Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Detmar W. Straub is active.

Publication


Featured researches published by Detmar W. Straub.


Management Information Systems Quarterly | 1989

Validating instruments in MIS research

Detmar W. Straub

Calls for new directions in MIS research bring with them a call for renewed methodological rigor. This article offers an operating paradigm for renewal along dimensions previously unstressed. The basic contention is that confirmatory empirical findings will be strengthened when instrument validation precedes both internal and statistical conclusion validity and that, in many situations, MIS researchers need to validate their research instruments. This contention is supported by a survey of instrumentation as reported in sample IS journals over the last several years. n nA demonstration exercise of instrument validation follows as an illustration of some of the basic principles of validation. The validated instrument was designed to gather data on the impact of computer security administration on the incidence of computer abuse in the U.S.A.


Information & Management | 1991

Security concerns of system users: a study of perceptions of the adequacy of security

Dale L. Goodhue; Detmar W. Straub

Abstract In the past several years, a number of researchers have raised the issue of the level of security concern among system users, suggesting that security may be undervalued in both centralized and decentralized IS departments, and among IS staff as well as end-users. Since protective measures often require significant managerial vigilance, an appropriate level of awareness and concern may be a prerequisite for adequate security protection. Given its importance, there is a need for a better understanding of what leads to security concern. This paper focuses on users perceptions about the security of their systems. Based on previous work on individuals attitudes and beliefs about IS and IS environments, it is hypothesized that a users concern about security is a function of three different constructs: industry risk, company actions, and individual awareness. The study tests the main assertions of the model, using a cross-sample comparison of perceptions from two different survey instruments. The first sample used 570 randomly selected DPMA members. The second sample surveyed 357 end-users. The theoretical model does provide some explanation for level of concern among IS professionals in the mainframe and minicomputer environment. Both company actions and individual awareness were statistically significant, although the explained variance was not large. Problems with using post hoc analysis may have contributed to the partial and weak support for the model.


Communications of The ACM | 1989

Information technologies for the 1990s: an organizational impact perspective

Detmar W. Straub; James C. Wetherbe

When a thing is new, people say: It is not true. Later, when its truth becomes obvious, they say: It is not important. Finally, when its importance cannot be denied, they say: Anyway, it is not new.nAdapted from William James


Information & Management | 1990

Utilizing GDSS technology: final report on a recent empirical study

Renée A. Beauclair; Detmar W. Straub

Abstract In recent years, Group Decision Support Systems (GDSS) technology has attracted considerable research interest. Proponents argue that GDSS can improve group decisions by supporting face-to-face conferencing, remote site teleconferencing, and remote/local computer conferencing. Emerging capabilities in telecommunications technology have enhanced these prospects. A survey of 135 randomly-selected organizations determined that GDSS are gradually being incorporated into the organizations information system (IS) portfolio. Apparently organizations are increasing their commitment to GDSS and current implementations are heaviest in the remote/ local computer conferencing arena, especially in electronic mail. A factor analysis of respondent data showed that GDSS usually involves planning, administrative, and data analysis tasks. Usage also varies significantly with certain organizational size variables.


hawaii international conference on system sciences | 1989

Security concerns of system users: a proposed study of user preceptions of the adequacy of security measures

Dale L. Goodhue; Detmar W. Straub

Based on previous work on individuals attitudes and beliefs about their information systems environment, a theoretical model of the determinants of security concern is presented. An approach to testing the main assertions of the model, using a cross-study comparison of security perceptions from two different survey instruments is described. The first study, conducted in 1985-6, used a sample base of 1063 randomly selected Data Processing Management Association members. The second study surveyed 357 end-users in 10 organizations in the 1986-7 time frame. The data elicited by these research questions will be analyzed in the near future, but the analytical procedures are delineated in the article.<<ETX>>


hawaii international conference on system sciences | 1989

Managing information resources at the department level: an agency perspective

Cynthia Mathis Beath; Detmar W. Straub

The authors contrast the role of department-level information resource management with information resource management at the individual, institutional and market levels. They argue that changes in the economics of computing, which have decreased the economies of scale and specialization previously found in mainframe computing facilities at the institution level, make it feasible to locate information-resource management closer to the tasks where that information is used, and have caused a focus on agency costs of residual efficiency losses, monitoring, and bonding to arise. Desirable reductions agency costs have thus been pursued through a growth of departmental-level information-resource management.<<ETX>>


hawaii international conference on system sciences | 1988

Current and future uses of GDSS technology: report on a recent empirical study

Detmar W. Straub; Renée A. Beauclair

This study looks at the actual ways in which group decision-support systems (GDSSs) are currently being utilized. The framework for the study was derived from G. DeSanctis and R.B. Gallupes (1987) work, using a survey of 135 randomly selected Data Processing Management Association members as the sample base. Based on preliminary data analysis, it appears that GDSS are slowly being introduced and supported by information-systems departments and that this pattern will be the trend for the immediate future as well. Data analysis will be completed in the near future, but analytical procedures are delineated. These procedures take two primary forms: descriptive statistics based on the study data assess the extent to which organizations are increasing their commitment to GDSS and which current implementations are heaviest in each of the GDSS types. Factor analysis of respondent data is used to assess task-group usage of GDSS.<<ETX>>


ACM Sigcpr Computer Personnel | 1991

Improving the performance of technologists and users on interdisciplinary teams: an analysis of information systems project teams

Jonathan K. Trower; Detmar W. Straub

As the technological dimension of society becomes more complex (Huber, 1984), the role played by technologists will become more important. And as this occurs, the question of motivating these individuals also becomes more important. Little prior empirical research has examined the impact of motivation on the performance of technologists--those workers who work primarily with technology in their job. Potential differences between technologists and nontechnologists in organizations which may effect the impact of motivation on performance include: (1) there tends to be a definable and measurable end-point to their tasks: (2) the work of the technologists will have a major impact on a major portion of the organization; and (3) they are preoccupied with things rather than organizational issues (von Heydebrand 1985, Medcof 1985).


Journal of the Association for Information Science and Technology | 1991

A model academic Integrated Information Center

Carl R. Adams; Cynthia Mathis Beath; Richard S. Bolan; Joseph J. Branin; George D'Elia; Nancy Freeman Rohde; Detmar W. Straub

Based on the results of the information and technology requirements assessments, three configurations for the model IIC were developed—a basic model, an intermediate model, and an advanced model. These configurations of the model IIC represent increasing numbers and sophistication of support capabilities as well as increasing costs. They represent possible stages of implementation depending on the requirements of the academic unit and the resources at its disposal.


Journal of the Association for Information Science and Technology | 1991

Issues Relating to the Implementation and Management of an Integrated Information Center.

Carl R. Adams; Cynthia Mathis Beath; Richard S. Bolan; Joseph J. Branin; George D'Elia; Nancy Freeman Rohde; Detmar W. Straub

This article addresses some issues related to the implementation and management of the Integrated Information Center (IIC). These issues include the impact of the legal environment within which an IIC must operate, the organization structure of the IIC, and the funding of the IIC. In addition, the article discusses the reactions of key stakeholders on campus to the proposed model IIC.

Collaboration


Dive into the Detmar W. Straub's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cynthia Mathis Beath

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge