Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Atreyi Kankanhalli is active.

Publication


Featured researches published by Atreyi Kankanhalli.


Management Information Systems Quarterly | 2005

Contributing knowledge to electronic knowledge repositories: an empirical investigation

Atreyi Kankanhalli; Bernard C. Y. Tan; Kwok Kee Wei

Organizations are attempting to leverage their knowledge resources by employing knowledge management (KM) systems, a key form of which are electronic knowledge repositories (EKRs). A large number of KM initiatives fail due to the reluctance of employees to share knowledge through these systems. Motivated by such concerns, this study formulates and tests a theoretical model to explain EKR usage by knowledge contributors. The model employs social exchange theory to identify cost and benefit factors affecting EKR usage, and social capital theory to account for the moderating influence of contextual factors. The model is validated through a large-scale survey of public sector organizations. The results reveal that knowledge self-efficacy and enjoyment in helping others significantly impact EKR usage by knowledge contributors. Contextual factors (generalized trust, pro-sharing norms, and identification) moderate the impact of codification effort, reciprocity, and organizational reward on EKR usage, respectively. It can be seen that extrinsic benefits (reciprocity and organizational reward) impact EKR usage contingent on particular contextual factors whereas the effects of intrinsic benefits (knowledge self-efficacy and enjoyment in helping others) on EKR usage are not moderated by contextual factors. The loss of knowledge power and image do not appear to impact EKR usage by knowledge contributors. Besides contributing to theory building in KM, the results of this study inform KM practice.


conference on multimedia computing and networking | 1993

Automatic partitioning of full-motion video

HongJiang Zhang; Atreyi Kankanhalli; Stephen W. Smoliar

Partitioning a video source into meaningful segments is an important step for video indexing. We present a comprehensive study of a partitioning system that detects segment boundaries. The system is based on a set of difference metrics and it measures the content changes between video frames. A twin-comparison approach has been developed to solve the problem of detecting transitions implemented by special effects. To eliminate the false interpretation of camera movements as transitions, a motion analysis algorithm is applied to determine whether an actual transition has occurred. A technique for determining the threshold for a difference metric and a multi-pass approach to improve the computation speed and accuracy have also been developed.


Management Information Systems Quarterly | 2009

Investigating user resistance to information systems implementation: a status quo bias perspective

Hee-Woong Kim; Atreyi Kankanhalli

User resistance to information systems implementation has been identified as a salient reason for the failure of new systems and hence needs to be understood and managed. While previous research has explored the reasons for user resistance, there are gaps in our understanding of how users evaluate change related to a new information system and decide to resist it. In particular, missing in the explanation of user decision making is the concept of status quo bias, that is, that user resistance can be due to the bias or preference to stay with the current situation. Motivated thus, this study develops a model to explain user resistance prior to a new IS implementation by integrating the technology acceptance and resistance literatures with the status quo bias perspective. The results of testing the model in the context of a new enterprise system implementation indicate the central role of switching costs in increasing user resistance. Further, switching costs also mediate the relationship between other antecedents (colleague opinion and self-efficacy for change) and user resistance. Additionally, perceived value and organizational support for change are found to reduce user resistance. This research advances the theoretical understanding of user acceptance and resistance prior to a new IS implementation and offers organizations suggestions for managing such resistance.


International Journal of Information Management | 2003

An integrative study of information systems security effectiveness

Atreyi Kankanhalli; Hock-Hai Teo; Bernard C. Y. Tan; Kwok Kee Wei

As organizations become increasingly dependent on information systems (IS) for strategic advantage and operations, the issue of IS security also becomes increasingly important. In the interconnected electronic business environment of today, security concerns are paramount. Management must invest in IS security to prevent abuses that can lead to competitive disadvantage. Using the literature on security practices and organizational factors, this study develops an integrative model of IS security effectiveness and empirically tests the model. The data were collected through a survey of IS managers from various sectors of the economy. Small and medium-sized enterprises were found to engage in fewer deterrent efforts compared to larger organizations. Organizations with stronger top management support were found to engage in more preventive efforts than organizations with weaker support from higher management. Financial organizations were found to undertake more deterrent efforts and have stiffer deterrent severity than organizations in other sectors. Moreover, greater deterrent efforts and preventive measures were found to lead to enhanced IS security effectiveness. Implications of these findings for further research and practice are discussed.


Journal of Management Information Systems | 2007

Conflict and Performance in Global Virtual Teams

Atreyi Kankanhalli; Bernard C. Y. Tan; Kwok Kee Wei

Increasing globalization and advances in communication technology have fuelled the emergence of global virtual teams (GVTs). There is much potential for conflict in GVTs as members work across cultural, geographical, and time boundaries. This study examines the antecedents of GVT conflict and the circumstances under which conflict affects team performance. An in-depth study of GVT conflict episodes was carried out using interviews, observations, communication logs, and documents. Based on findings from the teams under study interpreted in the light of prior literature, propositions are developed about the antecedents and effects of GVT conflict as stated. Within GVTs, cultural diversity is likely to contribute to both task and relationship conflict while functional diversity may result in task conflict. Large volumes of electronic communication and lack of immediacy of feedback in asynchronous media can contribute to task conflict. Moreover, the relationship between task conflict and team performance is likely to be contingent upon task complexity and conflict resolution approach. The influence of relationship conflict on performance may depend on task interdependence and conflict resolution approach. The conflict resolution approach may in turn be determined by the nature of conflict attribution. These propositions have been synthesized into a model to guide future empirical research and GVT practice.


Journal of Information Privacy and Security | 2005

Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior

Mark Y. Chan; Irene Woon; Atreyi Kankanhalli

Abstract A large number of information security breaches in the workplace result from employees’ failure to comply with organizational information security guidelines. Recent surveys report that 78% of computer attacks appear in the form of viruses embedded in email attachments. Employees who open e-mail attachments from unknown sources risk infecting their own computers as well as other computers sharing the same network. Therefore, more attention needs to be paid to learning why non-compliant behavior takes place so that appropriate measures for curbing the occurrence of such behavior can be found. With such motivation in mind, this study examines the effects of social contextual factors on employees’ compliance with organizational security policies. The research model is developed based on concepts adapted from safety climate literature that has been used to explain the safe behavior of employees in organizations. Data was collected from a sample of 140 employees from two large IT intensive organizations using a 28- item survey instrument and analyzed using structured equation modeling. Management practices, supervisory practices, and coworker’s socialization were found to be positively related to employees’ perception of information security climate in the organization. Perception of security climate and self-efficacy had positive impacts on compliant behavior. Implications of this study for research and practice are discussed.


Communications of The ACM | 2003

The role of IT in successful knowledge management initiatives

Atreyi Kankanhalli; Fransiska Tanudidjaja; Juliana Sutanto; Bernard C. Y. Tan

Executives must confront the challenging task of deciding the type of IT to deploy in support of their knowledge management initiatives.


Communications of The ACM | 2008

A framework of ICT exploitation for e-participation initiatives

Chee Wei Phang; Atreyi Kankanhalli

Governments around the world are tapping on the potential of information and communication technologies (ICt) to transform the public sector, a phenomenon broadly known as e-government. deployment of ICt in government is expected to improve internal efficiency and provide citizens with better information and services. the increasing interest in e-government is evident in the rising public expenditure on ICt. as an indicator, IdC estimates that e-government spending in the asia-Pacific region will exceed u.s.


hawaii international conference on system sciences | 2005

Senior Citizens' Adoption of E-Government: In Quest of the Antecedents of Perceived Usefulness

Chee Wei Phang; Yan Li; Juliana Sutanto; Atreyi Kankanhalli

31 billion by the end of 2010. 6 as e-government efforts mature, the exploitation of ICt is being extended to the realm of democracy such as, in enhancing citizen participation in policy-making.


European Journal of Information Systems | 2014

Transforming Decision-Making Processes: A Research Agenda for Understanding the Impact of Business Analytics on Organisations

Rajeev Sharma; Sunil Mithas; Atreyi Kankanhalli

E-Government, as a vehicle to deliver enhanced services to citizens, is now extending its reach to the elderly population through provision of targeted services. In doing so, the ideals of ubiquitous e-Government may be better achieved. However, there is a lack of studies on e-Government adoption among senior citizens, especially considering that this age group is growing in size and may be averse to new IT applications. This study aims to address this gap by investigating an innovative e- Government service specifically tailored for senior citizens, called CPF e-Withdrawal. Technology adoption model (TAM) is employed as the theoretical foundation, in which perceived usefulness is recognized as the most significant predictor of adoption intention. This study attempts to identify the antecedents of perceived usefulness by drawing from the innovation diffusion literature as well as age-related studies. Our findings agree with TAM and indicate that internet safety perception and perceived ease of use are significant predictors of perceived usefulness.

Collaboration


Dive into the Atreyi Kankanhalli's collaboration.

Top Co-Authors

Avatar

Bernard C. Y. Tan

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Loo Geok Pee

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Boon-Yuen Ng

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Kwok Kee Wei

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Zhenbin Yang

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Ke-Wei Huang

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge