HCI Bibliography Home | HCI Conferences | SIGHCI Archive | Detailed Records | RefWorks | EndNote | Hide Abstracts
SIGHCI Tables of Contents: 02030405060708091011121314

Proceedings of the 2013 AIS SIGHCI Workshop on HCI Research in MIS

Fullname:Proceedings of the 12th Annual Workshop on HCI Research in MIS
Editors:Richard Johnson; Soussan Djamasbi; Alexandra Durcikova; Hong Sheng; Miguel Aguire-Urreta
Location:Milan, Italy
Dates:2013-Dec-15
Publisher:AIS
Standard No:hcibib: SIGHCI13
Papers:26
Links:Workshop Proceedings | Workshop Program
Not Right Now! Cognitive and Behavioral Impacts of IT interruption Timing BIBAWeb Page 1
  Shamel Addas; Christopher M. Conway
Research in IT interruptions has shown that interruptions are frequently extremely detrimental to task performance. Past work has indicated that timing interruptions such that they occur on natural task boundaries can reduce the negative impact of the interruption. However, these interventions may not be very practical outside the laboratory. However, there has been significant research done in other realms which suggests that other types of time than the event time used in the interruptions literature might be implicated as well. We propose that timing interruptions on natural chunks of time may also ameliorate the negative effects of interruptions and be easier to implement. We propose a 2x2 laboratory study to validate our hypotheses.
IT Interruptions and Coordination Effectiveness in Software Development Groups: A Conceptual, Multilevel Model BIBAWeb Page 26
  Shamel Addas; Alain Pinsonneault
Research abounds on software teams enhancing their processes via IT. However, the unintended group-level effects of interruptions triggered by such IT are rarely examined. This paper develops a conceptual, multilevel model that focuses on the paths linking individually experienced IT interruptions to group coordination outcomes. Drawing on coordination theory and the work interruptions literature, we propose that different IT interruption types exhibit different effects. IT intrusions create resource constraints that emerge to the group level via interdependencies and debilitate group coordination effectiveness. To mitigate these effects, groups engage in coordination by task organization. IT interventions facilitate coordination by group problem-solving (a cross-level effect), which enhances coordination effectiveness. This research extends the IT interruptions literature by focusing on the multilevel effects, and extends the IT impacts literature by unearthing the unintended differential effects of IT via interruptions of group members' work.
Cognitive Workload Induced by Information Systems: Introducing an Objective Way of Measuring based on Pupillary Diameter Responses BIBAWeb Page 20
  Ricardo Buettner; Barbara Daxenberger; Andreas Eckhardt; Christian Maier
We present a novel method to derive users' cognitive workload intensity based on their pupillary diameter responses using eye-tracking technology. Contrary to several prior instruments with a static measurement our new method is applicable to all kind of experimental setting with varying degrees of difficulty with a dynamic measurement The method uses a hybrid data analysis approach making it suitable for analyzing basic information systems supporting the fulfillment of less difficult tasks as well as for evaluating more complex information systems containing several dynamic web elements, interaction functions and advertising banners supporting the fulfillment of tasks of all kinds of difficulty. We successfully evaluated the method by two experiments with different settings. The results of these experiments based on pupillary diameter responses show significant differences between tasks of low, medium, and high demand levels, and outline the suitability of our new method to accurately estimate IS users' cognitive workload in different scenarios.
Genetic Basis of Behavioral Security BIBAWeb Page 9
  Rachel Chung; Dennis F. Galletta
Behavioral genetics offers numerous opportunities to bridge gaps in biological research of IS and to shed light on the nature versus nurture debate. This study seeks to explain persistent weaknesses in behavioral security from a genetic perspective. A synthesis of current literatures on cognitive neuroscience, decision making, and fraud victimization suggests a genetic basis for user susceptibility to security risks such as phishing scams. Using the classic twin design, this study reports estimated heritability of behavioral security to be at least 29.15% by comparing concordance between 144 pairs of monozygotic (MZ) twins and that between 52 pairs of same-sex dyzygotic (DZ) twins. Zygosity of the twin pairs serves as the primary independent variable in the behavioral genetics analysis, while performance on a behavioral security test serves as the dependent measure. Implications of the study results are discussed with respect to IS research as well as managerial practices.
A Contextual Messaging Framework: Informing the Design of Effective Social Media Marketing Messages BIBAWeb Page 22
  Contantinos K. Coursaris; Wietske Van Osch
Despite the growing scholarship on social media (SM) marketing, a holistic consideration of what constitutes an informed messaging strategy has yet to emerge. Drawing on the contextual usability literature, this study proposes a Contextual Messaging Framework, encompassing four dimensions -- Brand, Industry, Medium, and Action -- that jointly drive the strategy, media type, and content as employed in a particular brand social media post and its subsequent effect on consumer engagement. Employing a longitudinal multiple case study of three Fortune 110 companies -- Delta Airlines, Wal-Mart, and McDonald's -- we analyzed 369 Facebook posts across two six-week data collection periods. Support was obtained for all hypotheses revealing that our framework not only offers a reliable set of conceptualizations and operationalizations that can be employed by SM researchers in future SM studies, but further offers a comprehensive lens that can guide SM practitioners in the design of effective messages that result in greater consumer engagement.
App-Like Mobile Optimization and User Experience BIBAWeb Page 12
  Soussan Djamasbi; Wilman Gomez; Georgi Kardzhaliyski; Tammy Liu; Frank Oglesby
Mobile devices allow companies to reach users anywhere anytime; however, these devices present the challenge of designing websites that can adapt to various screen sizes. Because competition is shifting more and more towards user experience creating a positive mobile experience is becoming increasingly important in maintaining a competitive edge in the market place. Research on creating positive mobile user experiences is still in its infancy. Currently there are two popular approaches for designing mobile websites: developing mobile apps and optimizing websites for mobile devices. In this study, we developed two mobile designs for an e-commerce website that combine the benefits of the above-mentioned popular approaches and avoid their disadvantages. We then tested the impact of these designs on user experience. Our preliminary results show that both designs facilitate a superior user experience; thus, our study provides a theoretical direction for developing visual design guidelines for mobile optimization of e-commerce websites.
IS Cognitive Load: An Examination of Measurement Convergence BIBAWeb Page 10
  Mary Dunaway; Zachary Steelman
Despite the growth and interest in information processing research, understanding the supporting role of information systems (IS) has been limited. While cognitive processing of information has been examined in learning environments with traditional learning tasks, the investigation of cognitive load within complex simulated IS learning environments has received less attention. Traditional measurement allows for a broad user evaluation of the ISs and actual usage from a holistic perspective; however, detailed synchronous evaluation of cognitive load during the usage of the IS may allow for more accurate assessment of how system features influence cognitive load and subsequent performance outcomes. Therefore, this research attempts to integrate traditional subjective and physiological measurements to examine cognitive load within a dynamic simulated IS learning environment. This research study focuses on how subjective and objective physiological (galvanic skin response (GSR), heart rate variability (HRV), and electroencephalography (EEG) measures of cognitive load compare in simulated IS training environments.
A First Perspective on Requirements of New-Generation Managers for Collaboration Technology to be Integrated into Management Support Systems BIBAWeb Page 23
  Hannes Feistenauer; Reiner Quick; Jörg H. Mayer
Companies today are mostly populated by new-generation managers -- consisting of digital natives and digital immigrants. New-generation managers have expanded their role in operations and have to make decisions faster than in the past. Management support systems (MSS) serve as managers' central, hands-on, day-to-day source of information. Thus, the present situation is favorable for redesigning MSS in two respects: On the one hand, new-generation managers' faster decision making is driving a new demand for self-service MSS. Unlike earlier MSS, self-service MSS accommodate individual user preferences and increasingly enable managers to operate MSS themselves. On the other hand, as companies become larger and more dispersed, face-to-face meetings and even telephone calls become less practical, but new collaboration technology is becoming increasingly important. Subject to these considerations, we examine collaboration technology -- technology assisting people working towards the same goals -- suitable to be incorporated into MSS for new-generation managers' self service.
The Persuasive Effect of Privacy Recommendations BIBAWeb Page 16
  Bart Knijnenburg; Hongxia Jin
Several researchers have recently suggested that in order to avoid privacy problems, location-sharing services should provide finer-grained methods of location-sharing. This may however turn each "check-in" into a rather complex decision that puts an unnecessary burden on the user. We present two studies that explore ways to help users with such location-sharing decisions. Study 1 shows that users' evaluation of their activity is a good predictor of the sharing action they choose. Study 2 develops several "privacy recommenders" that tailor the list of sharing actions to this activity evaluation. We find that these recommenders have a strong persuasive effect, and that users find short lists of recommended actions helpful. We also find, however, that users ultimately find it more satisfying if we do not ask them to evaluate the activity.
An Empirical Investigation of the Impact of Online Product Presentation on Hedonic Web Shopping BIBAWeb Page 5
  Eric Lim; Chee-Wee Tan; Dongback Seo; Dianne Cyr; Karsten de Vries
Despite the prevalence of online shopping, consumers' hedonic experience, when shopping online, is often limited due to static product images and uninspiring product description in textual form. To this end, this study endeavors to shed light on how contemporary and widely applied online product presentation formats influence consumers' hedonic web shopping experience. Building on the Theory of Reasoned Action (TRA), we advance a theoretical model that posits enjoyment and flow as positive indicators of consumers' hedonic web shopping experience, which in turn affects their behavioral intents to return and purchase from an e-commerce website. Our theoretical model is then subjected to empirical validation through an experiment that distinguishes between functional (product description) and visual (product display) dimensions of online product presentation. Findings suggest that hedonic web shopping could be induced through online product presentation that exhibits interactivity, vividness and social presence.
Information Sharing in the Context of Social Media: An Application of the Theory of Reasoned Action and Social Capital Theory BIBAWeb Page 17
  Xiaolin Lin; Mauricio Featherman; Saonee Sarker
Social media technologies are increasingly driving e-commerce activities. The intertwining of social media systems and e-commerce systems are creating new social commerce business models. At the core of these new business models is the need for individuals to upload information. This paper researches individual's information sharing behaviors in social media sites. With the goal of explaining the factors which drive or inhibit individual's information sharing, this research integrates factors from the Theory of Reasoned Action and Social capital Theory. Our research model identifies factors which influence individual's attitude and intentions toward sharing information in social media sites. In addition, by comparing the research results between female and male groups, we discovered significant gender differences in factors that influence information sharing behaviors. Lastly, practical and theoretical implications are discussed.
Multimedia in Requirements Elicitation: When to Show, to Speak, to Animate, or to Simulate BIBAWeb Page 13
  Michaela Luecke; Chen Zhang; William J. Kettinger
Requirements elicitation is considered to be the most difficult and most critical phase in software development due to the abstract information that is communicated during this process. Cross-functional team members communicate requirements to ultimately reach shared understanding of the user's needs. Given the increasing adoption of interactive simulation tools to facilitate the requirements elicitation process, we propose a study that investigates the impact of animations and simulations in combination with verbal information presented visually and auditorily on requirements elicitation performance through the lens of two theories from the education and learning domain: dual-coding theory and multimedia learning theory.
Selective Attention in Viewing Webpages: The Effects of Perceptual Salience and Content Relevance on Attention and Memory BIBAWeb Page 19
  Cheng Luo; Zhenhui Jiang
It is well acknowledged that viewers' attention is a scarce resource on the web so that it is of great importance to figure out the factors in determining attention allocation when Internet users are viewing webpages. Current study addresses above question by reviewing prior literature on selective attention and proposing a research model, which emphasizes the roles of perceptual salience and perceived relevance of a visual object in catching and holding viewers' attention as well as in increasing their memory of the visual object. In addition, our research takes a prevalent online information presentation format into consideration, i.e., a visual object that integrates both pictorial and textual information. We discuss the different roles of pictures and texts in affecting viewers' attention. A lab experiment is designed to test our hypotheses and we use eye-tracker to record viewers' attention. We conclude our work by discussing the theoretical and practical implications of this study.
How do You Choose What to Use? Technology Choice When You Have So Much BIBAWeb Page 3
  Tamilla Mavlanova; Sidne Ward; Mark Silver
This research-in-progress provides a fresh insight into technology choice in our daily activities. As opposed to prior studies that focus on technology in the work environment, this research is centered on individual technology choice while performing daily tasks: searching for information, executing transactions, consuming entertainment, and communicating. As hardware has become more affordable, more varied in size, and more diverse in features, individuals have access to a plethora of different devices -- smartphones, tablets, laptops, and desktop computers. Individuals also have a choice of software: apps versus web browsers. Our research focuses on understanding why individuals choose specific combinations of hardware and software to perform their tasks. By studying this phenomenon, our proposed research program can contribute to understanding individuals' technology choices and inform organizations providing applications to consumers.
Investigating the Effect of Input Device on Memory Retrieval: Evidence from Theta and Alpha Band Oscillations BIBAWeb Page 15
  Seyedmohammadmahdi Mirhoseini; Pierre-Majorique Leger; Sylvain Senecal; Marc Fredette; Ann-Frances Cameron; René Riedl
The goal of this study is to investigate the effect of input device on brain oscillations in Alpha and Theta frequency bands, and the effect of Alpha/Theta on memory retrieval in a recall task. Prior neuroscience research suggests that memory performance is associated with synchronization in Theta band and desynchronization in Alpha band. A between-subject experiment was designed and the electroencephalography (EEG) was recorded during memory retrieval. Preliminary analysis suggests a negative relationship between the Alpha/Theta frequencies and recognition rate during memory retrieval. The effect of input device on the Alpha/Theta frequencies is not significant, but post hoc analysis suggests that the relationship between the Alpha/Theta frequencies and recognition rate differs depending on the input device used.
Are You Annoyed? The Effects of Mobile Device User Interface and Intrusiveness of Security Notifications on User Security Perceptions BIBAWeb Page 7
  Gregory Moody; Dezhi Wu
Research on the behavioral-based security of information systems within organizations and for personal use has been common over the last decade, however little is known regarding how individuals perceive the security of their mobile devices. This study seeks to explore how the security notifications within a mobile application environment alter adoption and security-related beliefs concerning their device. We proposed a theoretical model based on the technology adoption and psychological theories, and conducted a set of controlled experiments with 351 subjects in six US universities. A structural equation modeling technique was utilized to examine the overall research model. The data analysis results demonstrate that the majority of our proposed hypotheses were significant. We find that disruptive mobile security notifications cause user irritation, which negatively impacts user perception about mobile security. Mobile device user interface also has compounding effects on users' perceived usefulness and security with mobile devices.
Applying Extended Adaptive Structuration Theory to Qualitative Research on Human-Computer Interaction BIBAWeb Page 2
  Michael J. Scialdone; Ping Zhang
Interaction, as the central tenet in Human-Computer Interaction phenomenon, lends itself to considering those characteristics of technologies that humans can perceive and/or interact with directly. However, Griffith (1999) noted that deciphering technology features is ambiguous with multiple levels of granularity that can be further deconstructed. Deciding which granularity levels technological features should be considered at can be challenging to HCI scholars. This paper demonstrates how to apply extended Adaptive Structuration Theory (eAST) (Markus & Silver, 2008) to data collection and analysis in a way that can address phenomena at an appropriate level of technological abstraction. Our approach helps to provide researchers with clear guidance as to how to understand human interaction with technologies in such a way as to provide insight on information technology design. Such an illustration can be beneficial to HCI scholars because despite the popularity and wide application of AST and eAST, little research has demonstrated the direct application of these theories in guiding qualitative HCI work. This paper first establishes the importance of identifying the appropriate technological features when studying HCI. Then foundations of the extended AST (technical objects, functional affordances, and symbolic expressions) are explained with attention to how they can guide the identification of technological features at the appropriate granularity level. An example multi-case study is used to illustrate the applicability of eAST. Finally, some considerations for applying AST are summarized.
On the Impact of Stereo 3D Image on User Learning in the Web Environment BIBAWeb Page 4
  Heshan Sun; Mary Peterson
Recent technological breakthroughs have cultivated a Web3D movement. It is safe to say we will see more and more stereo 3D images on websites. This research investigates how stereo 3D can be employed on websites to influence user learning. A set of theory-driven hypotheses were developed to compare websites with embedded stereo 3D and websites with either static 2D images or virtual realities in terms of user comprehension, user control in learning, and user adoption of the website. Controlled experiments were conducted to test the hypotheses. The results show that stereo 3D can reduce learning effort and induce positive user attitude. At the same time, it can also reduce users' perceived control. While answering some fundamental research questions, this research also reveals that more investigation is needed regarding the use of stereo 3D on websites.
Forced or Inspired: Understanding Consumers' Cognitive Appraisals and Behavioral Responses towards Online Advertising BIBAWeb Page 21
  Jian Tang; Ping Zhang
Drawing upon the coping theory and the stimulus-organism-response (S-O-R) model, this paper proposes a research model to understand consumers' behavioral responses toward online ads. We posit that a combination of primary appraisals (perceived gain/loss) and secondary appraisals (perceived control) of ads' design features influences consumers' emotional states (positive affect vs. negative affect) and motivational states (reactance vs. inspiration) that further lead to their behavioral responses. The behavioral responses are conceptualized along two dimensions: behavioral directions (approach vs. avoidance) and intensity of behavioral efforts (active vs. passive). This study contributes to the extant literature by emphasizing both the negative and positive aspects of consumers' interactions with online ads and incorporates the effects of emotional and motivational states in mediating and influencing consumer behaviors. It can also potentially have practical implications in improving online advertising design.
Priming System 1 Influences User Acceptance BIBAWeb Page 25
  Hans van der Heijden
The study examines an alternative conceptualization of user acceptance, where acceptance is a function of two modes of thinking: one that is fast, intuitive, and automatic (known as System 1), and one that is slow, more deliberate, and voluntary (known as System 2). Such a conceptualization can accommodate cases of affect substitution, where users rely on System 1 only, without activating System 2. An experiment is conducted (N = 250) in which users are primed for System 1 or System 2. The headline contribution is that, in the context of an unattractive but potentially useful software application, users primed for System 1 show weaker intentions to download the application than those who are primed for System 2 (mean score 5.25 versus 6.30, on a scale of 1 to 7). The difficulty of reconciling this result with traditional frameworks illustrates the relevance of the dual processing model.
Does Human Warmth Matter? -- An Experiment on User Profiles in Initial Business Interaction BIBAWeb Page 18
  Nicolai Walter
Social Presence (SP), i.e. the feeling of human warmth, is usually treated as a desirable outcome of interpersonal communication. This is in line with the current trend of Online Social Networks (OSN) where social interaction on basis of user profiles is being promoted. The rise of OSNs also includes enterprise software. While previous studies in this field deal with the question of adoption, the role of the user profile has been neglected. This study addresses this research gap by focusing on user profiles and evaluating the effect on SP, Trust and Enjoyment in an initial business interaction. The findings suggest that for an information exchange task, user profiles do not help to create SP. Thus, the potential of OSNs in enhancing communication may be constrained. Due to some limitations of this laboratory experiment and as part of future research, it is suggested to re-evaluate the findings in more natural settings.
The Role of Content and Interface Design in Mobile Tablet Training BIBAWeb Page 11
  Dezhi Wu; Iris Reychav
Tablets are playing an increasingly important role in today's education and training programs. This study explores the potential affordances of using tablets in a road safety training program. We examined how multimedia content and interface design components of a mobile tablet training program impacted the system usability and usefulness, and further how these factors influenced users' perceived and actual training outcomes. A field experiment was designed and carried out with about two hundred real-world road users while taking their mobile tablet training on site. We used a questionnaire to collect the majority of field data, and also conducted a series of pre- and post- actual training assessments with individual users in order to examine their actual training outcomes. The study results highlight the importance of content relevance and interface aesthetics in achieving mobile system usability goals and perceived usefulness, which significantly impact the training outcomes.
What Do Patients Want? Medical Expertise vis-a-vis Peer Support: Visitor Behaviors in Healthcare Social Infomediaries BIBAWeb Page 8
  Dobin Yim; Young Eun Lee
Social infomediaries (online infomediaries that employ social technologies) have become an integral part of electronic commerce environments, in which consumers and service providers search and find each other, for improved market efficiency. We extend the role of social infomediaries in healthcare context, connecting patients and doctors. This study presents a new typology of visitor behaviors in healthcare social infomediaries. Our theoretical framework draws from online community and online shopping behaviors literature to explore and define different types of visitors. Using a cross-sectional data set from a social infomediary where patients and doctors discuss elective medical procedures and patients review doctors, we classify visitor behaviors in terms of the primary objective of participation, as either information or community seeking, and three increasing levels of purchase intention of elective medical procedures, creating a three-by-two matrix of visitor behaviors. For each type, we analyze user-generated content contribution in terms of activity type (consultation, question, review, and comment), level (high or low), and concentration of popular topics. The completed study will include a validation of our typology to estimate conversation rates and business values of each type to sustainability of social infomediaries.
Emotional Labor in the Moderation of Online Communities BIBAWeb Page 14
  Amber Young; Sheila Miranda; Jama Denae Summers
Emotional labor is an essential component of knowledge work. As knowledge work increasingly moves online, we need to understand emotional labor performed online. Extant emotion research cautions against blindly applying insights about emotional labor from a face-to-face context to an online context. Yet, we know little about emotional labor performed online. We raise the following questions about emotional labor by community moderators: What constitutes "appropriate emotional displays" in online communities? How do community members' emotional displays interact with use of technology features to influence moderators' displays? Our findings suggest that the high-/low-energy dimension of emotion is more salient to the emotional labor performed by community moderators than is the conventionally-studied positive versus negative affect dimension. Findings further reveal the tendency for community members' use of technology features in stylizing their posts to induce mindfulness in moderators' emotional displays in response to those posts.
Using Lexicons Obtained from Online Reviews to Classify Computer Games BIBAWeb Page 24
  Miaoqi Zhu; Xiaowen Feng
This paper presents a new method for characterizing computer games based on lexicons obtained from online game reviews. Inspired by the lexical approach to define personality traits (Ashton, 2007), we hypothesize that game players would have used natural language in describing computer games and play experience over the time and the fundamental traits of computer games would be encapsulated in player's languages. Therefore, the traits of computer games could be explored by investigating descriptive terms within game reviews.
Information Technology Addiction: Construct Development and Effects on Work Performance BIBAWeb Page 6
  Sander Paul Zwanenburg
IT addiction is a growing threat to quality of life and work performance. Online social networks, computer games and email are among the main culprits of such addiction. Surprisingly, the MIS literature has paid scant attention to this important area of research. An important limitation of past research is a focus that is too narrow to study the overall dynamics of IT addiction. My dissertation aims to elucidate these dynamics by incorporating multiple technologies and using a multi-method approach. Based on theories of reward and self-control, I will first define IT addiction and develop an instrument to measure it. I will then employ an experiment to validate the scale and to examine the effects of IT addiction on work performance. The results should pave the way for further academic inquiry into the nature of this ever-important construct, and should suggest practical measures to overcome its deleterious effects in the workplace.