From Users to Choosers: the Change in Employee Technology Expectations

2021 ◽  
Author(s):  
◽  
David J Clarke

<p>This research looks at the motivation for using non-sanctioned technologies within a business context; that is, using Information Technology (IT) systems other than those provided (or approved) by the IT department. In this research, the non-sanctioned IT systems of primary interest are the internet based applications, but also includes personally owned hardware devices such as laptops, tablets and smartphones. This qualitative study used the key informant approach to gain an understanding of the subject using a semi-structured interview format. The results show that employees in knowledge based roles are choosing their own technology tools when they believe that they give them better functionality or flexibility over those offered and approved by the traditional IT department. Graduates and other millennial employees are found to be using non-sanctioned systems more frequently than older workers; millennials are also far more likely to use whatever application or device they want, regardless of the source or what corporate IT policies stated. The use of these non-sanctioned technologies should be a source concern to IT management because many of these can circumvent the organisations security and data management governance policies, giving the potential for data loss or unwanted exposure, regulatory compliance failure or have undesirable legal implications. The results also suggest that IT departments do not have the resources to keep up with the rate of change in technology. At the same time, the users of their services are able to obtain technology solutions from a range of other sources. This may mean a change in the role of the IT department as it loses its position as the technology gatekeeper.</p>

2021 ◽  
Author(s):  
◽  
David J Clarke

<p>This research looks at the motivation for using non-sanctioned technologies within a business context; that is, using Information Technology (IT) systems other than those provided (or approved) by the IT department. In this research, the non-sanctioned IT systems of primary interest are the internet based applications, but also includes personally owned hardware devices such as laptops, tablets and smartphones. This qualitative study used the key informant approach to gain an understanding of the subject using a semi-structured interview format. The results show that employees in knowledge based roles are choosing their own technology tools when they believe that they give them better functionality or flexibility over those offered and approved by the traditional IT department. Graduates and other millennial employees are found to be using non-sanctioned systems more frequently than older workers; millennials are also far more likely to use whatever application or device they want, regardless of the source or what corporate IT policies stated. The use of these non-sanctioned technologies should be a source concern to IT management because many of these can circumvent the organisations security and data management governance policies, giving the potential for data loss or unwanted exposure, regulatory compliance failure or have undesirable legal implications. The results also suggest that IT departments do not have the resources to keep up with the rate of change in technology. At the same time, the users of their services are able to obtain technology solutions from a range of other sources. This may mean a change in the role of the IT department as it loses its position as the technology gatekeeper.</p>


2018 ◽  
Vol 26 (1) ◽  
pp. 93-116
Author(s):  
Jozef H.H.M. Dorscheidt ◽  
Irma M. Hein

The quality of health care for children depends much on the availability of relevant results from medical research with children as subjects. Yet, because of their vulnerability and assumed incompetence to take part in decision-making, children have often been excluded from taking part in medical research, so as to prevent them from harm. Empirical data on children’s competence to consent to such research used to be rare, but recent developments in this field have created more insights in the myths and realities concerning minor patients’ capacities to decide on medical research participation. Against the background of relevant international, European and domestic legal frameworks concerning the rights of children as participants in medical research, this article goes into instruments such as MacCAT-CR, a semi-structured interview format useable as a competence assessment tool for clinical research involving children. On the basis of this, several recommendations are defined to enhance such research, as these may do sufficient justice to the health interests and the capacities of children, while at the same time supporting researchers and child research participants when facing decisions about pediatric research options.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Stefan Groschl

PurposeThis study aims to provide an understanding of the multi-layered managerial and organizational challenges of mega sporting events such as the Olympic and Paralympic Games, identify key competencies that address the complexities and uncertainties when planning and organizing the Olympic and Paralympic Games and provide a framework to classify sporting events according to their complexity and uncertainty.Design/methodology/approachThis study uses in-depth semi-structured interview with key organizing actor of the Olympic and Paralympic Games in Rio in 2016.FindingsPlanning and organizing complex and long-term mega sporting events such as the Olympic and Paralympic Games require a set of key competencies, including a range of soft skills (collaboration, negotiation, communication), goal-setting, persistence and resilience, paradox thinking and timing.Originality/valuePresenting the findings in an unedited and raw interview format provides practitioners and scholars alike with unfiltered and rich data that allows to choose, apply and adapt key competencies and heuristics from Rio 2016 to their own mega sporting projects or research agendas; allows to differentiate between sporting events according to their complexity and uncertainty.


Stroke ◽  
2016 ◽  
Vol 47 (suppl_1) ◽  
Author(s):  
J A Oostema ◽  
Maria Tecos ◽  
Deborah Sleight ◽  
Brian Mavis

Introduction: Ischemic stroke patients who arrive by emergency medical service (EMS) receive faster emergency department evaluations and improved rates of thrombolytic treatment. However, EMS stroke recognition and compliance with prehospital stroke quality measures are inconsistent. We hypothesized that EMS stroke care is influenced by a complex interaction of knowledge, beliefs, and system-level variables that influence behavior. Methods: Focus groups of paramedics from a single urban/suburban county were assembled to discuss their experiences identifying and transporting stroke patients. Focus groups were conducted using a semi-structured interview format and audio recorded. Transcripts of focus groups were qualitatively analyzed to identify themes, subthemes, and patterns of paramedic responses. The Clinical Practice Guidelines Framework provided the initial coding scheme, which was modified during the coding process by three coders using grounded theory methods, who came to consensus on which codes to apply. Results: Three focus groups (n=13) were conducted to reach theme saturation. Overall, paramedics reported high confidence in clinical gestalt for assessing stroke patients and a strong desire to “do the right thing,” but were unfamiliar with published guidelines. Paramedics identified variability in the clinical presentations of stroke, inadequate or inconsistent hospital guidance, and lack of feedback regarding care as principle barriers to ideal prehospital stroke care. Participants reported conflicting hospital guidance regarding the appropriate time frame for a high priority transport and hospital prenotification. Feedback regarding final diagnosis was viewed as critical for developing improved clinical acumen. Direct to CT protocols were cited as an effective way to integrate EMS into hospital stroke response. Conclusion: In this qualitative analysis, paramedics expressed a desire for clear, hospital-directed guidance and consistent feedback regarding outcomes for suspected stroke patients.


2016 ◽  
Vol 31 (1) ◽  
pp. 79-101 ◽  
Author(s):  
Stephan Zimmermann ◽  
Christopher Rentrop ◽  
Carsten Felden

ABSTRACT In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62 percent of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.


Author(s):  
Juan-Francisco Martínez-Cerdá ◽  
Joan Torrent-Sellens ◽  
Mônica Pegurer Caprino

This research analyzes the connections between media literacy and context of the knowledge economy, establishing a relationship between so-called co-innovative sources (ICT, organizational innovation and qualifications of employees) of the business environment and media literacy. It seeks to verify the behavior of media literacy as a co-innovative source, as fundamental as the three other ones to the viability and sustainability of companies. Authors start from a literature review related to media literacy and knowledge-based economy and then raise their own model that integrates the co-innovative sources and media literacy (the ‘Tetrahedron of Co-Innovative Sources') with which analyze media literacy in the business context. To verify the proposed relations, the research uses the Celot and Pérez Tornero's (2009) framework (proposed in the “Study on Assessment Criteria for Media Literacy Levels” delivered to the European Commission) with official statistical sources in Europe, returning results with which to test the hypothesis that a higher level of media literacy of citizens of a country has a positive influence on its companies and businesses.


Author(s):  
Fawaz Alharbi

The complexity of business and competitive environment enforces organizations to adopt innovative ways for doing business. This drives a new trend of agile organizations that are adaptable to market and technology changes. As a result, 75% of organizations recognized agility as one of the key drivers for their IT strategies. As organizations start adopting digital transformation initiatives, they recognize the necessity to adapt agility in their IT departments as well. However, moving to an agile organization and an agile IT department is more complex than adapting an agile software. This chapter aims to provide an in-depth explanation of agile IT department specifying its features, roles, and differentiation elements from the traditional IT department. Emerging technologies that are crucial in the movement towards an agile IT department are also discussed with possible change management process to facilitate the transition of the agile IT department into profit center that is contracted to add value for the whole organization while working in a feasible partnership mode with the business.


2018 ◽  
Vol 51 (2) ◽  
pp. 144-158 ◽  
Author(s):  
Stephen McBride

The rationale for this study is to explore whether or not the Winnicottian concept of primary maternal preoccupation fits into the identities and features in what male group analysts reflect on and resonate with upon ‘giving birth to’ and conducting a group. A qualitative, individual case-study approach was employed to attempt to discover and understand how male group analysts make sense of Winnicott’s fundamental concept. Wondering and thinking about how a male group analyst ‘holds’ both the maternal and paternal function in a group is also being thought about to ascertain the impact of these features on clinical practice. Exploring the concept of primary maternal preoccupation lends towards a strong focus on the relationship between mother and baby, mirrored in and seen as a metaphor for the relationship between the group analyst and the group members. Doron argues that in disclosing her depth of feeling towards the changing group membership in the group she was conducting, she identified strongly with the state of primary maternal preoccupation. This study will explore the range of feelings associated with the primary maternal preoccupation male group analysts associate with. Three qualified group analysts with five years’ minimum post-qualification experience, with whom there were no boundary issues, were interviewed in a semi-structured interview format to ascertain and develop this understanding. A phenomenological research method was chosen to analyse the collated data from the three individual interviews. Following completion of the three interviews, the participants’ texts were analysed resulting in five overall themes being developed. Potential wider scopes and application of the question, potential clinical implications of the topic under discussion and the potential for developing a theoretical discussion in group analysis on what might be coined ‘paternal preoccupation’ were illuminated and discussed.


2018 ◽  
Vol 11 (1) ◽  
pp. 156 ◽  
Author(s):  
Ambika Zutshi ◽  
Andrew Creed ◽  
Brian Connelly

Universities that sign the Talloires Declaration signify their commitment to education for sustainable development. This research explores whether the signification is a strategic desire to be seen to be doing the right thing, or a genuine commitment to enhancing sustainability and helping the environment. This semi-structured interview research involves communication with the sustainability managers in the majority of Talloires signified universities in Australia. Since Australia has a comparably high rate of commitment to the Talloires Declaration, the findings represent rich and deep insight into reasons and motivations that can inform the adoption process around the world. Applying institutional theory and related concepts of structuration, isomorphism, and signaling, the findings are analyzed to reveal the range of environmental initiatives and the underlying explanation of themes. Current strategies and future directions for universities are indicated. Findings are that higher education is a key mechanism in business and society for finding and harnessing knowledge-based solutions. The challenge is that institutionalization has created resistance to change through coercive, normative, and mimetic isomorphism, along with rhetoric. Structuration factors should be considered in the context of making positive changes for sustainability in the university sector.


2016 ◽  
Vol 15 (3) ◽  
pp. 118-122 ◽  
Author(s):  
Chris Pace

Purpose The purpose of this paper is to examine the impact that cyberattacks are having on organizations and the growing need these create for H.R. departments to collaborate more closely with IT departments. Design/methodology/approach Current thinking regarding managing cybersecurity suggests that it should be managed holistically, i.e. by the human resources (HR) department and information technology (IT) department working together more closely. This sees the IT department providing the IT security tools and the HR department providing the appropriate processes and procedures that need to be followed, as well as creating a necessarily more “vigilant” culture. Findings Several practical steps are outlined that will help HR departments protect themselves against a data breach. Originality/value Cyberthreats are amongst the top threats to UK business, according to the government. Managing cybersecurity has long been left almost solely to the technology experts. The continuing number of high-profile data breaches suggests that cybersecurity tools alone will not stop information leaking from companies. There is an important role for HR teams in encouraging and enforcing a more proactive, vigilant culture amongst the workforce and working more closely with IT to improve security practices.


Sign in / Sign up

Export Citation Format

Share Document