149,674 research outputs found

    Research Agenda for Studying Open Source II: View Through the Lens of Referent Discipline Theories

    Get PDF
    In a companion paper [Niederman et al., 2006] we presented a multi-level research agenda for studying information systems using open source software. This paper examines open source in terms of MIS and referent discipline theories that are the base needed for rigorous study of the research agenda

    A new perspective on IT governance in SMEs

    Get PDF

    Information Systems Skills Differences between High-Wage and Low-Wage Regions: Implications for Global Sourcing

    Get PDF
    Developing Information Systems (IS) skills for a company’s workforce has always been challenging, but global sourcing growth has caused the determination of needed IS skills to be more complex. The increased use of outsourcing to an IS service provider and from high-wage regions to low-wage regions has affected what IS skills are required globally and how to distribute the workforce to meet these needs. To understand what skills are needed in locations that seek and those that provide outsourcing, we surveyed IS service provider managers in global locations. Results from 126 reporting units provide empirical evidence that provider units in low-wage regions value technical skills more than those in high-wage regions. Despite the emphasis on commodity skills in low-wage areas, high- and low-wage providers value project management skills. Low-wage regions note global and virtual teamwork more than high-wage regions do. The mix of skills and the variation by region have implications for domestic and offshore sourcing. Service providers can vary their staffing models in global regions which has consequences for recruiting, corporate training, and curriculum

    Determinants of User Acceptance of a Local eGovernment Electronic Document Management System (EDMS)

    Get PDF
    On numerous occasions the significant value of the investments involved in the development of eGovernment and the expectations of governmental information systems use do not correspond to the rate of effective use. This scenario makes it difficult to justify the development of electronic government by governments and local authorities among its citizens. It is therefore important to understand the factors that influence the employees' intention of using governmental information systems. With the aim of understanding the determining factors of using an Electronic Document Management System (EDMS) in the context of Portuguese municipalities, this study develops an empirical analysis using the Unified Theory of Acceptance and Use of Technology (UTAUT) model, (Venkatesh et al., 2003). This model's application for information systems research in the governmental context has a weak expression and is unique in EDMS research. This empirical research follows a realist and positivist approach. Data was collected from a survey answered by 2,175 employees of Portuguese municipalities (EDMS users). Partial Least Squares (PLS) was used to test the model proposed. The results showed that Intention to Use is positively affected by Performance Expectancy, Effort Expectancy, Social Influence and Facilitating Conditions. With respect to the EDMS Use, the results showed that it is positively influenced by Intention to Use and Facilitating Conditions. The main result indicates that EDMS users believe that the use of this information system will help them to obtain performance benefits in their work. However, the increasing use of EDMS is not very influenced by the system's perceived ease of use. In short, this study provides a contribution to the Information Systems Acceptance and Adoption literature in local eGovernmental contexts. In addition, our contribution empirically tests the model for implementation in governmental organizations and provides a better understanding of the adoption and use of an EDM

    “This is the way ‘I’ create my passwords ...":does the endowment effect deter people from changing the way they create their passwords?

    Get PDF
    The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to ownership of physical artifacts. If computer users also "own", and are attached to, their personal security routines, such feelings could conceivably activate the same endowment effect. This would, in turn, lead to their over-estimating the \value" of their existing routines, in terms of the protection they afford, and the risks they mitigate. They might well, as a consequence, not countenance any efforts to persuade them to adopt a more secure routine, because their comparison of pre-existing and proposed new routine is skewed by the activation of the endowment effect.In this paper, we report on an investigation into the possibility that the endowment effect activates when people adopt personal password creation routines. We did indeed find evidence that the endowment effect is likely to be triggered in this context. This constitutes one explanation for the failure of many security awareness drives to improve password strength. We conclude by suggesting directions for future research to confirm our findings, and to investigate the activation of the effect for other security routines

    Addressing business agility challenges with enterprise systems

    Get PDF
    It is clear that systems agility (i.e., having a responsive IT infrastructure that can be changed quickly to meet changing business needs) has become a critical component of organizational agility. However, skeptics continue to suggest that, despite the benefits enterprise system packages provide, they are constraining choices for firms faced with agility challenges. The reason for this skepticism is that the tight integration between different parts of the business that enables many enterprise systems\u27 benefits also increases the systems\u27 complexity, and this increased complexity, say the skeptics, increases the difficulty of changing systems when business needs change. These persistent concerns motivated us to conduct a series of interviews with business and IT managers in 15 firms to identify how they addressed, in total, 57 different business agility challenges. Our analysis suggests that when the challenges involved an enterprise system, firms were able to address a high percentage of their challenges with four options that avoid the difficulties associated with changing the complex core system: capabilities already built-in to the package but not previously used, leveraging globally consistent integrated data already available, using add-on systems available on the market that easily interfaced with the existing enterprise system, and vendor provided patches that automatically updated the code. These findings have important implications for organizations with and without enterprise system architectures

    Fuzzification of quantitative data to predict tumour size of colorectal cancer

    Get PDF
    Regression analysis has become more popular among researchers as a standard tool in analyzing data. This paper used fuzzy linear regression model (FLRM) to predict tumour size of colorectal cancer (CRC) data in Malaysia. 180 patients with colorectal cancer received treatment in hospital were recorded by nurses and doctors. Based on the patient records, a triangular fuzzy data will be built toward the size of the tumour. Mean square error (MSE) and root mean square error (RMSE) will be measured as a part of the process for predicting the size of the tumour. The degree of fitting adjusted is set between 0 and 1 in order to find the least error. It was found that the combination of FLRM model with fuzzy data provided a better prediction compared to the FLRM model alone. Hence, this study concluded that the tumour size is directly proportional to several factors such as gender, ethnic, icd 10, TNM staging, diabetes mellitus, Crohn’s disease

    A Research Agenda for Studying Open Source I: A Multi-Level Framework

    Get PDF
    This paper presents a research agenda for studying information systems using open source software A multi-level research model is developed at five discrete levels of analysis: (1) the artifact; (2) the individual; (3) the team, project, and community; (4) the organization; and (5) society. Each level is discussed in terms of key issues within the level. Examples are based on prior research. In a companion paper, [Niederman, et al 2006], we view the agenda through the lens of referent discipline theories
    • …
    corecore