首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
While post mortem evaluation (PME) has long been advocated as a means of improving development practices by learning from IT project failures, few organizations conduct PMEs. The purpose of the study is to explain this discrepancy between theory and practice. This paper integrates findings from a Delphi study of what experienced practitioners perceive as the most important barriers to conducting PMEs with insights from organizational learning theory. The results suggest that there are critical tensions between development practices and learning contexts in many organizations, and adopting PMEs in these cases is likely to reinforce organizational learning dysfunctions rather than improve current development practices. Based on these findings, we argue that the PME literature has underestimated the limits to learning in most IT organizations and we propose to explore paradoxical thinking to help researchers frame continued inquiry into PME and to help managers overcome learning dysfunctions as they push for more widespread use of PMEs.  相似文献   

2.
The value of information technology (IT) to modern organizations is almost undeniable. However, the determination of that value has been elusive in research and practice. We used a process-oriented research model developed using two streams of IT research to examine the value of IT in business organizations. One stream is characterized by examining how IT and non-IT variables affect other so-called IT success variables. The second stream is commonly referred to as IT business value, defined as the contribution of IT to firm performance. The resulting research model is referred to in our paper as the IT business success model. Data was collected from 225 top IS executives in fairly large organizations to empirically examine several hypotheses derived from theory concerning the causal nature of the IT business success model. A set of measures for the IT business success model was developed through an intense investigation of the IT literature. The measures were tested for validity and reliability using confirmatory factor analysis. The hypotheses that resulted from past research and conceptually illustrated in the research model were assessed using structural equation analysis. The implications of these findings and the limitations of the study are discussed in an effort to contribute to building a process-oriented theory base for IT business success at the organizational level of analysis.  相似文献   

3.
Assessing the economic feasibility of information systems (IS) projects and operations remains a challenge for most organizations. This research investigates lifecycle cost and benefit management practices and demonstrates that, overall, although organizations intend to improve their information technology (IT) management, they squander many opportunities to do so. There are inconsistencies in cost/benefit management practices. Most organizations that integrate operational benefits into investment analyses do not acknowledge operational costs. Planned project goals are seldom formulated in a verifiable or measurable way; there is little structured feedback on individual lifecycle activities, nor co-ordination of various activities. Thus, the attitude towards cost/benefit management appears primarily context-related and incident-driven. A further development of the system lifecycle-based approach is needed to improve IT cost/benefit management theory and practice, because a coherent set of methods is required to assess IT costs and benefits throughout the entire lifecycle.  相似文献   

4.
Ethical issues related to information systems are important to the information technology (IT) professionals. These issues are also significant for organizations and societies. Although considerable literature on IT and related ethical issues exists, a review of this literature has found little empirical research on ethical practices within the government and private sector organizations. Therefore, the objective of this paper is to draw inferences regarding such practices currently in these sectors. The research results indicate a significant correlation between the code of ethics and the attitude of professionals towards the unethical use of software in government and private sector organizations. These also indicate significant differences in government and private sectors.  相似文献   

5.
ABSTRACT

Effective information technology (IT) project managers (PMs) are recognized as being essential for project success. However, little research has focused on the roles IT PMs must play. Utilizing a qualitative field study, we found 4 IT PM archetypes (checklist, technical lead, organizational process lead, and poly-synchronous) employed in practice. We discuss our findings regarding the assignment of multiple PMs in the presence of complex IT projects and provide organizations with practical inferences to consider.  相似文献   

6.
The skill requirements for project managers in information technology (IT) projects have not been widely studied in the past, especially in terms of their relative importance. We addressed this gap in the literature by conducting a Delphi study with 19 IT project managers (PMs). Among the list of 48 skills identified, our panelists selected 19 skills as being the most critical for IT PMs and then ranked them based on their relative importance. Follow-up interviews were conducted with selected panelists to gain insights into the importance of the top-ranked IT PM skills. We compare our results with two previous studies of IT PM skills and discuss the implications for research and practice.  相似文献   

7.
With the growing role of information technology (IT), many organizations struggle with IT-related risks. Both IT managers and IT auditors are involved in assessing, monitoring, and reporting IT risks, but this does not necessarily mean that they share the same views. In this study, we draw upon the actor–observer asymmetry perspective to understand differences in IT managers’ vs. IT auditors’ perceptions of risks. Through a quasi-experiment with 76 employees of a financial institution, we found that IT managers and IT auditors showed the expected actor–observer differences. Implications for both research and practice are discussed.  相似文献   

8.
Abstract.  The adoption of packaged software is becoming increasingly common in a variety of organizations and much of the packaged software literature presents this as a straightforward, linear process based on rationalistic evaluation. This paper applies the framework of power relations developed by Markus and Bjørn-Andersen to a longitudinal study concerning the adoption of a customer relationship management package in a small organization. This is used to highlight both overt and covert power issues within the selection and procurement of the product and illustrate the interplay of power between senior management, information technology (IT) managers, IT vendors and consultants and end-users. The paper contributes to the growing body of literature on packaged software and also to our understanding of how power is deeply embedded within the surrounding processes.  相似文献   

9.
Abstract. Information technology (IT) leaders — companies that successfully exploit IT to achieve business results — generate immense interest among practitioners and academics. From a practitioner's perspective, IT leaders provide benchmarks of leading IT management practices which others may emulate to achieve success. From an academic perspective, IT leaders provide the 'data' for the creation of frameworks and theories of IT management. While US IT leaders are regularly assessed by academics, trade magazines, consultants and benchmarking firms, there has been no Europe-wide assessment of IT leadership. This neglect is detrimental to European IT practitioners and academics who may discover that American IT management practices are not transferrable in the European context. In this article, we analyse the construct, context and statistical validity of six methods for identifying European IT leaders. Based on this analysis, two methods (expert ratings and citation counts) were used to generate a preliminary list of European IT leaders and laggards. While individual experts were reticent about volunteering their ratings, their collective view appears to generate a worthwhile list with high construct validity. Citation counts represent a more accessible process for list generation, with high statistical validity. However, an attempt to correlate expert ratings with a list based on citation counts confirms that the latter has questionable construct validity.  相似文献   

10.
The academic literature on Service Oriented Architecture (SOA) governance is based on theories and assumptions rather than practices, whereas the SOA governance frameworks proposed by Information Technology (IT) vendors are made to suit their products. Research shows that the problems with SOA governance in practice are among the major reasons of SOA failures. An extensive literature review that covers SOA, IT governance and SOA governance has been carried out part of this research. The purpose of this research paper is to increase our understanding of SOA governance and to show which SOA aspects organizations should consider when adopting a SOA governance framework. Based on a literature review, this study first proposes a list of SOA aspects to be considered when implementing SOA governance. By adopting an interpretive research methodology – based on interviews with professionals and practitioners in the fields of IT governance and SOA governance – this research paper examines the importance of these aspects. The results provide a theoretical conceptualization of SOA aspects that can be used to assess SOA governance practices and provide guidance to improve them.  相似文献   

11.
Many organizations run their core business operations on decades-old legacy IT systems. Some security professionals argue that legacy IT systems significantly increase security risks because they are not designed to address contemporary cybersecurity risks. Others counter that the legacy systems might be “secure by antiquity” and argue that due to lack of adequate documentation on the systems, it is very difficult for potential attackers to discover and exploit security vulnerabilities. There is a shortage of empirical evidence on either argument. Routine activity theory (RAT) argues that an organization’s guardianship is critical for reducing security incidents. However, RAT does not well explain how organizations might guard against security risks of legacy IT systems. We theorize that organizations can enhance their guardianship by either modernizing their legacy IT systems in-house or by outsourcing them to cloud vendors. With datasets from the U.S. federal agencies, we find that agencies that have more legacy IT systems experience more frequent security incidents than others with more modern IT systems. A 1%-point increase in the proportion of IT budgets spent on IT modernization is associated with a 5.6% decrease in the number of security incidents. Furthermore, migration of the legacy systems to the cloud is negatively associated with the number of security incidents. The findings advance the literature on strategic information systems by extending RAT to explain why the “security by antiquity” argument is not valid and how organizations can reduce the security risks of legacy IT systems through modernization and migration to the cloud.  相似文献   

12.
This paper investigates performance impacts of two types of IT value practices – efficiency and knowledge management (KM) – by taking two external environmental factors – dynamism and hostility – into account. A survey of IT managers was conducted to assess the environmental conditions under which one mode of value practice or the other becomes more salient. Results suggest that despite the apparent value of knowledge management in the new economy, IT managers continue to emphasize the traditional orientation of efficiency. This tendency persists in highly dynamic and hostile industrial environments. Interestingly, however, when these environmental factors are controlled for, KM-based IT valuation clearly pays off for firm performance.  相似文献   

13.
Research on the organizational implementation of information technology (IT) and social power has favoured explanations based on issues of resource power and process power at the expense of matters of meaning power. As a result, although the existence and importance of meaning power is acknowledged, its distinctive practices and enacted outcomes remain relatively under‐theorized and under‐explored by IT researchers. This paper focused on unpacking the practices and outcomes associated with the exercise of meaning power within the IT implementation process. Our aim was to analyze the practices employed to construct meaning and enact a collective ‘definition of the situation’. We focused on framing and utilizing the signature matrix technique to represent and analyze the exercise of meaning power in practice. The paper developed and illustrated this conceptual framework using a case study of a conflictual IT implementation in a challenging public sector environment. We concluded by pointing out the situated nature of meaning power practices and the enacted outcomes. Our research extends the literature on IT and social power by offering an analytical framework distinctly suited to the analysis and deeper understanding of the meaning power properties.  相似文献   

14.
The use of IT to drive organizational change has gained momentum in today’s organizations. In response to the practical demand for guidance on managing such change, professional institutions have issued industry standards for Program Management (PgM). However, research on the applicability of PgM to manage IT-based change is scant. The present article adds to research and practice by giving insight into five IT programs that ran into difficulties and the management challenges involved.  相似文献   

15.
This paper examines the impact of the integration of IT systems with other organizations (IT integration) on the knowledge absorption and desorption of the focal firm. We ran an empirical study in Spain and found that IT integration enables the firm to absorb and desorb knowledge with other organizations, which in turn improves firm performance. This research provides two key contributions to the IS discipline: 1) We introduce the concept of desorptive capacity in the IS research and provide a scale for its measure, 2) we provide a theory of IT integration impact on the firm’s knowledge absorption and desorption.  相似文献   

16.
《Information & Management》2016,53(4):447-466
Information technology (IT) organizations use strategic IT benchmarking (SITBM) to revise IT strategies or perform internal marketing. Despite benchmarking's long tradition, many SITBM initiatives do not reveal the desired outcomes. The vast body of knowledge on benchmarking and IT management does not help overcome the challenges of successful SITBM. We therefore synthesize the existing research on IT management and benchmarking into a concept relationship map and derive future research avenues. We find that there is much literature on how to obtain SITBM results. However, research does not explain how these results are transformed into outcomes – essentially the problem many practitioners struggle with.  相似文献   

17.
This study proposes and tests a model of information technology outsourcing (ITO) capabilities as antecedents of ITO success. Building on the dynamic capabilities perspective (DCP), the model posits that ITO sensing, ITO seizing, and ITO orchestrating capabilities will influence ITO success by way of both successful reconfiguration of IT solutions and successful delivery of IT services. Building on extant ITO research, the model also hypothesizes that contract management capabilities and relationship management capabilities will influence ITO success via the successful delivery of IT services. Data from a cross-sectional survey of 152 large U.S.-based organizations in various industries were analyzed with PLS. The results support the hypothesis that successful reconfiguration mediates the effect of dynamic capabilities on ITO success. They partially support the hypothesis of successful delivery as mediator of the effect of dynamic capabilities on ITO success. The hypothesis of successful delivery as a mediator of the effect of relationship management capabilities and contract management capabilities on ITO success is supported only for relationship management capabilities. The study offers a theoretical anchoring for the conceptualization of ITO capabilities, which complements the rich and context-specific case-based literature of ITO capabilities and extends current research by adding to existing explanations of how ITO success is achieved.  相似文献   

18.
Abstract

A growing number of organizations are implementing the ITIL (IT Infrastructure Library) “best practice” framework in an attempt to improve their IT service management processes. However, not all ITIL implementations are successful and some companies have been disappointed with the outcomes. This exploratory research reports on four case studies of “successful” implementations of IT service management using the process-based ITIL V2 framework. Two companies are located in the U.S. and two in Australia. The cases demonstrate a mix of implementation justifications and strategies. Critical success factors (CSFs) suggested in the literature are compared against those attributed to these successful ITIL implementations. Some CSFs, including executive management support, interdepartmental communication and collaboration, use of consultants, training and careful software selection are confirmed. Three new CSFs are identified: creating an ITIL-friendly culture, process as a priority, and customer-focused metrics. Practitioner guidelines, to assist IT managers, who are contemplating adopting ITIL for process improvement and organisational transformation, are also provided together with some challenges encountered and their associated resolutions.  相似文献   

19.
ICT applications that include functionality for knowledge sharing are routinely used by IT service providers even though their implementation is known to be problematic and the reasons for such problems not well understood. To shed light on the issue, we collected data at two organisations where managers had provided IT service support workers with IT service management (ITSM) tools incorporating functionality for knowledge sharing. Using critical discourse analysis and rhetorical analysis techniques, we contrasted primary data representative of IT service support practice with other primary and publicly available secondary data reflecting the prevailing discourse of IT service managers. Through this analysis, we identify an apparent dissonance between ITSM managerial and worker discourses that reflect opposing epistemologies. Managers are optimistic about the benefits of ICT‐based knowledge sharing, whereas the practice of workers is revealed to privilege self‐reliance and interpersonal knowledge sharing. By taking a dual, management–worker, perspective, we provide fresh insight into why ICT‐based knowledge sharing is problematic. As a theoretical contribution, we propose that dysfunctional intra‐organisational conflict can arise where incompatible management and worker practices become institutionalised through the simultaneous diffusion of conflicting discourses.  相似文献   

20.
随着信息技术项目的大规模建设和应用,如何客观、公正地评价其效果成为各方关注的焦点。信息项目后评价已成为项目闭环管理的最后1个环节,评价工作也逐步开展起来。当前评价的重点是项目目标实现程度、项目实施组织管理、应用效果、影响与持续性。虽然通用的项目后评价方法可以应用于信息项目,但操作难度较大。因此,应重视信息项目后评价方法的研究,在实践中探索信息项目后评价的关键要素和指标,形成完善的后评价方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号