首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 11 毫秒
1.
This research focuses on information technology (IT) project managers' growth mindset concerning IT project management (PM) ability and investigates how such a mindset can promote escalation of commitment to a troubled IT project. Specifically, we suggest that the growth mindset of IT PM ability promotes prospective achievement motivation and can lead IT project managers to escalate their commitment to an IT project despite negative feedback suggesting that the project may not be completed successfully. Through a series of three experiments with 351 IT project managers, we obtained consistent support for our hypotheses suggesting that the growth mindset of IT PM ability promotes IT project escalation and this effect is partially mediated by anticipated regret about project failure and anticipated likelihood of project success. In addition, in the three experiments we found that when the project involves an unfamiliar technology the indirect effect of the growth mindset of IT PM ability through anticipated likelihood of project success is stronger than when the project involves a familiar technology.  相似文献   

2.
This research aims to investigate the underlying process-based causes of e-government failure. Through the lens of actor-network theory, this paper presents a process-oriented study of the failure of Thailand’s Smart ID Card project. Adding to the extant knowledge on e-government failures that attributes this phenomenon to internal and external factors, this paper argues that the reason the project failed was a cumulative process of failure to create and maintain the actor-network. Policy implications for developing countries to efficiently manage their e-government initiatives are given, such as adopting an open principle in setting e-government project objectives and initiating the actor-network; implementing the e-government target in stages based on prepared environment; allowing an e-government system to evolve according to the degree of readiness in the information and communications technology (ICT) system design, implementation and local adoption; and including large, nationwide projects as part of a national informatization strategy.  相似文献   

3.
The provision of accessible websites is a legal requirement under the Disability Discrimination Act 1995, which applies throughout Great Britain and Northern Ireland, and the Equality (disability, etc.) (Northern Ireland) Order 2000. A survey of local e-government websites indicated that few local councils in the devolved administration of Northern Ireland offered websites which were adequately usable by people with a disability, yet most citizen-government transactions occur at the local level. Design for all has obvious commercial benefits, but it has also become a legal obligation, and application of accessible design principles should improve the online experience of all users.  相似文献   

4.
Many MMORPG offer players the possibility to become a member of a guild, a hierarchical organization of characters with common objectives. Guild membership can be beneficial to game progress, and offer opportunities for social interaction. In the current study we focus on the MMORPG World of Warcraft (WoW), with the main aim to examine whether guild commitment and players’ intention to remain in their guild can be predicted by players’ satisfaction, investments, and perceptions of alternatives to their guild. To this end, 165 WoW players completed an online questionnaire and answered questions related to their guild membership. They also completed the investment model scale which was reworded so all questions pertained to their guild and their fellow guild members. Results show that satisfaction level, quality of alternatives, and investment size significantly predict commitment level (p’s < .001), which in turn predicted likelihood of participants’ staying with their current guild (p < .001) and the number of guilds they had been a member of in the past (p < .001). Moreover, high levels of guild commitment were indicative of better mental health, whereas weekly hours of game play was negatively related to mental health. In the discussion, we conclude that interdependence theory and the investment model of commitment are applicable to online gaming environments, and we argue that commitment to one’s guild is one factor that could prevent the risks associated with online game play (i.e. problematic use).  相似文献   

5.
软件项目由于其产品的智力密集性和项目的复杂性,在开发过程中,进行风险分析时不同于一般项目有很多客观的指标可供参考,更多地是借助于专家的意见,从而使得专家意见的综合成为软件项目风险分析中一个急需解决的问题。给出了一个基于证据理论的软件项目风险分析模型,通过引入模糊评语集及该集合上的模糊效用值,使用Dempster规则更好地融合各个专家的意见,从而得出了更加合理的风险概率和风险损失评价值。该方法强调了关键专家意见在决策中的重要性,较好地解决了分析结果过于依赖专家选择的问题,从而减少了风险因素量化的复杂性,为风险控制策略的制定提供了依据。并通过算例加以验证。  相似文献   

6.
From #Pizzagate to anti-vaxxers, passing by 9/11 or Obama ‘birthers’, we have seen many communities growing on social media around conspiracy theories and thereby gaining public prominence. Debunking or presenting alternative views to conspiracy theories often fails because individuals within these communities can grow more resolute, encouraging and reinforcing their beliefs online. Instead of withering in the face of contradiction, such communities hunker down; escalating their commitment to their conspiratorial beliefs. By interacting over social media platforms, they develop a sense of a shared social identity, which in turn fosters escalating behaviours and can lead to radicalization. For some people, the choice of abandoning or moderating these beliefs is unthinkable because they are too deeply invested to quit. This study advances a second-order affordance for identity-driven escalation that explains the process of conspiracy theory radicalization within online communities. We offer a theoretical account of the way social media platforms contribute to escalating commitment to conspiracy radicalization. We show how the sequential and combined actualization of first-order affordances of the technology enables a second-order affordance for escalation.  相似文献   

7.
This paper examines channel choice and the digital divide in Egyptian electronic government or e-government. Citizens have access to a variety of service delivery channels when they initiate contact with their government, ranging from e-government to more traditional channels such as the phone and in-person visits to a government office. This paper examines the extent of use of both contact channels for citizens and the impact of the digital divide on channel use. A public opinion survey of Egyptian citizens was analyzed, and the results showed that there was a digital divide in the use of e-government by citizens. The digital divide also extended to other contact channels such as the phone and when citizens used multiple contact channels for public service delivery. The results of this study imply that for the development of e-government, especially in the context of a developing country such as Egypt, policy-makers need to understand that e-government is one of many channels that citizens can use when they initiate contact with their government. The results of this study should encourage policy-makers to recognize the importance of public service delivery in a multichannel environment. Shirin Madon is the accepting Associate Editor for this article. View all notes  相似文献   

8.
ABSTRACT

The article analyzes an open data movement in an unusual context of highly developed digital economy and widespread popularity of e-government services in a country that is universally well-known as one of the global leaders in promoting information society and electronic democracy, but paradoxically demonstrating modest results in propagating a presumably related concept of open government data. In this regard, paying special attention to the investigation of main drivers, stakeholders and challenges of the open data movement in Estonia, the author argues that a highly centralized administrative policy that has been widely used previously by authorities in advancing various technology-driven public reforms, which partly explains a truly impressive advance of this Nordic state in e-government, e-commerce, e-banking and evoting, does not necessarily lead to same effective results in the open data domain. On the contrary, the presence of established democratic institutions and developed civil society as well as an incredibly advanced and dynamic private ICTindustry that values competition and professional curiosity along with a very strong sense of patriotism and adherence to a particular neighborhood deeply rooted in Estonian society has played a much more important role in diffusing the concept rather than just traditional government directives and strategies.  相似文献   

9.
We aim to examine whether national culture has an impact on e-government development. We used methods of correlation and multiple regression to analyse two sets of index: (1) Hofstede's cultural dimension index and (2) the e-government development index of the 2010 United Nations e-government survey. We found that there is a correlation to a various degree between e-governmental development and the cultural dimensions defined by Hofstede. Of the five cultural dimensions, we found that, individualism (i.e. the extent to which an individual is integrated into a group), power distance (i.e. the extent to which a society accepts the differences and inequalities in power distribution) and long-term orientation (i.e. the extent to which a culture programs its members to accept delayed satisfaction of their material, social and emotional needs) are significantly correlated with e-government development. The implications of the findings and the strategies proposed by this study could help governments and decision makers design and implement policies that take into account cultural factors to improve e-government services and their overall development. This study confirms and supports previous research and extends the scope of, and updates the results of, similar studies in the field.  相似文献   

10.
Poor governance is among the most important causes of state failure and underdevelopment. Hence innovations and reforms in the governmental and bureaucratic apparatus are an important prerequisite for development. E-government policy initiatives have gained international validity by the donor community as a catalyst for such reforms. To be sure, the characteristics of the state model implicit in e-government applications and the economics of transition from a backward state organization to e-government are equally relevant for the success of the initiative. This study focuses on the analysis and early design of e-government solutions in a less-developed country: Jordan. It shows that implementing a general standardized ICT portfolio to support good governance proves to be a difficult task and that there are a number of risks emerging from development aid policies aimed at good governance. The paper provides suggestive evidence that e-government and the view of the minimal state put forward by international development agencies might not be conducive to rapid late development. The New Institutional Economics provides an illuminating framework for this purpose. © 2005 Wiley Periodicals, Inc.  相似文献   

11.
This study analyzes the determinants of information security that influence the adoption of Web-based integrated information systems (IIS) by government agencies in Peru. The study introduces Web-based information systems designed to formulate strategic plans for the Peruvian government. A theoretical model is proposed to test the impact of organizational factors such as deterrent efforts, severity efforts, and preventive efforts and individual factors such as perceived information security threats and security awareness on intentions to use Web-based IIS. The empirical results indicate that deterrent efforts and deterrent severity have no significant influence on use intentions of IIS, whereas preventive efforts play an important role in such intentions. Information security awareness and perceived information security threats as individual factors have a significant effect on intentions to use the system. This suggests that organizations should implement preventive efforts by introducing various information security solutions, and improve information security awareness while reducing perceived information security threats.  相似文献   

12.
Although effective project management is critical to the success of information technology (IT) projects, little empirical research has investigated skill requirements for IT project managers (PMs). This study addressed this gap by asking 19 practicing IT PMs to describe the skills that successful IT PMs exhibit. A semi-structured interview method known as the repertory grid (RepGrid) technique was used to elicit these skills. Nine skill categories emerged: client management, communication, general management, leadership, personal integrity, planning and control, problem solving, systems development and team development. Our study complements existing research by providing a richer understanding of several skills that were narrowly defined (client management, planning and control, and problem solving) and by introducing two new skill categories that had not been previously discussed (personal integrity and team development). Analysis of the individual RepGrids revealed four distinct ways in which study participants combined skill categories to form archetypes of effective IT PMs. We describe these four IT PM archetypes – General Manager, Problem Solver, Client Representative and Balanced Manager – and discuss how this knowledge can be useful for practitioners, researchers and educators. The paper concludes with suggestions for future research.  相似文献   

13.
In recent years, discussion of the provision of government services has paid particular attention to notions of customer choice and improved service delivery. However, there appears to be marked shift in the relationship between the citizen and the state moving from government being responsive to the needs of citizens to viewing citizens explicitly as customers. This paper argues that this change is being accelerated by government use of techniques like benchmarking, which have been widely used in the private sector. To illustrate this point, the paper focuses on the adoption of website benchmarking techniques by the public sector. The paper argues that the essence of these benchmarking technologies, a process comprised of both finding and producing truth, is fundamentally based on the act of classifying and draws on Martin Heidegger's etymological enquiry to reinterpret classification as a dynamic movement towards order that both creates and obfuscates truth. In so doing, it demonstrates how Heidegger's seminal ideas can be adapted for critical social research by showing that technology is more than an instrument as it has epistemic implications for what counts as truth. This stance is used as the basis for understanding empirical work reporting on a UK government website benchmarking project. Our analysis identifies the means involved in producing the classifications inherent in such benchmarking projects and relates these to the more general move that is recasting the relationship between the citizen and the state, and increasingly blurring the boundaries between the state and the private sector. Recent developments in other attempts by the UK government to use private-sector technologies and approaches indicate ways in which this move might be challenged.  相似文献   

14.
输变电工程项目建设规模不断壮大,相应的电网造价数据量也持续增加,但目前对于造价数据的挖掘处理远远不够,亟待提升造价管理的信息化水平,构建输变电工程造价“大数据”体系。本文基于大数据应用背景下输变电工程造价数据管理运用现状,分析大数据理论在工程造价管理中应用的必要性及意义,探讨了输变电工程造价数据采集、存储技术及关键影响因素技术的应用,系统梳理与总结造价数据来源类型、数据分析与处理流程、数据信息挖掘与应用方向等内容,构建了基于大数据应用的输变电工程造价系统平台,并结合实际应用案例,通过分析找到关键影响因素,采用支持向量机方法、粒子群等方法,建立起科学的造价预测模型,可为电网企业输变电工程造价管控水平的提升提供重要支撑。  相似文献   

15.
The success rate for information technology (IT) projects continues to be low. With an increasing number of IT projects in developing countries such as China, it is important to understand the risks they are experiencing on IT projects. To date, there has been little research documenting Asian perceptions of IT project risk. In this research, we examine the risks identified by Chinese senior executives (SEs) and project managers (PMs), and compare these two groups. The importance of top management support in IT projects is well documented. Prior research has shown that from the perspective of IT PMs, lack of support from SEs is the number one risk in IT projects. Surprisingly, senior executives' perceptions towards IT project risk have never been systematically examined. One reason why lack of support from senior executives continues to represent a major risk may be that senior executives themselves do not realize the critical role that they can play in helping to deliver successful projects. In this study, we use the Delphi method to compare the risk perceptions of senior executives and project managers. By comparing risk factors selected by each group, zones of concordance and discordance are identified. In terms of perceived importance ascribed to risk factors, PMs tend to focus on lower‐level risks with particular emphasis on risks associated with requirements and user involvement, whereas SEs tend to focus on higher‐level risks such as those risks involving politics, organization structure, process, and culture. Finally, approaches for dealing with risk factors that are seen as important by both SEs and PMs are provided.  相似文献   

16.
Environmental conflict analysis (henceforth ECA) has become a key factor for the viability of projects and welfare of affected populations. In this study, we propose an approach for ECA using an integrated grey clustering and entropy-weight method (The IGCEW method). The case study considered a mining project in northern Peru. Three stakeholder groups and seven criteria were identified. The data were gathered by conducting field interviews. The results revealed that for the groups urban population, rural population and specialists, the project would have a positive, negative and normal social impact, respectively. We also noted that the criteria most likely to generate environmental conflicts in order of importance were: access to drinking water, poverty, GDP per capita and employment. These results could help regional and central governments to seek appropriate measures to prevent environmental conflicts. The proposed method showed practical results and a potential for application to other types of projects.  相似文献   

17.
Abstract. In an increasingly dynamic business environment characterized by fast cycle times, shifting markets and unstable technology, a business organization’s survival hinges on its ability to align IT capabilities with business goals. To facilitate the successful introduction of new IT applications, issues of project risk must be addressed, and the expectations of multiple stakeholders must be managed appropriately. To the extent that users and developers may harbour different perceptions regarding project risk, areas of conflict may arise. By understanding the differences in how users and project managers perceive the risks, insights can be gained that may help to ensure the successful delivery of systems. Prior research has focused on the project manager’s perspective of IT project risk. This paper explores the issue of IT project risk from the user perspective and compares it with risk perceptions of project managers. A Delphi study reveals that these two stakeholder groups have different perceptions of risk factors. Through comparison with a previous study on project manager risk perceptions, zones of concordance and discordance that must be reconciled are identified.  相似文献   

18.
Driven by the complexity of new products and services, project work has become increasingly common in all types of organizations. However, research on project learning suggests that often project teams do not meet their stated objectives and, moreover, there is limited organizational learning from the experiences of project work. We use the dynamic capabilities framework to argue that building a dynamic project learning capability is useful for organizations that make extensive use of projects. We use both survey and interview data to discuss the key ways in which such a dynamic capability can be built. Our survey data demonstrate the importance of documenting project learning, but our interview data show that teams are often remiss at documenting their learning. The results from the two different approaches are synthesized using Boland & Tenkasi’s notions of perspective‐making and perspective‐taking. Importantly, combining the results from the two sets of data suggests that organizations need to emphasize the benefits from project reviews and documentation and explore ways in which the documents produced can be made more useful as boundary objects to encourage the sharing of learning across projects.  相似文献   

19.
对项目管理系统的研究现状进行了分析,并总结了企业项目管理中存在的问题,结合项目管理知识、企业的业务流程和项目管理经验,按照工作分解结构的思想,提出了分阶段逐层分解的项目计划制订模式.对任务的生命周期、交付物管理进行了重点阐述,构建了项目管理框架体系,并进行了开发和实施.任务生命周期管理,是贯穿整个系统设计的核心.  相似文献   

20.
The ongoing revolutions in e-business and progresses of IT and communication, has resulted in the increasing number of companies with formal virtual project teams. In such situation, Uncertainty analysis gains more importance, being conducted within risk management framework. In this paper, based on the six phases of risk management procedure in PMBOK methodology, a risk management process in virtual projects is introduced. In qualitative analysis phase (of PMBOK methodology), the most effective factors of project management in virtual project teams are prioritized. In quantitative analysis phase, for the very first time, “Fuzzy Linear Programming Model” is employed to assess project risks based on project life cycle. Also given time and budget constraints, a method for developing appropriate strategies of reacting to each risk factor is introduced. We use GAMS (General Algebraic Modeling System) to select these strategies. Finally, we test our model in a numerical example, as evidence.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号