“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels
Tóm tắt
Từ khóa
Tài liệu tham khảo
Berinsky, 2012, Evaluating online labor markets for experimental research: Amazon.com’s Mechanical Turk, Polit. Anal., 20, 351, 10.1093/pan/mpr057
Birnbaum, 2004, Human research and data collection via the Internet, Annu. Rev. Psychol., 55, 803, 10.1146/annurev.psych.55.090902.141601
Boss, 2015, What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors, MIS Quart., 39, 837, 10.25300/MISQ/2015/39.4.5
Buchanan, 1999, Research on the Internet: validation of a World-Wide Web mediated personality scale, Behav. Res. Methods, 31, 565, 10.3758/BF03200736
Buchanan, 1999, Using the Internet for psychological research: personality testing on the World Wide Web, Br. J. Psychol., 90, 125, 10.1348/000712699161189
Buhrmester, 2011, Amazon’s Mechanical Turk: a new source of inexpensive, yet high-quality, data?, Perspect. Psychol. Sci., 6, 3, 10.1177/1745691610393980
Burgoon, 2016, Application of expectancy violations theory to communication with and judgments about embodied agents during a decision-making task, Int. J. Hum Comput Stud., 91, 24, 10.1016/j.ijhcs.2016.02.002
Cenfetelli, 2009, Interpretation of formative measurement in information systems research, MIS Quart., 33, 689, 10.2307/20650323
Chatterjee, 2015, Strategic relevance of organizational virtues enabled by information technology in organizational innovation, J. Manage. Inform. Syst., 32, 158, 10.1080/07421222.2015.1099180
D’Arcy, 2014, Understanding employee responses to stressful information security requirements: a coping perspective, J. Manage. Inform. Syst., 31, 285, 10.2753/MIS0742-1222310210
D’Arcy, 2009, User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach, Inform. Syst. Res., 20, 79, 10.1287/isre.1070.0160
Davis, 1989, Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quart., 13, 319, 10.2307/249008
Downs, J.S., Holbrook, M.B., Sheng, S., Cranor, L.F., 2010, April 10–15. Are your participants gaming the system?: Screening mechanical turk workers. Paper presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA.
Gefen, 2005, A practical guide to factorial validity using PLS-Graph: tutorial and annotated example, Commun. Assoc. Inform. Syst., 16, 91
Goodman, 2013, Data collection in a flat world: the strengths and weaknesses of Mechanical Turk samples, J. Behav. Dec. Making, 26, 213, 10.1002/bdm.1753
Gosling, 2004, Should we trust Web-based studies? A comparative analysis of six preconceptions about Internet questionnaires, Am. Psychol., 59, 93, 10.1037/0003-066X.59.2.93
Grover, 2015, New state of play in information systems research: the push to the edges, MIS Quart., 39, 271, 10.25300/MISQ/2015/39.2.01
Hansen, 2007, Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection, Decis. Support Syst., 43, 1362, 10.1016/j.dss.2006.04.004
Harms, 2015, Caution! MTurk workers ahead—fines doubled, Indust. Org. Psychol., 8, 183, 10.1017/iop.2015.23
Hsu, 2015, The role of extra-role behaviors and social controls in information security policy effectiveness, Inform. Syst. Res., 26, 282, 10.1287/isre.2015.0569
Jenkins, 2014, Improving password cybersecurity through inexpensive and minimally invasive means: detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings, Inform. Technol. Develop., 20, 196, 10.1080/02681102.2013.814040
Jia, R., Reich, B.H., 2008, December 14–17. IT service climate: The validation of an antecedent construct for IT service quality. Paper presented at the 29th International Conference on Information Systems (ICIS 2008), Paris, France.
Jia, 2011, IT service climate—an essential managerial tool to improve client satisfaction with IT service quality, Inform. Syst. Manage., 28, 174, 10.1080/10580530.2011.562401
Jia, 2013, IT service climate, antecedents and IT service quality outcomes: some initial evidence, J. Strategic Inform. Syst., 22, 51, 10.1016/j.jsis.2012.10.001
Jia, 2008, IT service climate: an extension to IT service quality research, J. Assoc. Inform. Syst., 9, 294
Kittur, A., Chi, E.H., Suh, B., 2008, April 5–10. Crowdsourcing user studies with Mechanical Turk. Paper presented at the 26th Conference on Human Factors in Computing Systems, Florence, Italy.
Landers, 2015, An inconvenient truth: arbitrary distinctions between organizational, Mechanical Turk, and other convenience samples, Indust. Org. Psychol., 8, 142, 10.1017/iop.2015.13
Lowry, 2014, Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it, IEEE Trans. Prof. Commun., 57, 123, 10.1109/TPC.2014.2312452
Lowry, 2015, Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust, Inform. Syst. J., 25, 193, 10.1111/isj.12063
Lowry, 2016, Creating agile organizations through IT: the influence of internal IT service perceptions on IT service quality and IT agility, J. Strategic Inform. Syst., 25, 211, 10.1016/j.jsis.2016.05.002
Mason, 2012, Conducting behavioral research on Amazon’s Mechanical Turk, Behav. Res. Methods, 44, 1, 10.3758/s13428-011-0124-6
Mathy, 2002, Methodological rigor with Internet samples: new ways to reach underrepresented populations, Cyberpsychol. Behav., 5, 253, 10.1089/109493102760147259
Meyerson, 2003, Validating Internet research: a test of the psychometric equivalence of Internet and in-person samples, Behav. Res. Methods, Instr., Comput., 35, 614, 10.3758/BF03195541
Miliaikeala, S.J., Heen, M.A., Liberman, J.D., Miethe, T.D., 2014. A comparison of different online sampling approaches for generating national samples. UNLV Center for Crime and Justice Policy: Research Brief. Retrieved from <https://www.unlv.edu/sites/default/files/page_files/27/ComparisonDifferentOnlineSampling.pdf>.
Moody, 2015, Lost in cyberspace: the impact of information scent and time constraints on stress, performance, and attitudes online, J. Manage. Inform. Syst., 32, 192, 10.1080/07421222.2015.1029391
Moody, 2016, It’s complicated: Explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis, European Journal of Information Systems
Moody, 2016, Facilitating the transformational: An exploration of control in cyberinfrastructure projects, Inform. Syst. Res., 10.1287/isre.2016.0619
Oliver, 1980, A cognitive model of the antecedents and consequences of satisfaction decisions, J. Mark. Res., 17, 460, 10.2307/3150499
Parks, 2016, Examining the intended and unintended consequences of organisational privacy safeguards enactment in healthcare: a grounded theory investigation, Eur. J. Inform. Syst., 10.1057/s41303-016-0001-6
Posey, 2015, The impact of organizational commitment on insiders’ motivation to protect organizational information assets, J. Manage. Inform. Syst., 32, 179, 10.1080/07421222.2015.1138374
Reips, 2002, Standards for Internet-based experimenting, Exper. Psychol., 49, 243, 10.1026//1618-3169.49.4.243
Rouse, 2015, A reliability analysis of Mechanical Turk data, Comput. Hum. Behav., 43, 304, 10.1016/j.chb.2014.11.004
Scott, 2015, Why do managers act fairly in the first place? A daily investigation of “hot” and “cold” motives and discretion, Acad. Manag. J., 57, 37
Skitka, 2006, The Internet as psychological laboratory, Annu. Rev. Psychol., 57, 529, 10.1146/annurev.psych.57.102904.190048
Smith, 2015, A convenient solution: Using MTurk to sample from hard-to-reach populations, Indust. Org. Psychol., 8, 220, 10.1017/iop.2015.29
Stanton, 1998, An empirical assessment of data collection using the Internet, Personnel, 51, 709, 10.1111/j.1744-6570.1998.tb00259.x
Steelman, 2014, Data collection in the digital age: innovative alternatives to student samples, MIS Quart., 38, 355, 10.25300/MISQ/2014/38.2.02
Twyman, 2014, Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals, J. Manage. Inform. Syst., 31, 106, 10.1080/07421222.2014.995535
Wall, 2016, Organizational violations of externally governed privacy and security rules: explaining and predicting selective violations under conditions of strain and excess, J. Assoc. Inform. Syst., 17, 39
Wilson, 2002, Responsible authorship and peer review, Sci. Eng. Ethics, 8, 155, 10.1007/s11948-002-0016-3
Woo, 2015, Amazon Mechanical Turk for industrial and organizational psychology: advantages, challenges, and practical recommendations, Ind. Org. Psychol., 8, 171, 10.1017/iop.2015.21