Wirtschaftswissenschaftliche Fakultät

Search

Seminar: Information Systems Research


Lecturer: Prof. Dr. Daniel Veit; Sabrina Hauff, M.Sc.; Dipl. Wirtsch.-Inf. Jan Huntgeburth; Philipp Klöcker, M.Sc.; Amelie Sach, M.Sc.; Dipl. Wirtsch.-Inf. Manuel Trenz
Date: Application: 07.-20.10.2013;
Building/Room: Kick-Off: FW 2102
Autres dates: Announcement: 23.10.2013
Kick-Off: 30.10.2013, 10 a.m., room FW 2102
Presentation: in the period 14.01.-16.01.2014at Augsburg or
in the period 17.01.-19.01.2014 during a skiing weekend at Sitten/Sion (Switzerland)
Submission: 17.03.2014, 12 noon
Contact: Dipl. Wirtsch.-Inf. Jan Huntgeburth


Abstract:

At the end of this module, students have a basic understanding of empiricial research in information systems. Topics include IT innovation, IT adoption and continuance, digital strategy, business models, pricing, cloud computing, information privacy, electronic healthcare and others.

The goals of this seminar are:
  • Fundamental understanding of the principles of empirical academic work
  • Ability to systematically and independently adress a research topic
  • Knowledge of the methodological and theoretical foundations necessary to write a master thesis in the area of information systems


Content:

Part 1
  • Introduction to academic research principles and academic writing

Part 2

  • Examination of the topic and the research question
  • Investigation of the theoretical and methodological foundation
  • Structured analysis of the current state of research
  • Analysis and structuration of the results with regard to one specific topic in the field of information systems research

Part 3

  • Writing of the seminar thesis
  • Presentation and discussion of the results

 


Previous knowledge:

Basic knowledge of the topics (e.g., from attending our lectures) is beneficial.

Good command of English is useful for understanding the provided literature and preparing presentation and seminar paper.

We furthermore recommend attending introductory courses offered by the university library.

 


Literature:

Initial readings are provided during the seminar.

 

Application

Please note that you will already choose the period an place of your presentation during the application (through the application process). The choice can be made between the period 14.-16.01.2014 at Augsburg or 17.-19.01.2014 at Sitten/Sion (Switzerland).

The skiing seminar will take place in the buildings of the Kurt-Bösch foundation. Registration is EUR 10 per person plus EUR 7,50 per night and transfer, food and skiing ticket. The registration fee is to be paid before the seminar kick-off.

Please apply during the given application period here.

 

Seminar Topics

Title

1) Comparing resistance theory and acceptance theory in IS research

Goal

With the introduction of information technology, organizations are faced with either the “acceptance” of or “user resistance” to such technology, namely IT innovations, management information systems, clinical information systems etc. Hence, managers, IT professionals as well as the academic research community have studied these phenomena in detail. The aim of this seminar paper is to give a comprehensive overview over the related literature on these two theories and single out the differing factors behind “acceptance” and “resistance” to information systems.

Readings on the Topic (T) and possible Methods (M)

T: Dwivedi et al. (2012): “Information System Theory, Explaining and Predicting Our Digital Society, Vol. 1; Springer Science + Business Media

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii.

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).


Title

2) Information Privacy in e-Health

Goal

More and more health information gets stored electronically, e.g. in an electronic health record at your health insurance company or at healthcare providers.  Many patients fear that their sensitive and confidential information is put at risk by this, especially since they are afraid that organizations do not take appropriate steps to protect their data. Goal of this seminar paper is to conduct a systematic literature review and analyze the role of information privacy in e-health literature.

Readings on the Topic (T) and possible Methods (M)

T: Angst, C.M.; Agarwal, R. (2009): Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion. MIS Quarterly (33:2), pp. 339-370.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

 



Title

3) Intention and Actual Behavior – The Same or Different?

Goal

Does the intention to do something always lead to the according behavior? Theories like the theory of reasoned action or the theory of planned behavior suggest this relationship and are often used in IS research. However, opposite evidence has also been found in some areas, e.g. information privacy or in innovation adoption.

The aim of this seminar thesis is to review academic literature considering the relationship between the constructs of intention and actual behavior and to investigate when and why they might be similar or different. A structured literature review method should be applied to fulfill this goal.

Readings on the Topic (T) and possible Methods (M)

T: Ajzen, I. (1991): The Theory of Planned Behvaior. Organizational Behavior and Human Decision Processes (50), pp. 179-211.

T: Fishbein, M.; Ajzen, I. (1975):Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.

T: Norberg, P.A.; Horne, D.R.; Horne, D.A. (2007): The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs (41:1), pp. 100-126.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.



Title

4) Stakeholder theory in IS research – a systematic literature review

Goal

The aim of this paper is to identify and structure the most important stakeholders/stakeholder groups involved in the introduction of IS systems. The student pursuing this paper should conduct a systematic literature overview with regards to stakeholder theory in IS and pinpoint what influence these stakeholders/stakeholder groups have on the adoption of IS systems.

Readings on the Topic (T) and possible Methods (M)

T: Dwivedi et al. (2012): “Information System Theory, Explaining and Predicting Our Digital Society, Vol. 1; Springer Science + Business Media

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii.

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).




Title

5) The impact of digital media on the public (dis)approval of organizations

Goal

Advances in information and communication technology have made it more difficult for companies to keep control over how they are perceived by various audiences. This trend combined with a general growing skepticism towards profit-driven firms represents a serious threat to organizations. The aim of this seminar paper is to review and structure existing literature as well as to identify research gaps.

Readings on the Topic (T) and possible Methods (M)

T: Bunting, M.; Lipski, R. (2000). Drowned out? Rethinking Corporate Reputation Management for the Internet. Journal of Communication Management, (5:2), pp.170-178.

T: Tucker, L.; Melewar, T. C. (2005). Corporate Reputation and Crisis Management: The Threat and Manageability of Anti-corporatism. Corporate Reputation Review (7:4), pp. 377-387.

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.



Title

6) The influence of social norms on IS adoption – a systematic literature review

Goal

The aim of this paper is to conduct a systematic literature review offering an overview on how social norms have influenced the introduction of information systems. The student pursuing this paper should identify the different forms of social norms. Finally, a short comparison to institutional theory should be part of this exercise.

Readings on the Topic (T) and possible Methods (M)

T: Venkatesh et al. (2003): User acceptance of information technology: Toward a unified view. MIS Quarterly, (27:3), p425-478

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly (26:2), p. xiii-xxiii.

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).



Title

7) The relationship between stakeholder activities, infomediaries, and organizational response to ethical issues

Goal

Whether and how organizations respond to ethical issues is the result of a socially constructed process. Taking into account not only stakeholder activities but also the role infomediaries, i.e., third-party organizations, further highlights the likewise social nature of information exchange. The aim of this seminar paper is to review and structure existing literature as well as to identify research gaps.

Readings on the Topic (T) and possible Methods (M)

T: Agle, B. R.; Mitchell, R. K.; Sonnenfeld, J. A. (1999). Who Matters to CEOs? An Investigation of Stakeholder Attributes and Salience, Corporate Performance, and CEO Values. Academy of Management Journal (42:5), pp. 507-525.

T: Deephouse, D.L.; Pursey, P.M.; Heugens, A.R. (2009). Linking Social Issues to Organizational Impact: The Role of Infomediaries and the Infomediary Process. Journal of Business Ethics (86:4), pp. 5 41-553.

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.



Title

8) The role of IS in managerial cognition

Goal

Managerial cognition refers to the way managers perceive, interpret, and reason about environmental, conceptual environmental or organizational stimuli. It is seen as a crucial mediator between changes in the external environment and corresponding organizational responses. Information systems assisting in gathering information from outside the organization can significantly shape the process of managerial cognition. The aim of this seminar paper is to review and structure existing literature as well as to identify research gaps.

Readings on the Topic (T) and possible Methods (M)

T: Kiesler, S.; Sproull, L. (1982). Managerial Response to Changing Environments: Perspectives on Problem Sensing from Social Cognition. Administrative Science Quarterly (27:4), pp. 548-570.

T: Ahituv, N.; Zif, J.; Machlin, I. (1998). Environmental Scanning and Information Systems in Relation to Success in Introducing New Products. Information & Management (33:4), pp. 201-2011.

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

 

 

Title

9) The Role of Social Influences on Adoption Behavior

Goal

Whether a newly developed technology becomes a success or a failure is an important issue for organizations. Within the last years, adoption theories have focused not only on people's beliefs, technology usability or its usefulness to explain adoption decisions but also incorporated the social enviornment to account for the social influence of third parties. Even more, the emergence of social media has put new emphasis on social influences since it enables new ways of communication and collaboration. Thus, aim of this study is to summon and compare adoption literature in an IS context that includes a construct of social influence like peer pressure, social norms, or the perceived behavior of others, to explain adoption and usage behavior of information technology.

Readings on the Topic (T) and possible Methods (M)

T: Dickinger, A.; Arami, M.; Meyer, D. (2009): The Role of Perceived Enjoyment and Social Norm in the Adoption of Technology with Network Externalities. European Journal of Information Systems (17:1), pp. 4-11.

T: Eckhardt. A.; Laumer, S.; Weitzel, T. (2009): Who Influences Whom? Analyzing Workplace Referents' Social Influence on IT Adoption and Non-Adoption. Journal of Information Technology (24:1), pp. 11-24.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

 


More information:

Recommended semester: any semester
Field of study: Master
Duration: 4 SWS
Type: S - Seminar
Credit points: 6 ECTS
Area: iBWL: O&I
Examination: Presentation / term paper
Exam offered: every term
Duration of exam: 30 minutes
Semester: every summer and winter term