2021
DOI: 10.1287/isre.2020.0958
|View full text |Cite
|
Sign up to set email alerts
|

Axiomatic Theories and Improving the Relevance of Information Systems Research

Abstract: Axiomatic Theories and Improving the Relevance of Information Systems Research This paper examines the fact that a significant number of empirical information systems (IS) studies engage in confirmative testing of self-evident axiomatic theories without yielding highly relevant knowledge for the IS community. The authors conduct both a horizontal analysis of 72 representative IS theories and an in-depth vertical analysis of 3 well-known theories (i.e., technology acceptance model, diffusion of innovation theor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 163 publications
0
9
0
Order By: Relevance
“…The content validity of information asymmetry and the credibility of YouTube product reviews were also assessed. All indicator coefficients were significant, as shown in Table 3, suggesting that the constructs of YouTube product review credibility and information asymmetry were well represented by their first-order indicators (Lee et al. , 2021a).…”
Section: Data Analysis and Resultsmentioning
confidence: 92%
See 2 more Smart Citations
“…The content validity of information asymmetry and the credibility of YouTube product reviews were also assessed. All indicator coefficients were significant, as shown in Table 3, suggesting that the constructs of YouTube product review credibility and information asymmetry were well represented by their first-order indicators (Lee et al. , 2021a).…”
Section: Data Analysis and Resultsmentioning
confidence: 92%
“…This study modeled the construct of the credibility of YouTube product reviews and information asymmetry as second-order constructs, both of which were generated as the weighting factor of their two first-order constructs. Testing weights are thus recommended, as in the primary component analysis (Lee et al. , 2021a).…”
Section: Data Analysis and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The purpose of our study is to understand the continuance intention, which we use as the basis of the ECM model (Bhattacherjee, 2001). Considering ECM an axiomatic theory, which is acceptable and truly self-evident (Lee et al, 2021), in the current study we adopted for our model two constructs, satisfaction and continuance intention (Bhattacherjee, 2001), the dependent construct of our study is continuance intention. Following the parsimony approach and reducing model complexity to make it easier to grasp, the constructs perceived usefulness and confirmation were The following section presents the proposed hypotheses.…”
Section: Research Modelmentioning
confidence: 99%
“…In the following decades, many relatively complete and mature access control models appeared successively, among which the widely used models mainly include: Discretional Access Control (DAC) model [3], Mandatory Access Control (MAC) model [4], Role-based access control model (RBAC) [5]. The main problem with these access policies is that they often assign more access rights than the requesting entity needs, exposing system resources to insider attacks [6]. Furthermore, these access policies are manually specified and maintained, assuming the operation is in a closed environment and interaction conditions rarely change.…”
Section: Introductionmentioning
confidence: 99%