Jeff Crawford
University of Tulsa
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jeff Crawford.
Management Information Systems Quarterly | 2009
Rajeev Sharma; Philip Yetton; Jeff Crawford
This paper presents a meta-analysis-based technique to estimate the effect of common method variance on the validity of individual theories. The technique explains between-study variance in observed correlations as a function of the susceptibility to common method variance of the methods employed in individual studies. The technique extends to mono-method studies the concept of method variability underpinning the classic multitrait-multimethod technique. The application of the technique is demonstrated by analyzing the effect of common method variance on the observed correlations between perceived usefulness and usage in the technology acceptance model literature. Implications of the technique and the findings for future research are discussed.
Industrial Management and Data Systems | 2011
Jeff Crawford; Lori N. K. Leonard; Kiku Jones
Purpose – The purpose of this paper is to study the influence of an organizations human resource on its IT competence. The IT human resource is examined in terms of worker tenure and worker composition, and IT competence is defined in terms of IT‐business relationships, IT‐business knowledge, and IT infrastructure.Design/methodology/approach – The study examines the activities of one organizations software development group over a three‐year period, 2004‐2006. The organization is a US‐based financial services firm, and data are drawn from archived software development project information.Findings – The findings help to clarify how changes in the IT human resource influence a firms IT competence. A model of organizational IT competence is developed and discussed, along with propositions for future study.Research limitations/implications – The propositions developed in this study provide direction for future IT value research, and are key to the understanding the development of a firms IT competence.Pra...
International Journal of Secure Software Engineering | 2013
Jeff Crawford
Applications often use behavior control mechanisms in order to ensure that individuals create sufficiently strong passwords. Behavior controls, which force individuals to utilize specific password characteristics, are assumed to be the best mechanism to encourage strong password creation. However, an over reliance on them could lead to counterproductive security behaviors. This study examines the efficacy of formal controls in the password creation process to determine if their use does indeed result in meaningfully stronger passwords than informal control techniques. Findings demonstrate that controls used during the password creation process do indeed shape password strength, but that behavior controls do not produce significantly stronger passwords than informal controls. Using an Agency Theory perspective, control techniques are considered in their ability to align principal-agent goal and risk perceptions. Findings illustrate the importance of using both informal and formal controls as a means of creating strong and effective passwords.
conference on information technology education | 2013
Jeff Crawford; Ken Mayer; Fortune S. Mhlanga
This paper presents our approach to implementing structures that encourage innovation and entrepreneurship behaviors within the Lipscomb University student population. An early step in this process is presented in this paper: extending our undergraduate Information Technology (IT) curriculum with a concentration on entrepreneurship. Specifically, the paper clarifies where our IT courses address specific dimensions of innovation (a precursor to entrepreneurship), how the curriculum can be extended to effectively incorporate entrepreneurship, and where facilitating conditions can be implemented to reinforce entrepreneurial behavior in our student population. The curriculum changes and ideas presented here have a number of long- and short-term benefits for Lipscomb University as a whole and our IT program in particular. The paper ends by soliciting input on several issues that can maximize the effectiveness of this innovative program.
Jistem Journal of Information Systems and Technology Management | 2013
Jeff Crawford; Lori N. K. Leonard; Kiku Jones
Software development group effectiveness depends on many factors, and understanding those factors is vital to project success, especially when considering the time and money that is dedicated to said projects. Therefore, this study examines the role of worker tenure and employment heterogeneity on exploration and exploitation work completed within an organization’s software development group. Analysis of time tracking data within one financial services organization over a three years period demonstrates that worker tenure and employment heterogeneity do play an important role in shaping work activities. Worker tenure exhibited a negative relationship with exploration and exploitation activities, suggesting a critical mechanism through which an organization can elicit innovative and incremental development efforts. Further, the positive effect of employment heterogeneity on exploration and exploitation suggests that employment diversity can also provide a means to encourage innovative and incremental development activities. Findings highlight the notion that group composition plays a meaningful role in shaping the focus of software development work within an organization.
information security curriculum development | 2013
Mark Brown; Jeff Crawford; Steven Nordstrom; Fred Scholl; Fortune S. Mhlanga
Career opportunities in information security related fields are growing, and degree granting college programs are being created or modified to meet this increased industry demand. Paradoxically, many employers prefer either to not hire entry-level information security candidates or to require extensive experience for information security positions. While many established high-risk disciplines such as medicine and engineering have well-developed internship and apprenticeship training programs, the information security profession seems to be unsure of the utility of such programs. This work outlines a study to investigate the degree to which employers participate in information security specific experiential learning opportunity programs, and seeks to understand a perceived gap in the expectation of experience in new hires with an organizations participation in such programs.
Team Performance Management | 2012
Jeff Crawford; Lori N. K. Leonard
Purpose – This study seeks to determine factors that encourage post‐meeting work activity in a software development group by assessing attendee diversity (functional, staffing and tenure), meeting size, and meeting history.Design/methodology/approach – One years worth of meeting data from a software development group in a US‐based financial services company were collected and analyzed. A binary logistic regression analysis was utilized to determine the impact of diversity, meeting size, and meeting history on the likelihood of post‐meeting work activity.Findings – Tenure diversity and meeting history for each meeting event significantly contribute to the likelihood of post‐meeting work activity.Research limitations/implications – A lack of variance in the data does not allow for the examination of staffing diversity. Further, generalizability of findings is limited since data come entirely from one organization. Findings suggest that meeting characteristics, specifically tenure diversity and meeting hist...
european conference on information systems | 2010
Rajeev Sharma; Philip Yetton; Jeff Crawford
international conference on information systems | 2014
Rajeev Sharma; Murad Safadi; Megan Andrews; Philip Ogunbona; Jeff Crawford
Archive | 2014
Rajeev Sharma; Murad Safadi; Megan Andrews; Philip Ogunbona; Jeff Crawford