42 research outputs found
Recommended from our members
Achieving IT diffusion within the fragments: an IT culture perspective
Many organizations still fail to make a return from the huge investments they make in implementing complex Information Technology (IT). This is usually due to cultural forces that inhibit the level of usage required to facilitate IT Diffusion. An emerging stream of research highlights the IT culture perspective, a perspective vital for understanding individualsâ social practices when they interact with IT. This paper adopted a case study approach to explore how the IT culture perspective may explain how organizational diffusion of an IT may happen despite opposing cultural forces causing a stalemate to the diffusion process. This study identified three IT culture archetypes - embracing, rejecting and confused, depicting a fragmented IT culture during the adaption, acceptance and routinization stages of diffusion of an IT. This study highlights how a salient element of a fragmented IT culture-embracing IT culture archetype could explain how diffusion of an IT happened despite the manifestations of negative IT culture archetypes - âconfusedâ and ârejectingâ during the diffusion process
Recommended from our members
The influence of organizational culture on the outcome of an IS implementation
A number of information system (IS) studies have adopted organizational culture (OC) theory to investigate IS implementations. The studies highlight that members will reach consensus or agreement in the use of an IS but also experience inevitable tensions and ambiguities in the use of the IS. However, literature related to IS implementation/OC has rarely examined the influence that the saliency of specific cultural practices may have on the success or failure of IS implementations. Using a case study approach, we adopted the âsoft positivismâ research philosophy to collect data, underpinned by Martinâs (1992) integration and differentiation perspectives of OC to study organizational implementation of an IS. These perspectives served as interpretive lenses through which to explain how membersâ salient behaviors towards an IS evolved during the implementation process. Our study augments the IS implementation/OC literature by demonstrating how salient cultural practices influence the outcome of IS implementatio
Managerial ambidexterity and the cultural toolkit in project delivery
Research has established that ambidextrous organizations can successfully outperform their non-ambidextrous counterparts through exploitative and exploratory activities. However, there remains a scarcity of research on how managers orchestrate ambidexterity at the operational level, particularly in project delivery. Drawing on 55 qualitative interviews with middle managers on two engineering projects, we examine how managerial ambidexterity is enacted at the project level. We find that middle managers enable their own exploitative, exploratory and ambidextrous behaviors by invoking a repertoire of values selected from their organization's cultural toolkit, which serve as cultural resources for action. We discuss how the cultural toolkit perspective can inform the relationship between managerial actions in day-to-day operations and organizational ambidexterity. Implications for theory and practice are presented
Recommended from our members
Revisiting the trajectory of IT implementation in organisations: an IT culture perspective
Purpose - Organisational implementations of information technology (IT) normally fail due to cultural forces that inhibit the usage levels required to facilitate successful IT implementation. This paper explores IT implementation from an IT Culture perspective (Leidner and Kayworth, 2006). In particular, it identifies and follows the trajectory of IT culture archetypes that emerge during the implementation process and further investigates their role in facilitating successful IT implementations.
Design/methodology/approach - This research adopts the qualitative single case study approach and draws on the implementation of a management information system (MIS) in a Nigerian global bank.
Findings - The findings illustrate three different IT culture archetypes and provide insights into their dynamic nature. The progressive weakening of two IT culture archetypes and the corresponding strengthening of the third archetype shows how initial vision conflicts can get transformed into vision agreements.
Originality/value - This paper extends the IT Culture perspective by illustrating how a congruence relationship between IT cultures and IT artefacts can be fostered. The paper shows how diverse IT cultures can develop reasonably quickly in line with initial user experiences of a system. When IT cultures are aligned with the values embedded in IT, positive engagement and usage of the technology results, strengthening the presence of embracing IT cultures
Planar Tc99m â sestamibi scintimammography should be considered cautiously in the axillary evaluation of breast cancer protocols: Results of an international multicenter trial
BACKGROUND: Lymph node status is the most important prognostic indicator in breast cancer in recently diagnosed primary lesion. As a part of an interregional protocol using scintimammography with Tc99m compounds, the value of planar Tc99m sestamibi scanning for axillary lymph node evaluation is presented. Since there is a wide range of reported values, a standardized protocol of planar imaging was performed. METHODS: One hundred and forty-nine female patients were included prospectively from different regions. Their mean age was 55.1 ± 11.9 years. Histological report was obtained from 2.987 excised lymph nodes from 150 axillas. An early planar chest image was obtained at 10 min in all patients and a delayed one in 95 patients, all images performed with 740â925 MBq dose of Tc99m sestamibi. Blind lecture of all axillary regions was interpreted by 2 independent observers considering any well defined focal area of increased uptake as an involved axilla. Diagnostic values, 95% confidence intervals [CI] and also likelihood ratios (LR) were calculated. RESULTS: Node histology demonstrated tumor involvement in 546 out of 2987 lymph nodes. Sestamibi was positive in 30 axillas (25 true-positive) and negative in 120 (only 55 true-negative). The sensitivity corresponded to 27.8% [CI = 18.9â38.2] and specificity to 91.7% [81.6â97.2]. The positive and negative LR were 3.33 and 0.79, respectively. There was no difference between early and delayed images. Sensitivity was higher in patients with palpable lesions. CONCLUSION: This work confirmed that non tomographic Tc99m sestamibi scintimammography had a very low detection rate for axillary lymph node involvement and it should not be applied for clinical assessment of breast cancer
A post-colonial analysis of agile software development methods in ICT4D
There is evidence that agile approaches to information system development can improve product quality and developer productivity. However, successful
adoption of these approaches appears to depend on adaptation to specific contexts.
This research contributes to a broader goal to understand what it means to âbe
agileâ in the presence of adaptations to the specific context.
To pursue our research objectives, we have performed 31 semi-structured recorded
and transcribed practitioner interviews from three companies in Lebanon. The interview transcripts were analysed using an approach informed by grounded theory.
Agile methods enable learning and improvement through team conversations.
Yet, the practitioners in our study shun public self-evaluation, finding it difficult
to discuss areas for improvement in public. We also found legacy âtop downâ
management practices that undermine team autonomy and local client companies
lack experience of engaging with agile processes. In a more positive vein, we found
evidence of rich use of various communications channels to overcome geographical
distance.
On the one hand, agile methods represent a ânorthernâ idea being propagated
to the Global South. And yet, on the other hand, the agile concept of self-organising
teams has the potential to be empowering and emancipatory. Post-colonial theory
helps us understand the phenomenon of agile tailoring, where development process
ceremonies are adapted to suite a specific local context
Direct observation of topoisomerase IA gate dynamics
Type IA topoisomerases cleave single-stranded DNA and relieve negative supercoils in discrete steps corresponding to the passage of the intact DNA strand through the cleaved strand. Although type IA topoisomerases are assumed to accomplish this strand passage via a protein-mediated DNA gate, opening of this gate has never been observed. We developed a single-molecule assay to directly measure gate opening of the Escherichia coli type IA topoisomerases I and III. We found that after cleavage of single-stranded DNA, the protein gate opens by as much as 6.6ânm and can close against forces in excess of 16 pN. Key differences in the cleavage, ligation, and gate dynamics of these two enzymes provide insights into their different cellular functions. The single-molecule results are broadly consistent with conformational changes obtained from molecular dynamics simulations. These results allowed us to develop a mechanistic model of interactions between type IA topoisomerases and single-stranded DNA
The Perils and Promises of Self-Disclosure on Social Media
In addition to their professional social media accounts, individuals are increasingly using their personal profiles and casual posts to communicate their identities to work colleagues. They do this in order to âstand out from the crowdâ and to signal attributes that are difficult to showcase explicitly in a work setting. Existing studies have tended to treat personal posts viewed in a professional context as a problem, since they can threaten impression management efforts. These accounts focus on the attempts of individuals to separate their life domains on social media. In contrast, we present the narratives of professional IT workers in India who intentionally disrupt the boundaries between personal and professional profiles in order to get noticed by their employers. Drawing on the dramaturgical vocabulary of Goffman (1959) we shed light on how individuals cope with increased levels of self-disclosure on social media. We argue that their self-presentations can be likened to post-modern performances in which the traditional boundaries between actor and audience are intentionally unsettled. These casual posts communicate additional personal traits that are not otherwise included in professional presentations. Since there are no strict boundaries between formal front-stage and relaxed back-stage regions in these types of performance, a liminal mental state is often used, which enables a better assessment of the type of information to present on social media
Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model
YesBased on a critical review of the Unified Theory of Acceptance and Use of Technology (UTAUT), this study first formalized an alternative theoretical model for explaining the acceptance and use of information system (IS) and information technology (IT) innovations. The revised theoretical model was then empirically examined using a combination of meta-analysis and structural equation modelling (MASEM) techniques. The meta-analysis was based on 1600 observations on 21 relationships coded from 162 prior studies on IS/IT acceptance and use. The SEM analysis showed that attitude: was central to behavioural intentions and usage behaviours, partially mediated the effects of exogenous constructs on behavioural intentions, and had a direct influence on usage behaviours. A number of implications for theory and practice are derived based on the findings