Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jordan B. Barlow is active.

Publication


Featured researches published by Jordan B. Barlow.


Journal of Management Information Systems | 2016

Not As Smart As We Think: A Study of Collective Intelligence in Virtual Groups

Jordan B. Barlow; Alan R. Dennis

Abstract Organizations increasingly use virtual groups for many types of work, yet little research has examined factors that make groups perform better across multiple different types of tasks. Previous research has proposed that groups, like individuals, have a general factor of collective intelligence, an ability to perform consistently across multiple types of tasks. We studied groups that used computer-mediated communication (CMC) to investigate whether collective intelligence is similar or different when groups work using CMC. A collective intelligence factor did not emerge among groups using CMC, suggesting that collective intelligence manifests itself differently depending on context. This is in contrast to previous findings. Our results surface a need for more research on boundary conditions of the construct of collective intelligence. Our findings also have practical implications: managers should take care when organizing virtual group work because groups that perform well on one type of task will not necessarily be the groups that do well on other tasks


Information & Management | 2017

A new perspective on neutralization and deterrence: Predicting shadow IT usage

Mario Silic; Jordan B. Barlow; Andrea Back

This study examines the role of neutralization and deterrence in discouraging employees from using Shadow IT: tools, services and systems used in an organization but not authorized by the IT department. Our study provides a unique contribution to the IT security literature by studying effects of neutralization on both intentions (self-reported) and actual behavior, as well as examining the role of shame as a mediator. We surveyed employees from four organizations and found that the “metaphor of the ledger” neutralization technique predicts Shadow IT intention and actual Shadow IT usage. We also find that neutralization and deterrence effects influence shame.


conference on computer supported cooperative work | 2013

Emergent roles in decision-making tasks using group chat

Jordan B. Barlow

Individuals assume roles in all aspects of life, including in computer-supported collaborative settings. The concept of roles is particularly interesting in settings where no formal roles are defined, as in self-managing virtual teams. In these settings, roles often emerge not only as a result of individual characteristics, but also as participants interact with each other and develop norms of behavior. Using role theory and speech act theory, this study explores the emergence of roles in computer-mediated decision-making groups, using chat transcripts from a lab experiment. Results indicate that four distinct roles emerge as individuals come together in decision-making groups using synchronous computer-mediated communication. These emerging roles have implications for virtual teams in research and practice.


Communications of The Ais | 2011

Overview and Guidance on Agile Development in Large Organizations

Jordan B. Barlow; Justin Scott Giboney; Mark Keith; David W. Wilson; Ryan M. Schuetzler; Paul Benjamin Lowry; Anthony Vance


Management Information Systems Quarterly | 2013

Evaluating journal quality and the association for information systems senior scholars' journal basket via bibliometric measures: do expert journal assessments add value?

Paul Benjamin Lowry; Gregory D. Moody; James Eric Gaskin; Dennis F. Galletta; Sean L. Humpherys; Jordan B. Barlow; David W. Wilson


Computers & Security | 2013

Don't make excuses! Discouraging neutralization to reduce IT policy violation

Jordan B. Barlow; Merrill Warkentin; Dustin Ormond; Alan R. Dennis


Journal of the Association for Information Systems | 2016

Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess

Jeffrey D. Wall; Paul Benjamin Lowry; Jordan B. Barlow


Archive | 2015

Warning! A Comprehensive Model of the Effects of Digital Information Security Warning Messages

Mario Silic; Jordan B. Barlow; Dustin Ormond


AIS Transactions on Replication Research | 2018

Evaluating the Role of Trust in Adoption: A Conceptual Replication in the Context of Open Source Systems

Mario Silic; Jordan B. Barlow; Andrea Back


Journal of the Association for Information Systems | 2018

Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance

Jordan B. Barlow; Merrill Warkentin; Dustin Ormond; Alan R. Dennis

Collaboration


Dive into the Jordan B. Barlow's collaboration.

Top Co-Authors

Avatar

Alan R. Dennis

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Mario Silic

University of St. Gallen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrea Back

University of St. Gallen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Merrill Warkentin

Mississippi State University

View shared research outputs
Top Co-Authors

Avatar

Anthony Vance

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge