29 research outputs found

    An empirical study of the influence of different organisation cultures on e-commerce adoption maturity

    Get PDF
    Drawing on Cameron and Quinn’s organisational cultures typology that defines four types of organisational culture (i.e., clan, adhocracy, market, and hierarchy), and Daniel et al.’s four-stage model of e-commerce adoption, this paper empirically examines the influence of different organisational cultures on e-commerce adoption maturity in small and medium-sized enterprises (SMEs) in Sri Lanka. The result indicates a positive correlation between adhocracy culture and e-commerce adoption. However, those firms with hierarchy cultural characteristics indicate a negative correlation in relation to e-commerce adoption. The organisational culture differences explain these issues

    An Empirical Study of Factors Influencing Accounting Information Systems Adoption

    Get PDF
    This study investigates the factors that influence accounting information systems (AIS) adoption among accountants. Drawing on the unified theory of acceptance and use of technology (UTAUT), the task–technology fit (TTF) model and the institutional theory, we developed a research model for AIS adoption by accountants. Data was collected from 216 accountants and multiple linear regression was employed to test the research model. The results showed that five key factors, namely effort expectancy, perceived technology fit, facilitating conditions, self-efficacy and coercive pressure are able to influence the likelihood that accountants would adopt the AIS. This research confirms the need to integrate UTAUT, TTF and institutional theory when studying AIS adoption factors. The findings from this study are useful for senior management, technology consultants, software vendors and accounting professional bodies in promoting the adoption of AIS

    Security and Privacy Concerns for Australian SMEs Cloud Adoption

    Get PDF
    Cloud Computing has become increasingly important for Small and Medium-sized Enterprises because of its cost-effective benefits. However, the adoption of Cloud Computing over the recent years raised challenging issues with regard to privacy and security. In this study, we explored and presented the findings of the influence of privacy and security on Cloud adoption by SMEs. Based on a survey of SMEs across Australia, we analysed the data using structural equation modelling. We found that Cloud privacy and Cloud security are major concerns for SMEs to adopt Cloud computing. The study findings are useful for IT practitioners and regulatory bodies to understand how SMEs consider privacy and security issues for Cloud adoption

    Cybersecurity Issues and Practices in Cloud Context: A comparison amongst Micro, Small and Medium Enterprises

    Get PDF
    The advancement and the proliferation of information systems among enterprises have given rise to cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access (ACSC 2020). Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and medium-sized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences

    Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises

    Get PDF
    The advancement and the proliferation of information systems among enterprises have given rise to understanding cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access. Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and medium sized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences

    Impact of an addiction medicine consult service on patients admitted to the hospital with injection drug use-associated infective endocarditis

    Get PDF
    Background: The addition of an addiction medicine consult service has been shown to improve mortality and decrease hospital costs but its impact on the proportion of patients discharged against medical advice (DAMA) and in-hospital initiation of medication for opioid use disorder (MOUD) has not been examined. Methods: A retrospective before-after cohort study was performed at an urban, academic medical center between January 1, 2015 and November 1, 2019. We included adult patients with infective endocarditis and injection drug use determined by admitting diagnosis ICD-9 or ICD-10 codes or documentation within the history section of electronic health recordEHR. Our institution implemented a formal addiction medicine consult service on July 1, 2018. We determined the proportion of patients DAMA and the proportion of patients started on MOUD among patients in the pre-intervention (i.e. hospitalized before July 1, 2018) and intervention (i.e. hospitalized July 1, 2018 or after) groups. Results: A total of 171 patients among hospitalized patients with injection drug use-associated infective endocarditis were included with 119 patients in the pre-intervention group and 52 patients in the intervention group. There was no statistically significant difference in patients DAMA [19% vs 15%, absolute risk difference 4.6% (95% confidence interval -8.6% to 17.7%)] between the intervention and pre-intervention groups. However, there was an increase in the proportion of inpatient MOUD initiation in the intervention group compared to the pre-intervention group [56% vs 21%, absolute risk difference 35% (95% confidence interval 19% to 50%)]. Conclusions: The initiation of an addiction medicine consult service was associated with a higher proportion of MOUD initiation but there was no statistically significant association with the proportion of patients DAMA

    Manipulation of an Innate Escape Response in Drosophila: Photoexcitation of acj6 Neurons Induces the Escape Response

    Get PDF
    Background: The genetic analysis of behavior in Drosophila melanogaster has linked genes controlling neuronal connectivity and physiology to specific neuronal circuits underlying a variety of innate behaviors. We investigated the circuitry underlying the adult startle response, using photoexcitation of neurons that produce the abnormal chemosensory jump 6 (acj6) transcription factor. This transcription factor has previously been shown to play a role in neuronal pathfinding and neurotransmitter modality, but the role of acj6 neurons in the adult startle response was largely unknown. Principal Findings: We show that the activity of these neurons is necessary for a wild-type startle response and that excitation is sufficient to generate a synthetic escape response. Further, we show that this synthetic response is still sensitive to the dose of acj6 suggesting that that acj6 mutation alters neuronal activity as well as connectivity and neurotransmitter production. Results/Significance: These results extend the understanding of the role of acj6 and of the adult startle response in general. They also demonstrate the usefulness of activity-dependent characterization of neuronal circuits underlying innat
    corecore