157,913 research outputs found

    Research Agenda for Studying Open Source II: View Through the Lens of Referent Discipline Theories

    Get PDF
    In a companion paper [Niederman et al., 2006] we presented a multi-level research agenda for studying information systems using open source software. This paper examines open source in terms of MIS and referent discipline theories that are the base needed for rigorous study of the research agenda

    Addressing business agility challenges with enterprise systems

    Get PDF
    It is clear that systems agility (i.e., having a responsive IT infrastructure that can be changed quickly to meet changing business needs) has become a critical component of organizational agility. However, skeptics continue to suggest that, despite the benefits enterprise system packages provide, they are constraining choices for firms faced with agility challenges. The reason for this skepticism is that the tight integration between different parts of the business that enables many enterprise systems\u27 benefits also increases the systems\u27 complexity, and this increased complexity, say the skeptics, increases the difficulty of changing systems when business needs change. These persistent concerns motivated us to conduct a series of interviews with business and IT managers in 15 firms to identify how they addressed, in total, 57 different business agility challenges. Our analysis suggests that when the challenges involved an enterprise system, firms were able to address a high percentage of their challenges with four options that avoid the difficulties associated with changing the complex core system: capabilities already built-in to the package but not previously used, leveraging globally consistent integrated data already available, using add-on systems available on the market that easily interfaced with the existing enterprise system, and vendor provided patches that automatically updated the code. These findings have important implications for organizations with and without enterprise system architectures

    A new perspective on IT governance in SMEs

    Get PDF

    Information Systems Skills Differences between High-Wage and Low-Wage Regions: Implications for Global Sourcing

    Get PDF
    Developing Information Systems (IS) skills for a company’s workforce has always been challenging, but global sourcing growth has caused the determination of needed IS skills to be more complex. The increased use of outsourcing to an IS service provider and from high-wage regions to low-wage regions has affected what IS skills are required globally and how to distribute the workforce to meet these needs. To understand what skills are needed in locations that seek and those that provide outsourcing, we surveyed IS service provider managers in global locations. Results from 126 reporting units provide empirical evidence that provider units in low-wage regions value technical skills more than those in high-wage regions. Despite the emphasis on commodity skills in low-wage areas, high- and low-wage providers value project management skills. Low-wage regions note global and virtual teamwork more than high-wage regions do. The mix of skills and the variation by region have implications for domestic and offshore sourcing. Service providers can vary their staffing models in global regions which has consequences for recruiting, corporate training, and curriculum

    “This is the way ‘I’ create my passwords ...":does the endowment effect deter people from changing the way they create their passwords?

    Get PDF
    The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to ownership of physical artifacts. If computer users also "own", and are attached to, their personal security routines, such feelings could conceivably activate the same endowment effect. This would, in turn, lead to their over-estimating the \value" of their existing routines, in terms of the protection they afford, and the risks they mitigate. They might well, as a consequence, not countenance any efforts to persuade them to adopt a more secure routine, because their comparison of pre-existing and proposed new routine is skewed by the activation of the endowment effect.In this paper, we report on an investigation into the possibility that the endowment effect activates when people adopt personal password creation routines. We did indeed find evidence that the endowment effect is likely to be triggered in this context. This constitutes one explanation for the failure of many security awareness drives to improve password strength. We conclude by suggesting directions for future research to confirm our findings, and to investigate the activation of the effect for other security routines

    Big data in higher education: an action research on managing student engagement with business intelligence

    Get PDF
    This research aims to explore the value of Big Data in student engagement management. It presents an action research on applying BI in a UK higher education institution that has developed and implemented a student engagement tracking system (SES) for better student engagement management. The SES collects data from various sources, including RFID tracking devices across many locations in the campus and student online activities. This public funded research project has enhanced the current SES with BI solutions and raised awareness on the value of the Big Data in improving student experience. The action research concerns with the organizational wide development and deployment of Intelligent Student Engagement System involving a diverse range of stakeholders. The activities undertaken to date have revealed interesting findings and implications for advancing our understanding and research in leveraging the benefit of the Big Data in Higher Education from a socio-technical perspective

    A Research Agenda for Studying Open Source I: A Multi-Level Framework

    Get PDF
    This paper presents a research agenda for studying information systems using open source software A multi-level research model is developed at five discrete levels of analysis: (1) the artifact; (2) the individual; (3) the team, project, and community; (4) the organization; and (5) society. Each level is discussed in terms of key issues within the level. Examples are based on prior research. In a companion paper, [Niederman, et al 2006], we view the agenda through the lens of referent discipline theories

    Does Information Technology Investment Influences Firm’s Market Value? The Case of Non-Publicly Traded Healthcare Firms

    Get PDF
    Managers make informed information technology investment decisions when they are able to quantify how IT contributes to firm performance. While financial accounting measures inform IT’s influence on retrospective firm performance, senior managers expect evidence of how IT influences prospective measures such as the firm’s market value. We examine the efficacy of IT’s influence on firm value combined with measures of financial performance for non-publicly traded (NPT) hospitals that lack conventional market-based measures. We gathered actual sale transactions for NPT hospitals in the United States to derive the q ratio, a measure of market value. Our findings indicate that the influence of IT investment on the firm is more pronounced and statistically significant on firm value than exclusively on the accounting performance measures. Specifically, we find that the impact of IT investment is not significant on return on assets (ROA) and operating income for the same set of hospitals. This research note contributes to research and practice by demonstrating that the overall impact of IT is better understood when accounting measures are complemented with the firm’s market value. Such market valuation is also critical in merger and acquisition decisions, an activity that is likely to accelerate in the healthcare industry. Our findings provide hospitals, as well as other NPT firms, with insights into the impact of IT investment and a pragmatic approach to demonstrating IT’s contribution to firm value

    IT integration, operations flexibility and performance: an empirical study

    Get PDF
    Purpose: This study examines the relationship between IT implementation and performance with manufacturing flexibility based on a sample drawn from a set of manufacturing firms. Design/methodology/approach: The relationships were analyzed using structural equations modelling (SEM) using EQS 6.2 software. Previously, an explanatory factor analysis confirmed one-dimensionality of the scales, Cronbach’s alpha was calculated to evaluate its internal consistency and a confirmatory factor analysis was run to observe scales’ validity. Findings: This research proves a significant positive and direct effect of IT implementation on operations performance with 4 out of 6 flexibility dimensions (Machine, Labour, Material handling and Volume). Mix and Routing flexibility dimensions show no significant impact on firm performance. Research limitations/implications: It is necessary to be cautious when generalizing this findings these findings, as service firms were not part of the sample even when statistical results prove robustness suggesting that the findings are quite reliable. Some flexibility dimensions show no significant impact in performance (Routing and Mix flexibility). This is consistent with the fact that these flexibility dimensions act as variability absorbers within the manufacturing process. Future research lines: Future studies can focus on determining further internal and environmental factors that affect operations flexibility according to specific sector characteristics. Originality/value: This research proves a significant positive and direct effect of IT implementation on operations performance. Results show not only the links between IT implementation and operations performance, but also the magnitude of every impact. The model considers IT integration as the degree of alignment that existing technology resources in a firm have with the business strategy, in terms of importance and support for this strategyPeer Reviewe
    • …
    corecore