47 research outputs found

    Design of Integral Reminder for Collaborative Appointment Management

    Get PDF
    Reminder systems have great potential to enhance healthcare outcome, but there is a big space for improvement to facilitate the collaborative appointment management with accessible mobile communication technology. This study proposes a design of integral reminder systems that automates the process of appointment rescheduling for patients and physicians in addition to confirmation and cancellation. Based on the premises of patient-centered care of media synchronicity theory, design principles are proposed to cater to the different requirements of healthcare providers and patient users on appointment management. The design provides useful guidelines for building integral reminder systems that enhance medical compliance

    Antecedents and Outcomes of Extent of ERP Systems Implementation in the Sub-Saharan Africa Context: A Panoptic Perspective

    Get PDF
    Most research on the impact of enterprise resource planning (ERP) systems implementation on business process outcomes have focused on developed nations. However, Sub-Saharan Africa, a developing region, is a growing ERP market and provides a new context for theory development. We examine the antecedent and outcomes of extent of ERP systems implementation in Sub-Saharan Africa. Specifically, we examine three research questions: 1) “How does an organization’s data culture influence the extent of ERP implementation?”, 2) “How does the extent of ERP implementation influence the ethical behavior and data integration of the organization?”, and 3) “How do ethical behavior and organizational integration influence the business process outcomes?”. We used the panoptic concept as a theoretical lens to develop a research model and six hypotheses to answer the research questions. We tested the model by using the survey methodology to collect data from 115 firms that have implemented ERP systems and operated in 13 industries in Ghana, a Sub-Saharan Africa nation. We used structural equation modeling to analyze the data. We found support for all six hypotheses. We offer both theoretical and managerial implications

    An Integrative Approach for Examining the Determinants of Abnormal Returns: The Cases of Internet Security Breach and Ecommerce Initiative

    Get PDF
    Researchers in various business disciplines use the event study methodology to assess the market value of firms through capital market reaction to news in the public media about the firm\u27s activities. Capital market reaction is assessed based on cumulative abnormal return (sum of abnormal returns over the event window). In this study, the event study methodology is used to assess the impact that two important information technology activities, Internet security breach and ecommerce initiative, have on the market value of firms. While prior research on the relationship between these business activities and cumulative abnormal return involved the use of regression analysis, in this study, we use decision tree induction and regression.For the Internet security breach study, we use negative cumulative abnormal return as a surrogate for damage to the breached firm. In contrast to what has been reported in the research literature, our results suggest that the relationship between cumulative abnormal return and the independent variables for both the Internet security breach and ecommerce initiative studies is complex, often involving conditional interactions between the independent variables. We report that the incomplete contract theory is unable to effectively explain the relationship between cumulative abnormal return and the organizational variables. Other ecommerce theories provide support to the findings from our analysis. We show that both attack and firm characteristics are determinants of damage to breached firms.Our results revealed that the use of decision tree induction presents additional insight to that provided by regression models. We illustrate that there is value in using data mining techniques to study the market value of e-commerce initiative and Internet security breach and that this approach has applicability in other domains and that Decision Tree can enhance the event study methodology.We demonstrate that Decision Tree induction can be used for both theory building and theory testing. We specifically employ Decision Tree induction to test and enhance ecommerce theories and develop a theoretical model for cumulative abnormal return and ecommerce. We also present theoretical models for Internet security breach and damage to the breached firm. These models can be used by decision makers in Internet security and ecommerce investments strategic formulations and implementations

    SSM Approach to Realizing Emancipatory Idels in ERP Implementation

    Get PDF
    Organizations implement Enterprise Resource Planning (ERP) systems seeking to integrate functional units, standardize business processes and enhance organizational efficiencies. Although several millions of dollars are spent in implementing ERP systems, most of these systems fail. As ERP systems are implemented in complex environments with extensive social and organizational interactions leading to dramatic changes in the organizational structures and business processes, two critical success factors in ERP implementation are user involvement and effective project communication. Although Checkland’s soft systems (SSM) methodology is a proven tool for encouraging user participation, it does not fully embrace emancipation. In this paper, we reformulate SSM to incorporate emancipatory ideals to enhance project communication during ERP implementation. The emancipatory approach developed in this paper is suitable for the requirement specification phase of ERP implementation. The approach can enhance systems implementation practice and presents an opportunity for a new research stream in method engineering for ERP systems

    The Use of Text Analytics to Investigate Concepts in Intra- and Inter-disciplinary Software Piracy Research Inter-disciplinary Software Piracy Research

    Get PDF
    IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas. A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying \u27software piracy.\u27 We use term-term co-occurrence to find all the terms used in close proximity to the topic. We identify which terms are most prominent in each discipline, show quantitatively how these usages coincide or diverge across disciplines, measure the overlap between pairs of disciplines, and identify clusters of terms shared among disciplines. Specific findings from this case of software piracy are presented

    Examining the Relationships between Supply Chain Integration, Information Sharing, and Supply Chain Performance: A Replication Study

    Get PDF
    This study performs a conceptual replication of the study of Koçoğlu et al. (2011) which explored the effect of Supply Chain Integration (SCI) on Supply Chain Performance (SCP) and Information Sharing using manufacturing firms in Turkey. The replicated study explored the same relationships but considered manufacturing and service firms belonging to one giant supply chain in Ghana. Whilst the results of the measurement model of replicated study are valid and reliable, the structural model results were different from that of the original study. The original study observed a positive significant effect of SCI on SCP which was not confirmed in our study. Instead, a mediating effect of Information Sharing on the relationship between SCI and SCP was observed. The differences in the structural model results may have arisen due to the different conceptualization of the SCP construct, or the existence of different contextual and/or environmental factors

    The association between Institutional Absorptive Capacity, Electronic procurement Assimilation and Procurement Process in Public Sector Organizations

    Get PDF
    Public sector organizations face challenges with their procurement processes. Electronic mode of public procurement enables governments and organizations to achieve efficient and effective tendering information processing, leading to transparency and fairness in the bidding process. However, little is known on the drivers of electronic procurement assimilation in the public sector. The study examines the influence of absorptive capacity on the assimilation of electronic procurement and the subsequent effect on the procurement process in the public sector. In addition, the study explores the mediating role of electronic procurement assimilation on the relationship between institutional absorptive capacity and the procurement process. Structural equation modeling was used to analyze 306 useable data from public sector organizations in Ghana where public procurement laws demand efficient and effective procurement processes. We found support for all the four hypotheses. We offer theoretical and managerial implications

    Post Data Breach Use of Protective Technologies: An Examination of Users’ Dilemma

    Get PDF
    This preliminary research addresses the technology use uncertainties that arise when users are presented with protective technologies following a data breach or privacy violation announcement. Prior studies have provided understanding of determinants of technology use through several perspectives. The study complements prior research by arguing that, beyond individual dispositions or technology features, data breach announcements bring users’ focus on the actions of the breaching organization. Fair process and information practices provide avenue for organizations to alleviate users’ concerns and increase service usage. We draw on organizational justice theory to develop a model that explicates the effect of organizational fairness process and use of technologies. We test this model using data from 200 Facebook users recruited from Amazon MTurk. We found that procedural and informational justice have differential effect on users’ desire to use protective technologies. Our findings have both theoretical and practical implications

    Impact of ERP Implementation on Business Process Outcomes: A Replication of a United States Study in a Sub-Saharan African Nation

    Get PDF
    This study is a conceptual replication of Karimi et al.’s (2007) study on the impact of ERP implementations on business process outcomes among US manufacturing firms in a Sub-Saharan African (SSA) nation. The results of the measurement model are valid and reliable, which are consistent and comparable with that of the original study, enhancing the external validity of the constructs proposed in the original model. However, only one of the four hypotheses tested in the structural model was confirmed in the current study although all four were supported in the original study. While the original model was tested on manufacturing firms in the US, the replicated study was carried out in several industries in Ghana, a SSA nation. Thus the differences in the structural model results do not invalidate the original model but suggest the need for capturing contextual or environmental variables such as culture, industry, ethical behavior, and data culture in order to enhance the external validity and theoretical contribution of the original model in the SSA context
    corecore