Atreyi Kankanhalli
National University of Singapore
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Atreyi Kankanhalli.
Management Information Systems Quarterly | 2005
Atreyi Kankanhalli; Bernard C. Y. Tan; Kwok Kee Wei
Organizations are attempting to leverage their knowledge resources by employing knowledge management (KM) systems, a key form of which are electronic knowledge repositories (EKRs). A large number of KM initiatives fail due to the reluctance of employees to share knowledge through these systems. Motivated by such concerns, this study formulates and tests a theoretical model to explain EKR usage by knowledge contributors. The model employs social exchange theory to identify cost and benefit factors affecting EKR usage, and social capital theory to account for the moderating influence of contextual factors. The model is validated through a large-scale survey of public sector organizations. The results reveal that knowledge self-efficacy and enjoyment in helping others significantly impact EKR usage by knowledge contributors. Contextual factors (generalized trust, pro-sharing norms, and identification) moderate the impact of codification effort, reciprocity, and organizational reward on EKR usage, respectively. It can be seen that extrinsic benefits (reciprocity and organizational reward) impact EKR usage contingent on particular contextual factors whereas the effects of intrinsic benefits (knowledge self-efficacy and enjoyment in helping others) on EKR usage are not moderated by contextual factors. The loss of knowledge power and image do not appear to impact EKR usage by knowledge contributors. Besides contributing to theory building in KM, the results of this study inform KM practice.
conference on multimedia computing and networking | 1993
HongJiang Zhang; Atreyi Kankanhalli; Stephen W. Smoliar
Partitioning a video source into meaningful segments is an important step for video indexing. We present a comprehensive study of a partitioning system that detects segment boundaries. The system is based on a set of difference metrics and it measures the content changes between video frames. A twin-comparison approach has been developed to solve the problem of detecting transitions implemented by special effects. To eliminate the false interpretation of camera movements as transitions, a motion analysis algorithm is applied to determine whether an actual transition has occurred. A technique for determining the threshold for a difference metric and a multi-pass approach to improve the computation speed and accuracy have also been developed.
Management Information Systems Quarterly | 2009
Hee-Woong Kim; Atreyi Kankanhalli
User resistance to information systems implementation has been identified as a salient reason for the failure of new systems and hence needs to be understood and managed. While previous research has explored the reasons for user resistance, there are gaps in our understanding of how users evaluate change related to a new information system and decide to resist it. In particular, missing in the explanation of user decision making is the concept of status quo bias, that is, that user resistance can be due to the bias or preference to stay with the current situation. Motivated thus, this study develops a model to explain user resistance prior to a new IS implementation by integrating the technology acceptance and resistance literatures with the status quo bias perspective. The results of testing the model in the context of a new enterprise system implementation indicate the central role of switching costs in increasing user resistance. Further, switching costs also mediate the relationship between other antecedents (colleague opinion and self-efficacy for change) and user resistance. Additionally, perceived value and organizational support for change are found to reduce user resistance. This research advances the theoretical understanding of user acceptance and resistance prior to a new IS implementation and offers organizations suggestions for managing such resistance.
International Journal of Information Management | 2003
Atreyi Kankanhalli; Hock-Hai Teo; Bernard C. Y. Tan; Kwok Kee Wei
As organizations become increasingly dependent on information systems (IS) for strategic advantage and operations, the issue of IS security also becomes increasingly important. In the interconnected electronic business environment of today, security concerns are paramount. Management must invest in IS security to prevent abuses that can lead to competitive disadvantage. Using the literature on security practices and organizational factors, this study develops an integrative model of IS security effectiveness and empirically tests the model. The data were collected through a survey of IS managers from various sectors of the economy. Small and medium-sized enterprises were found to engage in fewer deterrent efforts compared to larger organizations. Organizations with stronger top management support were found to engage in more preventive efforts than organizations with weaker support from higher management. Financial organizations were found to undertake more deterrent efforts and have stiffer deterrent severity than organizations in other sectors. Moreover, greater deterrent efforts and preventive measures were found to lead to enhanced IS security effectiveness. Implications of these findings for further research and practice are discussed.
Journal of Management Information Systems | 2007
Atreyi Kankanhalli; Bernard C. Y. Tan; Kwok Kee Wei
Increasing globalization and advances in communication technology have fuelled the emergence of global virtual teams (GVTs). There is much potential for conflict in GVTs as members work across cultural, geographical, and time boundaries. This study examines the antecedents of GVT conflict and the circumstances under which conflict affects team performance. An in-depth study of GVT conflict episodes was carried out using interviews, observations, communication logs, and documents. Based on findings from the teams under study interpreted in the light of prior literature, propositions are developed about the antecedents and effects of GVT conflict as stated. Within GVTs, cultural diversity is likely to contribute to both task and relationship conflict while functional diversity may result in task conflict. Large volumes of electronic communication and lack of immediacy of feedback in asynchronous media can contribute to task conflict. Moreover, the relationship between task conflict and team performance is likely to be contingent upon task complexity and conflict resolution approach. The influence of relationship conflict on performance may depend on task interdependence and conflict resolution approach. The conflict resolution approach may in turn be determined by the nature of conflict attribution. These propositions have been synthesized into a model to guide future empirical research and GVT practice.
Journal of Information Privacy and Security | 2005
Mark Y. Chan; Irene Woon; Atreyi Kankanhalli
Abstract A large number of information security breaches in the workplace result from employees’ failure to comply with organizational information security guidelines. Recent surveys report that 78% of computer attacks appear in the form of viruses embedded in email attachments. Employees who open e-mail attachments from unknown sources risk infecting their own computers as well as other computers sharing the same network. Therefore, more attention needs to be paid to learning why non-compliant behavior takes place so that appropriate measures for curbing the occurrence of such behavior can be found. With such motivation in mind, this study examines the effects of social contextual factors on employees’ compliance with organizational security policies. The research model is developed based on concepts adapted from safety climate literature that has been used to explain the safe behavior of employees in organizations. Data was collected from a sample of 140 employees from two large IT intensive organizations using a 28- item survey instrument and analyzed using structured equation modeling. Management practices, supervisory practices, and coworker’s socialization were found to be positively related to employees’ perception of information security climate in the organization. Perception of security climate and self-efficacy had positive impacts on compliant behavior. Implications of this study for research and practice are discussed.
Communications of The ACM | 2003
Atreyi Kankanhalli; Fransiska Tanudidjaja; Juliana Sutanto; Bernard C. Y. Tan
Executives must confront the challenging task of deciding the type of IT to deploy in support of their knowledge management initiatives.
Communications of The ACM | 2008
Chee Wei Phang; Atreyi Kankanhalli
Governments around the world are tapping on the potential of information and communication technologies (ICt) to transform the public sector, a phenomenon broadly known as e-government. deployment of ICt in government is expected to improve internal efficiency and provide citizens with better information and services. the increasing interest in e-government is evident in the rising public expenditure on ICt. as an indicator, IdC estimates that e-government spending in the asia-Pacific region will exceed u.s.
hawaii international conference on system sciences | 2005
Chee Wei Phang; Yan Li; Juliana Sutanto; Atreyi Kankanhalli
31 billion by the end of 2010. 6 as e-government efforts mature, the exploitation of ICt is being extended to the realm of democracy such as, in enhancing citizen participation in policy-making.
European Journal of Information Systems | 2014
Rajeev Sharma; Sunil Mithas; Atreyi Kankanhalli
E-Government, as a vehicle to deliver enhanced services to citizens, is now extending its reach to the elderly population through provision of targeted services. In doing so, the ideals of ubiquitous e-Government may be better achieved. However, there is a lack of studies on e-Government adoption among senior citizens, especially considering that this age group is growing in size and may be averse to new IT applications. This study aims to address this gap by investigating an innovative e- Government service specifically tailored for senior citizens, called CPF e-Withdrawal. Technology adoption model (TAM) is employed as the theoretical foundation, in which perceived usefulness is recognized as the most significant predictor of adoption intention. This study attempts to identify the antecedents of perceived usefulness by drawing from the innovation diffusion literature as well as age-related studies. Our findings agree with TAM and indicate that internet safety perception and perceived ease of use are significant predictors of perceived usefulness.