53 research outputs found

    Synergy and Its Limits in Managing Information Technology Professionals

    Get PDF
    We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and empirically demonstrating with IT professionals the power of configurational theory to explain the relationship between HRM practices and job search behavior. Our empirical results show that two configurations of HRM practices – Human Capital Focused (HCF) and Task Focused (TF), which are high and low on all HRM practices, respectively – exhibit a synergistic relationship with the job search behavior of IT professionals. HCF has lower job search behavior than would be expected based on the independently additive effects of the HRM practices, whereas TF has correspondingly higher job search behavior. Our results also show that less than perfect horizontal fit detracts from the synergy of these extreme configurations. Just as importantly, several other non-extreme configurations of HRM practices exhibit independently additive effects for the HRM practices but not synergy, suggesting that synergy is limited to extreme configurations. We also discuss a number of implications for research and practice

    Fast and Slow Processes Underlying Theories of Information Technology Use

    Get PDF
    Although theories of information technology (IT) use have been widely researched, organizations continue to struggle with insufficiently utilizing their IT assets. Those interested in understanding and managing IT use need both novel theoretical development and new directions for future research. In this paper, we address both of these needs. Regarding the first need, we develop novel theory by explaining two types of cognitive processes—one fast and one slow—that underlie theories of IT use. The impetus for our explanation of underlying processes (EUP) comes from studies of IT use that have found moderating effects of previous interaction with IT. With these results, researchers have concluded that cognitions are less important in determining IT use as the use of that IT increases. Consistent with that conclusion, our EUP posits that, as learning from prior use occurs, the influence of fast, automatic, unconscious (type 1) cognitive processes increases while the influence decreases for slow, controlled, conscious (type 2) cognitive processes. Type 1 processes automatically generate a default type 1 response; type 2 processes have the potential to generate an intervening type 2 response. The intervention potential is highest for initial use of the target IT and lowest when learning is high such that use of the IT has become automatic. From our EUP, we develop three insights: 1) that the cognitions that lead to a default response are not necessarily the cognitions found in extant theories of IT use, 2) that both type 1 and type 2 processes are subject to bounded rationality, and 3) that the relationship between learning and the intervention potential for a type 2 response, although negative, may not be linear. To address the second need that we note above, we suggest new directions for future research, which includes investigating the cognitive control problem (i.e., when type 2 processes intervene) and exploring the effects of heuristics, nudges, and bounded rationality on decisions to use IT. Beyond the hope that the suggested directions for research will yield solutions for addressing the underutilization of IT assets, the fundamental advances in theoretical understanding that we present here suggest notable implications for practice, including developing brief, simple, cognitively unconscious messages directed at nudging decision makers toward a default response to use the target IT

    Choosing Management Information Systems as a Major: Understanding the smiFactors for MIS

    Get PDF
    Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies and identify three new ones. We also relate our findings to broad categories of vocational interests. Of the newly identified smiFactors, one—linking business and technology—is unique to MIS, whereas the other two—practical application of course work and daily variety—apply to MIS as well as other majors and careers. Our findings provide a more complete foundation for helping students make an informed choice of MIS as a major. We use our findings and an extension of the Theory of Planned Behavior (TPB) to identify four types of intervention for increasing MIS enrollments

    Technology Acceptance and Use in a Knowledge Management Support System: An Exploratory Case Study of Air Force Knowledge Now Communities of Practice

    Get PDF
    In 2002, The Air Force’s Chief Information Officer (CIO) tasked Air Force Knowledge Now (AFKN) to host online Communities of Practice as a means to enhance and facilitate KM. (AF/CIO, 2002) These CoPs are intended to provide users, which share a functional or organizational bond, the ability to electronically collaborate. There have been several studies performed previously at the Air Force Institute of Technology (AFIT) on CoPs. The current research will explore some of the findings from these previous studies, while applying the theories of the Technology Acceptance Model (TAM) in order to gain a better understanding of the use and acceptance of CoPs

    Choosing Management Information Systems as a Major: Understanding the smiFactors for MIS

    Get PDF
    Given declining management information systems (MIS) enrollments at our university, we seek to understand our students’ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies and identify three new ones. We also relate our findings to broad categories of vocational interests. Of the newly identified smiFactors, one—linking business and technology—is unique to MIS, whereas the other two—practical application of course work and daily variety—apply to MIS as well as other majors and careers. Our findings provide a more complete foundation for helping students make an informed choice of MIS as a major. We use our findings and an extension of the Theory of Planned Behavior (TPB) to identify four types of intervention for increasing MIS enrollments

    Characteristic distributions of finite-time Lyapunov exponents

    Full text link
    We study the probability densities of finite-time or \local Lyapunov exponents (LLEs) in low-dimensional chaotic systems. While the multifractal formalism describes how these densities behave in the asymptotic or long-time limit, there are significant finite-size corrections which are coordinate dependent. Depending on the nature of the dynamical state, the distribution of local Lyapunov exponents has a characteristic shape. For intermittent dynamics, and at crises, dynamical correlations lead to distributions with stretched exponential tails, while for fully-developed chaos the probability density has a cusp. Exact results are presented for the logistic map, x→4x(1−x)x \to 4x(1-x). At intermittency the density is markedly asymmetric, while for `typical' chaos, it is known that the central limit theorem obtains and a Gaussian density results. Local analysis provides information on the variation of predictability on dynamical attractors. These densities, which are used to characterize the {\sl nonuniform} spatial organization on chaotic attractors are robust to noise and can therefore be measured from experimental data.Comment: To be appear in Phys. Rev

    Condom use and prevalence of syphilis and HIV among female sex workers in Andhra Pradesh, India – following a large-scale HIV prevention intervention

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Avahan, the India AIDS initiative began HIV prevention interventions in 2003 in Andhra Pradesh (AP) among high-risk groups including female sex workers (FSWs), to help contain the HIV epidemic. This manuscript describes an assessment of this intervention using the published Avahan evaluation framework and assesses the coverage, outcomes and changes in STI and HIV prevalence among FSWs.</p> <p>Methodology</p> <p>Multiple data sources were utilized including Avahan routine program monitoring data, two rounds of cross-sectional survey data (in 2006 and 2009) and STI clinical quality monitoring assessments. Bi-variate and multivariate analyses, Wald Chi-square tests and multivariate logistic regressions were used to measure changes in behavioural and biological outcomes over time and their association.</p> <p>Results</p> <p>Avahan scaled up in conjunction with the Government program to operate in all districts in AP by March 2009. By March 2009, 80% of the FSWs were being contacted monthly and 21% were coming to STI services monthly. Survey data confirmed an increase in peer educator contacts with the mean number increasing from 2.9 in 2006 to 5.3 in 2009. By 2008 free and Avahan-supported socially marketed condoms were adequate to cover the estimated number of commercial sex acts, at 45 condoms/FSW/month. Consistent condom use was reported to increase with regular (63.6% to 83.4%; AOR=2.98; p<0.001) and occasional clients (70.8% to 83.7%; AOR=2.20; p<0.001). The prevalence of lifetime syphilis decreased (10.8% to 6.1%; AOR=0.39; p<0.001) and HIV prevalence decreased in all districts combined (17.7% to 13.2%; AOR 0.68; p<0.01). Prevalence of HIV among younger FSWs (aged 18 to 20 years) decreased (17.7% to 8.2%, p=0.008). A significant increase in condom use at last sex with occasional and regular clients and consistent condom use with occasional clients was observed among FSWs exposed to the Avahan program. There was no association between exposure and HIV or STIs, although numbers were small.</p> <p>Conclusions</p> <p>The absence of control groups is a limitation of this study and does not allow attribution of changes in outcomes and declines in HIV and STI to the Avahan program. However, the large scale implementation, high coverage, intermediate outcomes and association of these outcomes to the Avahan program provide plausible evidence that the declines were likely associated with Avahan. Declining HIV prevalence among the general population in Andhra Pradesh points towards a combined impact of Avahan and government interventions.</p

    ELSEVIER Causes of Inaccurate Software Development Cost Estimates

    No full text
    A study of information systems managers and other information systems professionals at 112 different or-ganizations confirmed that information systems soft-ware cost estimating is an important concern. Sub-jects reported the completion of only one of every four systems development projects within their estimates. Although subjects perceived that the major causes of inaccurate estimates were users ’ changes in their requirements and users ’ lack of understanding of those requirements, such problems with users did not pre-dict inaccurate estimates. instead, management con-trol issues such as lack of consideration in perfor-mance reviews as to whether estimates were met, lack of project control comparing estimates and actual performance, and lack of careful examination of the estimate by information systems department manage-ment did predict inaccurate estimates. Thus, in reply to the long-standing question as to whether overruns are more attributable to inaccurate estimating or in-effectual project management, the data in this study raise concerns about the latter. The results suggest that information systems managers and professionals might want to reassess their attitudes toward their users, and researchers might want to focus on partic-ular causes of inaccurate estimating

    One Size Does Not Fit All: Managing IT Employees\u27 Employment Arrangements

    No full text
    As alternative employment arrangements proliferate within the information technology (IT) function, it becomes increasingly important to understand the impact of these arrangements on IT employees. A prevalent notion in the IT literature is that these employees are homogeneous in their work values and that they prefer similar employment arrangements. Given the inefficiency of designing individual employment programs, we advocate a middle ground between the two extremes of individualized employment arrangements and “one size fits all.” We conducted two studies. The first study developed an individual\u27s work values profile as a psychological construct. It used a national sample of IT employees to validate a simple, heuristic procedure that was successful in classifying about 80% of the sample into three work values profiles.The second study demonstrated the use of work values profiles for understanding how employment arrangements differentially influence employee satisfaction. It applied the validated procedure to a single organization in order to demonstrate the general applicability of the procedure and to show that it provides researchers and HR professionals with better insights than the assumption that all IT employees are alike
    • 

    corecore