599
Views
0
CrossRef citations to date
0
Altmetric
Editorial

From the Editor

, Editor-in-Chief

I wish you enjoyable reading of the first issue of Volume 33. This issue consists of seven articles. In the first article, “Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective,” authors Bartlomiej Hanus and Yu “Andy” Wu apply the protection motivation theory to study the impact of information security awareness on desktop security behavior. Their findings reveal that security awareness significantly affects perceived severity, response efficacy, self-efficacy, and response cost. The second article entitled “Use of Digital Signage in a Distressed Community: An Example of Community Informatics,” by Jiahe Song, Chetan S. Sankar, Paramjit Kahai, and David Mixson, assesses the use of digital signage to solve some of the problems within a distressed community, finding that a community informatics perspective is essential to design and implement such a system. In the third article, “Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines,” Princely Ifinedo surveys Canadian professionals to examine the impacts of employees’ cost–benefit analysis, deterrence considerations, and top management support and beliefs on information systems security policy compliance. The results confirm that top management support and beliefs, sanction severity, and cost–benefit analysis significantly influence employees’ compliance perceptions. In the next article, “Success Factors for Using Case Management System in Italian Courts,” by Rocco Agrifoglio, Concetta Metallo, and Luigi Lepore, ease of use and the output of the systems used were found to be critical to determine success for using such systems in courts. In the fifth article, authors Yael Karlinsky-Shichor and Moshe Zviran theorize that system quality, knowledge quality, user IS competence, and organizational attitude influence users’ perceived benefits and user satisfaction in organizational knowledge management systems in their article entitled “Factors Influencing Perceived Benefits and User Satisfaction in Knowledge Management Systems.” Next, authors Virginie Thion, Malika Grim-Yefsah, Camille Rosenthal-Sabroux, and Samira Si-Said Cherfi present their experience on quality evaluation and improvement of the transfer of a project from an outgoing project team to an incoming one in a French public organization, in their article “Evaluation and Improvement of a Transition Business Process: A Case Study Guided by a Semantic Quality-Based Approach.” Finally, in the last of the seven articles in this issue, entitled “Texting While Driving: An Empirical Investigation of Students’ Attitudes and Behaviors,” authors Pola B. Gupta, David J. Burns, and Heather Boyd present their findings that individuals involved in texting while driving also engage in other risky behaviors.

Your submissions are kindly welcome through ScholarOne Manuscript for Information Systems Management (ISM) at http://mc.manuscriptcentral.com/uism. For submission details, please visit the ISM web site (www.tandfonline.com/uism).

I look forward to receiving your quality research for publication consideration in the ISM journal. I wish to thank all of the authors for undertaking their excellent research to make this issue possible. I genuinely appreciate the hard work of our senior editors and reviewers who volunteer their time to provide valuable feedback to the authors. Finally my gratitude goes to our readership for their continued interest.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.