Advances in Information Resources Management - Advanced Topics in Information Resources Management, Volume 2
Latest Publications


TOTAL DOCUMENTS

32
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781591400622, 9781591400998

Author(s):  
Mikko T. Siponen

The question of whether ethical theories appealing to human morality can serve as a means of protection against information system security breaches has been recognized by several authors. The existing views concerning the role of ethics in information systems security can be divided into two categories. These are (1) expressions about the use of human morality and (2) arguments claiming that the use of ethics is useless or, at best, extremely restricted. However, the former views are general statements lacking concrete guidance and the latter viewpoint is based on cultural relativism, and can be thus classified as descriptivism. This paper claims that the use of ethical theories and human morality is useful for security, particularly given that Hare’s Overriding thesis has validity — though it has its limitations, too. This paper further argues that descriptivism (including the doctrine of cultural relativism) leads to several problems, contradictions and causes detrimental effects to our well-being (and security). Therefore, an alternative approach to using ethics in minimizing security breaches that is based on non-descriptive theories is proposed. The use of non-descriptivism will be demonstrated using Rawls’ concept of the “veil of ignorance.” The limitations of non-descriptivism, and appealing to human morality in a general sense, will also be discussed. Finally, suggestions for future research directions are outlined.


Author(s):  
John Pillay ◽  
Ray Hackney

The mission statement embodies certain beliefs about the management culture of the organization, which can be examined and placed within underlying theoretical contexts. This chapter examines postmodernism in this respect, which, in addition to forming a critique of modernist approaches, posits alternative views about philosophy, organization and subsequently IS/IT management theory. The study applies an ethnographic case research methodology where data was collected from 16 interviewees employed within a multi-national financial services group. In this way, the organizational mission statement was used as a vehicle for analyzing the contribution of postmodern approaches to the management of the IS/IT function. The influential Ashridge Model was adopted to map the findings of the study which suggest three propositions for postmodernism in providing: (i) cultural context, (ii) a textual or ‘deconstructive’ analysis and (iii) an ethnographic empathy for further IS/IT research. Finally, it is argued that the modernist/postmodernist dialectic is ultimately a productive discussion, which can positively contribute towards research in terms of analytical techniques and interpretative strategies.


Author(s):  
William D. Haseman ◽  
Vichuda Nui Polatoglu ◽  
K. Ramamurthy

The study reported here investigates the influence of “interactivity” on the learning outcomes of users in a multimedia systems environment. Drawing from past literature base and based on key tenets of three learning theories, behaviorist, cognitivist and constructivist, the study first proposes a measurement scheme for “interactivity” and then hypothesizes that “interactivity” would influence the learning outcomes positively in terms of users’ learning achievement and attitude. Three prototypes of a multimedia instructional/training system to represent high, low, and non-interactive modes of use were developed and implemented, and the hypothesized influences were investigated using a controlled laboratory research design. Multiple analysis of variance (MANOVA) results indicate that while interactivity does not necessarily enable enhanced gain in user learning, it positively influences participants’ attitude. The study finds no support for hypothesized moderating effects of learning styles (measured using Kolb’s Learning Style Inventory scale) on the relationship between interactivity and user outcomes. The results of this study have important implications for both education and corporations’ training efforts and investments. The reasons for practical lack of influence of learning style are highlighted in some detail. Implications and future research directions are discussed.


Author(s):  
Denise J. McManus ◽  
Chetan S. Sankar ◽  
Houtson H. Carr ◽  
F. Nelson Ford

This chapter provides a new perspective on the competitive advantage of electronic mail within organizations. Essentially, e-mail assists individuals with efficiency and effectiveness. It improves the overall productivity of the firm and provides better coordination of internal processes. Electronic mail has been considered an important channel of communication. Since quality, time and cost are considered the main means of competition in today’s global market, this study investigated the relationship between the strategic uses and competitive benefits of electronic mail in contemporary organizations. A sample of 99 management-level staff members in 41 companies responded to a questionnaire assessing their e-mail usage and their perceived e-mail benefits. The results suggested that e-mail usage could augment the competitive posture of the firm.


Author(s):  
Janice M. Burn ◽  
Karen D. Loch

This paper addresses the impact of information technology (IT) and the World Wide Web (WWW) on the 21st century and the challenges which we will face as responsible members of a dynamically changing society. Reviewing the spread of potentially alienating technology, the paper highlights the implications for change with reference to the “haves” and the “have nots” — developing societies, economically disadvantaged groups, women and children. The authors argue that organisational, sociological and cultural factors may inhibit an effective transformation to a global Information Society. Particular consideration is given to policies, infrastructure, human resources and development responsibilities in developing societies.


Author(s):  
Steven A. Morris ◽  
Thomas E. Marshall ◽  
R. Kelly Rainer Jr.

Pressured by the growing need for fast response times, mass customization and globalization, many organizations are turning to flexible organizational forms, such as virtual teams. Virtual teams consist of cooperative relationships supported by information technology to overcome limitations of time and/or location. Virtual teams require their members to rely heavily on the use of information technology and trust in coworkers. This study investigates the impacts that the reliance on information technology (operationalized in our study via the user satisfaction construct) and trust have on the job satisfaction of virtual team members. The study findings reveal that both user satisfaction and trust are positively related to job satisfaction in virtual teams, while system use was not found to play a significant role. These findings emphasize that organizations seeking the benefits of flexible, IT-enabled virtual teams must consider both the level of trust among colleagues, and the users’ satisfaction with the information technology on which virtual teams rely.


Author(s):  
Xiaotong Li ◽  
John D. Johnson

In this chapter, we discuss the real options theory and its applications in IT investment evaluation. We provide a framework within which the appropriateness of using real options theory in strategic IT investment evaluation is systematically justified. In our framework, IT investment opportunities are classified into four categories based on two criteria: the technology switching costs and the nature of competition. We point out that different real options models should be adopted for each category. The electronic brokerage’s investment decision in wireless technology is discussed as a real-world case within the framework. Our study also provides some insights about the relationship between technology standardization and IT investment decisions.


Author(s):  
Gurpreet S. Dhillon ◽  
Trevor T. Moores

The phenomenal growth in Internet commerce in recent years has brought privacy concerns to the fore. Although privacy as a concept has been well understood with respect to brick and motor businesses, there is limited research in identifying major issues of concern related to Internet privacy. This paper systematically identifies the major Internet privacy concerns. Data for the study was collected through two panels and subjective evaluation.


Author(s):  
Craig Van Slyke ◽  
Hao Lou ◽  
John Day

Information technologies that support groups of individuals have become increasingly visible. While some of these, such as electronic mail, have become almost ubiquitous in many organizations, other groupware applications have not enjoyed similar acceptance. This study uses diffusion of innovation theory to investigate factors that may influence intentions to use a specific groupware application, Lotus Domino discussion databases. Findings indicate that intentions to use Domino discussion databases are impacted by perceptions of relative advantage, complexity, compatibility and result demonstrability. There was not a significant relationship between intentions to use and perceived trialability, visibility or voluntariness. Suggestions for positively impacting important perceptions are also offered. Those interested in increasing the use of groupware technologies may find these suggestions helpful in guiding their efforts.


Author(s):  
Nicholas Beaumont ◽  
Christina Costa

In Australia, popular discussion of the growing market in outsourcing information technology (IT) has been spurred by decisions of several large companies and the Australian government to outsource IT operations, but there has been little academic research into outsourcing in Australia. This chapter reports research into Australian IT outsourcing based on data collected in 1999. The research objectives were to measure the incidence of outsourcing among Australian firms, identify the functions outsourced, the reasons why managers considered outsourcing, the costs and benefits of outsourcing, possible changes in modes of and motivations for outsourcing and factors that are associated with successful outsourcing arrangements. The nature of and motivations for outsourcing have evolved; for example, cost saving is not (if it ever was) the prime motivator. The three most important factors driving outsourcing in Australia are access to skills, improved service quality and increasing managers’ ability to focus on core business activities. Decisions to outsource are weakly correlated with company size, but are not related to industry sectors. The factors most associated with successful IT outsourcing were the cultural match between the vendor and client, and the nature of the contractual arrangements—partnerships are more fruitful than rigidly interpreted black letter contracts. Outsourcing (not just of IT) is becoming increasingly popular; we suggest reasons for this and propose further research. The research used quantitative and qualitative data. A survey was used to collect data from 277 informants, and six interviews were used to explore managers’ reasons for outsourcing and relate these to the success of outsourcing arrangements. Outsourcing of many business processes (not just IT) is becoming increasingly frequent in Australia. Where appropriate, themes are illustrated by outsourcing activities other than IT.


Sign in / Sign up

Export Citation Format

Share Document