133 research outputs found
Organisation designing though the practice of multi-method research in information systems
Uninvited Submission
Infrastrutture dell’Informazione e Società Digitale
Il punto di partenza di un dibattito sulla società digitale, sulle opportunità e i rischi emergenti e sul governo delle nuove for-me di cooperazione rese possibili grazie al continuo sviluppo delle tecnologie digitali, non può prescindere da un’analisi preli-minare sulla natura stessa di questo tipo di tecnologia e della realtà sociale che con-tribuisce alla sua diffusione e al suo svilup-po. Una riflessione ontologica sulle tecno-logie digitali costituisce dunque un buon punto di partenza per identificare i princi-pali elementi in gioco, le relazioni tra que-sti e i fenomeni emergenti di cui tener conto per accompagnare l’evoluzione di questo complesso sistema in continuo adattamento.Il punto di partenza di un dibattito sulla società digitale, sulle opportunità e i rischi emergenti e sul governo delle nuove for-me di cooperazione rese possibili grazie al continuo sviluppo delle tecnologie digitali, non può prescindere da un’analisi preli-minare sulla natura stessa di questo tipo di tecnologia e della realtà sociale che con-tribuisce alla sua diffusione e al suo svilup-po. Una riflessione ontologica sulle tecno-logie digitali costituisce dunque un buon punto di partenza per identificare i princi-pali elementi in gioco, le relazioni tra que-sti e i fenomeni emergenti di cui tener conto per accompagnare l’evoluzione di questo complesso sistema in continuo adattamento.Articles published in or submitted to a Journal without I
Le dinamiche di diffusione della pratica del riuso software
In ambito pubblica amministrazione (PA) il riuso del software è una pratica di approvvigio-namento già da qualche anno. La prima versione del Codice dell’Amministrazione Digitale prevedeva infatti che le PA mettessero a disposizione di altre amministrazioni il codice delle soluzioni sviluppate. Inoltre era previsto l’obbligo per le PA di verificare l’esistenza di soluzioni software adeguate a risolvere il loro problema prima di rivolgersi al mercato per acquisire nuove applicazioni. In queste pagine si intende tracciare un quadro delle iniziative ad oggi intraprese nell’applicazione di tali obblighi normativi e approfondire il tema della governance dell’innovazione nella PA attraverso l’approfondimento di un caso di successo.In ambito pubblica amministrazione (PA) il riuso del software è una pratica di approvvigio-namento già da qualche anno. La prima versione del Codice dell’Amministrazione Digitale prevedeva infatti che le PA mettessero a disposizione di altre amministrazioni il codice delle soluzioni sviluppate. Inoltre era previsto l’obbligo per le PA di verificare l’esistenza di soluzioni software adeguate a risolvere il loro problema prima di rivolgersi al mercato per acquisire nuove applicazioni. In queste pagine si intende tracciare un quadro delle iniziative ad oggi intraprese nell’applicazione di tali obblighi normativi e approfondire il tema della governance dell’innovazione nella PA attraverso l’approfondimento di un caso di successo.Monograph's chapter
Qualitative Comparative Analysis for Conducting Multiple Case Study Research: Concept and Discussion
We aim to make a contribution by deepening the understanding on how Qualitative Comparative Analysis methods can be applied for theory building in multiple-case studies when the relationship between Information Technology and organizations is investigated.In our presentation, we will outline a research design using qualitative comparative analysis, show one example of applying the method in the field of eHealth research, and discuss the pros and cons of our methodological choice
Understanding FLOSS Implementation as a Key for Organization Design
Growing research on Free/Libre Open Source Software (FLOSS) has addressed a variety of questions focusing on aspects ranging from open source development processes and developer motivation to economic and policy implications. Nevertheless, a few authors have examined the use of FLOSS and its implementation in organizations. Implementation studies represent a particularly promising area for information systems researchers who are still in the process of theorizing about the relationship between the distinctive properties of FLOSS and the processes of implementation and use. The goal of this paper is to present a taxonomy of FLOSS initiatives drawn on the outcomes of a previous study and to link the results with the multi-level framework defined by Niederman et al (2006). We also suggest a possible methodology to further investigate the possible combinations of organizational practices in order to achieve the expected benefits from FLOSS implementation
Exploring the Interplay between Floss Adoption and Organisational Innovation
Growing research on Free/Libre Open Source Software (FLOSS) has addressed a variety of questions focussing on aspects ranging from open source development processes and developer motivation, to economic and policy-making implications. Nevertheless, a few authors have examined the adoption of FLOSS and its impact on organisational change and innovation. Adoption studies represent a particularly promising area for information system researchers to investigate the relationship between the specific properties of FLOSS and the processes of implementation and use. The goal of this paper is to contribute to this field of research by discussing a former multi-targeted research agenda and by defining an empirically grounded framework for studying FLOSS adoption, drawing on the outcomes of an exploratory multiple case study involving 16 Italian public administrations.Growing research on Free/Libre Open Source Software (FLOSS) has addressed a variety of questions focussing on aspects ranging from open source development processes and developer motivation, to economic and policy-making implications. Nevertheless, a few authors have examined the adoption of FLOSS and its impact on organisational change and innovation. Adoption studies represent a particularly promising area for information system researchers to investigate the relationship between the specific properties of FLOSS and the processes of implementation and use. The goal of this paper is to contribute to this field of research by discussing a former multi-targeted research agenda and by defining an empirically grounded framework for studying FLOSS adoption, drawing on the outcomes of an exploratory multiple case study involving 16 Italian public administrations.Articles published in or submitted to a Journal without IF refereed / of international relevanc
The duality of Information Security Management: fighting against predictable and unpredictable threats
Information systems security is a challenging research area in the context of Information Systems. In fact, it has strong practical implications for the management of IS and, at the same time, it gives very interesting insights into understanding the process of social phenomena when communication information technologies are deployed in organizations. Current standards and best practices for the design and management of information systems security, recommend structured and mechanistic approaches, such as risk management methods and techniques, in order to address security issues. However, risk analysis and risk evaluation processes have their limitations, when security incidents occur, they emerge in a context, and their rarity and even their uniqueness give rise to unpredictable threats. The analysis of these phenomena which are characterized by breakdowns, surprises and side-effects, requires a theoretical approach which is able to examine and interpret subjectively the detail of each incident. The aim of this paper is to highlight the duality of information systems security, providing an alternative view on the management of those aspects already defined in the literature as intractable problems and this is pursued through a formative context (Ciborra, Lanzara, 1994) that supports bricolage, hacking and improvisation.Information systems security is a challenging research area in the context of Information Systems. In fact, it has strong practical implications for the management of IS and, at the same time, it gives very interesting insights into understanding the process of social phenomena when communication information technologies are deployed in organizations. Current standards and best practices for the design and management of information systems security, recommend structured and mechanistic approaches, such as risk management methods and techniques, in order to address security issues. However, risk analysis and risk evaluation processes have their limitations, when security incidents occur, they emerge in a context, and their rarity and even their uniqueness give rise to unpredictable threats. The analysis of these phenomena which are characterized by breakdowns, surprises and side-effects, requires a theoretical approach which is able to examine and interpret subjectively the detail of each incident. The aim of this paper is to highlight the duality of information systems security, providing an alternative view on the management of those aspects already defined in the literature as intractable problems and this is pursued through a formative context (Ciborra, Lanzara, 1994) that supports bricolage, hacking and improvisation.Articles published in or submitted to a Journal without IF refereed / of international relevanc
Digital artifacts development and evolution: who has the control/supremacy? A story of UNIX developmental trajectories read from institutional theory perspective
Uninvited Submission
- …