99 research outputs found

    Human Resources Systems Outsourcing as a Source of Sustained Competitive Advantage: Proposal for an Empirical Investigation

    Get PDF
    The global outsourcing industry, including the Human Resources (HR) Systems outsourcing industry is growing at a phenomenal rate. The proponents of the resource-based view (RBV) have long argued that a firm gains sustainable competitive advantage from those resources and capabilities it controls and which are valuable, rare, imperfectly imitable, and not substitutable. The RBV also indicates that HR systems can be a source of sustained competitive advantage. What happens when such HR systems are outsourced? Does HR systems outsourcing itself become a source of sustained competitive advantage for a firm? Is there any relation between whether a firm perceives its HR systems to be a source of sustained competitive advantage or not and its decision to outsource its HR systems? These are the questions that this study seeks to address

    Understanding Resource Sharing In the Online Decentralized Peer-To-Peer Market Environment by Complex Adaptive System

    Get PDF
    The emerging discussion of sharing economy (sharing a product and service in turns) takes individuals back to familiar sharing behaviors and community-based exchange from the domination of large corporations. However, the current study proposes that the resources are not only limited to services or goods, but also private individuals’ competence (knowledge, skills, and experience). By applying the complex adaptive system theory, this paper redefines the whole online market environment, demonstrates the important role of intangible recourse sharing during dynamic emergence processes, and explains the establishment of decentralized online community-based exchange. Moreover, this study highlights the intangible resource sharing as the foundation of the online market environment evolution, and contributes to the appearing P2P exchange discussions by introducing a macroscopic theory

    Disaster Recovery Planning: A PMT-based Conceptual Model

    Get PDF
    In today\u27s information intensive and networked world, Disaster Recovery Planning (DRP) is a critical and significant activity. Yet, it does not always receive the attention it deserves. Therefore, it is critical to examine the factors that influence the undertaking of disaster recovery planning under the lens of the Protection Motivation Theory (PMT). Additionally, it is important to note that even if there is enough motivation to undertake disaster recovery planning, whether it is actually undertaken or not is largely dependent on the influence the Information Technology (IT) Professional is able to exert as an opinion leader within the organization. A model on disaster recovery planning is proposed suggesting threat and coping appraisals as the determinants and opinion leadership of the IT Professional as the moderator variable

    IT Capability: A Moderator Model of Competitive Advantage

    Get PDF
    Although, the resource based theory mentions both resources and capabilities to be sources of competitive advantage, not much distinction between the two has been made in research on competitive advantage. Therefore, this proposal presents a literature review of the research on information technology (IT) and organizational capability, and then puts forth a model of IT capability as a moderator in the relationship between IT resources (as indicated by the IT investment announcements) and competitive advantage (as indicated by the firm’s stock performance)

    Investigation on Willingness of Employees to Share Information Security Advice

    Get PDF
    As modern organizations rely more on their information systems, mitigating information security risks becomes essential. Weaknesses in the information security management chain have continued to be challenged by employees. Therefore, enhancing employee security awareness becomes critical. Considering the effectiveness of informal methods, this research examines security advice sharing as one of the operative ways. Accordingly, in this paper, by adapting the theory of planned behavior as our theoretical lens, we propose a conceptual model of factors that are anticipated to impact the willingness of employees to share security advice. Finally, conclusion and avenues for future research are discussed

    Beyond Compliance: Empowering Employees’ Extra-Role Security Behaviors in Dynamic Environments

    Get PDF
    Information security policies are (ISP) used to guide employees in order to ensure information security while utilizing organizational information systems in the workplace. However, rigid compliance with ISP may not help employees and companies to confront emerging threats in the dynamic environment of modern security threats. ISP should be developed and improved according to the demands of implementers and in keeping with the changing security environment. To that end, we propose that employees\u27 extra-role behaviors - actions that may seem to go beyond requirements and limitations of security policies - can provide input into forming suitable and feasible security policies that provide insights against the emerging threats in the operating environment

    IT Outsourcing: Examined Under the Resource-Based View Lens

    Get PDF
    The proponents of the resource-based view (RBV) have long argued that a firm gains sustainable competitive advantage from those resources and capabilities it controls and which are valuable, rare, imperfectly imitable, and not substitutable. So, does information technology (IT) outsourcing strip companies of any competitive advantage that is attributed to IT? It has been said that information systems that cannot sustain competitive advantage are transient and are not expected to enhance firm valuation. In that case, does it imply that outsourcing of certain aspects of IT can lead to sustained competitive advantage? Therefore, this paper’s main research question is: Does IT outsourcing lead to sustained competitive advantage for a firm? In order to empirically examine this, it is proposed to study the impact of IT outsourcing announcements on firm valuation using the event study methodology

    Information Technology Usage In Accounting Firms: The Best Versus The Rest

    Get PDF
    The purpose of this paper is to analyze information technology expenditures in public accounting firms from a multi-year sample.  This study also focuses on identifying possible IT spending trends in public accounting firms and attempts to determine if additional spending on IT increased the profitability of these firms
    • …
    corecore