61 research outputs found

    Achieving IT diffusion within the fragments: an IT culture perspective

    Get PDF
    Many organizations still fail to make a return from the huge investments they make in implementing complex Information Technology (IT). This is usually due to cultural forces that inhibit the level of usage required to facilitate IT Diffusion. An emerging stream of research highlights the IT culture perspective, a perspective vital for understanding individuals’ social practices when they interact with IT. This paper adopted a case study approach to explore how the IT culture perspective may explain how organizational diffusion of an IT may happen despite opposing cultural forces causing a stalemate to the diffusion process. This study identified three IT culture archetypes - embracing, rejecting and confused, depicting a fragmented IT culture during the adaption, acceptance and routinization stages of diffusion of an IT. This study highlights how a salient element of a fragmented IT culture-embracing IT culture archetype could explain how diffusion of an IT happened despite the manifestations of negative IT culture archetypes - ‘confused’ and ‘rejecting’ during the diffusion process

    The influence of organizational culture on the outcome of an IS implementation

    Get PDF
    A number of information system (IS) studies have adopted organizational culture (OC) theory to investigate IS implementations. The studies highlight that members will reach consensus or agreement in the use of an IS but also experience inevitable tensions and ambiguities in the use of the IS. However, literature related to IS implementation/OC has rarely examined the influence that the saliency of specific cultural practices may have on the success or failure of IS implementations. Using a case study approach, we adopted the “soft positivism” research philosophy to collect data, underpinned by Martin’s (1992) integration and differentiation perspectives of OC to study organizational implementation of an IS. These perspectives served as interpretive lenses through which to explain how members’ salient behaviors towards an IS evolved during the implementation process. Our study augments the IS implementation/OC literature by demonstrating how salient cultural practices influence the outcome of IS implementatio

    Managerial ambidexterity and the cultural toolkit in project delivery

    Get PDF
    Research has established that ambidextrous organizations can successfully outperform their non-ambidextrous counterparts through exploitative and exploratory activities. However, there remains a scarcity of research on how managers orchestrate ambidexterity at the operational level, particularly in project delivery. Drawing on 55 qualitative interviews with middle managers on two engineering projects, we examine how managerial ambidexterity is enacted at the project level. We find that middle managers enable their own exploitative, exploratory and ambidextrous behaviors by invoking a repertoire of values selected from their organization's cultural toolkit, which serve as cultural resources for action. We discuss how the cultural toolkit perspective can inform the relationship between managerial actions in day-to-day operations and organizational ambidexterity. Implications for theory and practice are presented

    Revisiting the trajectory of IT implementation in organisations: an IT culture perspective

    Get PDF
    Purpose - Organisational implementations of information technology (IT) normally fail due to cultural forces that inhibit the usage levels required to facilitate successful IT implementation. This paper explores IT implementation from an IT Culture perspective (Leidner and Kayworth, 2006). In particular, it identifies and follows the trajectory of IT culture archetypes that emerge during the implementation process and further investigates their role in facilitating successful IT implementations. Design/methodology/approach - This research adopts the qualitative single case study approach and draws on the implementation of a management information system (MIS) in a Nigerian global bank. Findings - The findings illustrate three different IT culture archetypes and provide insights into their dynamic nature. The progressive weakening of two IT culture archetypes and the corresponding strengthening of the third archetype shows how initial vision conflicts can get transformed into vision agreements. Originality/value - This paper extends the IT Culture perspective by illustrating how a congruence relationship between IT cultures and IT artefacts can be fostered. The paper shows how diverse IT cultures can develop reasonably quickly in line with initial user experiences of a system. When IT cultures are aligned with the values embedded in IT, positive engagement and usage of the technology results, strengthening the presence of embracing IT cultures

    Improving the governance of information technology: Insights from the history of Internet governance

    Get PDF
    Governance of the Internet is a matter of global importance and concern. The multi-stakeholder (MS) and multilateral (ML) forms have been presented as two competing and plausible models of Internet governance. Drawing on actor–network theory (ANT) and building on an interpretive case study of rich archival data, this paper examines how the focal actor’s (i.e. the U.S. government’s) beliefs influence the choice of Internet governance form. It further explores the strategies of the focal actor to translate the interests of the ML network’s supporters, with a view to enrolling them in the MS governance network. The analysis shows how the focal actor has established the MS governance form through the Internet Corporation for Assigned Names and Numbers (ICANN) as an Obligatory Passage Point to keep the Internet successfully operational. The analysis also illuminates the combination of structural and collaborative strategies employed to allay the growing dissatisfaction with the MS governance form. The paper suggests that whilst the protocols and technical standards of the Internet are increasingly relegated to the background, the social and political network that Internet artefacts draw together in a meta-form has grown in prominence. It also argues that there may be a hierarchy of beliefs, which influence how actors enact their translation strategies. Finally, the paper discusses parallels between the MS/ML forms of Internet governance and IT governance in organizational contexts

    Research on information systems failures and successes: Status update and future directions

    Get PDF
    The final publication is available at Springer via http://dx.doi.org/10.1007/s10796-014-9500-yInformation systems success and failure are among the most prominent streams in IS research. Explanations of why some IS fulfill their expectations, whereas others fail, are complex and multi-factorial. Despite the efforts to understand the underlying factors, the IS failure rate remains stubbornly high. A Panel session was held at the IFIP Working Group 8.6 conference in Bangalore in 2013 which forms the subject of this Special Issue. Its aim was to reflect on the need for new perspectives and research directions, to provide insights and further guidance for managers on factors enabling IS success and avoiding IS failure. Several key issues emerged, such as the need to study problems from multiple perspectives, to move beyond narrow considerations of the IT artifact, and to venture into underexplored organizational contexts, such as the public sector. © 2014 Springer Science+Business Media New York

    Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model

    Get PDF
    YesBased on a critical review of the Unified Theory of Acceptance and Use of Technology (UTAUT), this study first formalized an alternative theoretical model for explaining the acceptance and use of information system (IS) and information technology (IT) innovations. The revised theoretical model was then empirically examined using a combination of meta-analysis and structural equation modelling (MASEM) techniques. The meta-analysis was based on 1600 observations on 21 relationships coded from 162 prior studies on IS/IT acceptance and use. The SEM analysis showed that attitude: was central to behavioural intentions and usage behaviours, partially mediated the effects of exogenous constructs on behavioural intentions, and had a direct influence on usage behaviours. A number of implications for theory and practice are derived based on the findings

    Planar Tc99m – sestamibi scintimammography should be considered cautiously in the axillary evaluation of breast cancer protocols: Results of an international multicenter trial

    Get PDF
    BACKGROUND: Lymph node status is the most important prognostic indicator in breast cancer in recently diagnosed primary lesion. As a part of an interregional protocol using scintimammography with Tc99m compounds, the value of planar Tc99m sestamibi scanning for axillary lymph node evaluation is presented. Since there is a wide range of reported values, a standardized protocol of planar imaging was performed. METHODS: One hundred and forty-nine female patients were included prospectively from different regions. Their mean age was 55.1 ± 11.9 years. Histological report was obtained from 2.987 excised lymph nodes from 150 axillas. An early planar chest image was obtained at 10 min in all patients and a delayed one in 95 patients, all images performed with 740–925 MBq dose of Tc99m sestamibi. Blind lecture of all axillary regions was interpreted by 2 independent observers considering any well defined focal area of increased uptake as an involved axilla. Diagnostic values, 95% confidence intervals [CI] and also likelihood ratios (LR) were calculated. RESULTS: Node histology demonstrated tumor involvement in 546 out of 2987 lymph nodes. Sestamibi was positive in 30 axillas (25 true-positive) and negative in 120 (only 55 true-negative). The sensitivity corresponded to 27.8% [CI = 18.9–38.2] and specificity to 91.7% [81.6–97.2]. The positive and negative LR were 3.33 and 0.79, respectively. There was no difference between early and delayed images. Sensitivity was higher in patients with palpable lesions. CONCLUSION: This work confirmed that non tomographic Tc99m sestamibi scintimammography had a very low detection rate for axillary lymph node involvement and it should not be applied for clinical assessment of breast cancer

    A post-colonial analysis of agile software development methods in ICT4D

    Get PDF
    There is evidence that agile approaches to information system development can improve product quality and developer productivity. However, successful adoption of these approaches appears to depend on adaptation to specific contexts. This research contributes to a broader goal to understand what it means to “be agile” in the presence of adaptations to the specific context. To pursue our research objectives, we have performed 31 semi-structured recorded and transcribed practitioner interviews from three companies in Lebanon. The interview transcripts were analysed using an approach informed by grounded theory. Agile methods enable learning and improvement through team conversations. Yet, the practitioners in our study shun public self-evaluation, finding it difficult to discuss areas for improvement in public. We also found legacy “top down” management practices that undermine team autonomy and local client companies lack experience of engaging with agile processes. In a more positive vein, we found evidence of rich use of various communications channels to overcome geographical distance. On the one hand, agile methods represent a “northern” idea being propagated to the Global South. And yet, on the other hand, the agile concept of self-organising teams has the potential to be empowering and emancipatory. Post-colonial theory helps us understand the phenomenon of agile tailoring, where development process ceremonies are adapted to suite a specific local context

    Direct observation of topoisomerase IA gate dynamics

    Get PDF
    Type IA topoisomerases cleave single-stranded DNA and relieve negative supercoils in discrete steps corresponding to the passage of the intact DNA strand through the cleaved strand. Although type IA topoisomerases are assumed to accomplish this strand passage via a protein-mediated DNA gate, opening of this gate has never been observed. We developed a single-molecule assay to directly measure gate opening of the Escherichia coli type IA topoisomerases I and III. We found that after cleavage of single-stranded DNA, the protein gate opens by as much as 6.6 nm and can close against forces in excess of 16 pN. Key differences in the cleavage, ligation, and gate dynamics of these two enzymes provide insights into their different cellular functions. The single-molecule results are broadly consistent with conformational changes obtained from molecular dynamics simulations. These results allowed us to develop a mechanistic model of interactions between type IA topoisomerases and single-stranded DNA
    corecore