37 research outputs found

    The Trajectory of IT in Healthcare at HICSS: A Literature Review, Analysis, and Future Directions

    Get PDF
    Research has extensively demonstrated that healthcare industry has rapidly implemented and adopted information technology in recent years. Research in health information technology (HIT), which represents a major component of the Hawaii International Conference on System Sciences, demonstrates similar findings. In this paper, review the literature to better understand the work on HIT that researchers have conducted in HICSS from 2008 to 2017. In doing so, we identify themes, methods, technology types, research populations, context, and emerged research gaps from the reviewed literature. With much change and development in the HIT field and varying levels of adoption, this review uncovers, catalogs, and analyzes the research in HIT at HICSS in this ten-year period and provides future directions for research in the field

    A model for describing and maximising Security Knowledge Sharing to enhance security awareness

    Get PDF
    Employees play a crucial role in enhancing information security in the workplace, and this requires everyone having the requisite security knowledge and know-how. To maximise knowledge levels, organisations should encourage and facilitate Security Knowledge Sharing (SKS) between employees. To maximise sharing, we need first to understand the mechanisms whereby such sharing takes place and then to encourage and engender such sharing. A study was carried out to test the applicability of Transactive Memory Systems Theory in describing knowledge sharing in this context, which confirmed its applicability in this domain. To encourage security knowledge sharing, the harnessing of Self-Determination Theory was proposed— satisfying employee autonomy, relatedness and competence needs to maximise sharing. Such sharing is required to improve and enhance employee security awareness across organisations. We propose a model to describe the mechanisms for such sharing as well as the means by which it can be encouraged

    Fall 2003

    Get PDF

    Fall 2003 Vol. 6 No. 2

    Get PDF
    https://surface.syr.edu/ischool_news/1014/thumbnail.jp

    The impact of information systems auditor’s training on the quality of an information systems audit

    Get PDF
    Abstract: The significance of information technology (IT) audits in organisations is an area that has received increased focus, and it is increasingly necessary to conduct additional research into the IT audit subject area. As a result of increased dependence and spending on IT, it has effectively become a requirement for organisations to increase their level of assurance about these investments and their ability to deliver as expected. IT audits fulfil this role, and are used to examine the effectiveness of controls, security of important systems and business operations to identify weaknesses and find ways that can be used to improve and mitigate the impact of these weaknesses. However, prior research has not measured the impact that training of auditors has on the quality of IT audits. The findings of this study show that organisations play an integral role in the training programs. However, these organisations do not understand their training programs and cannot properly communicate the training requirements to IT auditors. The research findings have also shown that continuous professional development programs are additional tools in enhancing IT auditor knowledge. This research undertaking has found that generally, internal programs are more effective in delivering content to IT auditors and thus more emphasis can be put on them. Overall, this research undertaking strengthens the idea that resources should be committed to improving training programs, as improving training programs eventually leads to efficiency in all matters related to IT audit quality

    Blockchain Value Creation Logics and Financial Returns

    Get PDF
    With its complexities and portfolio-nature, the advent of blockchain technology presents several use cases to stakeholders for business value appropriation and financial gains. This 3-essay dissertation focuses on three exemplars and research approaches to understanding the value creation logics of blockchain technology for financial gains. The first essay is a conceptual piece that explores five main affordances of blockchain technology and how these can be actualized and assimilated for business value. Based on the analysis of literature findings, an Affordance-Experimentation-Actualization-Assimilation (AEAA) model is proposed. The model suggests five affordance-to-assimilation value chains and eight value interdependencies that firms can leverage to optimize their value creation and capture during blockchain technology implementation. The second essay empirically examines the financial returns of public firms\u27 blockchain adoption investments at the level of the three main blockchain archetypes (private-permissioned, public-permissioned and permissionless. Drawing upon Fichman\u27s model of the option value of innovative IT platform investments, the study examines business value creation through firm blockchain strategy (i.e., archetype instances, decentralization, and complementarity), learning (i.e., blockchain patents and event participation), and bandwagon effects using quarterly data of firm archetype investments from 2015 to 2020. The study\u27s propensity score matching utilization and fixed-effects modeling provide objective quantification of how blockchain adoption leads to increases in firm value (performance measured by Tobin\u27s q) at the archetype level (permissionless, public permissioned, and private permissioned). Surprisingly, a more decentralized archetype and a second different archetype implementation are associated with a lower Tobin\u27s q. In addition, IT-option proxy parameters such as blockchain patent originality, participation in blockchain events, and network externality positively impact firm performance, whereas the effect of blockchain patents is negative. As the foremost and more established use case of blockchain technology whose business value is accessed in either of the five affordances and exemplifies a permissionless archetype for financial gains, bitcoin cryptocurrency behavior is studied through the lens of opinion leaders on Twitter. The third essay this relationship understands the hourly price returns and volatility shocks that sentiments from opinion leaders generate and vice-versa. With a dynamic opinion leader identification strategy, lexicon and rule-based sentiment analytics, I extract sentiments of the top ten per cent bitcoin opinion leaders\u27 tweets. Controlling for various economic indices and contextual factors, the study estimates a vector autoregression model (VAR) and finds that finds that Bitcoin return granger cause Polarity but the influence of sentiment subjectivity is marginal and only stronger on bitcoin price volatility. Several key implications for blockchain practitioners and financial stakeholders and suggestions for future research are discussed
    corecore