346,693 research outputs found

    A Structural Framework for Analyzing Information Technology

    Get PDF
    With the rise of technological advance, organizations require methods and tools to analyze technologies regarding their fit to the needs of an institution. Research on the evaluation and selection of technologies has mainly adopted a process perspective so far. We argue that it is crucial to consider the inner structure of technologies as well and describe its elements and connections. Hence, in this paper we propose a framework for analyzing information technology by reconstructing its inner structure. We transfer concepts of philosophical Structuralism to technologies by analyzing the striking proximity in the assembly of theories and technologies as conceptual networks. By describing technologies in such a way, we are able to formulate a set of questions which allows for analyzing and evaluating the suitability of technologies for specific requirements. In order to demonstrate the utility of such theoretizied technologies we apply our approach to the technology .NET

    Information Acquisition and Adoption of Organic Farming Practices

    Get PDF
    This study offers an empirical framework for analyzing farmers' joint decisions to adopt organic farming practices and to seek technical (i.e., farming) information from various sources. To that end, a trivariate ordered probit model is specified and implemented in the case of organic land conversion in Crete, Greece. Findings suggest that the decisions of information acquisition and organic land conversion are indeed correlated, and different farming information sources play a complementary role. Structural policies improving the farmer's allocative ability are found to play an important role in encouraging organic farming adoption.Crete, Greece, information acquisition, organic farming, technology adoption, Farm Management,

    Enterprise Social Media Use and Impact on Performance: The Role of Workplace Integration and Positive Emotions

    Get PDF
    Organizations struggle to find ways to improve employees’ performance. To date, little research has empirically examined the relationship between enterprise social media use and knowledge workers’ performance. Using social capital theory and the broaden-and-build theory of positive emotions as our theoretical framework, we investigate the relationship between enterprise social media use and knowledge workers’ performance. We tested our research model by collecting data from employees working for a large information technology firm in the Midwestern United States and analyzing the data using a structural equation modeling approach. The results suggest that enterprise social media use can increase workplace integration, which further enhances performance directly and indirectly through positive emotions. Enterprise social media use also has a direct relationship with performance. The paper concludes with practical and theoretical implications

    Identifying Factors Contributing Towards Information Security Maturity in an Organization

    Get PDF
    Information security capability maturity (ISCM) is a journey towards accurate alignment of business and security objectives, security systems, processes, and tasks integrated with business-enabled IT systems, security enabled organizational culture and decision making, and measurements and continuous improvements of controls and governance comprising security policies, processes, operating procedures, tasks, monitoring, and reporting. Information security capability maturity may be achieved in five levels: performing but ad-hoc, managed, defined, quantitatively governed, and optimized. These five levels need to be achieved in the capability areas of information integrity, information systems assurance, business enablement, security processes, security program management, competency of security team, security consciousness in employees, and security leadership. These areas of capabilities lead to achievement of technology trustworthiness of security controls, integrated security, and security guardianship throughout the enterprise, which are primary capability domains for achieving maturity of information security capability in an organization. There are many factors influencing the areas of capabilities and the capability domains for achieving information security capability maturity. However, there is little existing study done on identifying the factors that contribute to achievement of the highest level of information security capability maturity (optimized) in an organization. This research was designed to contribute to this area of research gap by identifying the factors contributing to the areas of capabilities for achieving the highest level of information security capability maturity. The factors were grouped under the eight capability areas and the three capability domains in the form of an initial structural construct. This research was designed to collect data on all the factors using an online structured questionnaire and analyzing the reliability and validity of the initial structural construct following the methods of principal components analysis (PCA), Cronbach Alpha reliability analysis, confirmatory factor analysis (CFA), and structural equation modeling. A number of multivariate statistical tests were conducted on the data collected regarding the factors to achieve an optimal model reflecting statistical significance, reliability, and validity. The research was conducted in four phases: expert panel and pilot study (first phase), principal component analysis (PCA) and reliability analysis (RA) of the factor scales (second phase), confirmatory factor analysis (CFA) using LISREL (third phase), and structural equation modeling (SEM) using LISREL (fourth phase). The final model subsequent to completing the four phases reflected acceptance or rejection of the eleven hypotheses defined in the initial structural construct of this study. The final optimized model was obtained with the most significant factors loading on the capability areas of information integrity, information security assurance, business enablement, security process maturity, security program management, competency of security team, security conscious employees, and security leadership, including the most significant factors loading the three capability domains of security technology trustworthiness, security integration, and security guardianship. All the eleven hypotheses were accepted as part of the optimal structural construct of the final model. The model provides a complex integrated framework of information security maturity requiring multi-functional advancements and maturity in processes, people, and technology, and organized security program management and communications fully integrated with the business programs and communications. Information security maturity is concluded as a complex function of multiple maturity programs in an organization leading to organized governance structures, multiple maturity programs, leadership, security consciousness, and risk-aware culture of employees

    Analytic frameworks for assessing dialogic argumentation in online learning environments

    Get PDF
    Over the last decade, researchers have developed sophisticated online learning environments to support students engaging in argumentation. This review first considers the range of functionalities incorporated within these online environments. The review then presents five categories of analytic frameworks focusing on (1) formal argumentation structure, (2) normative quality, (3) nature and function of contributions within the dialog, (4) epistemic nature of reasoning, and (5) patterns and trajectories of participant interaction. Example analytic frameworks from each category are presented in detail rich enough to illustrate their nature and structure. This rich detail is intended to facilitate researchers’ identification of possible frameworks to draw upon in developing or adopting analytic methods for their own work. Each framework is applied to a shared segment of student dialog to facilitate this illustration and comparison process. Synthetic discussions of each category consider the frameworks in light of the underlying theoretical perspectives on argumentation, pedagogical goals, and online environmental structures. Ultimately the review underscores the diversity of perspectives represented in this research, the importance of clearly specifying theoretical and environmental commitments throughout the process of developing or adopting an analytic framework, and the role of analytic frameworks in the future development of online learning environments for argumentation

    Understanding the policy instruments mix in higher education r&d : a policy scale development

    Get PDF
    Purpose: The purpose of this paper is to understand the policy instruments mix in higher education research and development (HERD) using structural equation modeling. This modeling helps us to understand the total structure of the factors affecting the policy mix as well as its main actors in a political system. Design/Methodology/Approach: Thirty two identified actors (official institutions) through upstream documents were designed by the method of social network analysis in the form of a political network and their role in policy instruments mix was investigated through their amount of centrality in the network. Also, indicators affecting policy instrument mix were identified using the view of 13 Iranian higher education policy experts. These indicators were categorized in the form of causal, contextual, intervening factors, main phenomena, mechanisms and outcomes. Structural equation modeling was used to confirm the model. Findings: According to the results, the lack of policy logic is the main reason for the lack of justice in the policy instruments mix. Choosing a logic or theory of justice that is the basis of all the instruments in research and development decisions can lead to the integration of concepts and instruments mix. Practical Implications: There is no doubt that the dominant range of thought can have a greater impact on politics in any state, but choosing observers from other aspects of thought will always lead to more effective policies. Originality/Value: How to form policy instruments mix in policymakers' mind has not been investigated in any study so far, and this study explores the indicators governing policy instrument mix.peer-reviewe

    On Engineering Support for Business Process Modelling and Redesign

    Get PDF
    Currently, there is an enormous (research) interest in business process redesign (BPR). Several management-oriented approaches have been proposed showing how to make BPR work. However, detailed descriptions of empirical experience are few. Consistent engineering methodologies to aid and guide a BPR-practitioner are currently emerging. Often, these methodologies are claimed to be developed for business process modelling, but stem directly from information system design cultures. We consider an engineering methodology for BPR to consist of modelling concepts, their representation, computerized tools and methods, and pragmatic skills and guidelines for off-line modelling, communicating, analyzing, (re)designing\ud business processes. The modelling concepts form the architectural basis of such an engineering methodology. Therefore, the choice, understanding and precise definition of these concepts determine the productivity and effectiveness of modelling tasks within a BPR project. The\ud current paper contributes to engineering support for BPR. We work out general issues that play a role in the development of engineering support for BPR. Furthermore, we introduce an architectural framework for business process modelling and redesign. This framework consists of a coherent set of modelling concepts and techniques on how to use them. The framework enables the modelling of both the structural and dynamic characteristics of business processes. We illustrate its applicability by modelling a case from service industry. Moreover, the architectural framework supports abstraction and refinement techniques. The use of these techniques for a BPR trajectory are discussed

    Analyzing policy capturing data using structural equation modeling for within-subject experiments (SEMWISE)

    Get PDF
    We present the SEMWISE (structural equation modeling for within-subject experiments) approach for analyzing policy capturing data. Policy capturing entails estimating the weights (or utilities) of experimentally manipulated attributes in predicting a response variable of interest (e.g., the effect of experimentally manipulated market-technology combination characteristics on perceived entrepreneurial opportunity). In the SEMWISE approach, a factor model is specified in which latent weight factors capture individually varying effects of experimentally manipulated attributes on the response variable. We describe the core SEMWISE model and propose several extensions (how to incorporate nonbinary attributes and interactions, model multiple indicators of the response variable, relate the latent weight factors to antecedents and/or consequences, and simultaneously investigate several populations of respondents). The primary advantage of the SEMWISE approach is that it facilitates the integration of individually varying policy capturing weights into a broader nomological network while accounting for measurement error. We illustrate the approach with two empirical examples, compare and contrast the SEMWISE approach with multilevel modeling (MLM), discuss how researchers can choose between SEMWISE and MLM, and provide implementation guidelines
    • …
    corecore