Mo Adam Mahmood’s research while affiliated with The University of Texas at El Paso and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (56)


Culture Matters: Factors Affecting the Adoption of Telemedicine
  • Conference Paper

January 2013

·

982 Reads

·

25 Citations

·

M.Adam Mahmood

·

Sharon E. Thompson

·

Karl Putnam

The present research investigates the influence of culture on telemedicine adoption and patient information privacy, security, and policy. The results, based on the SEM analysis of the data collected in the United States, demonstrate that culture plays a significant role in telemedicine adoption. The results further show that culture also indirectly influences telemedicine adoption through information security, information privacy, and information policy. Our empirical results further indicate that information security, privacy, and policy impact telemedicine adoption.


Fig. 1. The theoretical model.
Descriptive statistics of the respondents.
Constructs and their theoretical background.
Correlations of the constructs and the square root of the variance extracted.
Fit indices of the model.

+1

Employees’ adherence to information security policies: An exploratory field study
  • Article
  • Full-text available

January 2013

·

6,444 Reads

·

517 Citations

Information & Management

Download

Figure 1 E-commerce business value model.
Figure 2 Result of the hypothesized model. * Significant at the 0.05 level. * * * Significant at the 0.002 level.
Scale development.
Correlations among constructs.
Measuring Electronic Commerce Technology Enabled Business Value: An Empirical Investigation

July 2012

·

60 Reads

·

5 Citations

Journal of Organizational Computing and Electronic Commerce

This research investigates whether firms using e-commerce technologies are successful in generating business value and, if so, which e-commerce drivers determine this success and how should firms use these drivers. There is no systematic empirical evidence in the IT productivity and business value literature regarding the payoffs a business receives from its e-business initiatives. The current research contributes to the literature in the e-commerce area by identifying a set of e-business value constructs, incorporating these constructs in a model in a manner not done before, and empirically validating the model using an AMOS/SEM analysis. The present research also contributes to the e-business value literature by providing insights into causal relationships among Rogers' innovation and diffusion theory (IDT) factors. This is the first time a research study has empirically established comprehensive causal relationships among these factors. The SEM analysis of the model indicates that the proposed model is able to explain e-commerce success utilizing the constructs identified and grounded using IT business value literature and Rogers' IDT. We conclude by summarizing its contributions to the IT literature, in general, and the e-business literature in particular, and by providing insights for practice and suggestions for future research.


Building Business Value in E-Commerce Enabled Organizations

January 2011

·

7 Reads

·

2 Citations

USA Information Resources Management Association

·

M. Adam Mahmood

·

·

[...]

·

Francisco J. López

This research attempts to identify critical e-commerce success factors essential for building business value within e-commerce enabled organizations. It is important to identify the critical success factors that organizations must pursue in order to facilitate a successful transformation from traditional brick-andmortar organizations to click-and-brick business models. Diffusion theory is used to demonstrate how these success factors create business value within an organization. The research model is fully grounded in information technology business value and productivity literature (e.g., Kauffman & Kriebel (1988), Mahmood, Gemoets, Hall, & Lopez (2008) Mahmood & Mann (1993), and Zhu (2004)). The manuscript utilizes an existing sample set consisting of a population of more than 550 company executives who are successfully implementing e-commerce strategies. The research examines constructs found in the literature and focuses on two importance dimensions of creating business value through e-commerce strategies: IT alignment to organizational strategies (ITOrS) and the quality and effectiveness of existing online systems (OnSQE). Critical success factors for e-commerce business success were found to include ITOrS (IT alignment to organizational strategies), IOrSA (Quality and effectiveness of online systems, OnSE (Online systems efficiency), and OnSQE (Online systems quality and effectiveness). The research produces empirical evidence that strategic decision making concerning implementation of e-commerce technologies and alignment with top management strategic planning is critical to the success of creating business value for e-commerce enabled organizations. The manuscript concludes with limitations of the research and implications for future research studies.


Moving Toward Black Hat Research in Information Systems Security: An Editorial Introduction to the Special Issue

September 2010

·

385 Reads

·

120 Citations

MIS Quarterly

Information security (IS) research has become more sophisticated, relevant, and rigorous with increasing number of scholars in the IS community turning their attention to security research. The US Securities and Exchange Commission (SEC) and the Computer Emergency Response Team (CERT) at Carnegie Mellon University are aimed towards reporting information security incidents by making data available. This method of security research improves the richness and depth of their research by seeking out new and unique sources of data that reveal the underlying mechanisms of computer crime and the effectiveness of organizational responses to this behavior. These efforts of the scientific community aimed towards security are expected to push the scientific knowledge of IS security into new realms.


Measuring e-Commerce Technology Enabled Business Value

August 2010

·

23 Reads

·

9 Citations

While a plethora of anecdotal evidence exists, there is little empirical evidence on the value-creating potential of e-commerce technologies. The present research investigates whether firms using e-commerce technologies are successful in generating business value and, if so, what e-commerce drivers determine success and how to best use these drivers. This work shows how diffusion theory can be used to analyze the wide-spread utilization of e-commerce technologies and how they create business value. It presents an exploratory model of e-commerce business value grounded in information technology (IT) business value and productivity literature. We use a sample from more than 550 company executives, identified as innovative and successful users of IT.


Compliance with Information Security Policies: An Empirical Investigation

March 2010

·

1,406 Reads

·

242 Citations

Computer

Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship between rewards and actual compliance with information security policies does not make sense. Quite possibly this relationship results from not applying rewards for security compliance. Also mentions that based on the survey conducted, careless employee behavior places an organization's assets and reputation in serious jeopardy. The major threat to information security arises from careless employees who fail to comply with organizations' information security policies and procedures.


Building Business Value in E-Commerce Enabled Organizations

January 2010

·

13 Reads

·

2 Citations

This research attempts to identify critical e-commerce success factors essential for building business value within e-commerce enabled organizations. It is important to identify the critical success factors that organizations must pursue in order to facilitate a successful transformation from traditional brick-and-mortar organizations to click-and-brick business models. Diffusion theory is used to demonstrate how these success factors create business value within an organization. The research model is fully grounded in information technology business value and productivity literature (e.g., Kauffman & Kriebel (1988), Mahmood, Gemoets, Hall, & Lopez (2008) Mahmood & Mann (1993), and Zhu (2004)). The manuscript utilizes an existing sample set consisting of a population of more than 550 company executives who are successfully implementing e-commerce strategies. The research examines constructs found in the literature and focuses on two importance dimensions of creating business value through e-commerce strategies: IT alignment to organizational strategies (ITOrS) and the quality and effectiveness of existing online systems (OnSQE). Critical success factors for e-commerce business success were found to include ITOrS (IT alignment to organizational strategies), IOrSA (Quality and effectiveness of online systems, OnSE (Online systems efficiency), and OnSQE (Online systems quality and effectiveness. The research produces empirical evidence that strategic decision making concerning implementation of e-commerce technologies and alignment with top management strategic planning is critical to the success of creating business value for e-commerce enabled organizations. The manuscript concludes with limitations of the research and implications for future research studies.


Technical opinion - Are employees putting your company at risk by not following information security policies?

December 2009

·

1,035 Reads

·

82 Citations

Communications of the ACM

Introduction Careless employees, who do not follow information security policies, constitute a serious threat to their organization. We conducted a field survey in order to understand which factors help towards employees' compliance with these security policies. Our research shows that the visibility of the desired practices and normative expectations of peers will provide a solid foundation towards employees complying with these policies. Our research also shows that if employees realize how vulnerable their organization is to security threats and the severity of these threats, they are likely to have a strong intention to comply with information security policies. Finally, employees' self-efficacy and response efficacy motivate them to comply with these policies. This article provides an information security strategic plan that puts together various best practices we found in our survey and that shows how these practices can be used to alleviate employees' non-compliance with organizational security policies. Information security breaches can cause serious damage to organizations. Such breaches can harm irreparably by shutting down computers forcing businesses to loose potential revenues or by leaking corporate confidential information and customer data possibly making corporations vulnerable to legal and regulatory problems and bad publicity. 4,5 Most organizations encounter more than one information security breaches in a given year. ² Prior information security research studies suggest that 91% of organizations' own employees frequently fail to adhere to information security policies ² paving the way for such breaches. To tackle this situation, a number of suggestions have been made in the literature to help ensure employees' compliance with security policies. Commentators have, however, pointed out a serious of weaknesses in the existing approaches. They suggest that these approaches lack empirical evidence on their effectiveness in practice. Because practitioners need empirically validated information, it is extremely important that we study employees' non-compliance with information security policies using field research. In order to understand why employees are careless about following security policies and which factors are important toward employees' compliance with these policies, we conducted a field survey of information security professionals from five Finnish companies operating in different lines of business. The survey instrument was developed based on a theoretical model developed from behavioral theories including the Theory of Reasoned Action ¹ and the Protection Motivation Theory. ³ Since employees' compliance with information security policies is ultimately a psychological phenomenon; we find these theories useful in understanding how organizations can help their employees comply with these security policies. We show how these theories can be useful in offering a new and practical insight into what motivates employees to comply with these policies. Some 3130 employees from four Finnish corporations were asked to fill out a Web-based information security instrument. Of these, 919 filled out the questionnaire resulting in a 29.4% response rate. The demographic data, among the respondents, show that the number of male (56.1%) and female (43.1%) are fairly evenly distributed. In order to test our model, we analyzed the field survey responses using factor analysis and multiple regression analysis. All constructs were found to have an acceptable level of reliability and validity confirming soundness of the measuring instrument.


Factors Affecting Information Technology Usage: A Meta-Analysis of the Empirical Literature

November 2009

·

2,390 Reads

·

177 Citations

Journal of Organizational Computing and Electronic Commerce

With an estimated investment of over 1 trillion dollars to date on information technology (IT) products and applications, one would hope that there exists a corresponding improvement in organizational performance and productivity. The level of IT usage has widely been accepted as an important indicator of IT success within organizations. This research synthesizes and validates the construct of IT usage using a meta-analysis. It accomplishes that by analyzing the empirical results of various studies over a period of time covering a broad scope of characteristics of both users and information systems (IS), and it examines the relation between these characteristics and the level of IT usage within organizations. In general, the results of this meta-analysis lead to the conclusion that there exists a strong and significant positive relation between the perception of ease of use and the perceived usefulness of an IT system to the actual amount of usage. Another factor that indicates a high level of IT usage is the organizational support of IT within an enterprise. Although the factors of education level, training level, and professional level were found to have a substantial effect on IT usage, the magnitude of these effects were lower than those of the perceptions of the user and organizational support. Managers and IT professionals may have a better chance of avoiding IT system ineffectiveness and even failure by paying attention to the results of this research, especially in view of the fact that it synthesized and validated the results of a significant number of empirical studies published in some of the best IS journals. Rarely do single research experiments provide definitive answers on which to base policy decisions.


Citations (35)


... These three factors are important for success primarily because they shape user sense of satisfaction and perceived benefits toward a DSS (Fuerst and Cheney 1982, Barki and Huff 1990, Guimaraes et al. 1992). Thus, considering or evaluating the above characteristics can help determine the success of the application (Bailey and Pearson 1983, Ives et al. 1983, Mahmood and Sniezek 1989, Barki and Huff 1990, Zviran and Erlich 2003. ...

Reference:

Exploring Adoption of the Wildland Fire Decision Support System: End User Perspectives
Defining Decision Support Systems: An Empirical Assessment Of End-User Satisfaction
  • Citing Article
  • August 1989

INFOR Information Systems and Operational Research

... In this context, supply chain management (SCM) is adopted to synchronize and manage the flows of materials and information between network entities. In particular, it aims to design, implement, and monitor systems in order to improve business logistics networks as well as the interactions between network activities (Mahmood et al., 2003). SCM complexity stems from its structure composed of many activities over several independent subsystems which poses interesting challenges (Arshinder et al., 2008). ...

Supply Chain Management
  • Citing Chapter
  • December 2003

... Diffusion is a spatial (Hagerstrand, 1967) as well as a temporal process, and historical evidence confirms that technologies diffuse at different times, at different rates, and to different extents in different places, and can be significantly influenced by policies (Victor, 1993). An illustrative empirically based theory for technology diffusion across multiple regions is suggested by "Schmidt's Law" (Grubler, 1990). ...

Information Technology Transfer and Diffusion to Mexico
  • Citing Article
  • October 1997

... In the previous literature, features defining the quality of a digital product have been categorized in several different ways and explored, for example, in the context of mobile commerce and e-commerce (e.g., DeLone & McLean, 2003;Gotzamani & Tzavlopoulos, 2009;E. Y. Huang et al., 2015;Mahmood et al., 2008;Oliveira & Roth, 2012;Omar et al., 2021;Parasuraman et al., 2005;Rita et al., 2019;Tzavlopoulos et al., 2019;Wagner et al., 2020;Zeithaml et al., 2002;R. Zhang et al., 2021). ...

Measuring e-Commerce Technology Enabled Business Value
  • Citing Article
  • August 2010

... The rapid progress and widespread use of Internet technology have promoted the generation and accumulation of large-scale log data (Miao and Li, 2022). Previous studies have suggested that, in an information security context, it is preferable to measure actual behaviors rather than intentions (Anderson and Agarwal, 2010;Mahmood et al., 2010;Warkentin et al., 2011Warkentin et al., , 2012 because intentions do not always lead to behaviors (Crossler et al., 2013;Herrero et al., 2023). In the present study, we collected data in both ways, via an online survey and via data captured via the iScan monitoring software. ...

Moving Toward Black Hat Research in Information Systems Security: An Editorial Introduction to the Special Issue
  • Citing Article
  • September 2010

MIS Quarterly

... Insolvency prediction • LDA • Genetic algo- rithms LDA proved to be slightly better than linear classifiers generated through genetic algorithms and the calculation of scores based on rules obtained using genetic algorithms Bertels et al. (1999) Evaluate the eligibility of a company to receive state subsidies • LDA • NN Backpropagation NNs are not superior to LDA models except when they are given highly uncertain information Mahmood et al. (1999) Analyzing ethical decision situations • LDA • NN NNs predict better in both training and testing phases Markham et al. (2000) Determining the number of circulating kanban cards in a just-in-time production system • RPA • NN ...

A new approach to evaluating business ethics: An artificial neural networks application
  • Citing Article
  • July 1999

Journal of End User Computing

... This study intends to explore which factors are perceived as important to online customers in Thailand when shopping on the Internet. Survey questions for this empirical research were compiled from previous studies on electronic commerce shopping behaviors (Alomaim, Tunca, and Zairi 2003;Changchit 2006;Joines, Scherer, and Scheufele 2003;Koivum€ aki 2001;Koyuncu and Lien 2003;Lin 2003;Mahmood, Kohli, and Devaraj 2004;Posnock 2004). Additional questions related to target demographics have been added. ...

Introduction to the Special Issue: Measuring the Business Value of Information Technology in e-Business Environments
  • Citing Article
  • October 2004

International Journal of Electronic Commerce

... Educational level, like other individual factors, has been studied as an antecedent of PU or PEOU (Agarwal & Prasad, 1999) and as a moderator that affects the relationship between main determinates and behavioural intention (Burton- Jones & Hubona, 2006). In particular, educational level was found to influence the relationships between PEOU, PU, SN and BI (Porter & Donthu, 2006;Rogers, 2003;Sun & Zhang, 2006;Zakaria, 2001;Mahmood, Hall, & Swanberg, 2001;Burton-Jones & Hubona, 2006). found a positive correlation between the level of education and PU, Similarly, Burton- Jones and Hubona (2006) suggested that higher education level leads to positive association with PU and those users are less sensitive to PEOU since it will reduce the computer anxiety and improve the overall attitude. ...

Factors Affecting Information Technology Usage: A Meta-Analysis of the Empirical Literature
  • Citing Article
  • November 2009

Journal of Organizational Computing and Electronic Commerce

... Based on the results, there are limited studies examining culture as a factor in telemedicine acceptance. The work of Mansouri-Rad [27] becomes relevant when culture is viewed as an indirect precursor to the successful adoption of telemedicine. According to other studies, patients using telemedicine in rural areas believe that practitioners familiar with culture are generally preferred [5]. ...

Culture Matters: Factors Affecting the Adoption of Telemedicine
  • Citing Conference Paper
  • January 2013

... Perceived severity refers to the amount of damage that people expect to endure in the event of a hazard ( Azadi et al. 2019 ;Siponen et al. 2014 ). This variable refers to people's understanding of the level of risks caused by economic, psychological, physical, environmental, and social threats to the individual and his family ( Grothmann and Patt 2005 ;Lee 2011 ). ...

Employees’ adherence to information security policies: An exploratory field study

Information & Management