277
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Examining System Administrators’ Verification Information to Enhance IT Training Design

, &

REFERENCES

  • Doll W, Torkzadeh G. 1988. The measurement of End-User computing satisfaction. Manage Inf Syst Q. 12:259–274.
  • Huh J, Ackerman MS, Douglas R. 2007. The Use of Aesthetics in HCI Systems. in ACM Conference on Human Factors in Computing Systems (CHI ‘07). San Jose, CA, USA.
  • Hornbaek K. 2006. Current practices in measuring usability: Challenges to usability studies and research. Int J Hum Comput Stud. 64:79–102.
  • Kandogan E, Maglio P. 2003. Why Don’t You Trust Me Anymore? Or the Role of Trust in Troubleshooting Activities of System Administrators. in ACM Conference on Human Factors in Computing (CHI ‘03). Ft Lauderdale, FL, USA.
  • Takayama L, Kandogan, E. 2006. Trust as an Underlying Factor of System Administrator Interface Choice. in ACM Conference on Human Factors in Computing Systems (CHI ‘06). Montreal, Quebec, CA.
  • Barrett R, Kandogan E, Maglio PP, Haber E, Takayama LA, Prabaker M. 2004. Field Studies of Computer System Administrators: Analysis of System Management Tools and Practices. in ACM Conference on Computer Supported Cooperative Work (CSCW ‘04). Chicago, IL, USA.
  • IBM. 2006. Autonomic computing: IBM’s perspective on the state of information technology. 2006 [cited 2006 Jan]; Available from: http://www.ibm.com/industries/government/doc/content/resource/thought/278606109.html
  • Kephart J, Chess D. 2003. The vision of autonomic computing. IEEE Comput. 36:41–51.
  • Patterson D, Brown A, Broadwell P, Candea G, Chen M, Cutler J, Enriquez P, Fox A, Kiciman E, Merzbacher, Oppenheimer D, Sastry N, Tetzlaff W, Traupman J, Treuhaft N. 2002. Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies, in Technical report CSD-02-1175. Berkeley, CA: University of California.
  • Santhanam R, Sasidharan S, Webster J. 2008. Using self-regulatory learning to enhance e-learning based on information technology training. Inf Syst Res. 19:26–47.
  • Piccoli G, Feeny D, Ives B. 2002. Creating and sustaining IT-Enabled competitive advantage. In Luftman J, editor. Competing in the information age: Strategic alignment and practice. Oxford: Oxford University Press; p. 107–136.
  • Gilmer B. 2005. The accidental system administrator. Broadcast Eng. 47:30–34.
  • Akins ML, Griffin JR. 1999. Keys to successful systems administration. in Computers in Libraries.
  • Merrill 2002. A Pebble-in-the-pond model for instructional design. Perform Improv. 41:41–46.
  • Humble J, Russell R. 2009. The agile maturity model applied to building and releasing software. ThoughtWorks White Paper.
  • Forsgren Velasquez N, Kim G, Kersten N, Humble J. 2014. 2014 State of DevOps Report., PuppetLabs, IT Revolution Press, ThoughtWorks.
  • Lewis J. 2001. Current Issues in Usability Evaluation. Int J Hum Comput Int. 13:343–349.
  • Gould J, Lewis C. 1985. Designing for usability - Key principles and what designers think. Commun ACM. 28:300–311.
  • Gillan D, Bias R. 2001. Usability science. I: Foundations. Int J Hum Comput Int. 13:351–372.
  • Brown DC, Burbano E, Minski J, Cruz IE. 2002. Evaluating web page color and layout adaptations. IEEE Multimedia. 9:86–89.
  • Ferre X, Juristo N, Windl H, Constantine L. 2001. Usability Basics for Software Developers. IEEE Software. 18:22.
  • Gould J, Boies S, Lewis C. 1991. Making usable, useful, productivity-enhancing computer applications. Commun ACM. 34:74–85.
  • Davis FD. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. Manage Inf Syst Q. 13:319–340.
  • Venkatesh V. 2000. Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res.11:342–365.
  • DeLone W, McLean E. 1992. Information systems success: The quest for the dependent variable. Inf Syst Res. 3:60–95.
  • Al-Gahtani S, King M. 1999. Attitudes, satisfaction, and usage: Factors contributing to each in the acceptance of information technology. Behav Inf Technol. 18:277–297.
  • DeLone W, McLean E. 2003. The DeLone and McLean model of information systems success: A Ten-Year update. J Manage Inf Syst. 19:9–30.
  • DeLone W, McLean E. 2004. Measuring e-Commerce success: Applying the DeLone & McLean information systems success model. Int J Electron Commerce. 9:31.
  • Piccoli G, Ahmad R, Ives B. 2001. Web-based virtual learning environments: A research framework and a preliminary assessment of effectiveness in basic IT skills training. MIS Q. 25:401–426.
  • Barrett R, Chen YYM, Maglio P. 2003. System administrators are users, too: designing workspaces for managing internet-scale systems. Conference on Human Factors in Computing Systems.
  • Anderson E. 2002. Researching system administration. http.cs.berkeley.edu.
  • Lenchner J, Rosu D, Velasquez NF, Guo S, Christiance K, DeFelice D, Deshpande PM, Kummamuru K, Kraus N, Luan LZ, Majumdar D, McLaughlin M, Ofek-Koifman S, Perng D, Roitman H, Ward C, Young, J. 2009. A service delivery platform for server management services. IBM J Res Dev. 53:2–1.
  • Maglio P, Kandogan E. 2004. Error messages: What’s the problem? Queue 2:50–55.
  • Agarwal RT, Ferratt TW. 2001. Crafting an HR strategy to meet the need for IT workers. Commun ACM 44:59–64.
  • Karjalainen M, Spionen M. 2011. Toward a new meta-theory for designing information systems (IS) security training approaches. J Assoc Inf Syst. 12:518–555.
  • Pujakainen P, Siponen M. 2010. Improving employees’ compliance through information systems security training: An action research study. MIS Q. 34:757–778.
  • Mills RJ, Hauser K, Pratt J.A. 2008. A comprehensive two-level framework for information systems curriculum design, assessment and improvement. J Comput Inf Syst. 48:1–14.
  • Shouhong W, Wang H. 2014. Redesigning the information systems analysis and design course: Curriculum renewal. J Comput Inf Syst. 55:30–39.
  • Dick W, Cary L. 1990. The Systematic Design of Instruction, Third Edition. New York: Harper Collins.
  • Fogg B, Tseng H. 1999. The elements of computer credibility. in CHI 99.
  • Tseng H, Fogg B. 1999. Credibility and computing technology. Commun ACM. 42:39–44.
  • Vakkari P. 1999. Task complexity, information types, search strategies and relevance: Integrating studies on information seeking and retrieval. Inf Process Manage. 35:819–837.
  • Bystrom K, Jarvelin K. 1995. Task complexity affects information seeking and use. Inf Process Manage. 31:191–213.
  • Mick CK. 1980. Toward usable user studies. J Am Soc Inf Sci. 31:347–356.
  • Murray KB. 1991. A test of services marketing theory: Consumer information acquisition activities. J Marketing 55:10–25.
  • Murray KB, Schlacter JL. 1990. The impact of services versus goods on consumers’ assessment of perceived risk and variability. J Acad Marketing Sci.. 18:51–65.
  • Aldag R, Brief A. 1979. Task design and employee motivation. Glenview, IL: Scott, Foresman.
  • Campbell D. 1988. Task complexity: A review and analysis. Acad Manage Rev. 13:40–52.
  • Shaw ME. 1963. Scaling group tasks: A method for dimensional analysis, in Tech. Rep. No. 1. Gainesville, FL: University of Florida.
  • Kluger AN, DeNisi A. 1996. The effects of feedback interventions on performance: A historical review, a meta-analysis, and a preliminary feedback intervention theory. Psychological Bull. 199:254–284.
  • Wood R. 1986. Task complexity: Definition of the construct. Organiz Behav Hum Decis Processes 37:60–82.
  • Stajkovic A, Luthans F. 1998. Self-efficacy and work-related performance: A meta-analysis. Psychologica. Bull. 124:240–261.
  • Jacoby J, Kaplan L. 1972. The components of perceived risk. In Convention of the Association of Consumer Research. Iowa City, IA.
  • Roselius T. 1971. Consumer rankings of risk reduction methods. J Marketing 35:56–61.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.