100 research outputs found

    Profiling a decade of information systems frontiers’ research

    Get PDF
    This article analyses the first ten years of research published in the Information Systems Frontiers (ISF) from 1999 to 2008. The analysis of the published material includes examining variables such as most productive authors, citation analysis, universities associated with the most publications, geographic diversity, authors’ backgrounds and research methods. The keyword analysis suggests that ISF research has evolved from establishing concepts and domain of information systems (IS), technology and management to contemporary issues such as outsourcing, web services and security. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of ISF. The analysis has also identified authors published in other journals whose work largely shaped and guided the researchers published in ISF. This research has implications for researchers, journal editors, and research institutions

    The Socio-economic Impacts of Social Media Privacy and Security Challenges

    Get PDF
    © 2020, Springer Nature Singapore Pte Ltd. Privacy and Security are two major challenges faced by users on social media today. These challenges are experienced in diverse ways and forms by different types of users across the web. While technological solutions are usually implemented to address them, the effects have proven to be limited so far. Despite continuous deployment of technological solutions, the need to evaluate socio-economic impacts of these challenges have also become more imperative. Hence, this paper provides a critical review and analysis of socio-economic impacts of these social media challenges. The research findings reveal significant levels of negative socio-economic impacts and provides an evaluation framework towards defining the scope, thereby identifying appropriate measures for both addressing the challenges and curbing the socio-economic impacts. The findings also demonstrate the need for solutions beyond the use of technology, to employing and deploying solutions from social sciences which deals with behavioral issues and how to address them

    IT-adoption and the interaction of task, technology and individuals: a fit framework and a case study

    Get PDF
    BACKGROUND: Factors of IT adoption have largely been discussed in the literature. However, existing frameworks (such as TAM or TTF) are failing to include one important aspect, the interaction between user and task. METHOD: Based on a literature study and a case study, we developed the FITT framework to help analyse the socio-organisational-technical factors that influence IT adoption in a health care setting. RESULTS: Our FITT framework ("Fit between Individuals, Task and Technology") is based on the idea that IT adoption in a clinical environment depends on the fit between the attributes of the individual users (e.g. computer anxiety, motivation), attributes of the technology (e.g. usability, functionality, performance), and attributes of the clinical tasks and processes (e.g. organisation, task complexity). We used this framework in the retrospective analysis of a three-year case study, describing the adoption of a nursing documentation system in various departments in a German University Hospital. We will show how the FITT framework helped analyzing the process of IT adoption during an IT implementation: we were able to describe every found IT adoption problem with regard to the three fit dimensions, and any intervention on the fit can be described with regard to the three objects of the FITT framework (individual, task, technology). We also derive facilitators and barriers to IT adoption of clinical information systems. CONCLUSION: This work should support a better understanding of the reasons for IT adoption failures and therefore enable better prepared and more successful IT introduction projects. We will discuss, however, that from a more epistemological point of view, it may be difficult or even impossible to analyse the complex and interacting factors that predict success or failure of IT projects in a socio-technical environment

    Female Audit Partners and Extended Audit Reporting: UK Evidence

    Get PDF
    This study investigates whether audit partner gender is associated with the extent of auditor disclosure and the communication style regarding risks of material misstatements that are classified as key audit matters (KAMs). Using a sample of UK firms during the 2013–2017 period, our results suggest that female audit partners are more likely than male audit partners to disclose more KAMs with more details after controlling for both client and audit firm attributes. Furthermore, female audit partners are found to use a less optimistic tone and provide less readable audit reports, compared to their male counterparts, suggesting that behavioural variances between female and male audit partners may have significant implications on their writing style. Therefore, this study offers new insights on the role of audit partner gender in extended audit reporting. Our findings have important implications for audit firms, investors, policymakers and governments in relation to the development, implementation and enforcement of gender diversity

    Developing a model of the global and strategic impact of Information Technology

    No full text
    Abstract: In today's intensely competitive world, many firms have developed applications of information technology (IT) that provide a significant global competitive advantage. Most evidence of such IT use is anecdotal; the global competitive impact of IT has not been studied from a rigorous theory building or empirical perspective. This article reports progress toward the development of a model (called GLITS) to measure the strategic global impact of IT on an international firm. The underpinnings of the model are based on domestic and international literature; and it has undergone extensive refinement through statistical evaluation and validation. The model and its accompanying instrument can be used to identify specific strategic IT factors for a company and a contingency analysis can be conducted to determine the importance of various factors based on organizational characteristics. This foundational model should have significant utility for both practitioners and researchers. Keywords: Global information technology; IS Instrument; Strategic information systems; Competitive advantage; International information systems; Reliability and validity Article: 1. Introduction Many reports have been published on the use of information technology (IT) in enhancing a firm's competitiveness. Normally, competitiveness is assumed to apply to the operations of the firm within its national borders. However, it is now generally recognized, as was also a key finding of the Landmark MIT study However, while there are several anecdotal cases of success, the larger American and worldwide business communities have no validated models for analyzing the strategic impact due to the global application of IT. This work is an extension of the research conducted by Mahmood and Soon Global IT research is in its embryonic stage. Guidance and research are urgently needed in the application of IT in global firms. With increasing business globalization, the model proposed and developed here has a direct bearing on corporate chief executives and information officers. The model provides a validated process for explaining and measuring the strategic and competitive impact of IT at the global level. It can also show the strengths and weaknesses of IT deployment in a firm and reveal promising areas for future development

    [[alternative]]從終端使用者角度看概念性資料模式

    No full text
    [[conferencetype]]國內[[conferencedate]]19910312~1991031

    An empirical evaluation of system development methodologies.

    No full text
    Abstract: Many methodologies and techniques may be used in the development of information systems. Two widely used methodologies are: system development life cycle, and proto-typing. In this article, we have extensively evaluated the two methodologies based on field data collected from information systems professionals in business and industry. Specifically, the two methodologies are evaluated for their applicability during various life cycle phases, by types of systems, and by the amount of problem structure. Various attributes associated with the methodologies have also been assessed. Our results support the use of a contingency approach for the selection of a proper methodology for systems development. Article: There are numerous methods available and used for developing information systems (IS). These methods may be categorized into three classes (DB Directions, 1985): methodologies, which are organized, systematic approaches for handling the system life cycle or its major parts; techniques, which are means of accomplishing specific tasks in the system life cycle; and tools, which are software packages to support one or more techniques. Characteristics, usage, and applicability of the techniques and methodologies have been reported in the literature Several methodologies are reported in the literatur
    corecore