37 research outputs found

    Information Systems Control: A Review and Synthesis of the Literature

    Get PDF
    The control of information systems (IS) activities has an extensive research history, ranging from early views on themanagement of systems development projects to more recent examinations of technology outsourcing. Using a structuredmethodology, 48 control-related articles from a range of IS journals are examined and individually coded. Based on patternsemerging from the literature, a comprehensive framework of IS control research is presented. The study’s findings revealopportunities for future research, including the use of a wider range of research methodologies and epistemologies, anexpanded focus beyond project level controls, and the creation of innovative conceptualizations of IS control that betterreflect the realities of technology in today’s organizations

    GOAL COMMITMENT IN ENTERPRISE SYSTEM LEARNING: AN EXPLORATORY EXAMINATION OF ITS ANTECEDENTS AND CONSEQUENCE

    Get PDF
    The success of enterprise system (ES), to a great extent, depends on users\u27 learning outcomes, which in turn, are determined by motivation and cognitive ability. Given the central role played by motivation, this paper applies the goal-setting theory and the expectancy theory to investigate the antecedents and consequence of users\u27 commitment to the goal of learning how to effectively apply ES. In particular, we focus on the effects of workplace environmental factors (i.e., work overload, leader member exchange and IT support) on goal commitment, which leads to user competence. In addition to the direct, main effects, we also explore how IT support and socialization tactics moderate the relationships between antecedents and goal commitment and between goal commitment and user competence, respectively. The research model is largely supported by data collected in a two-wave survey. Theoretical contribution and implications of this study are discussed

    Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm

    Get PDF
    We investigate differences in perception between management and staff with regard to the influence of criticalsuccess factors (CSFs) on security risk management (SRM) effectiveness at a Fortune 500 company. Nine CSFs areconfirmed to exist in the organization. Management and staff agree that each CSF is important for SRMeffectiveness, but differ on the level of importance of each CSF. With regard to six of the nine CSFs (executivemanagement support, organization maturity, open communication, holistic view of organization, corporate securitystrategy, and human resource development), management and staff concur on their current implementation, and havea positive perception about their impact. The results also indicate that both management and staff are not satisfiedwith the current practices pertaining to risk management stakeholders, team member empowerment, and securitymaintenance. Recommendations are presented for the organization as part of possible solutions to counter thedissatisfaction with these three CSFs

    Using a Positivist Case Research Methodology to Test a Theory About IT-Enabled Business Process Redesign

    Get PDF
    We derive a process theory, the “technology-oriented theory of business process redesign,” from the business process reengineering (BPR) literature and test it in a positivist case study of a corporation that implemented BPR. Our evidence refutes the theory. The future direction we suggest for researchers and practitioners is to adopt, from the beginning, an orientation that is not technocentric or overly technological, but gives equal consideration to social dimensions and the interactions between the social and the technological

    Digital technologies and power dynamics in the organization: A conceptual review of remote working and wearable technologies at work

    Get PDF
    In this article, we examine the kinds of control practices that emerge with the introduction of digital technologies, and how these technologies are employed to shape power within workplaces. We present a comparative conceptual review of work practices by contrasting remote work and the use of workplace wearables. We trace forms of power and control that have been enacted with the adoption of these work-related technologies and associated practices. We find that the prevailing literature focuses on the practices enacted by management in order to control workers and exert power over them, and we propose that a more comprehensive approach be taken. In support of this view, we show how the concept of appropriation emerges from science and technology studies, and we argue that such a concept would be useful for exploring how workers use and incorporate digital technologies into their daily lives, thus reshaping power in organizations
    corecore