Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains

The present paper presents a study that seeks the antecedents of inter-agency information sharing systems adoption and the effects of using such systems on the information sharing practice among anti/counter-terrorism and disaster management agencies. Based on traditional IT acceptance theory, social exchange theory, and distributional justice perspective, the study presents a set of potential determinants of inter-agency information sharing systems adoption and propositions about post-adoption behaviors of user agencies. Also presented in this paper are the results from a preliminary study that administered a survey questionnaire to emergency responders such as law enforcement personnel, intelligence agents, firefighters, emergency medical staffs, and other government employees in the emergency management area. In the preliminary study, the relationships between inter-agency information sharing and hypothesized antecedents including perceived benefits, information assurance, organizational norm, and IT infrastructure are examined. The results from the preliminary study revealed that the current inter-agency information sharing systems use does not reflect social and operational environments of emergency management organizations. While technical environments such as other agencies' information assurance level and technical standards seem to encourage information sharing systems use, other factors such as perceived task support benefits, organizational norms, and institutional pressure to share information have no or negligible association with the systems use. The paper discusses about the findings and proposes a refined framework and model to understand inter-agency information sharing systems adoption and use.

[1]  Powell E. Robinson,et al.  Flow Coordination and Information Sharing in Supply Chains: Review, Implications, and Directions for Future Research , 2002, Decis. Sci..

[2]  JinKyu Lee,et al.  An Examination of Trust Effects and Pre-Existing Relational Risks in eGovernment Services , 2005, AMCIS.

[3]  JinKyu Lee,et al.  Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment , 2007, Decis. Support Syst..

[4]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[5]  R. Cropanzano,et al.  Social Exchange Theory: An Interdisciplinary Review , 2005 .

[6]  H ClarkTheodore,et al.  A Hierarchical Model of Supply-Chain Integration , 2001 .

[7]  Kenneth D. Mitchell Collaboration and Information Sharing: An ROI Perspective? (Views You Can Use) , 2002 .

[8]  Christina Soh,et al.  How IT Creates Business Value: A Process Theory Synthesis , 1995, ICIS.

[9]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[10]  Robert E. Kraut,et al.  The Impact of Interorganizational Networks on Buyer-Seller Relationships , 1998, Doing Business Electronically.

[11]  Mark J. Safferstone Leveraging the New Infrastructure: How Market Leaders Capitalize on Information Technology , 1998 .

[12]  I. Ajzen The theory of planned behavior , 1991 .

[13]  JinKyu Lee,et al.  Secure knowledge management and the semantic web , 2005, CACM.

[14]  S. Upadhyaya,et al.  Part 2: emerging issues for secure knowledge management-results of a Delphi study , 2006 .

[15]  H. Hollander A Social Exchange Approach to Voluntary Cooperation , 1990 .

[16]  Vincent S. Lai,et al.  Exploring the research in information technology implementation , 1997, Inf. Manag..

[17]  Lynda Davies,et al.  The Dual Nature of the Impact of IT on Organizational Transformations , 1994, Transforming Organizations with Information Technology.

[18]  Kenneth L. Kraemer,et al.  Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry , 2005, Inf. Syst. Res..

[19]  William T. Schiano,et al.  A Hierarchical Model of Supply-Chain Integration: Information Sharing and Operational Interdependence in the US Grocery Channel , 2001, Inf. Technol. Manag..

[20]  Vivek Choudhury,et al.  Strategic Choices in the Development of Interorganizational Information Systems , 1997, Inf. Syst. Res..

[21]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[22]  R. MacAvoy,et al.  Frictionless Commerce? A Comparison of Internet and Conventional Retailers , 1999 .

[23]  S. Hunt,et al.  The Commitment-Trust theory of relationship marketing, Journal of Marketing, : . , 1994 .

[24]  Ritu Agarwal,et al.  Are Individual Differences Germane to the Acceptance of New Information Technologies , 1999 .

[25]  S. Hunt,et al.  The Commitment-Trust Theory of Relationship Marketing , 1994 .

[26]  T. Eng An investigation into the mediating role of cross-functional coordination on the linkage between organizational norms and SCM performance , 2006 .

[27]  Akhlaque Haque Implementation in a Wired World: Obstacles to Facilitating Information-Sharing Procedures in North-Central Alabama , 2005 .

[28]  Michael G. Harvey,et al.  An Investigation of National Culture's Influence on Relationship and Knowledge Resources in Interorganizational Relationships between Japan and the United States , 2006 .

[29]  Ho Geun Lee,et al.  Research Report. Can EDI Benefit Adopters? , 1999, Inf. Syst. Res..

[30]  Silviano Esteve‐Pérez,et al.  The Resource-Based Theory of the Firm , 2006 .

[31]  M. Bensaou,et al.  Buyer-Supplier Relations in Industrial Markets: When Do Buyers Risk Making Idiosyncratic Investments? , 1999 .

[32]  Jule B. Gassenheimer,et al.  The role of economic value, social value, and perceptions of fairness in interorganizational relationship retention decisions , 1998 .

[33]  S. Barley Technology as an occasion for structuring: evidence from observations of CT scanners and the social order of radiology departments. , 1986, Administrative science quarterly.

[34]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[35]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[36]  Shouyang Wang,et al.  Comparative analysis on value of information sharing in supply chains , 2005 .

[37]  Anandhi S. Bharadwaj,et al.  A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation , 2000, MIS Q..

[38]  Kevin Crowston,et al.  A Coordination Theory Approach to Organizational Process Design , 1997 .

[39]  Srinivasan Raghunathan,et al.  Information Sharing in a Supply Chain: A Note on its Value when Demand Is Nonstationary , 2001, Manag. Sci..

[40]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..