Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Clay K. Williams is active.

Publication


Featured researches published by Clay K. Williams.


Management Information Systems Quarterly | 2012

Principles for conducting critical realist case study research in information systems

Donald E. Wynn; Clay K. Williams

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research within the information systems field. The principles are derived directly from the ontological and epistemological assumptions of critical realism. We demonstrate the utility of each of the principles through examples drawn from existing critical realist case studies. The article concludes by discussing the implications of critical realism based research for IS research and practice.


Management Information Systems Quarterly | 2013

Causal explanation in the coordinating process: a critical realist case study of federated IT governance structures

Clay K. Williams; Elena Karahanna

Large, multi-unit organizations are continually challenged to balance demands for centralization of information technology that lead to cost and service efficiencies through standardization while providing flexibility at the local unit level in order to meet unique business, customer, and service needs. This has led many organizations to adopt hybrid federated information technology governance (ITG) structures to find this balance. This approach to ITG establishes demand for various means to coordinate effectively across the organization to achieve the desired benefits. Past research has focused on the efficacy of various coordination mechanisms (e.g., steering committees, task forces) to coordinate activities related to information technology. However, we lack insights as to how and why these various coordination approaches help organizations achieve desired coordinated outcomes. This research specifically identifies coordinating as a process. Adopting the philosophy of critical realism, we conducted a longitudinal, comparative case study of two coordinating efforts in a federated ITG structure. Through a multifaceted approach to scientific logic employing deductive, inductive, and retroductive elements, we explicate two causal mechanisms, consensus making and unit aligning, which help to explain the coordinating process and the coordination outcomes observed in these efforts. We additionally elaborate the operation of the mechanisms through the typology of macro-micro-macro influences. Further, we demonstrate the value of the causal mechanisms to understanding the coordinating process by highlighting the complementarity in insights relative to the theories of power and politics and of rational choice. The study contributes to our understanding of coordinating as a process and of governance in federated IT organizations. Importantly, our study illustrates the value of applying critical realism to develop causal explanations and generate insights about a phenomenon.


Journal of Organizational Computing and Electronic Commerce | 2012

A Theoretical Framework for Consumer E-Satisfaction and Site Stickiness: An Evaluation in the Context of Online Hotel Reservations

Greta L. Polites; Clay K. Williams; Elena Karahanna; Larry Seligman

E-satisfaction, defined in this study as overall satisfaction with an e-vendors website, is considered an important factor in encouraging loyalty to that site. Yet, to date, findings have varied tremendously, in both the strength of the satisfaction-loyalty relationship and factors surrounding it. We approach the study of e-satisfaction and e-loyalty (here termed “site stickiness”) from a site-specific perspective, meaning that we focus on consumer perceptions of satisfaction with, and loyalty toward, the information technology (IT) artifact (website) itself, excluding outside influences, such as offline interactions with the e-vendor and postconsumption experiences. We further seek to understand the satisfaction-stickiness relationship in the context of the hospitality industry, where loyalty programs are believed to play a key role in impacting consumer behavior. We ground our research model in Bagozzis 1992 framework of the self-regulation of attitudes, intentions, and behavior, and test it using a survey of 4838 consumers who visited a large hotel chains website for the specific purpose of researching room rates and availability as a prelude to booking a room. Results generally support the proposed model. Post hoc analyses indicate that while trust is not a significant direct predictor of satisfaction, it negatively moderates the value-satisfaction relationship. Loyalty card membership, while an important predictor of site stickiness, does not moderate the satisfaction-stickiness relationship as suggested in prior research. This indicates further research is necessary to explore other ways of conceptualizing the impact of loyalty programs, such as investigating member vestedness.


Management Information Systems Quarterly | 2012

Is employee attitudes and perceptions at varying levels of software process maturity

Janet K. Ply; Jo Ellen Moore; Clay K. Williams; Jason Bennett Thatcher

Taking a control theory view of software process innovation, we tested prevalent beliefs regarding software process maturity and Information Systems employee attitudes and perceptions by surveying 736 IS professionals in 10 organizations at varying levels of the CMM (capability maturity model). Although anecdotal reports and the scant empirical studies to date suggest job attitudes and perceptions are more positive for employees in organizations at higher levels of software process maturity, we found evidence of a more complex picture. While our data supported expectations that role conflict and perceived work overload were lower for IS professionals in organizations at a level of maturity where software process behavioral controls are implemented, other results were not fully in line with prevalent beliefs. Most notably, IS workers reported significantly lower professional efficacy and lower job satisfaction in organizations at CMM Level 3, where behavioral controls are the dominant form of formal control, than in organizations at Level 1, which is relatively free of formal controls. Some anticipated positive attitudes and perceptions surfaced in organizations at the highest rungs of software process maturity (CMM Levels 4/5), where the established behavioral controls are supplemented by substantial outcome controls, as IS professionals reported lower role ambiguity and higher job satisfaction than did their counterparts in organizations at CMM Level 3.


Journal of Organizational and End User Computing | 2014

Explaining Users' Security Behaviors with the Security Belief Model

Clay K. Williams; Donald E. Wynn; Ramana Madupalli; Elena Karahanna; Barbara K. Duncan

Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is established. A comprehensive and parsimonious model (the Security Belief Model) is developed to explain information security behavior intentions. The model is tested empirically based on a sample of 237 Indian professionals. The results of the empirical study indicate general support for the model, particularly including severity, susceptibility, benefits, and a cue to action as antecedents to the intention to perform preventive information security behaviors. The paper also discusses implications of the model and results for practitioners and possibilities for future research are included. Explaining Users’ Security Behaviors with the Security Belief Model


Government Information Quarterly | 2012

e-Voting intent: A comparison of young and elderly voters

Anne Powell; Clay K. Williams; Douglas B. Bock; Thomas Doellman; Jason Allen


international conference on information systems | 2008

Critical Realm-Based Explanatory Case Study Research in Information Systems

Donald E. Wynn; Clay K. Williams


Drake Management Review | 2013

Uncertainty Avoidance and Consumer Perceptions of Global e-Commerce Sites: A Multi-Level Model

Elena Karahanna; Clay K. Williams; Greta L. Polites; Ben Liu; Larry Seligman


international conference on information systems | 2013

Preventive Adoption of Information Security Behaviors

Donald E. Wynn; Clay K. Williams; Elena Karahanna; Ramana Madupalli


Midwest Association for Information Systems Conference (MWAIS) | 2013

The Influence of Uncertainty Avoidance on Consumer Perceptions of Global e-Commerce Sites

Elena Karahanna; Greta L. Polites; Clay K. Williams; Ben Liu; Larry Seligman

Collaboration


Dive into the Clay K. Williams's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Greta L. Polites

College of Business Administration

View shared research outputs
Top Co-Authors

Avatar

Jo Ellen Moore

Southern Illinois University Edwardsville

View shared research outputs
Top Co-Authors

Avatar

Ramana Madupalli

Southern Illinois University Edwardsville

View shared research outputs
Top Co-Authors

Avatar

Anne Powell

Southern Illinois University Edwardsville

View shared research outputs
Top Co-Authors

Avatar

Barbara K. Duncan

Southern Illinois University Edwardsville

View shared research outputs
Top Co-Authors

Avatar

Diane M. Strong

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Douglas B. Bock

Southern Illinois University Edwardsville

View shared research outputs
Top Co-Authors

Avatar

Jason Allen

Southern Illinois University Edwardsville

View shared research outputs
Researchain Logo
Decentralizing Knowledge