“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels

The Journal of Strategic Information Systems - Tập 25 Số 3 - Trang 232-240 - 2016
Paul Benjamin Lowry1, John D’Arcy2, Bryan Hammer3, Gregory D. Moody4
1Innovation and Information Management, School of Business, Faculty of Business and Economics, K. K. Leung Building, The University of Hong Kong, China
2Accounting & MIS, University of Delaware, 220 Purnell Hall, Newark, DE 19716, USA
3Management Science and Information Systems, 222 Business Building, Stillwater Campus, Spears School of Business, Oklahoma State University, Stillwater, OK 74078-4011, USA
4Department of Management Information Systems, 329 BEH, Lee Business School, University of Nevada-Las Vegas, Las Vegas, NV 89154, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Berinsky, 2012, Evaluating online labor markets for experimental research: Amazon.com’s Mechanical Turk, Polit. Anal., 20, 351, 10.1093/pan/mpr057

Birnbaum, 2004, Human research and data collection via the Internet, Annu. Rev. Psychol., 55, 803, 10.1146/annurev.psych.55.090902.141601

Boss, 2015, What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors, MIS Quart., 39, 837, 10.25300/MISQ/2015/39.4.5

Buchanan, 1999, Research on the Internet: validation of a World-Wide Web mediated personality scale, Behav. Res. Methods, 31, 565, 10.3758/BF03200736

Buchanan, 1999, Using the Internet for psychological research: personality testing on the World Wide Web, Br. J. Psychol., 90, 125, 10.1348/000712699161189

Buhrmester, 2011, Amazon’s Mechanical Turk: a new source of inexpensive, yet high-quality, data?, Perspect. Psychol. Sci., 6, 3, 10.1177/1745691610393980

Burgoon, 2016, Application of expectancy violations theory to communication with and judgments about embodied agents during a decision-making task, Int. J. Hum Comput Stud., 91, 24, 10.1016/j.ijhcs.2016.02.002

Cenfetelli, 2009, Interpretation of formative measurement in information systems research, MIS Quart., 33, 689, 10.2307/20650323

Chatterjee, 2015, Strategic relevance of organizational virtues enabled by information technology in organizational innovation, J. Manage. Inform. Syst., 32, 158, 10.1080/07421222.2015.1099180

D’Arcy, 2014, Understanding employee responses to stressful information security requirements: a coping perspective, J. Manage. Inform. Syst., 31, 285, 10.2753/MIS0742-1222310210

D’Arcy, 2009, User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach, Inform. Syst. Res., 20, 79, 10.1287/isre.1070.0160

Davis, 1989, Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quart., 13, 319, 10.2307/249008

Downs, J.S., Holbrook, M.B., Sheng, S., Cranor, L.F., 2010, April 10–15. Are your participants gaming the system?: Screening mechanical turk workers. Paper presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA.

Gefen, 2005, A practical guide to factorial validity using PLS-Graph: tutorial and annotated example, Commun. Assoc. Inform. Syst., 16, 91

Goodman, 2013, Data collection in a flat world: the strengths and weaknesses of Mechanical Turk samples, J. Behav. Dec. Making, 26, 213, 10.1002/bdm.1753

Gosling, 2004, Should we trust Web-based studies? A comparative analysis of six preconceptions about Internet questionnaires, Am. Psychol., 59, 93, 10.1037/0003-066X.59.2.93

Grover, 2015, New state of play in information systems research: the push to the edges, MIS Quart., 39, 271, 10.25300/MISQ/2015/39.2.01

Hansen, 2007, Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection, Decis. Support Syst., 43, 1362, 10.1016/j.dss.2006.04.004

Harms, 2015, Caution! MTurk workers ahead—fines doubled, Indust. Org. Psychol., 8, 183, 10.1017/iop.2015.23

Hsu, 2015, The role of extra-role behaviors and social controls in information security policy effectiveness, Inform. Syst. Res., 26, 282, 10.1287/isre.2015.0569

Jenkins, 2014, Improving password cybersecurity through inexpensive and minimally invasive means: detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings, Inform. Technol. Develop., 20, 196, 10.1080/02681102.2013.814040

Jia, R., Reich, B.H., 2008, December 14–17. IT service climate: The validation of an antecedent construct for IT service quality. Paper presented at the 29th International Conference on Information Systems (ICIS 2008), Paris, France.

Jia, 2011, IT service climate—an essential managerial tool to improve client satisfaction with IT service quality, Inform. Syst. Manage., 28, 174, 10.1080/10580530.2011.562401

Jia, 2013, IT service climate, antecedents and IT service quality outcomes: some initial evidence, J. Strategic Inform. Syst., 22, 51, 10.1016/j.jsis.2012.10.001

Jia, 2008, IT service climate: an extension to IT service quality research, J. Assoc. Inform. Syst., 9, 294

Kittur, A., Chi, E.H., Suh, B., 2008, April 5–10. Crowdsourcing user studies with Mechanical Turk. Paper presented at the 26th Conference on Human Factors in Computing Systems, Florence, Italy.

Landers, 2015, An inconvenient truth: arbitrary distinctions between organizational, Mechanical Turk, and other convenience samples, Indust. Org. Psychol., 8, 142, 10.1017/iop.2015.13

Lowry, 2014, Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it, IEEE Trans. Prof. Commun., 57, 123, 10.1109/TPC.2014.2312452

Lowry, 2015, Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust, Inform. Syst. J., 25, 193, 10.1111/isj.12063

Lowry, 2016, Creating agile organizations through IT: the influence of internal IT service perceptions on IT service quality and IT agility, J. Strategic Inform. Syst., 25, 211, 10.1016/j.jsis.2016.05.002

Mason, 2012, Conducting behavioral research on Amazon’s Mechanical Turk, Behav. Res. Methods, 44, 1, 10.3758/s13428-011-0124-6

Mathy, 2002, Methodological rigor with Internet samples: new ways to reach underrepresented populations, Cyberpsychol. Behav., 5, 253, 10.1089/109493102760147259

Meyerson, 2003, Validating Internet research: a test of the psychometric equivalence of Internet and in-person samples, Behav. Res. Methods, Instr., Comput., 35, 614, 10.3758/BF03195541

Miliaikeala, S.J., Heen, M.A., Liberman, J.D., Miethe, T.D., 2014. A comparison of different online sampling approaches for generating national samples. UNLV Center for Crime and Justice Policy: Research Brief. Retrieved from <https://www.unlv.edu/sites/default/files/page_files/27/ComparisonDifferentOnlineSampling.pdf>.

Moody, 2015, Lost in cyberspace: the impact of information scent and time constraints on stress, performance, and attitudes online, J. Manage. Inform. Syst., 32, 192, 10.1080/07421222.2015.1029391

Moody, 2016, It’s complicated: Explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis, European Journal of Information Systems

Moody, 2016, Facilitating the transformational: An exploration of control in cyberinfrastructure projects, Inform. Syst. Res., 10.1287/isre.2016.0619

Oliver, 1980, A cognitive model of the antecedents and consequences of satisfaction decisions, J. Mark. Res., 17, 460, 10.2307/3150499

Parks, 2016, Examining the intended and unintended consequences of organisational privacy safeguards enactment in healthcare: a grounded theory investigation, Eur. J. Inform. Syst., 10.1057/s41303-016-0001-6

Posey, 2015, The impact of organizational commitment on insiders’ motivation to protect organizational information assets, J. Manage. Inform. Syst., 32, 179, 10.1080/07421222.2015.1138374

Reips, 2002, Standards for Internet-based experimenting, Exper. Psychol., 49, 243, 10.1026//1618-3169.49.4.243

Rouse, 2015, A reliability analysis of Mechanical Turk data, Comput. Hum. Behav., 43, 304, 10.1016/j.chb.2014.11.004

Scott, 2015, Why do managers act fairly in the first place? A daily investigation of “hot” and “cold” motives and discretion, Acad. Manag. J., 57, 37

Skitka, 2006, The Internet as psychological laboratory, Annu. Rev. Psychol., 57, 529, 10.1146/annurev.psych.57.102904.190048

Smith, 2015, A convenient solution: Using MTurk to sample from hard-to-reach populations, Indust. Org. Psychol., 8, 220, 10.1017/iop.2015.29

Stanton, 1998, An empirical assessment of data collection using the Internet, Personnel, 51, 709, 10.1111/j.1744-6570.1998.tb00259.x

Steelman, 2014, Data collection in the digital age: innovative alternatives to student samples, MIS Quart., 38, 355, 10.25300/MISQ/2014/38.2.02

Twyman, 2014, Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals, J. Manage. Inform. Syst., 31, 106, 10.1080/07421222.2014.995535

Wall, 2016, Organizational violations of externally governed privacy and security rules: explaining and predicting selective violations under conditions of strain and excess, J. Assoc. Inform. Syst., 17, 39

Wilson, 2002, Responsible authorship and peer review, Sci. Eng. Ethics, 8, 155, 10.1007/s11948-002-0016-3

Woo, 2015, Amazon Mechanical Turk for industrial and organizational psychology: advantages, challenges, and practical recommendations, Ind. Org. Psychol., 8, 171, 10.1017/iop.2015.21

Zhu, 2015, Stop apologizing for your samples, start embracing them, Indust. Org. Psychol., 8, 228, 10.1017/iop.2015.30