THE APPLICATION OF THE CRITICAL INCIDENT TECHNIQUE TO INVESTIGATE EMAIL USAGE: CONTRIBUTION TO THEORY AND PRACTICE

In the past years, a number of academics criticized MIS research for its low practical contributions. One approach to overcome this issue is the critical incident technique. The goal of this project is to demonstrate the application of the critical incident technique to study user interaction with email systems. The outcome is a set of practical recommendations together with a valid theoretical framework.

[1]  P. Shrivastava Rigor and practical usefulness of research in strategic management , 1987 .

[2]  Michael A. Jones Entertaining Shopping Experiences: An Exploratory Investigation , 1999 .

[3]  B. Nagengast,et al.  Evaluative conditioning in social psychology: Facts and speculations , 2005, Cognition & emotion.

[4]  Helen Cowie,et al.  Measuring workplace bullying , 2002 .

[5]  Alexander Serenko,et al.  Are interface agents scapegoats? Attributions of responsibility in human-agent interaction , 2007, Interact. Comput..

[6]  J. Michael Pearson,et al.  The Relevancy of Information Systems Research: The Practitioner's View , 2005, Inf. Resour. Manag. J..

[7]  Victoria Bellotti,et al.  E-mail as habitat: an exploration of embedded personal information management , 2001, INTR.

[8]  Richard C. Hoffman,et al.  The Relevance of Strategy Research: Practitioner and Academic Viewpoints* , 1995 .

[9]  Janice R. Fauske,et al.  Principals and the Political Economy of Environmental Enactment , 2000 .

[10]  Izak Benbasat,et al.  The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..

[11]  Mary Beth Rosson,et al.  Comparative usability evaluation: critical incidents and critical threads , 1994, CHI Conference Companion.

[12]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[13]  R. Weber Basic Content Analysis , 1986 .

[14]  Steve Muylle,et al.  The conceptualization and empirical validation of web site user satisfaction , 2004, Inf. Manag..

[15]  Klaus Krippendorff,et al.  Content Analysis: An Introduction to Its Methodology , 1980 .

[16]  H. Bernard,et al.  Data Management and Analysis Methods , 2000 .

[17]  A. Light,et al.  Critical incident technique and explicitation interviewing in studies of information behavior , 2003 .

[18]  Henry Lieberman,et al.  Aria: an agent for annotating and retrieving images , 2001, Computer.

[19]  Alexander Serenko,et al.  Antecedents and Consequences of User Satisfaction with E-Mail Systems , 2006, Int. J. e Collab..

[20]  Izak Benbasat,et al.  Empirical Research in Information Systems: The Practice of Relevance , 1999, MIS Q..

[21]  Richard Baskerville,et al.  Special issue on action research in information systems: making is research relevant to practice--foreword , 2004 .

[22]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[23]  P. Rajan Varadarajan,et al.  Musings on relevance and rigor of scholarly research in marketing , 2003 .

[24]  Donald C. Bryant,et al.  Content Analysis of Communications , 1968 .

[25]  M. Miles,et al.  Data management and analysis methods. , 1994 .

[26]  J. de Houwer,et al.  Associative learning of likes and dislikes: a review of 25 years of research on human evaluative conditioning. , 2001, Psychological bulletin.

[27]  Trevor Wood-Harper,et al.  A critical perspective on action research as a method for information systems research , 1996, J. Inf. Technol..

[28]  John D. Daniels,et al.  Relevance in International Business Research: A Need for More Linkages , 1991 .

[29]  Rohit Khare Seventh Heaven: The Spec's in the Mail , 1998, IEEE Internet Comput..

[30]  Deborah Hix,et al.  Remote usability evaluation: can users report their own critical incidents? , 1998, CHI Conference Summary.

[31]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[32]  Alexander Serenko,et al.  The use of interface agents for email notification in critical incidents , 2006, Int. J. Hum. Comput. Stud..

[33]  Cheryl Tay,et al.  User competence in information technology: a critical incident analysis , 1994, Proceedings of TENCON'94 - 1994 IEEE Region 10's 9th Annual International Conference on: 'Frontiers of Computer Technology'.

[34]  Fred D. Davis User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..

[35]  John F. Rockart,et al.  IS Research Relevance Revisited: Subtle Accomplishment, Unfulfilled Promise, or Serial Hypocrisy? , 2002, Commun. Assoc. Inf. Syst..

[36]  Jean-David Ruvini,et al.  Do users tolerate errors from their assistant?: experiments with an E-mail classifier , 2002, IUI '02.

[37]  K. Stewart Trust Transfer on the World Wide Web , 2002 .

[38]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[39]  Lee Sproull,et al.  Reducing social context cues: electronic mail in organizational communication , 1986 .

[40]  Susan M. Keaveney,et al.  Customer Switching Behavior in Service Industries: An Exploratory Study , 1995 .

[41]  C. Brodsky The Discovery of Grounded Theory: Strategies for Qualitative Research , 1968 .

[42]  J. C. Flanagan Psychological Bulletin THE CRITICAL INCIDENT TECHNIQUE , 2022 .

[43]  Kuo-Ching Wang,et al.  Critical service features in group package tour: An exploratory research , 2000 .

[44]  I. Martin,et al.  Classical conditioning of human 'evaluative' responses. , 1975, Behaviour research and therapy.

[45]  Ajay Luthra,et al.  Content Analysis for Communications , 2009 .

[46]  George M. Alliger,et al.  Toward an ADA-appropriate job analysis , 1997 .

[47]  Gary P. Latham,et al.  The reliability and validity of the critical incident technique: A closer look. , 1974 .

[48]  Bengt-Erik Andersson,et al.  Studies in the reliability and validity of the critical incident technique. , 1964 .

[49]  Alexander Serenko,et al.  A model of user adoption of interface agents for email notification , 2008, Interact. Comput..