Papers by France Belanger
Advances in information technologies facilitate new organizational forms and new ways of structur... more Advances in information technologies facilitate new organizational forms and new ways of structuring work, such as the use of distributed teams. In distributed environments, individuals have many choices of communication modes for use with colleagues. Previous research has primarily addressed the need for richness of a medium to “fit ” the characteristics of the communication task being performed. There has been little research on when and how different communication technologies are used in the performance of specific communication-based work processes (e.g., information gathering, relationship development). Using an interpretive case study approach, and guided by a hermeneutic perspective, texts from interviews of 40 individuals working in distributed teams in two organizations were analyzed. Analysis was conducted in three stages: (1) key patterns of meanings expressed by each employee, (2) key patterns of meaning that emerge across organizations, and (3) broader conceptual and m...
Information systems security (ISS) has become one of the top agendas of companies located in the ... more Information systems security (ISS) has become one of the top agendas of companies located in the developed world. Despite this fact, there is an increasing trend in the types and frequency of ISS breaches. Most of the time researchers and practitioners focus on threat that are caused by external agents while most of the threats are originated from insiders. In addition to this, the majority of the investments and researches around ISS are limited to technically oriented solutions. It is now realized that the technical approach alone couldn’t bring the required level of ISS, and this led ISS researchers to embark on socio-technical approaches. One of the critical social factors that has been given little emphasis is culture. Thus, this research investigates the impact of national culture on employees’ ISS behaviour. Specifically, it answers the question “what is the moderating impact of national culture on the influence of ISS countermeasures on employees’ intention to violate ISS po...
Computers & Security
ABSTRACT Recent decades have seen numerous studies of individual information security behaviors a... more ABSTRACT Recent decades have seen numerous studies of individual information security behaviors and compliance within organizational contexts. One regular finding is that individuals continue to fail at compliance; however the explanations for why this occurs typically fail to consider the temporal, emergent and dynamic nature of security encounters between human users information security-related artifacts when they come together in the practice of security. In addition, existing research typically does not consider the inherent tension that exists between information systems (IS) use and security controls where the former is used to perform tasks and the latter may constrain the accomplishment of those tasks. This paper offers a new perspective that may better explain how the human and the security-related artifacts they create interact to both afford and constrain the enactment of information security. Our perspective builds on Pickering's mangle of practice metaphor to consider the constitutive entanglement of humans and artifacts and explain information security behaviors. This perspective is applied and discussed in the context of insider compliance with information security policies but could apply to a wide range of other information security and information systems behavioral contexts.
Proceedings of the 50th Hawaii International Conference on System Sciences (2017)
Increasing collection of individuals' information has led to several security and privacy issues,... more Increasing collection of individuals' information has led to several security and privacy issues, such as identity theft and targeted marketing. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. Most existing research considers threats to privacy and security as separate concerns, resulting in separate research streams. However, focusing on information privacy alone results in a lack of understanding of the security ramifications of individual information disclosure. Using the Information Motivation Behavioral (IMB) Skills Model as a theoretical foundation, we develop the Knowledge Gap Model of Security and Privacy Behavior. In the model, we propose that two knowledge gaps exist that affect how individuals enact security and privacy behaviors: the security-privacy knowledge gap, and the knowledge-belief gap. We use the model to develop a research agenda for future research.
Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017
Increasing collection of individuals' information has led to several security and privacy issues,... more Increasing collection of individuals' information has led to several security and privacy issues, such as identity theft and targeted marketing. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. Most existing research considers threats to privacy and security as separate concerns, resulting in separate research streams. However, focusing on information privacy alone results in a lack of understanding of the security ramifications of individual information disclosure. Using the Information Motivation Behavioral (IMB) Skills Model as a theoretical foundation, we develop the Knowledge Gap Model of Security and Privacy Behavior. In the model, we propose that two knowledge gaps exist that affect how individuals enact security and privacy behaviors: the security-privacy knowledge gap, and the knowledge-belief gap. We use the model to develop a research agenda for future research.
The Journal of Strategic Information Systems
Abstract With increasingly digitization, more and more information is collected from individuals ... more Abstract With increasingly digitization, more and more information is collected from individuals and organizations, leading to several privacy concerns. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. When individuals use their own devices in work settings, these issues become concerns for organization as well. The question then is how to ensure individuals perform proper information protection behaviors on mobile devices. In this research, we develop a model of mobile information protection based on an integration of the Theory of Planned Behavior and the information privacy literature to explore the antecedents of the attitude of individuals towards sharing information on their mobile devices, their intentions to use protective settings, and their actual practices. The model is tested with data from 228 iPhone users. The results indicate that mobile information protection intention leads to actual privacy settings practice, and that attitude towards information sharing and mobile privacy protection self-efficacy affect this intention. Determinants of attitude towards information sharing include mobile privacy concern and trust of the mobile platform. Finally, prior invasion experience is related to privacy concern. These findings provide insights into factors that can be targeted to enhance individuals’ protective actions to limit the amount of digital information they share via their smartphones.
Communications of the Association for Information Systems
Study abroad programs can represent an important component of an Information Systems (IS) educati... more Study abroad programs can represent an important component of an Information Systems (IS) education. This article presents the views of five scholars on study abroad education. These views are based on their experiences leading such programs, and were presented during a panel session at the America's Conference on Information Systems (AMCIS) 2010 in Lima, Peru. The panel discussed short-term (seven to fourteen days), medium-term (fourteen to thirty days), and long-term study abroad experiences. In addition, the panelists touched on the logistical issues related to leading a study abroad trip, and on lessons learned by the panelists.
Journal of the Association for Information Systems
Information systems (IS) researchers often explore complex phenomena that result from the interpl... more Information systems (IS) researchers often explore complex phenomena that result from the interplay between technologies and human actors; as such, IS research frequently involves constructs found at multiple levels of analysis, although rarely recognized as such. In fact, our targeted review of the IS literature found minimal explicit consideration of the issues posed by multilevel research although a number of studies implicitly conducted research at multiple levels. In this paper, we discuss the issues that result from not explicitly recognizing the multilevel nature of one's work and offer guidance on how to identify and explicitly conduct multilevel IS research. Recognizing the relevance of multilevel research for the IS domain, we discuss a systematic approach to conduct quantitative multilevel IS research that is grounded in an overarching framework that focuses equally on testing variables and entities. We also highlight the unique role of IS in developing multilevel opportunities for researchers. Finally, we identify a number of gaps within the IS literature in which specific multilevel research questions may be articulated. Such explicit consideration of multilevel issues in future IS research will not only improve IS research but contribute to the larger discourse on multilevel research.
MIS Quarterly
After searching for the keywords "information privacy" in ABI/Informs focusing on scholarly artic... more After searching for the keywords "information privacy" in ABI/Informs focusing on scholarly articles, we obtained a listing of 340 papers. We first eliminated papers that were anonymous, table of contents, interviews with experts, or short opinion pieces. We also removed articles not related to our focus on information privacy research in IS literature. A total of 218 articles were removed as explained in Table A1.
Privacy Strategies for Electronic Government 163 Introduction Electronic commerce in the private ... more Privacy Strategies for Electronic Government 163 Introduction Electronic commerce in the private sector is growing by astronomical meas-ures. Estimates vary greatly, but commerce on the Internet has been forecasted to exceed $37 billion in the next three years. In addition, the number ...
Abstract As children increasingly use the Internet, there have been mounting concerns about their... more Abstract As children increasingly use the Internet, there have been mounting concerns about their privacy online. As a result, the US Congress enacted the Children's Online Privacy Protection Act (COPPA) in 1998 to prohibit web sites from collecting information from children under 13 years of age without verifiable parental consent. Unfortunately, few technologies and tools are available for parents to provide this consent. Further, our research demonstrates that very few parents are even aware of the laws and technologies ...
Amcis 1998 Proceedings, 1998
... Other characteristics of DE include joining the teacher and learner through media, and the pr... more ... Other characteristics of DE include joining the teacher and learner through media, and the provision for two-way communication (Keegan, 1986). ... usage of both computers and telecommunications to substitute for the commute of employees to an office (Belanger & Collins, ...
Metrics for assessing online customer satisfaction (e-satisfaction) are essential in gauging the ... more Metrics for assessing online customer satisfaction (e-satisfaction) are essential in gauging the success and failure of e-commerce. The Internet business must determine and understand the values of its existing and potential customers. Hence, it's important for researchers to develop and validate a diverse array of metrics to comprehensively capture the attitudes and feelings of online customers. What factors make on-line shopping appealing? What customer values take priority? This study's purpose is to answer these questions, examining the role of several technology, shopping, and product factors using a conjoint analysis of consumer preferences to measure e-satisfaction. The study will result in the development of an e-satisfaction conceptual model and metric.
Journal of Electronic Commerce Research, 2005
... available for a product is perceived as more important by consumers in affecting their satisf... more ... available for a product is perceived as more important by consumers in affecting their satisfaction? ... the environmental correlation between factors is large and the number of factors on the ... Sample The sample consisted of 188 undergraduate students (average age of 22 years old ...
Information Technology Learning and Performance Journal, 2000
As today’s knowledge workers tend to have less clearly defined outputs, many organizations are co... more As today’s knowledge workers tend to have less clearly defined outputs, many organizations are concerned with employees’ non-work use of technologies during office hours. In addition, as organizations strive to increase the job efficiency of new hires, managers must collapse overall training time while providing constant on-the-job training. This manuscript argues that individuals’ play with computer applications can be considered a form of self-directed, experiential learning. Drawing from information systems research and individual learning theories, an emerging framework for research on the role of application and technology play in individual learning is proposed. The framework suggests that self-directed experience and application of technology to work-related tasks is a moderator of the relationship between selfdirected experience and individual learning. The manuscript presents two real life examples to illustrate the inter-relationships of the constructs in the framework. Research recommendations and guidelines for practitioners are then presented.
Proceedings of the 2000 Information Resources Management Association International Conference on Challenges of Information Technology Management in the 21st Century, May 21, 2000
Google, Inc. (search). SIGN IN SIGN UP. Perceptions of business-to-consumer electronic commerce: ... more Google, Inc. (search). SIGN IN SIGN UP. Perceptions of business-to-consumer electronic commerce: a comparison of two cultures. Authors: France Belanger, Craig van Slyke, Published in: · Proceeding. Proceedings of the 2000 ...
Uploads
Papers by France Belanger