Learn More
Researchers have developed a number of statistical techniques to control for the effect of CMV in mono-method research designs. 1 Two techniques that have been frequently employed in IS research are the Harman single-factor test and the marker variable technique (see, for example, Jarvenpaa and Majchrzak 2008; Pavlou et al. 2007). The Harman single-factor(More)
The marker variable technique offers a practical and easy method to address the validity threat on account of common method variance to the findings of individual studies. However, the validity of the marker variable technique has not been established. This paper examines the validity threat to the marker variable technique arising from multiple criteria(More)
A number of potential biases have been identified that may contribute a spurious component to the observed correlation between variables. One such potential bias is the manner in which items are worded. This paper presents a technique and a program of research to estimate the magnitude of method bias arising from item wording. We hypothesize that the(More)
This paper presents our approach to implementing structures that encourage innovation and entrepreneurship behaviors within the Lipscomb University student population. An early step in this process is presented in this paper: extending our undergraduate Information Technology (IT) curriculum with a concentration on entrepreneurship. Specifically, the paper(More)
Career opportunities in information security related fields are growing, and degree granting college programs are being created or modified to meet this increased industry demand. Paradoxically, many employers prefer either to not hire entry-level information security candidates or to require extensive experience for information security positions. While(More)