Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeff Crawford is active.

Publication


Featured researches published by Jeff Crawford.


Management Information Systems Quarterly | 2009

Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research

Rajeev Sharma; Philip Yetton; Jeff Crawford

This paper presents a meta-analysis-based technique to estimate the effect of common method variance on the validity of individual theories. The technique explains between-study variance in observed correlations as a function of the susceptibility to common method variance of the methods employed in individual studies. The technique extends to mono-method studies the concept of method variability underpinning the classic multitrait-multimethod technique. The application of the technique is demonstrated by analyzing the effect of common method variance on the observed correlations between perceived usefulness and usage in the technology acceptance model literature. Implications of the technique and the findings for future research are discussed.


Industrial Management and Data Systems | 2011

The human resource's influence in shaping IT competence

Jeff Crawford; Lori N. K. Leonard; Kiku Jones

Purpose – The purpose of this paper is to study the influence of an organizations human resource on its IT competence. The IT human resource is examined in terms of worker tenure and worker composition, and IT competence is defined in terms of IT‐business relationships, IT‐business knowledge, and IT infrastructure.Design/methodology/approach – The study examines the activities of one organizations software development group over a three‐year period, 2004‐2006. The organization is a US‐based financial services firm, and data are drawn from archived software development project information.Findings – The findings help to clarify how changes in the IT human resource influence a firms IT competence. A model of organizational IT competence is developed and discussed, along with propositions for future study.Research limitations/implications – The propositions developed in this study provide direction for future IT value research, and are key to the understanding the development of a firms IT competence.Pra...


International Journal of Secure Software Engineering | 2013

Assessing the Value of Formal Control Mechanisms on Strong Password Selection

Jeff Crawford

Applications often use behavior control mechanisms in order to ensure that individuals create sufficiently strong passwords. Behavior controls, which force individuals to utilize specific password characteristics, are assumed to be the best mechanism to encourage strong password creation. However, an over reliance on them could lead to counterproductive security behaviors. This study examines the efficacy of formal controls in the password creation process to determine if their use does indeed result in meaningfully stronger passwords than informal control techniques. Findings demonstrate that controls used during the password creation process do indeed shape password strength, but that behavior controls do not produce significantly stronger passwords than informal controls. Using an Agency Theory perspective, control techniques are considered in their ability to align principal-agent goal and risk perceptions. Findings illustrate the importance of using both informal and formal controls as a means of creating strong and effective passwords.


conference on information technology education | 2013

Incorporating an entrepreneurship concentration into the undergraduate IT curriculum

Jeff Crawford; Ken Mayer; Fortune S. Mhlanga

This paper presents our approach to implementing structures that encourage innovation and entrepreneurship behaviors within the Lipscomb University student population. An early step in this process is presented in this paper: extending our undergraduate Information Technology (IT) curriculum with a concentration on entrepreneurship. Specifically, the paper clarifies where our IT courses address specific dimensions of innovation (a precursor to entrepreneurship), how the curriculum can be extended to effectively incorporate entrepreneurship, and where facilitating conditions can be implemented to reinforce entrepreneurial behavior in our student population. The curriculum changes and ideas presented here have a number of long- and short-term benefits for Lipscomb University as a whole and our IT program in particular. The paper ends by soliciting input on several issues that can maximize the effectiveness of this innovative program.


Jistem Journal of Information Systems and Technology Management | 2013

The role of worker tenure and employment heterogeneity on software development work activities

Jeff Crawford; Lori N. K. Leonard; Kiku Jones

Software development group effectiveness depends on many factors, and understanding those factors is vital to project success, especially when considering the time and money that is dedicated to said projects. Therefore, this study examines the role of worker tenure and employment heterogeneity on exploration and exploitation work completed within an organization’s software development group. Analysis of time tracking data within one financial services organization over a three years period demonstrates that worker tenure and employment heterogeneity do play an important role in shaping work activities. Worker tenure exhibited a negative relationship with exploration and exploitation activities, suggesting a critical mechanism through which an organization can elicit innovative and incremental development efforts. Further, the positive effect of employment heterogeneity on exploration and exploitation suggests that employment diversity can also provide a means to encourage innovative and incremental development activities. Findings highlight the notion that group composition plays a meaningful role in shaping the focus of software development work within an organization.


information security curriculum development | 2013

Understanding the Presence of Experiential Learning Opportunity Programs in the Information Security Field

Mark Brown; Jeff Crawford; Steven Nordstrom; Fred Scholl; Fortune S. Mhlanga

Career opportunities in information security related fields are growing, and degree granting college programs are being created or modified to meet this increased industry demand. Paradoxically, many employers prefer either to not hire entry-level information security candidates or to require extensive experience for information security positions. While many established high-risk disciplines such as medicine and engineering have well-developed internship and apprenticeship training programs, the information security profession seems to be unsure of the utility of such programs. This work outlines a study to investigate the degree to which employers participate in information security specific experiential learning opportunity programs, and seeks to understand a perceived gap in the expectation of experience in new hires with an organizations participation in such programs.


Team Performance Management | 2012

Predicting post‐meeting work activity in software development projects

Jeff Crawford; Lori N. K. Leonard

Purpose – This study seeks to determine factors that encourage post‐meeting work activity in a software development group by assessing attendee diversity (functional, staffing and tenure), meeting size, and meeting history.Design/methodology/approach – One years worth of meeting data from a software development group in a US‐based financial services company were collected and analyzed. A binary logistic regression analysis was utilized to determine the impact of diversity, meeting size, and meeting history on the likelihood of post‐meeting work activity.Findings – Tenure diversity and meeting history for each meeting event significantly contribute to the likelihood of post‐meeting work activity.Research limitations/implications – A lack of variance in the data does not allow for the examination of staffing diversity. Further, generalizability of findings is limited since data come entirely from one organization. Findings suggest that meeting characteristics, specifically tenure diversity and meeting hist...


european conference on information systems | 2010

A Critique of the Marker Variable Technique: The Effect of Alternative Marker Variable Criteria

Rajeev Sharma; Philip Yetton; Jeff Crawford


international conference on information systems | 2014

Estimating the magnitude of method bias on account of text similarity using a natural language processing-based technique

Rajeev Sharma; Murad Safadi; Megan Andrews; Philip Ogunbona; Jeff Crawford


Archive | 2014

Estimating the magnitude of method bias on account of text similarity using a natural language processing-based technique Submission Type: Research-in-Progress

Rajeev Sharma; Murad Safadi; Megan Andrews; Philip Ogunbona; Jeff Crawford

Collaboration


Dive into the Jeff Crawford's collaboration.

Top Co-Authors

Avatar

Rajeev Sharma

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Philip Yetton

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Megan Andrews

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Murad Safadi

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge