Jeff Crawford

Learn More
Researchers have developed a number of statistical techniques to control for the effect of CMV in mono-method research designs. 1 Two techniques that have been frequently employed in IS research are the Harman single-factor test and the marker variable technique (see, for example, Jarvenpaa and Majchrzak 2008; Pavlou et al. 2007). The Harman single-factor(More)
The marker variable technique offers a practical and easy method to address the validity threat on account of common method variance to the findings of individual studies. However, the validity of the marker variable technique has not been established. This paper examines the validity threat to the marker variable technique arising from multiple criteria(More)
Acknowledgements The primary documents and sources reviewed for this report are located at the California secondary sources are located in the California State Library and University of California library collections. Many people that work in these special collections and archives shared their knowledge, expertise and extended assistance in locating(More)
Although the concept of role is considered an important modeling construct in information systems analysis and design, no generally accepted, clear, well-formalized interpretation and guidelines to model it are available. In this paper we use concepts from a philosophical ontology to guide us in interpreting the concept of role. Specifically we chose two(More)
A number of potential biases have been identified that may contribute a spurious component to the observed correlation between variables. One such potential bias is the manner in which items are worded. This paper presents a technique and a program of research to estimate the magnitude of method bias arising from item wording. We hypothesize that the(More)
Career opportunities in information security related fields are growing, and degree granting college programs are being created or modified to meet this increased industry demand. Paradoxically, many employers prefer either to not hire entry-level information security candidates or to require extensive experience for information security positions. While(More)