首页 > 最新文献

Journal of Global Information Technology Management最新文献

英文 中文
An Interview with Kevin Lipscomb, CIO of Averett University, USA 专访美国Averett大学首席信息官Kevin Lipscomb
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-04-02 DOI: 10.1080/1097198x.2020.1752085
Sergey Samoilenko
{"title":"An Interview with Kevin Lipscomb, CIO of Averett University, USA","authors":"Sergey Samoilenko","doi":"10.1080/1097198x.2020.1752085","DOIUrl":"https://doi.org/10.1080/1097198x.2020.1752085","url":null,"abstract":"","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"44 1","pages":"165 - 168"},"PeriodicalIF":2.0,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77809296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Do We Need to Understand the World to Know It? Knowledge in a Big Data World 我们需要了解世界才能认识它吗?大数据世界中的知识
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-01-02 DOI: 10.1080/1097198X.2019.1701623
V. Grover
In both practice and academia, the incredible access to data is creating a marked disruption. The perfect storm of massive amounts of digital data, sophisticated analytical tools and cheap, scalable processing power has fostered a data-driven mindset in both corporate and academic practices. These are being embraced to varying degrees in companies around the world as well as in global academic communities. However, swinging the pendulum in the relationship between knowledge and data too far toward data can have adverse consequences. This editorial offers a cautionary note for both companies and academia. For a number of years, in practice, the distinction between data, information, and knowledge could be stated with some level of precision. Data are raw facts and figures that can become information when massaged and placed in the right context. The value-adding activities from data to information are largely the domain of information systems. Knowledge, however, adds experience and expertise to the information and often resides in tacit form in people’s heads. So, the Knowledge Management System (KMS) popularity that started in the 1990s was intended to capture knowledge (largely tacit) and put it in a system that could benefit others in the organization (Davenport & Grover, 2001). KM processes include externalization (taking tacit knowledge and representing it in a KMS) and internalization (making this knowledge accessible to people who might need it). For example, a global consulting firm might have a team that concluded a multiyear project in Malaysia – and their experiences, successes, failures, precautions, and guidance in a KMS – could be invaluable for other teams initiating projects in that region. KM practices included creating the right incentives for knowledge to flow between people and the system, as well as embedding knowledge into products and services offered. In academic research, particularly the social sciences including Information Systems, knowledge is largely represented as an abstraction – a theory or model – that explains or predicts the real world. It is in the efficacy of these abstractions, as assessed through logic or impact, that academics gain their esteem. The advent of “big data” in recent years, along with advanced analytics and machine learning has created a disruption both in the practice of KM as well as in the importance of abstraction. Big data, through its global reach and its sheer volume, velocity, and variety, along with computationally intensive analysis, offers opportunities for generating new insights. Mining of big data and digital streams can yield fresh perspectives for decision-makers, optimize and automate processes, and discover new ways to understand and fulfill customers’ needs. It can also offer precision of predictions to important questions in both practice and academia. However, in observing the ready embrace of big data and analytics there are also signs that some companies and researchers
在实践和学术界,难以置信的数据获取正在造成明显的破坏。海量数字数据、复杂的分析工具和廉价、可扩展的处理能力的完美风暴,在企业和学术实践中培养了一种数据驱动的思维方式。世界各地的企业以及全球学术界都在不同程度上接受了这些观点。然而,在知识和数据之间的关系中,过于倾向于数据可能会产生不利的后果。这篇社论对企业和学术界都提出了警告。多年来,在实践中,数据、信息和知识之间的区别可以在某种程度上精确地表述出来。数据是原始的事实和数字,如果经过处理并置于适当的环境中,就可以成为信息。从数据到信息的增值活动在很大程度上属于信息系统的范畴。然而,知识在信息的基础上增加了经验和专业知识,并且常常以隐性的形式存在于人们的头脑中。因此,从20世纪90年代开始流行的知识管理系统(KMS)旨在获取知识(很大程度上是隐性的),并将其放在一个可以使组织中的其他人受益的系统中(Davenport & Grover, 2001)。知识管理过程包括外部化(获取隐性知识并在知识管理系统中表示它)和内部化(使可能需要这些知识的人可以访问这些知识)。例如,一家全球咨询公司可能有一个团队在马来西亚完成了一个多年的项目,他们在KMS中的经验、成功、失败、预防措施和指导对于在该地区启动项目的其他团队来说可能是非常宝贵的。知识管理实践包括为知识在人和系统之间流动创造正确的激励,以及将知识嵌入所提供的产品和服务中。在学术研究中,特别是在包括信息系统在内的社会科学领域,知识在很大程度上被表现为一种抽象——一种理论或模型——用来解释或预测现实世界。正是通过逻辑或影响来评估这些抽象的有效性,学者才赢得了他们的尊重。近年来“大数据”的出现,以及高级分析和机器学习的出现,在知识管理的实践和抽象的重要性方面都造成了破坏。大数据凭借其全球影响力、庞大的数量、速度和多样性,以及计算密集型分析,为产生新的见解提供了机会。挖掘大数据和数字流可以为决策者提供新的视角,优化和自动化流程,并发现理解和满足客户需求的新方法。它还可以为实践和学术界的重要问题提供精确的预测。然而,在观察对大数据和分析的欣然接受时,也有迹象表明,一些公司和研究人员可能会陷入一个陷阱,他们认为数据取代了知识,模糊了上述三分法中的区别。这里隐含的论点是,知识在很大程度上是我们对世界的观察和我们大脑中对世界的解释之间的对应,以我们用来理解观察的模型的形式。现在,有了大量的数据,我们不需要了解世界就能认识它。所有的知识都可以通过数据提取出来。因此,在这种观点下,知识不是通过人类评估内化的,而是通过数据外化的。虽然许多人可能不赞同数据是知识的观点,但那些大量投资于数据和分析能力的公司可能会接受一种以人为代价的数据文化,这种文化是以人为解释和判断为代价的。“企业,一切都围绕着数据科学和”显示全球信息技术管理杂志2020年第23卷,第1期。1,1 - 4 https://doi.org/10.1080/1097198X.2019.1701623
{"title":"Do We Need to Understand the World to Know It? Knowledge in a Big Data World","authors":"V. Grover","doi":"10.1080/1097198X.2019.1701623","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701623","url":null,"abstract":"In both practice and academia, the incredible access to data is creating a marked disruption. The perfect storm of massive amounts of digital data, sophisticated analytical tools and cheap, scalable processing power has fostered a data-driven mindset in both corporate and academic practices. These are being embraced to varying degrees in companies around the world as well as in global academic communities. However, swinging the pendulum in the relationship between knowledge and data too far toward data can have adverse consequences. This editorial offers a cautionary note for both companies and academia. For a number of years, in practice, the distinction between data, information, and knowledge could be stated with some level of precision. Data are raw facts and figures that can become information when massaged and placed in the right context. The value-adding activities from data to information are largely the domain of information systems. Knowledge, however, adds experience and expertise to the information and often resides in tacit form in people’s heads. So, the Knowledge Management System (KMS) popularity that started in the 1990s was intended to capture knowledge (largely tacit) and put it in a system that could benefit others in the organization (Davenport & Grover, 2001). KM processes include externalization (taking tacit knowledge and representing it in a KMS) and internalization (making this knowledge accessible to people who might need it). For example, a global consulting firm might have a team that concluded a multiyear project in Malaysia – and their experiences, successes, failures, precautions, and guidance in a KMS – could be invaluable for other teams initiating projects in that region. KM practices included creating the right incentives for knowledge to flow between people and the system, as well as embedding knowledge into products and services offered. In academic research, particularly the social sciences including Information Systems, knowledge is largely represented as an abstraction – a theory or model – that explains or predicts the real world. It is in the efficacy of these abstractions, as assessed through logic or impact, that academics gain their esteem. The advent of “big data” in recent years, along with advanced analytics and machine learning has created a disruption both in the practice of KM as well as in the importance of abstraction. Big data, through its global reach and its sheer volume, velocity, and variety, along with computationally intensive analysis, offers opportunities for generating new insights. Mining of big data and digital streams can yield fresh perspectives for decision-makers, optimize and automate processes, and discover new ways to understand and fulfill customers’ needs. It can also offer precision of predictions to important questions in both practice and academia. However, in observing the ready embrace of big data and analytics there are also signs that some companies and researchers ","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"72 1","pages":"1 - 4"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79038870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Interview with Theo Breuers, Chief Executive Officer of COMPO Software, the Netherlands 专访荷兰COMPO软件公司首席执行官西奥·布鲁尔斯
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-01-02 DOI: 10.1080/1097198X.2019.1701641
Kyootai Lee, K. Joshi
This interview introduces how innovative firms are employing interesting new technologies to improve their product line up and better serve customer needs. Facial recognition and biometric identification are opening new avenues for application of IT in personnel administration and other areas. This interview also highlights how European firms need to comply with EU’s strict General Data Protection Regulation (GDPR) regulation designed to ensure safeguards for data collected by firms from individuals in designing their new IT applications and products. Theo Breuers, CEO of Compo Software, founded the company in 1984. In the first few years, the firm focused on automation. In 2004 he and his team discovered the possibilities of application of IT in personnel registration and administration, and later entered the computer-controlled ticketing and event registration market. He recognized the value of face recognition technologies in proving better service to his customers and integrated them in his firm’s products.
本访谈介绍了创新型公司如何利用有趣的新技术来改进其产品线并更好地满足客户需求。面部识别和生物特征识别为信息技术在人事管理和其他领域的应用开辟了新的途径。本次访谈还强调了欧洲公司需要遵守欧盟严格的通用数据保护条例(GDPR),该条例旨在确保公司在设计新的IT应用程序和产品时从个人收集的数据得到保护。Theo Breuers是Compo软件公司的首席执行官,他于1984年创立了Compo软件公司。在最初的几年里,该公司专注于自动化。2004年,他和他的团队发现了将信息技术应用于人事登记和管理的可能性,后来进入了计算机控制的票务和活动登记市场。他认识到面部识别技术在为客户提供更好服务方面的价值,并将其整合到公司的产品中。
{"title":"An Interview with Theo Breuers, Chief Executive Officer of COMPO Software, the Netherlands","authors":"Kyootai Lee, K. Joshi","doi":"10.1080/1097198X.2019.1701641","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701641","url":null,"abstract":"This interview introduces how innovative firms are employing interesting new technologies to improve their product line up and better serve customer needs. Facial recognition and biometric identification are opening new avenues for application of IT in personnel administration and other areas. This interview also highlights how European firms need to comply with EU’s strict General Data Protection Regulation (GDPR) regulation designed to ensure safeguards for data collected by firms from individuals in designing their new IT applications and products. Theo Breuers, CEO of Compo Software, founded the company in 1984. In the first few years, the firm focused on automation. In 2004 he and his team discovered the possibilities of application of IT in personnel registration and administration, and later entered the computer-controlled ticketing and event registration market. He recognized the value of face recognition technologies in proving better service to his customers and integrated them in his firm’s products.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"1 1","pages":"76 - 78"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90868646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Universal and Culture-dependent Employee Compliance of Information Systems Security Procedures 员工对信息系统安全程序的遵从性具有普遍性和文化依赖性
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-01-02 DOI: 10.1080/1097198X.2019.1701355
Mari Karjalainen, M. Siponen, Petri Puhakainen, Suprateek Sarker
ABSTRACT Employee information systems security behavior (ISSB) is a key concern for organizations. Previous studies have proposed models aimed at explaining employees’ ISSB and related behavioral change. While these studies have contributed to our understanding of the reasons for ISSB (change), there is a lack of research related to cultural differences and distinguishing cultural-specific reasons for ISSB. This paper takes the first step in addressing this research gap by theorizing about employee ISSB based on empirical material collected in Finland, Switzerland, the UAE, and China. This paper suggests that ISSB constitute a learned information systems security (ISS) conventions that may be somewhat generic across different cultures; however, different paradigms of learning seem to be effective in different cultures for supporting behavioral change. From a theoretical perspective, the results help us to understand why employees comply or do not comply with ISS procedures. This study also highlights the need for future research on employee compliance to understand cultural differences regarding key ISS interventions. Finally, from a managerial perspective, the theory suggests that different cultures require different ISS interventions.
员工信息系统安全行为(ISSB)是组织关注的关键问题。以往的研究已经提出了一些模型来解释员工的ISSB和相关的行为改变。虽然这些研究有助于我们理解ISSB(变化)的原因,但缺乏与文化差异和区分ISSB的文化特异性原因相关的研究。本文基于芬兰、瑞士、阿联酋和中国收集的经验材料,对员工ISSB进行了理论化,从而迈出了解决这一研究空白的第一步。本文认为,ISSB构成了一种习得的信息系统安全(ISS)惯例,可能在不同的文化中有些通用;然而,在不同的文化中,不同的学习范式似乎对支持行为改变是有效的。从理论的角度来看,研究结果有助于我们理解员工遵守或不遵守ISS流程的原因。本研究还强调了未来对员工依从性研究的必要性,以了解关键ISS干预措施的文化差异。最后,从管理的角度来看,该理论表明不同的文化需要不同的ISS干预。
{"title":"Universal and Culture-dependent Employee Compliance of Information Systems Security Procedures","authors":"Mari Karjalainen, M. Siponen, Petri Puhakainen, Suprateek Sarker","doi":"10.1080/1097198X.2019.1701355","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701355","url":null,"abstract":"ABSTRACT Employee information systems security behavior (ISSB) is a key concern for organizations. Previous studies have proposed models aimed at explaining employees’ ISSB and related behavioral change. While these studies have contributed to our understanding of the reasons for ISSB (change), there is a lack of research related to cultural differences and distinguishing cultural-specific reasons for ISSB. This paper takes the first step in addressing this research gap by theorizing about employee ISSB based on empirical material collected in Finland, Switzerland, the UAE, and China. This paper suggests that ISSB constitute a learned information systems security (ISS) conventions that may be somewhat generic across different cultures; however, different paradigms of learning seem to be effective in different cultures for supporting behavioral change. From a theoretical perspective, the results help us to understand why employees comply or do not comply with ISS procedures. This study also highlights the need for future research on employee compliance to understand cultural differences regarding key ISS interventions. Finally, from a managerial perspective, the theory suggests that different cultures require different ISS interventions.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"8 1","pages":"24 - 5"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81010982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
IT Outsourcing in the Public Sector: A Descriptive Framework from a Literature Review 公共部门的IT外包:来自文献综述的描述框架
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-01-02 DOI: 10.1080/1097198X.2019.1701357
J. M. Marco-Simó, J. Pastor-Collado
ABSTRACT Despite its economic scale, IT outsourcing (ITO) in the public sector (PS) has not yet been deeply analyzed by academic literature when compared with ITO focused on the private sector. In fact, the question has often been raised as to whether ITO in the PS should be regarded as completely different to ITO in the private sector. In order to contribute to this discussion, our first goal in this paper is, after a review of the academic literature, to summarize the covered topics in a descriptive framework that facilitates the understanding both for researchers and practitioners of the ITO phenomena in the Public Sector. This framework is organized in four main categories that explain the context (the features of the PS) and the rationale of the ITO process (Why, What and How) in the PS. Then, we use this framework to face our second goal: highlight to which extent differences in ITO process between the public and private sectors are clear and can impact upon the implementation of the ITO. Although the conclusions indicate that there are quite a number of points of coincidence, partly because both sectors have organizations with a certain degree of publicness, they also reflect some aspects that are intrinsic to the PS (as the prioritization of non-economistic values, the application of industrial policies, or the search of collaborative sourcing, among others) and which need to be borne in mind in any work tackling ITO in this context.
尽管公共部门的IT外包(ITO)具有经济规模,但与私营部门的IT外包相比,学术文献尚未对其进行深入分析。事实上,经常有人提出一个问题,即是否应该将公营部门的ITO视为与私营部门的ITO完全不同。为了促进这一讨论,我们在本文中的第一个目标是,在对学术文献进行回顾之后,在一个描述性框架中总结所涵盖的主题,以促进研究人员和公共部门ITO现象的实践者的理解。该框架分为四个主要类别,解释了PS的背景(PS的特征)和ITO过程的基本原理(为什么,什么和如何)。然后,我们使用该框架来面对我们的第二个目标:强调公共部门和私营部门之间ITO过程的差异在多大程度上是明确的,并可能影响ITO的实施。虽然结论表明有相当多的巧合点,部分原因是两个部门都有一定程度的公开组织,但它们也反映了PS固有的一些方面(如非经济价值的优先次序,产业政策的应用,或寻找合作采购等),在此背景下处理ITO的任何工作都需要牢记这些方面。
{"title":"IT Outsourcing in the Public Sector: A Descriptive Framework from a Literature Review","authors":"J. M. Marco-Simó, J. Pastor-Collado","doi":"10.1080/1097198X.2019.1701357","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701357","url":null,"abstract":"ABSTRACT Despite its economic scale, IT outsourcing (ITO) in the public sector (PS) has not yet been deeply analyzed by academic literature when compared with ITO focused on the private sector. In fact, the question has often been raised as to whether ITO in the PS should be regarded as completely different to ITO in the private sector. In order to contribute to this discussion, our first goal in this paper is, after a review of the academic literature, to summarize the covered topics in a descriptive framework that facilitates the understanding both for researchers and practitioners of the ITO phenomena in the Public Sector. This framework is organized in four main categories that explain the context (the features of the PS) and the rationale of the ITO process (Why, What and How) in the PS. Then, we use this framework to face our second goal: highlight to which extent differences in ITO process between the public and private sectors are clear and can impact upon the implementation of the ITO. Although the conclusions indicate that there are quite a number of points of coincidence, partly because both sectors have organizations with a certain degree of publicness, they also reflect some aspects that are intrinsic to the PS (as the prioritization of non-economistic values, the application of industrial policies, or the search of collaborative sourcing, among others) and which need to be borne in mind in any work tackling ITO in this context.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"12 1","pages":"25 - 52"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73887452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Participating in Critical Discourse: A Critical Research Study of Clinicians’ Concerns for A Ghanaian Hospital E-mail System 参与批评话语:临床医生对加纳医院电子邮件系统关注的批判性研究
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-01-02 DOI: 10.1080/1097198X.2019.1701356
Frank Nyame-Asiamah, P. Kawalek
ABSTRACT A growing body of information systems (IS) literature advocates the explicit use of suitable critical theories to explore power issues in developing countries and make IS research findings more accessible to systems’ users and the wider audiences for consumption. We respond to this debate in IS by applying critical research perspectives to discuss the power implications of Internet and e-mail resource distribution in a Ghanaian teaching hospital in a way that addresses clinicians’ concerns of using Internet services for healthcare practices. We applied critical qualitative approaches to collect and analyze data from clinicians, healthcare managers, and the hospital’s internal documents. It was found that managers exercised their powers to allocate Internet facilities selectively on the contestable account that clinicians might misuse the Internet if they were given access while clinicians sought to empower themselves as co-planners who could make technology choices and add new value to the existing normative decisions of the managers. The outcomes show that critical researchers can directly relate to decision-making powers, recognize their powers and expose structures that surround them, and emancipate people whose Internet resource needs are restricted to co-involve in technology adoption and distribution processes.
越来越多的信息系统(IS)文献提倡明确使用合适的批判理论来探索发展中国家的权力问题,并使信息系统的研究成果更容易为系统用户和更广泛的受众所接受。我们通过应用批判性的研究视角来讨论加纳教学医院中互联网和电子邮件资源分配的权力含义,以解决临床医生在医疗保健实践中使用互联网服务的担忧,以此回应IS中的这一争论。我们应用关键的定性方法来收集和分析来自临床医生、医疗保健管理人员和医院内部文件的数据。研究发现,管理人员在有争议的情况下行使他们的权力,有选择地分配互联网设施,因为临床医生如果被允许访问互联网,可能会滥用互联网,而临床医生则试图授权自己作为共同规划者,他们可以做出技术选择,并为管理人员现有的规范性决策增加新的价值。研究结果表明,批判性研究人员可以直接与决策权联系起来,认识到他们的权力,并揭露围绕他们的结构,并解放那些互联网资源需求被限制在共同参与技术采用和分配过程的人。
{"title":"Participating in Critical Discourse: A Critical Research Study of Clinicians’ Concerns for A Ghanaian Hospital E-mail System","authors":"Frank Nyame-Asiamah, P. Kawalek","doi":"10.1080/1097198X.2019.1701356","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701356","url":null,"abstract":"ABSTRACT A growing body of information systems (IS) literature advocates the explicit use of suitable critical theories to explore power issues in developing countries and make IS research findings more accessible to systems’ users and the wider audiences for consumption. We respond to this debate in IS by applying critical research perspectives to discuss the power implications of Internet and e-mail resource distribution in a Ghanaian teaching hospital in a way that addresses clinicians’ concerns of using Internet services for healthcare practices. We applied critical qualitative approaches to collect and analyze data from clinicians, healthcare managers, and the hospital’s internal documents. It was found that managers exercised their powers to allocate Internet facilities selectively on the contestable account that clinicians might misuse the Internet if they were given access while clinicians sought to empower themselves as co-planners who could make technology choices and add new value to the existing normative decisions of the managers. The outcomes show that critical researchers can directly relate to decision-making powers, recognize their powers and expose structures that surround them, and emancipate people whose Internet resource needs are restricted to co-involve in technology adoption and distribution processes.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"123 1","pages":"53 - 75"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85683819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Analytics Applications in Latin America and Emerging Economies 拉丁美洲和新兴经济体的数据分析应用
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-12-06 DOI: 10.1080/1097198X.2019.1701728
Roberto Vinaja
{"title":"Data Analytics Applications in Latin America and Emerging Economies","authors":"Roberto Vinaja","doi":"10.1080/1097198X.2019.1701728","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701728","url":null,"abstract":"","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"2017 1","pages":"79 - 81"},"PeriodicalIF":2.0,"publicationDate":"2019-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79642455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
“The Early Bird Catches the Worm - First Mover Advantage through IoT Adoption for Indian Public Sector Retail Oil Outlets” “早起的鸟儿有虫吃——印度公共部门零售油店采用物联网的先发优势”
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-10-02 DOI: 10.1080/1097198x.2019.1679588
S. Das
ABSTRACT This paper identifies the various significant factors that contribute to the Internet of Things (IoT) adoption at the Indian Oil Marketing Companies (OMCs') Retail Oil Outlets (ROO) and empirically tests the model of constituents for the same. The logistic regression analysis was applied, using a survey of 402 respondents, to predict the adoption of IoT at the OMCs' ROO. Using the 7 factors as predictors, the regression analysis output showed a significant impact from 5 factors-People, Technologies, Processes, Data Security, and Competitive Advantage. To transform the existing ROO into “smart pumps, and to fully realize the expected benefits from the investment in IoT, the OMCs' need to give increased emphasis to these 5 factors. It tests the applicability of the PolySocial Reality (PoSR) framework and Thing Theory at the OMCs' ROO extending the literature by incorporating 'processes' to the existent framework of people, devices and communication technologies within the IoT ecosystem. “Data Security” and “Interoperability” tie up these four components together enabling a seamless flow of digital data among them and empowering the organization to realize “competitive advantage”
本文确定了影响印度石油营销公司(omc)零售油品网点(ROO)采用物联网(IoT)的各种重要因素,并对其成分模型进行了实证检验。通过对402名受访者的调查,应用逻辑回归分析来预测omc的ROO采用物联网。使用这7个因素作为预测因子,回归分析结果显示人员、技术、流程、数据安全和竞争优势这5个因素对企业的影响显著。为了将现有的ROO转变为“智能泵”,并充分实现物联网投资的预期收益,omc需要更加重视这5个因素。它测试了多社会现实(PoSR)框架和物论在omc的ROO中的适用性,通过将“过程”纳入物联网生态系统中现有的人、设备和通信技术框架来扩展文献。“数据安全”和“互操作性”将这四个组件结合在一起,使数字数据在它们之间无缝流动,并使组织能够实现“竞争优势”。
{"title":"“The Early Bird Catches the Worm - First Mover Advantage through IoT Adoption for Indian Public Sector Retail Oil Outlets”","authors":"S. Das","doi":"10.1080/1097198x.2019.1679588","DOIUrl":"https://doi.org/10.1080/1097198x.2019.1679588","url":null,"abstract":"ABSTRACT This paper identifies the various significant factors that contribute to the Internet of Things (IoT) adoption at the Indian Oil Marketing Companies (OMCs') Retail Oil Outlets (ROO) and empirically tests the model of constituents for the same. The logistic regression analysis was applied, using a survey of 402 respondents, to predict the adoption of IoT at the OMCs' ROO. Using the 7 factors as predictors, the regression analysis output showed a significant impact from 5 factors-People, Technologies, Processes, Data Security, and Competitive Advantage. To transform the existing ROO into “smart pumps, and to fully realize the expected benefits from the investment in IoT, the OMCs' need to give increased emphasis to these 5 factors. It tests the applicability of the PolySocial Reality (PoSR) framework and Thing Theory at the OMCs' ROO extending the literature by incorporating 'processes' to the existent framework of people, devices and communication technologies within the IoT ecosystem. “Data Security” and “Interoperability” tie up these four components together enabling a seamless flow of digital data among them and empowering the organization to realize “competitive advantage”","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"31 1","pages":"280 - 308"},"PeriodicalIF":2.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90092206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Scrum Culture: Introducing Agile Methods in Organizations Scrum文化:在组织中引入敏捷方法
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-10-02 DOI: 10.1080/1097198x.2019.1679956
Roberto Vinaja
{"title":"The Scrum Culture: Introducing Agile Methods in Organizations","authors":"Roberto Vinaja","doi":"10.1080/1097198x.2019.1679956","DOIUrl":"https://doi.org/10.1080/1097198x.2019.1679956","url":null,"abstract":"","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"74 1","pages":"309 - 311"},"PeriodicalIF":2.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90371185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Influence of Cultural Values on Information and Communication Technology (ICT) Diffusion Levels: A Cross-National Study 文化价值观对信息通信技术(ICT)传播水平的影响:一项跨国研究
IF 2 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2019-10-02 DOI: 10.1080/1097198X.2019.1679586
Khendum Choden, K. Bagchi, G. Udo, P. Kirs, G. Frankwick
ABSTRACT It has been posited that information and communication technology (ICT) diffusion can be explained by national culture since individuals from different cultures think and behave differently toward the development and use of ICT. To the best of our knowledge, the impact of Schwartz’s model of cultural dimensions on ICT diffusion level has not yet been investigated. This study explored the diffusion level using Schwartz’s three national cultural dimensions: autonomy vs. embeddedness, egalitarianism vs. hierarchy, and mastery vs. harmony. Data were obtained for 73 nations on three ICTs: Internet usage, mobile phones, and fixed broadband connections. The correlation results showed that autonomy vs. embeddedness and egalitarianism vs. hierarchy influenced ICT diffusion levels. The regression results showed that autonomy vs. embeddedness had significant impact on diffusion levels. The implications of these findings are discussed.
信息通信技术(ICT)的传播可以用民族文化来解释,因为不同文化的个体对ICT的发展和使用有不同的思考和行为。据我们所知,施瓦茨的文化维度模型对信息通信技术扩散水平的影响尚未被调查。本研究使用Schwartz的三个民族文化维度:自主性与嵌入性、平均主义与等级、掌握与和谐来探讨扩散水平。获得了73个国家三项信息通信技术的数据:互联网使用、移动电话和固定宽带连接。相关结果显示,自主性与嵌入性、平均主义与等级制度影响ICT扩散水平。回归结果显示,自主性与嵌入性对扩散水平有显著影响。讨论了这些发现的意义。
{"title":"The Influence of Cultural Values on Information and Communication Technology (ICT) Diffusion Levels: A Cross-National Study","authors":"Khendum Choden, K. Bagchi, G. Udo, P. Kirs, G. Frankwick","doi":"10.1080/1097198X.2019.1679586","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1679586","url":null,"abstract":"ABSTRACT It has been posited that information and communication technology (ICT) diffusion can be explained by national culture since individuals from different cultures think and behave differently toward the development and use of ICT. To the best of our knowledge, the impact of Schwartz’s model of cultural dimensions on ICT diffusion level has not yet been investigated. This study explored the diffusion level using Schwartz’s three national cultural dimensions: autonomy vs. embeddedness, egalitarianism vs. hierarchy, and mastery vs. harmony. Data were obtained for 73 nations on three ICTs: Internet usage, mobile phones, and fixed broadband connections. The correlation results showed that autonomy vs. embeddedness and egalitarianism vs. hierarchy influenced ICT diffusion levels. The regression results showed that autonomy vs. embeddedness had significant impact on diffusion levels. The implications of these findings are discussed.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"43 1","pages":"243 - 256"},"PeriodicalIF":2.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83487579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Journal of Global Information Technology Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1