81 research outputs found

    A model to understand digital capabilities, shadow IT and individual performance in the context of remote work

    Get PDF
    In recent years, remote work has grown enormously, as has the adoption of digital technologies and shadow IT. There has never been a situation where workers could choose to use their own devices and cloud-based applications. Due to the Covid-19 pandemic, large numbers of workers suddenly found themselves at home. Understanding how this shift to remote working has impacted digital resources, the use of shadow IT and individual performance is of great importance to academics and professionals. This study seeks to analyze the relationship between digital capabilities and shadow IT usage on the one hand and individual performance on the other in the context of remote working. To do so, a survey was carried out among a sample of 188 IT and non-IT executives from Brazil working remotely. The resulting data were analyzed using IBM-SPSS 24 exploratory analysis and PLS-SEM software to test the measurement and structural model. In the study we identified that shadow IT usage is positively related both to digital capabilities and individual performance. The main findings reveal that to understand the behavior of employees and how these systems are being used is essential for the individual performance of company employees to be maintained or even improved

    Analysis of the Relationship Between Data Governance and Data-Drive Culture

    Get PDF
    As organizations increase their use of data, among scholars there is growing interest in data governance and data-driven culture, and studies suggest investigating the relationship between these two phenomena would provide a better understanding of data behavior in organizations. Thus, this exploratory research investigates the relationship between data governance and data-driven culture using partial least squares structural equation modeling (PLS-SEM). The results show the relationship between data governance and data-driven culture is strong, and that it is mediated by data quality. Additionally, based on the Resource-Based View of the firm, our results indicate data governance and data- driven culture should be addressed jointly when evaluating their contribution as an organizational resource

    The Influence of Information Stimulus Event on Human Information Behavior

    Get PDF
    People use information systems to seek information. Transformative technologies have increased the number of information sources and amount of time people consume interacting with them. However, life is overloaded with unpredictable and uncontrolled information sources, generating anxiety, stress, and uncertainty. While the Management Information Systems field is concerned with understanding how to increase adoption of information systems that represent formal information sources, transformative technologies are selected by users and used to perform work tasks. Given this scenario, we present a new approach to investigate user behavior in this information context. The objective of this research in progress is to investigate information stimulus event, which influences human information behavior in the context of the large number of information sources. We hope to provide a new model to assist the academic community, practitioners, and society to understand this phenomenon, as well as to improve IS design and help individuals to advance their experience and interaction with IS

    The influence of human factors on vulnerability to information security breaches

    Get PDF
    Within the context of information security (InfSec), human aspects have been receiving particular attention in research studies and business practices because of the fundamental role of the users. The objective of this research-in-progress is to develop a theoretical model of how human factors such as behavior with InfSec, familiarity with policies and procedures, awareness, organizational environment, and work conditions, contribute to InfSec breaches. The proposed model will be applied through interviews with CIO, multiple case studies and a survey of information system users in some South American countries and the USA. The sample will consist of end users of integrated web information systems (IS) in large organizations. An instrument will be designed and validated using qualitative and multivariate techniques. This research is intended to contribute towards identifying and managing the impact of human aspects on InfSec breaches

    Information Governance Framework: The Defense Manufacturing Case Study

    Get PDF
    While many companies are facing problems with the information explosion, others are ensuring the appropriate value, quality and compliance of their information environment. Information governance is a set of standards, guidelines and accountability controls designed to ensure value, quality and compliance of information. Thus, the aim of this paper is to analyze how value, quality and compliance of information are defined in its information environment. A qualitative research is made, by a case study in a defense manufacturing company. The information governance foundations are explained, through theories from economics of information. Also, a framework was proposed plus three research propositions. In addition, this case study investigates a unified governance framework, which incorporates corporate governance, information technology governance and information governance. Therefore, two propositions were supported and one was partly supported. The main contribution of this paper is to identify and analyze dimensions and elements of information governance

    Information Management Capability as Competitive Imperfection in the Strategic Factor Market of Big Data

    Get PDF
    The interest of the organizations in developing Big Data strategies is increasing significantly. However, the expectation of the value of these benefits and of the costs involved in acquiring or developing these solutions are not homogeneous for all of the firms, generating competitive imperfections in the market of strategic resources. Using Information Management Capability (IMC) as a premise to provide the required unique insight for Big Data strategies to be successful, this article proposes to analyze IMC as an imperfection agent in the market of strategic resources of Big Data. The formulated hypotheses were tested from a survey of 101 valid participants and analyzed with SEM-PLS. The results indicate a positive IMC influence on value expectation and a negative one on cost expectation. Cost expectation inversely affects the intent to purchase or develop the resources to implant Big Data strategies. Value expectation has a positive effect in both intents

    IT investment management based on Information Technology Portfolio Management (ITPM): a study in Brazilian companies

    Get PDF
    The objective of this research is to analyze some Brazilian companies\u27 use of ITPM technique as an aid to their IT investments management. It was carried out in five case studies in different Brazilian companies from several economic sectors which were using the technique or were in the initial implementation phase. Eight interviews were conducted. The persons interviewed were high-level executives working in the IT department in the studied companies. Different levels of ITPM use was found regarding IT investment management (planning, control and evaluation). It was observed, in the analyzed cases, that ITPM is used most frequently in IT investment planning, which is the process most discussed and used in analyzed companies. The ITPM technique is used more frequently in Company 2 than in the other cases because the organization of the IT area in the company is structured according to ITPM dimensions. The technique has received little attention in IT research and ITPM research is still very limited in the information systems literature, a possible reflection of its academic importance. To highlight its practical use, ITPM has been considered a useful and accessible tool which aid IT executives in better managing and justifying investments in technology

    IT Investment Management using the Real Options and Portfolio Management Approaches

    Get PDF
    In earlier studies dealing with IT Portfolio Management (ITPM), the risk and return have not been treated concisely and in combination with the concept of portfolio. Real Options Theory (ROT) has been suggested as a way to analyze IT investments, assuming a dynamic positioning in relation to both these variables. Thus, the aim of this study is to analyze how the dimensions of ITPM combined with ROT help companies to justify and manage their IT investments, including the risks and returns. We performed a quantitative analysis in a company that invests intensively in IT. ROT was found to assist IT managers in the analysis of investments in the ITPM dimensions and allow greater flexibility in decision making and enhance the capacity to take advantage of market opportunities
    corecore