France Belanger

France Belanger
Virginia Polytechnic Institute and State University | VT · Department of Accounting and Information Systems

About

148
Publications
63,342
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10,873
Citations

Publications

Publications (148)
Article
Full-text available
Exchanging social support on online health communities (OHCs) can be beneficial to people's health, but the OHC characteristics that promote environments in which users feel socially supported are understudied. We develop a model that examines the mediating influence of OHC cohesiveness, altruism, and universality on the relationships between activ...
Article
Research shows it is challenging to ensure that individuals use information protective behaviors (e.g., secure passwords, turning off tracking features), especially on smartphones. Concurrently, employees increasingly use their own devices for work (BYOD), but with limited compliance with BYOD policies. This research studies the role of knowledge i...
Article
Full-text available
The aim of fitness technologies, a combination of wearables and associated applications, is to support users’ health and fitness regimes. The market for fitness technologies continues to increase, and the technologies themselves are quickly advancing. However, it is unclear how effective fitness technologies are in generating wellness outcomes, and...
Article
Individuals are increasingly using personal Internet of Things (IoT) devices that digitize their day-to-day lives. Those devices, however, often require substantial personal information to generate their intended benefits. For example, fitness technologies collect health, sleep, personal, and a vast array of other information ubiquitously, creating...
Article
Recent decades have seen numerous studies of individual information security behaviors and compliance within organizational contexts. One regular finding is that individuals continue to fail at compliance; however the explanations for why this occurs typically fail to consider the temporal, emergent and dynamic nature of security encounters between...
Article
Despite increasing studies on IT monitoring, our understanding of how the relationships between the watcher and watched are affected by IT-mediation has remained limited in two areas. First, contradictory views exist on the relationships between the watchers and the watched. Studies either adapt traditional actor-centric frameworks assuming pre-def...
Article
In the digital era, it is increasingly important to understand how privacy decisions are made because information is frequently perceived as a commodity that is mismanaged. The preponderance of privacy literature focuses on individual-level information privacy concern and personal self-disclosure decisions. We propose that a more versatile multilev...
Article
Full-text available
Individuals can perform many different behaviors to protect themselves from computer security threats. Research, however, generally explores computer security behaviors in isolation, typically looking at one behavior per study, such as usage of malware or strong passwords. However, defense in depth requires that multiple behaviors be performed conc...
Chapter
Small businesses represent an important element of many western economies. However, they often struggle with resources needed to succeed, and small business owners often have to perform many, if not all, roles in their organizations. One of the key functions that small businesses need to excel at for business success today is social commerce since...
Article
With increasingly digitization, more and more information is collected from individuals and organizations, leading to several privacy concerns. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. When individuals use their own devices in work settings, these issues become concerns for o...
Article
Developing and advancing theory in the information systems (IS) discipline requires scholars to use and contribute to theory. While few IS scholars create new theories, many borrow and adapt theories from other disciplines to study a variety of phenomena in the realm of IS. Over time, this practice has raised concerns as to the appropriateness and...
Chapter
Electronic Government (e-government) is growing in popularity across the globe. Given the increasing relevance of electronic services in the public sector, there is a need for a global agreement on a consistent framework for assessing e-government. This study uses a cross-cultural comparison to assess the fundamentals of e-government adoption in th...
Article
Individuals often fail to perform the security behaviors their organizations request to protect informational assets. However, forcing individuals into the compliance can trigger undesired behaviors. We propose a model grounded in Theory of Planned Behavior and information security literature to study determinants of early conformance toward techno...
Conference Paper
Information systems and teams are essential for organizations achieve competitive advantages. In fact, the team’s ability to adapt to continuous changes in the organizational environment may depend on IS and consequently in their usage. In the post-adoption stage, user behavior can assume a routine or an innovative nature. In routine usage, IS is u...
Article
Small businesses represent an important element of many western economies. However, they often struggle with resources needed to succeed, and small business owners often have to perform many, if not all, roles in their organizations. One of the key functions that small businesses need to excel at for business success today is social commerce since...
Article
The Securities and Exchange Commission (SEC) has recently expanded the communication channels available for management when it determined that personal social media pages are recognized channels for financial disclosures, provided Reg FD and the 2008 Guidance are correctly applied. However, social media channels are more widely available to investo...
Conference Paper
Full-text available
Today's organizations rely on continuous information inflow. Not surprisingly, Social Networking Sites (SNS) have expanded to Low-Income Countries (LICs) to solicit more information from individuals but increased information privacy concerns (IPC). Therefore, there are an increasing number of studies investigating the determinants of IPC. However,...
Conference Paper
Full-text available
With the growth of Social Network Sites (SNS) and other online services, the collection and processing of personal information across boundaries has become an everyday reality including Africa. Africa is growing and technology offers a possibility to break the vicious circle of poverty. However, the limited IT infrastructure and weak economic reali...
Article
Full-text available
Acknowledgment We would like to thank the participants in The 2010 Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13, for their helpful feedback on an earlier version of this paper. Abstract Security threats regularly affect users of home computers. As such, it is important to understand the practices of users for...
Article
Security threats regularly affect users of home computers. As such, it is important to understand the practices of users for protecting their computers and networks, and to identify determinants of these practices. Several recent studies utilize Protection Motivation Theory (PMT) to explore these practices. However, these studies focus on one speci...
Article
Mobile technologies have increasingly become an integral part of individuals’ work and personal lives. Although research exists in this domain, most of it focuses on the customer’s adoption factors rather than assessing the value or the impact of mobile business (m-business) usage on firms. The present study fills this gap in the literature through...
Article
Full-text available
Information systems (IS) researchers often explore complex phenomena that result from the interplay between technologies and human actors; as such, IS research frequently involves constructs found at multiple levels of analysis, although rarely recognized as such. In fact, our targeted review of the IS literature found minimal explicit consideratio...
Article
Companies are implementing social media for marketing, advertising, employee recruitment, and overall communications with employees, clients, and partners. Small businesses are able to gain substantial value from social media but there are also many challenges. In this research, the Technology-Organization-Environment framework, the Resource-Based...
Article
Electronic Government (e-government) is growing in popularity across the globe. Given the increasing relevance of electronic services in the public sector, there is a need for a global agreement on a consistent framework for assessing e-government. This study uses a cross-cultural comparison to assess the fundamentals of e-government adoption in th...
Article
Mobile business m-business creates new business opportunities. Yet, existing research focuses on customer adoption factors rather than an assessment of the value of m-business for organisations. This study fills this gap through the development of a conceptual model of m-business value at the organisational level, which is grounded in the technolog...
Article
Mobile technology innovations have allowed organizations to expand the way they conduct business. Organizations are increasingly leveraging the unique value propositions of mobile business (m-business) in terms of convenience, ubiquity, unison, and personalization to improve business performance and support their value chain activities. Building on...
Conference Paper
Full-text available
Information security is a top concern of managers, often addressed with technical, behavioral and procedural solutions. Information Security Policies (ISPs) are among these solutions. ISPs require organizational members to conform to security measures but individuals often fail to comply with them. While prior studies investigated several factors l...
Article
Children's privacy in the online environment has become critical. Use of the Internet is increasing for commercial purposes, in requests for information, and in the number of children who use the Internet for casual web surfing, chatting, games, schoolwork, e-mail, interactive learning, and other applications. Often, websites hosting these activiti...
Article
Full-text available
Growth of social networking sites (SNS) and other global information systems has created new information privacy concerns (IPC). While SNS involve substantial information inflow, individuals may wish to maintain certain level of information privacy while using these systems. While some researchers have started to explore causes of individual's IPC...
Article
Privacy concern has been identified as a major factor hindering the growth of e-business. Recently, various privacy-enhancing tools (PETs) have been proposed to protect the online privacy of Internet users. However, most of these PETs have been designed using an ad hoc approach rather than a systematic design. In this paper, we present an explorato...
Article
One emerging facet of e-government is Internet voting, or i-voting. I-voting refers to the secure transmission of a ballot via the Internet. This phenomenon has the potential to increase citizen participation in the democratic process. However, few studies have identified the unique characteristics that make i-voting an appealing option. In particu...
Article
Full-text available
Information Systems researchers have embraced a number of qualitative research approaches and methodologies, including interviews, observations, and even action research. One research method gaining visibility in IS research is the focus group research method. Focus groups have the potential to provide great insights into phenomena of interest to I...
Article
As information and communication technologies began to support new forms of interaction between governments and their constituents, the concept of e-government emerged as a new domain for Information Systems (IS) researchers. The past decade has seen a variety of e-government themes researched and presented by scholars in IS, public administration,...
Article
Although software development methodologies can improve software quality, developers typically have a negative attitude toward using them. To encourage a positive attitude, organizations must convince developers of the usefulness of methodologies. However, the traditional conceptualization of perceived usefulness PU may not be detailed enough to ex...
Article
Full-text available
Telecommuting can help to create organisational efficiencies and improve competitive advantage. It has been studied from a variety of perspectives, including that of transportation, management, psychology, and information systems. However, telecommuting literature, while abundant and diversified, often reports contradictory results, creating dilemm...
Conference Paper
Losing files and data on a personal computer is an issue that practitioners and researchers have addressed for a number of years. Properly mitigating this security threat requires a number of protective behaviors. In this paper, we present the protective behaviors that a panel of experts recommend be performed to mitigate this threat. We then measu...
Article
Many information systems development (ISD) projects are deemed a failure in the field. However, several practitioners and researchers argue these projects could actually be considered successful if we used a broader definition of software development project success. Answering the call for further research on what makes ISD projects successful, thi...
Article
Many information systems development (ISD) projects are deemed a failure in the field. However, several practitioners and researchers argue these projects could actually be considered successful if we used a broader definition of software development project success. Answering the call for further research on what makes ISD projects successful, thi...
Article
Advancements in mobile technologies leverage the potential of m-business to impact organizational performance. This study aims at identifying the determinants of m-business usage and its impact on the firm's performance. The Technology-Organization-Environment (TOE), Diffusion of Innovation (DOI) and Resource-Based View (RBV) theories ground this r...
Article
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address th...
Article
Study abroad programs can represent an important component of an Information Systems (IS) education. This article presents the views of five scholars on study abroad education. These views are based on their experiences leading such programs, and were presented during a panel session at the America’s Conference on Information Systems (AMCIS) 2010 i...
Conference Paper
Mobile business is expected to create a large spectrum of business opportunities. There are many studies analyzing the contribution of IT to firm performance and whether IT is capable of creating value. One process-level model of IT business value, defined as the contribution of IT to firm performance, focuses on how IT impacts critical business ac...
Conference Paper
Governments and corporations are increasingly considering the use of the Internet for individuals to cast votes. Yet, not everyone has access to and is comfortable with the use of technology. This is the problem of the digital divide. This study explores the impact of the digital divide on Internet voting (I-voting). A model of I-voting and the dig...
Conference Paper
Full-text available
Given the substantive investments that governments are making in information technology and the development of e-government channels to improve interactions with citizens, there is increasing interest in determining whether these investments are paying off, and encouraging citizen use of and migration to less costly e-channels. For research on e-go...
Conference Paper
Study abroad programs can represent an important component of an Information Systems (IS) education. This article presents the views of five scholars on study abroad education. These views are based on their experiences leading such programs, and were presented during a panel session at the America's Conference on Information Systems (AMCIS) 2010 i...
Article
Full-text available
Consumer-oriented electronic commerce is a global phenomenon. However, while online transactions are readily accepted by consumers in some countries, in others consumers seem to be less accepting. This paper uses diffusion of innovation theory in combination with literature on culture and information technology to examine the question of whether cu...
Conference Paper
Full-text available
Phishing is an attempt to fraudulently acquire users' sensitive information, such as passwords or financial information, by masquerading as a trustworthy entity in online transactions. Recently, a number of researchers have proposed using external online resources like the Google PageRank system to assist phishing detection. The advantage of such a...
Article
As the use of the Internet continues to grow in all aspects of daily life, there is an increasing need to better understand what makes websites successful. A long standing model of success in the Information Systems literature is the DeLone and McLean IS Success Model. Addressing the call for research of existing theoretical models in different con...
Article
For e-commerce to grow, customers must trust organizations with which they interact. In this article, we propose and test a theoretically-derived model of trustworthiness of Web merchants in general. Trustworthiness is influenced by behavioral, competence, and attitudinal beliefs. Findings indicate trustworthiness is strongly influenced by behavior...
Article
The effects of demographic variables identified in the digital divide literature on usage of e-government services has been discussed. Statistical analyses revealed that for the access divide income, education, and age were significant predictors of intentions to use e-government services. Those which are more likely to use e-government services in...
Article
This research investigates the effects of technical (i.e. technical ability) and soft (i.e. emotional intelligence) skills on CS program retention. Structural equation modeling revealed that affinity (satisfaction with the major) was the most important factor in determining intention to leave the CS major. Unexpectedly, technical skills were the le...
Article
Virtual stores are Internet-based innovations that influence the dynamics of consumer choice making. Utilizing the attitude-to-behavior theory, theory of reasoned action, technology acceptance model, functional theory of attitude, causal theory of action, and prior literature, we develop and empirically evaluate a model that describes consumer purc...
Article
Citizen confidence in government and technology is imperative to the wide-spread adoption of e-government. This study analyzes the impact of trust and risk perceptions on one’s willingness to use e-government services. We propose a model of e-government trust composed of disposition to trust, trust of the Internet (TOI), trust of the government (TO...
Article
Full-text available
Knowledge workers in distributed work environments require substantial communication with colleagues and supervisors to perform their work activities, and collaborative technologies, like groupware, continue to improve the potential for such communication. This study investigates how an improvement in collaborative technology among a group of knowl...
Conference Paper
Current declining enrollment and attrition trends in IT programs have inspired an emerging body of literature: IT student retention. To shed some insight on whom leaves and stays in IT programs, the authors developed a new construct, computing resilience, and explored its influence on intent to stay and emotional intelligence. This study also inves...
Article
Funded by a SIGCSE Special Project grant, Training to Persist in Computing Careers is a hands-on resource for faculty interested in incorporating soft skills training in IT-related courses. Soft skills include such abilities as controlling and using one's emotions (emotional intelligence), dealing with team issues and stress (coping strategies) and...
Article
As the number of students enrolling in computing majors [computer science (CS), information systems (IS), information technology (IT)] has declined, retaining students in these curricula becomes increasingly important. Student success is important to retention, and one of the premises of this study is that meeting the challenges of demanding curric...
Article
In today's organizations, employees have an ever-increasing variety of communication media to use in the performance of work activities. In this study, we seek to expand our understanding of media usage in organizations where there is a multiplicity of communication media available to employees. We use communication media repertoires as the lens th...
Conference Paper
In this qualitative study, undergraduate computing students from two mid-sized southeastern universities participated in focus groups to explore their (1) developing professional identities, (2) salient stressors within their computing education programs, and (3) coping strategies used to navigate these stressors. Students provided contextual evide...
Conference Paper
Full-text available
This mini-track focuses on challenges presented by geographical, temporal, and cultural distribution among individuals working in teams, organizations, and communities. The explosion of communication technologies has facilitated the growth of virtual environments, but it has also resulted in confusion over choice of communication technologies that...
Conference Paper
The Fostering Resilience in IT tutorial is a hands-on training session for faculty interested in incorporating soft skills training in IT-related courses. Soft skills include such abilities as controlling and using one's emotions (emotional intelligence), dealing with team issues and stress (coping strategies) and talking the language of business....
Article
Full-text available
Research on the concept of telecommuting or telework, as it is known in various areas of the world, has appeared in information systems (IS) and non-IS publications for more than 20 years. Research areas with respect to telecommuting are quite varied, from Information and Communication Technologies (ICT) use, to transportation, managerial control,...
Article
Full-text available
Successful Web sites should be designed and incorporated with metric systems to address the multiple goals of the owner while taking into account the multiple audiences of the site. The organization must first identify its goals, audiences, and the motivations for its audiences accessing the site to begin an investigation of Web site success. It is...
Article
Internet technology has changed the way information is distributed and the way people do business in the industry. Its impacts have been well studied, but the time element seems to be ignored for the investigation of risks taken and trustworthiness held by online shoppers. The time element should be included because pre-travel plans are usually mad...
Article
Full-text available
Work environments have grown substantially more complex over the years. Teams are increasingly distributed, and presented with a variety of different communication technologies, e.g., e-mail, instant messaging, cellular phones, pagers, and intranet applications, for use in distributed collaborative activities. Further, individuals often belong to m...
Conference Paper
E-government is revolutionizing the way government agencies interact with citizens. E-services improve the responsiveness, efficiency and transparency of the public sector. Unfortunately, these benefits may not be realized by the entire population. A digital divide exists in society, both from an access point of view and from a skills point of view...
Conference Paper
Full-text available
In building a successful website it is imperative that the design matches the organization’s objectives, which should be well defined. Clearly, different types of websites will have different goals. Thus, determining success across websites is both goal and context specific. One measure of website success is satisfaction, and the resulting intent t...
Conference Paper
The purpose of this paper is to determine the effectiveness different levels of instruction have on security tool usage for individuals at different levels of computer self-efficacy. This is accomplished by utilizing a quasi-experimental method to demonstrate the effect that computer self-efficacy has on people's usage of security tools as well as...
Article
Purpose – The paper proposes a conceptual framework of the stages of electronic government that describes and integrates the unique relationship between the government and its varied constituents, and identifies and applies the global constraints that affect the implementation of e-government at each stage. Design/methodology/approach – Building on...
Article
A crucial success factor in e-com- merce is the development of an appealing, effective, and efficient Web site. Web de- velopment is evolving constantly with new tools, approaches, and methodologies. This editorial explores Web development trends and issues and discusses the gap between research and practice that exists in this domain. The perspect...
Chapter
Chapter one introduced distance learning definitions and concepts as applied to education and training. An important consideration when choosing among DL technologies is the potential effect of DL technology use on the learning experience. This chapter provides a discussion of key learning variables in the learning process and outcome. These variab...