Papers by Francis Andoh-Baidoo
Information Systems Frontiers, Jun 25, 2022
Due to misinterpretation, Victor B. Lawrence was mistakenly captured as part of the author group.... more Due to misinterpretation, Victor B. Lawrence was mistakenly captured as part of the author group. The below data should have been retained at the end of the text.
IFIP advances in information and communication technology, 2019
Information security risk is of concern to both researchers and practitioners. In this study, we ... more Information security risk is of concern to both researchers and practitioners. In this study, we investigate the antecedents of optimal information security investment from organizational perspective using the concept of information technology governance. Specifically, we examine how board attributes including IT savviness, board duality, experience, and functional debate along with an organizational attribute, digital maturity, influence optimal information security investments. Data was collected from board members in organization to test the research model. Our results offer both theoretical and practical implications.

Information Systems Frontiers
H. Raghav Rao, for the opportunity to put together this special issue. Furthermore, we thank the ... more H. Raghav Rao, for the opportunity to put together this special issue. Furthermore, we thank the advisory guest editor, the various guest editors and referees for their comment/insights on the accepted papers in this special issue. We are grateful for the help provided by IFIP Working Group 8.6 2019 workshop team: honorary chair George Kasper, the general chairs Deborah Bunker and Richard Boateng and the doctoral consortium chair H. Raghav Rao, of the University of Texas at San Antonio. H. Raghav Rao rendered invaluable support in bringing the whole idea of having the IFIP 8.6 2019 working conference in Ghana to fruition. We thank John Effah and the leadership of Information Systems Department of the University of Ghana for organizing the workshop. Finally, we are immensely grateful to University of Ghana Business School (UGBS) for agreeing to host the workshop and providing logistics that made the workshop possible.

Understanding Phishing Susceptibility: An Integrated Model of Cue-utilization and Habits
This preliminary study investigates individuals’ susceptibility in responding to phishing email. ... more This preliminary study investigates individuals’ susceptibility in responding to phishing email. Drawing on cue-utilization theory and habit, this paper examines the antecedents of individuals’ phishing susceptibility. A survey was conducted with 228 students who were target of actual phishing attack. The results provide strong support for the model\u27s theoretical structure. The results also indicate that, urgency arousing cues embedded in a phishing email are positively related to individuals’ phishing susceptibility. While individual automatic use of communication media leads to phishing victimization, routine use of communication media does not. The study contributes to the stream of phishing research that seeks to understand why individual fall for phishing by explaining the effect of habits and arousal cues. The study results provide foundation for future research to employ rigorous methodology that measure actual phishing by manipulation of the framing and content of email messages to develop and test a more robust model

Information Systems Frontiers, 2020
Online romance fraud (ORF) is a growing concern with such serious negative consequences as financ... more Online romance fraud (ORF) is a growing concern with such serious negative consequences as financial loss or suicide to the victim. Majority of empirical studies on online romance fraud using attachment, deception, protection motivation and relation theories focus on the victim. While neutralization offers insights into how individuals justify their deviant behaviors, the results have not been consistent in different contexts. In the ORF context, offenders may not only rely on justifying techniques but also rationalize their actions by denying risk both to the victim and the offender. Thus, drawing from the neutralization and denial of risk theories, we develop a research model to explain how online romance offenders justify and rationalize their intended criminal activities. To confirm our theoretical model, we collected 320 responses from individuals at Internet Cafés alleged to be online romance fraud hotspots. Our results highlight the boundary conditions of neutralization techniques in the context of online romance fraud. The study shows that denial of risk, a rationalization mechanism, moderates the relationship between denial of victim, a justification technique, and intention to commit romance fraud. This insight advances the frontiers of neutralization theory. We offer both theoretical and managerial implications of the findings.

Communications of the Association for Information Systems, 2018
Most research on the impact of enterprise resource planning (ERP) systems implementation on busin... more Most research on the impact of enterprise resource planning (ERP) systems implementation on business process outcomes have focused on developed nations. However, Sub-Saharan Africa, a developing region, is a growing ERP market and provides a new context for theory development. We examine the antecedent and outcomes of extent of ERP systems implementation in Sub-Saharan Africa. Specifically, we examine three research questions: 1) "How does an organization's data culture influence the extent of ERP implementation?", 2) "How does the extent of ERP implementation influence the ethical behavior and data integration of the organization?", and 3) "How do ethical behavior and organizational integration influence the business process outcomes?". We used the panoptic concept as a theoretical lens to develop a research model and six hypotheses to answer the research questions. We tested the model by using the survey methodology to collect data from 115 firms that have implemented ERP systems and operated in 13 industries in Ghana, a Sub-Saharan Africa nation. We used structural equation modeling to analyze the data. We found support for all six hypotheses. We offer both theoretical and managerial implications.
How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control
European Journal of Information Systems, Mar 6, 2023

Proceedings of the ... Annual Hawaii International Conference on System Sciences, 2019
The extant literature explored the reasons why many firms do not make a successful transition fro... more The extant literature explored the reasons why many firms do not make a successful transition from adoption to assimilation of ERP software. However, there is lack of understanding in the psychological and decision-making mechanisms which compel individuals in organizations to be bias or prefer to remain in their current situation. In addition, most of the prior studies focused on large firms in developed nations. This study presents a theoretical model that explains the assimilation of ERP software by integrating the tall poppy syndrome, switching cost, and loss aversion literatures through the lens of the status quo bias theory. We tested the model using data gathered from large and mid-size firms in Ghana, a pre-emerging economy. We offer practical and theoretical implications from the findings.
Americas Conference on Information Systems, 2004
This study mapped 947 articles published in top information systems (IS) journals over the period... more This study mapped 947 articles published in top information systems (IS) journals over the period 1998-2002 into an updated version of March and Smith's taxonomy of IS research activities and outputs using Newman's method of pro forma abstracting. The results show that publishing in many of these journals is almost exclusively limited to the behavioral science paradigm of theorizing and justifying. Design science research, research that builds and evaluates systems, is negligible. These results suggest that an increase in design science research is needed to advance IS cumulative research because building and evaluating systems provides unique feedback that advances those ideas that are the most promising in practice.

Factors that Influence Lurking Behaviors in Open Innovation Communities: The Role of Social Capital
Americas Conference on Information Systems, 2018
Virtual communities help organizations to develop innovative ideas. Active participation by membe... more Virtual communities help organizations to develop innovative ideas. Active participation by members is key to sustainability of such communities. Members lurk by not contributing knowledge, although they remain as part of the community. This study employs cognitive and relational capital dimensions of social capital theory to discern lurking behavior in Dell’s ideastorm website. From the data collected on the website, we use ideators’ characteristics to reflect social capital, while lurking is measured by the number of days that an ideator has not contributed, posted comments, or voted on ideas on the website. We contribute to social capital theory development by applying it in the open innovation communities’ context, using observed data. Our findings have implications on virtual community managers who need to build social capital to prevent their community members from lurking
Managing Organizational Culture: The Use of Scenarios and Domain Memory in Organizational Mentoring
The international journal of knowledge, culture and change management, 2010
Organizations use mentoring as a means for employees to share organizational culture and develop ... more Organizations use mentoring as a means for employees to share organizational culture and develop leadership qualities. A mentor relationship is said to exist in an organization when a more experienced employee (mentor) assumes the role of a guardian to another ...
The Journal of Information Technology Theory and Application, Apr 1, 2009
This paper describes a Geographical Information Systems (GIS)-based response management architect... more This paper describes a Geographical Information Systems (GIS)-based response management architecture that combines GIS capabilities with web-based voice translation technologies such as VoiceXML to effectively coordinate the emergency response notification activities. The paper highlights some of the critical shortcomings of existing emergency response systems and proposes an architecture that addresses these limitations. The proposed architecture uses newer technologies to develop a seamless response notification system that requires minimal human intervention. The EVResponse is an application built around this architecture to provide real-time reporting capabilities to both decision makers and first response units.

International Journal of Electronic Finance, 2013
This study uses the deterrence theory to explain investors' behaviour towards the announcement of... more This study uses the deterrence theory to explain investors' behaviour towards the announcement of internet security breaches in the public media. Using the event study methodology, we compute the abnormal returns over a three day window. We then use decision tree induction to investigate how firm type and time affect the likelihood that an attack would lead to abnormal returns. The results reveal that investors are more likely to react negatively to announcements involving internet firms. In addition, investors are more likely to react negatively to more recent attacks. We argue that managers, especially in Net firms, should develop effective mechanisms to address security breach since investors interpret a security breach as management's failure to deter computer abusers from violating organisational security policies and controls. From a theoretical perspective, we demonstrate that event study research can use theory to explain investor's behaviour towards announcement of events in the public media.
Information Technology for Development, Apr 3, 2017

Towards a Community-Centered Knowledge Management Architecture for Disaster Management in Sub-Saharan Africa
Integrated series on information systems, Dec 20, 2013
Disasters in developing nations are typically caused by frequent and intense climate changes, whi... more Disasters in developing nations are typically caused by frequent and intense climate changes, which contribute to the socio-economic vulnerabilities of such nations. It is important to be strategic in the management of disasters in such regions in order to minimize their impact on thriving communities. There is therefore the need for effective disaster response that allows for access, analysis, and integration of information from varied sources. This Chapter presents architecture for managing knowledge on disaster in Sub-Saharan African nations. This architecture captures the critical contextual variables using process view of knowledge management to assist citizens who are less knowledgeable about disaster management to understand the various forms of knowledge on disaster response while developing extensive knowledge and building capability necessary to address disaster response and management. It also addresses issues with building IT expertise on disaster response in developing nations. More importantly, the architecture facilitates the creation, storage/retrieval, transfer, and application of knowledge on disaster response and management especially for ordinary citizens. The architecture also helps overcome issues with lack of collaboration and coordination across disaster response and management agencies.
Cultural Values, Coping and Threat Appraisals, and Intention to Protect Information--Model

A Support Vector Approach to Detecting Manipulated Reviews
Americas Conference on Information Systems, 2020
Despite the abundance and successes of studies on manipulated reviews, there have been notable li... more Despite the abundance and successes of studies on manipulated reviews, there have been notable limitations acknowledged by academia and industry alike. Some of which include the lack of rich datasets for feature extraction and the inability to marry verbal and nonverbal features for model development. Furthermore, prior studies have always relied on existing literature in order to select relevant features for analysis. The limitations mentioned have rendered recent attempts at combating review manipulations quite unreliable and they lack the efficacy to target complex manipulated reviews, for example fake reviewers whose profiles are set to private. We attempt to bridge this gap by proposing a hybrid framework that incorporates econometrics and machine learning in feature extraction, engineering and review detection. Furthermore we utilize these methods in tandem and derive new sets of features for future analysis. This emergent study has important implications for research and practice

Examining the state of empirical business intelligence and analytics research: A poly-theoretic approach
Information & Management
Interest in Business Intelligence and Analytics (BI&A) has led to a growing body of impac... more Interest in Business Intelligence and Analytics (BI&A) has led to a growing body of impactful scholarly articles. We investigate the state of BI&A research by answering what is the state of BI&A research in terms of constructs studied, article's macrostructure, and theoretical contributions, and how do the constructs studied, macrostructure, and theoretical contributions, influence an article's impact? We propose a poly-theoretic framework that classifies articles from top IS journals and conferences by studied construct, macrostructure, contribution, distribution, and impact. Findings provide an understanding of how articles’ components influence the impact of BI&A research. Implications and future research areas are discussed.
Communications of the Association for Information Systems, 2016
This material is brought to you by the Journals at AIS Electronic Library (AISeL). It has been ac... more This material is brought to you by the Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.
Uploads
Papers by Francis Andoh-Baidoo