首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
As an innovation that revolutionizes application delivery based on cloud-computing, software-as-a-service (SaaS) has seen a tremendous growth during the last few years. However, its diffusion is not evenly distributed: some organizational users are open to SaaS but others are still hesitant despite the huge cost saving it may bring. The behavioral impacts of SaaS are far-reaching and the new socio-technical phenomenon deserves a close look. Based on the literature review, this study proposes a tripod model of SaaS Readiness that suggests that organizational users need to get prepared from technological, organizational and environmental aspects for the adoption of SaaS. The empirical results support that all three aspects are important for SaaS adoption yet their influences vary across psychological and overt outcome variables.  相似文献   

2.
Domestic technologies, such as assistant robots, have the potential to provide considerable assistance to families in societies with aging populations and increasing labor costs. This study intends 1) to test a series of innovation adoption theories to examine which models may better predict consumer behavioral intention toward the use of domestic technologies and 2) to examine whether lead‐usership and global identity predict intentions. With the floor cleaning robots as target products of the survey and employing a sample of 299 potential consumers in Taiwan, a rapidly aging society, this study finds: 1) the theory of planned behavior (TPB) model accounts for 55% of the variance and better predicts purchase intention than the technology acceptance model and the theory of reasoned action. 2) In the nested TPB model, the effects of usefulness and ease of use on intentions are fully mediated by attitude. 3) When including 2 additional constructs, global identity and lead‐usership, the explanatory power of the extended TPB model rises from 55% to 66%. 4) Lead‐usership moderates the link between attitude and intentions, that is, the stronger the lead‐usership the weaker the effect of attitude on intentions. 5) As lead‐usership and global identity are included in the model, the impact of perceived behavioral control vanishes. 6) Subjective norms moderate (weakening) the effect of attitude on adoption intentions; thus, word of mouth and peer pressure could be powerful communication tools to persuade follower consumers to adopt domestic technologies, such as family robots.  相似文献   

3.
Over the past five years or so, pervasive computing has emerged as a new computing paradigm with a great deal of appeal. Enterprises are increasingly showing interest in deploying pervasive information technology (IT) infrastructures to realise the perceived benefits offered by this new computing paradigm. However, a return on the investment and considerations of the currently deployed infrastructure is a constraint for businesses to invest in a pervasive IT infrastructure. Realising that the economics of an investment in a new infrastructure can affect the embracing of pervasive IT, we suggest an approach that shows how the existing technology solutions available in the market and deployed in an enterprise can be used to develop a pervasive IT infrastructure, thereby protecting investments and maximising returns. We present an evolution model to systematically and incrementally achieve a pervasive IT environment, and present guidelines for evaluating which services to develop first based on evolving the existing infrastructure point of view. This work provides practical implications for enterprises as well as pointers for research.
Deependra MoitraEmail: Phone: +91-80-8520261Fax: +91-80-8520740
  相似文献   

4.
Many factors influence the adoption of cloud computing. Organizations must systematically evaluate these factors before deciding to adopt cloud-based solutions. To assess the determinants that influence the adoption of cloud computing, we develop a research model based on the innovation characteristics from the diffusion of innovation (DOI) theory and the technology-organization-environment (TOE) framework. Data collected from 369 firms in Portugal are used to test the related hypotheses. The study also investigates the determinants of cloud-computing adoption in the manufacturing and services sectors.  相似文献   

5.
The unified theory of acceptance and use of technology (UTAUT), a model of the user acceptance of IT, synthesizes elements from several prevailing user acceptance models. It has been credited with explaining a larger proportion of the variance of ‘intention to use’ and ‘usage behavior’ than do preceding models. However, it has not been validated in non-Western cultures. Using a survey sample collected from 722 knowledge workers using desktop computer applications on a voluntary basis in Saudi Arabia, we examined the relative power of a modified version of UTAUT in determining ‘intention to use’ and ‘usage behavior’. We found that the model explained 39.1% of intention to use variance, and 42.1% of usage variance. In addition, drawing on the theory of cultural dimensions, we hypothesized and tested the similarities and differences between the North American and Saudi validations of UTAUT in terms of cultural differences that affected the organizational acceptance of IT in the two societies.  相似文献   

6.
ABSTRACT

Cloud computing is gaining increasing interest as an enabling technology for improved productivity, efficiency and cost reduction. It also has the potential to add value to reliability and scalability of organisation’s systems, which would allow organisations to better focus on their core business and strategies. This research paper aimed at exploring the perceived potential for value creation from cloud computing in Australian Regional Governments. Using the Technology-Organization-Environment (TOE) framework, the Diffusion of Innovation (DOI) theory and Desires Framework (DF), a conceptual research model is devised. The key identified factors that are likely to influence adoption of cloud computing are identified along with the implications to current policies, anticipated benefits and challenges of adoption of cloud computing. The research employed a qualitative approach involving 21 in-depth interviews with Australian local councils’ IT managers. The findings of this research are mapped to the research model factors, thereby presenting and validating a number of value-adding concepts that are expected to contribute to investment decisions on cloud computing adoption.  相似文献   

7.
We propose a conceptual model for assessing the determinants of SaaS diffusion process (i.e. intention, adoption, and routinization). The conceptual model is based on three important theories of adoption at the firm level (i.e., technology-organization-environment [TOE] framework, diffusion of innovation [DOI] theory, and institutional [INT] theory). Data collected from 265 firms are used to test the conceptual model. Nine determinants are found to be statistically significant. By examining direct and total (direct and indirect) effects of the determinants, the study offers rich insight into the firm's decision to adopt and routinize SaaS.  相似文献   

8.
The use of IT to drive organizational change has gained momentum in today’s organizations. In response to the practical demand for guidance on managing such change, professional institutions have issued industry standards for Program Management (PgM). However, research on the applicability of PgM to manage IT-based change is scant. The present article adds to research and practice by giving insight into five IT programs that ran into difficulties and the management challenges involved.  相似文献   

9.
We analysed the role of industry in determining the diffusion and business value created by IT. Data was collected for this purpose by surveying 192 large enterprises in Italy. Our research revealed three findings. First, in the material services and non-hi-tech manufacturing industries, firms had a relatively limited adoption of IT, resulting in little business impact. Second, firms’ IT spending behaviour depended on their industry type and not on their IT capabilities. However their capabilities were more important than industry in explaining why firms achieved benefits from IT adoption that depended on the previous accumulation of IT resources and other capabilities. Third, industry type determined the degree to which IT affected profitability and its effectiveness in helping firms to defend their competitive advantage. Specifically, the slower the adoption of IT in an industry, the greater its impact on the firm's profitability.The implications of these findings for managers and policy-makers are discussed.  相似文献   

10.
There are various methods available for dealing with IT governance. These methods are diversified, and in some cases lengthy and complicated. This paper is concerned with providing a unified simple approach for IT governance assessment. The approach is developed and tested through the following three main steps: (1) highlighting the basic requirements of IT governance considering key available methods; (2) designing the target approach that integrates these requirements and uses knowledge management principles; and (3) illustrating the use of the approach through a typical illustrative application. The approach uses the “STOPE: Strategy, Technology, Organization, People and Environment” view to integrate the issues involved, the knowledge management principles as an added value, and the six-sigma phases as a cyclic improvement process. The work provides “fifty” main IT governance controls; and these enable finding key strengths and weaknesses of IT governance in organizations from which development directions can be derived. It should be noted that considering knowledge management, and people as a main domain in the integration view, illustrate special emphasis of the human factor in IT governance.  相似文献   

11.
Social media websites have created valuable opportunities for electronic word of mouth (eWOM) conversations. People are now able to discuss products and services of brands with their friends and acquaintances. The aim of this study is to examine the influence of these conversations in social media on consumers' purchase intentions. For this purpose, a conceptual model was developed based on the integration of Information Adoption Model (IAM) and related components of Theory of Reasoned Action (TRA). The new model, which is named as Information Acceptance Model (IACM), was validated through structural equation modelling (SEM) based on surveys of 384 university students who use social media websites. The results confirm that quality, credibility, usefulness and adoption of information, needs of information and attitude towards information are the key factors of eWOM in social media that influence consumers’ purchase intentions. Theoretical and practical implications are discussed as well as recommendations for further research.  相似文献   

12.
Even if m-learning is spreading rapidly in many regions of the world, research addressing the driving factors of m-learning adoption is in short supply. Built on the Technology Acceptance Model, this paper proposes a hypothesized model of m-learning adoption. Employing structural equation modeling technology, the model was assessed based on the data collected from 230 participants using a survey questionnaire. Results indicate that perceived near-term/long-term usefulness and personal innovativeness have significant influence on m-learning adoption intention, while perceived long-term usefulness significantly affects the perceived near-term usefulness. Personal innovativeness is a predictor of both the perceived ease of use and perceived long-term usefulness as well. Of all variables, the perceived long-term usefulness contributes to the most influential predictor of m-learning adoption. The model accounts for approximately 60.8% of the variance of behavioural intention. The results indicted that offing high-quality contents complying with students’ future targets is key to the success of m-learning in China. Both theoretical and practical implications are discussed.  相似文献   

13.
Using resource dependency theory (RDT), this research analyzes how organizations control their information technology resources to improve organizational performance. According to RDT, organizations must manage their dependency on external organizations and limit external dependencies when resources are considered critical. The current study proposes and tests a portion of a Strategic Control Model positing that managers seek to control important, strategic resources in order to create value for the firm and to avoid dependency on external entities. Utilizing a research design that captured extensive quantitative data on the control of IT functions and services, the research team gathered 5 years of data on 54 business units (BUs) in 27 global companies located in seven countries. Study examined the linkages of these 54 BUs to firm performance. Locating the Extent of Control within the firm in cases where the firm depends on IT as a strategic resource proves to be a good explanation for effective decisions leading to higher performance. Viewing IT as a strategic resource alone does not lead to positive business unit outcomes, but the moderating influence of Extent of Control is found to establish the complex statistical relationship with business unit performance. For these reasons, it is critical that a theoretically grounded firm-wide process for decisions on locating IT control is in place to capture business value.
Kathy S. SchwaigEmail:

Detmar Straub   The J. Mack Robinson Distinguished Professor of Information Systems at Georgia State University, Detmar has conducted research in the areas of IT outsourcing, computer security, Net-enhanced organizations (e-Commerce), technological innovation, international IT studies, and IS research methods. He holds a DBA (Doctor of Business Administration) in MIS from Indiana and a Ph.D. in English from Penn State. Detmar has published over 145 papers in journals such as MIS Quarterly, Management Science, Information Systems Research, Journal of MIS, Journal of AIS, Decision Sciences Journal, Organization Science, Communications of the ACM, Information & Management, Communications of the AIS, IEEE Transactions on Engineering Management, DATA BASE, OMEGA, Academy of Management Executive, and Sloan Management Review. Detmar is Editor-in-Chief of MIS Quarterly and former Senior Editor for Information Systems Research and Journal of the AIS and Co-Editor of DATA BASE for Advances in Information Systems. He is also an Associate Editor for the Journal of International Management. In the past he has served as Associate Editor for Management Science and Information Systems Research, and Associate Publisher/Senior Editor/Associate Editor for MIS Quarterly as well as editorial board member on a variety of other journals. Former VP of Publications for the Association of Information Systems (AIS), he has held roles as co-program chair for AMCIS and ICIS and was elected an AIS fellow in 2005. Peter Weill   is an MIT Senior Research Scientist and joined MIT Sloan faculty in 2000 to become director of MIT Sloan’s Center for Information Systems Research (CISR). MIT CISR is funded by sixty corporate sponsors, and undertakes practical research on how firms generate business value from IT. Peter has written award-winning books, journal articles, and case studies on how firms govern, invest in and get value from IT. Peter’s co-authored books include: Enterprise Architecture as Strategy: Creating a Foundation for Business Execution (Harvard Business School Press, July 2006), IT Governance: How Top Performers Manage IT Decision Rights for Superior Results (2004), Leveraging the New Infrastructure: How market leaders capitalize on information technology (1998) and Place to Space: Migrating to eBusiness Models, (2001) which won one of the Library Journal of America’s best business book of the year awards and was reviewed by the New York Times. Before joining Sloan as Director of CISR, Peter was Foundation Professor and Chair of Management and a member of the Board of Directors of Melbourne Business School. Peter has been an Associate Editor for MISQ and ISR and was a program co-chair for ICIS2000 in Brisbane. Kathy S. Schwaig   is an Associate Professor of Information Systems and Associate Dean for Administration in the Coles College of Business at Kennesaw State University. Her research interests include information privacy, outsourcing, project management, knowledge management and electronic commerce. She also serves as a business consultant in information systems strategy. Dr. Schwaig has published in the Communications of the ACM, The Journal of Management Information Systems, DATABASE, Information and Organization, and Information Systems Research among others.  相似文献   

14.
Abstract. The objectives of the research were to identify factors enabling or inhibiting the adoption and use of information systems and technology (IS/IT) in Portuguese manufacturing small and medium‐sized enterprises (SMEs) and understand how these factors interrelate in determining relative success in the adoption and use of IS/IT. This research elicited factors from previous quantitative and qualitative research, which had been shown to influence IS/IT adoption in SMEs in other contexts. A strategic change framework was used to structure the factors and ensure that comprehensive evidence about their nature and effects could be obtained in the empirical research. Further factors were identified by initial fieldwork, before carrying out 12 in‐depth case studies, across a range of situations – different industries, different levels of adoption and a range of degrees of success in IS/IT use. The pattern that emerged from the analysis of the data shows that certain factor combinations and relationships appear to determine the relative degrees of IS/IT success across the firms. This pattern can also be explained by interpreting the roles and relationships of the key actors involved in the process of IS/IT adoption and use. Top management perspectives and attitudes towards IS/IT adoption and use play an important role in the development of internal IS/IT competencies and provide an important contribution to the development of a context that enables IS/IT success.  相似文献   

15.
Expectations have been found to exert a significant impact on client satisfaction in outsourcing projects and have been utilized to understand how individuals accumulate experiences and develop beliefs. In this study, we examine the impact of expectations on IT outsourcing success. Although extant studies identify multiple potential expectations, the expectations construct is often viewed as unidimensional with expectations examined at a general level. Furthermore, our multidisciplinary literature review indicates a gap in the literature regarding which expectations to employ. We therefore draw upon the Expectation Confirmation Theory (ECT) to determine a parsimonious set of expectations that combine to influence outsourcing success. Through an international survey of chief information officers (CIOs) and other senior IT outsourcing practitioners, we demonstrate the impact of expectations on IT outsourcing success. Moreover, we evidence that the should, minimally acceptable, and intolerable expectations can be used to predict outsourcing success. This study contributes to the outsourcing literature, specifically, and the multidisciplinary ECT literature, generally, by evaluating the multi-faceted nature of expectations. The results have practical implications for clients and vendors engaged in IT outsourcing and those who engage in expectation management.  相似文献   

16.
Many organizations run their core business operations on decades-old legacy IT systems. Some security professionals argue that legacy IT systems significantly increase security risks because they are not designed to address contemporary cybersecurity risks. Others counter that the legacy systems might be “secure by antiquity” and argue that due to lack of adequate documentation on the systems, it is very difficult for potential attackers to discover and exploit security vulnerabilities. There is a shortage of empirical evidence on either argument. Routine activity theory (RAT) argues that an organization’s guardianship is critical for reducing security incidents. However, RAT does not well explain how organizations might guard against security risks of legacy IT systems. We theorize that organizations can enhance their guardianship by either modernizing their legacy IT systems in-house or by outsourcing them to cloud vendors. With datasets from the U.S. federal agencies, we find that agencies that have more legacy IT systems experience more frequent security incidents than others with more modern IT systems. A 1%-point increase in the proportion of IT budgets spent on IT modernization is associated with a 5.6% decrease in the number of security incidents. Furthermore, migration of the legacy systems to the cloud is negatively associated with the number of security incidents. The findings advance the literature on strategic information systems by extending RAT to explain why the “security by antiquity” argument is not valid and how organizations can reduce the security risks of legacy IT systems through modernization and migration to the cloud.  相似文献   

17.
A case study was performed examining the electronic data interchange (EDI) implementation projects of four divisions of an aerospace company. By interviewing both partners in the relationship, a business-to-business (B2B) electronic commerce (e-commerce) implementation framework was developed. The framework provides guidelines for the type of e-business partnership to be pursued based on the volume of transactions (low vs. high) and complexity of transactions (simple vs. complex). Machine-to-machine B2B solutions should be pursued when the there is a high transaction volume of simple transactions. In other situations, potential B2B solutions include: e-business pull, partner access-extranet/push, or manual e-transmission.  相似文献   

18.
ABSTRACT

A case study was performed examining the electronic data interchange (EDI) implementation projects of four divisions of an aerospace company. By interviewing both partners in the relationship, a business-to-business (B2B) electronic commerce (e-commerce) implementation framework was developed. The framework provides guidelines for the type of e-business partnership to be pursued based on the volume of transactions (low vs. high) and complexity of transactions (simple vs. complex). Machine-to-machine B2B solutions should be pursued when the there is a high transaction volume of simple transactions. In other situations, potential B2B solutions include: e-business pull, partner access-extranet/push, or manual e-transmission.  相似文献   

19.
Organizations rely on customer information to design new products and offer new services. However, people should not share their personal information online. We produced and tested a model of information disclosure. While prior work focused on the effects of trust and its relationship to risk in determining intent to disclose information, we assumed that information relevance was a critical antecedent to disclosure and that both relevance and trust could alleviate perceptions of risk associated with disclosure, thereby increasing peoples’ intentions to disclose information. We tested our model using 264 subjects in an experimental setting. The results showed the importance of relevance on intentions to disclose information – allowing us to draw implications for practice about voluntary information disclosure in online settings.  相似文献   

20.
Cloud computing and Internet of Things (IoT) are two very different technologies that are both already part of our life. Their adoption and use are expected to be more and more pervasive, making them important components of the Future Internet. A novel paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios.In this paper, we focus our attention on the integration of Cloud and IoT, which is what we call the CloudIoT paradigm. Many works in literature have surveyed Cloud and IoT separately and, more precisely, their main properties, features, underlying technologies, and open issues. However, to the best of our knowledge, these works lack a detailed analysis of the new CloudIoT paradigm, which involves completely new applications, challenges, and research issues. To bridge this gap, in this paper we provide a literature survey on the integration of Cloud and IoT. Starting by analyzing the basics of both IoT and Cloud Computing, we discuss their complementarity, detailing what is currently driving to their integration. Thanks to the adoption of the CloudIoT paradigm a number of applications are gaining momentum: we provide an up-to-date picture of CloudIoT applications in literature, with a focus on their specific research challenges. These challenges are then analyzed in details to show where the main body of research is currently heading. We also discuss what is already available in terms of platforms–both proprietary and open source–and projects implementing the CloudIoT paradigm. Finally, we identify open issues and future directions in this field, which we expect to play a leading role in the landscape of the Future Internet.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号