共查询到20条相似文献,搜索用时 15 毫秒
1.
Bumsoo Kim 《Information Technology for Development》2013,19(4):706-732
This research investigated some key factors influencing an individual’s behavior to use e-learning in developing countries through social cognitive theory for examining the adoption of e-learning by instructors and learners, who are the key e-learning users. This paper focused on the personal capacity of Information and Communications Technologies and also investigated the mediating effects of computer self-efficacy (CSE) and performance expectation on intention to use e-learning. The results indicate that performance expectation and CSE were crucial factors influencing behavior intention to use e-learning systems for both instructors and learners. This study also found that computer experience and personal innovativeness in the domain of information technology were prominent factors for instructors. In addition, some differences and similarities were identified in the results for instructors and learners. This study used structure equation model, partial least squares, for data analysis, and data were collected from universities in Indonesia. 相似文献
2.
Understanding the drivers of technology adoption remains an important organizational problem. Our research focused on a personality trait that is relevant to the adoption of technological innovation: personal innovativeness in IT (PIIT). We examined the causal pathways by which this trait affects behavioral intention by testing three alternative models based on innovation diffusion theory, the theory of planned behavior, and an integrative perspective that combines them. Data were collected from 196 hospital administrators in South Korea. The target innovation was an e-commerce purchasing system. Testing across all three models resulted in complete mediation, indicating that PIIT is a strong predictor of intended use of IT but it exerts its influence by altering the mediators. Our integrative perspective provides a more complete account of the causal mechanisms underlying the relationships as well as unique insights that cannot be obtained with a single theory driven model. 相似文献
3.
Stefan Tams Jason Bennett Thatcher Kevin Craig 《The Journal of Strategic Information Systems》2018,27(2):170-190
Since the underutilization of technology often prevents organizations from reaping expected benefits from IT investments, an increasing body of literature studies how to elicit value-added, post-adoptive IT use behaviors. Such behaviors include extended and innovative feature use, both of which are exploratory in nature and can lead to improved work performance. Since these exploratory behaviors can be risky, research has directed attention to trust in technology as an antecedent to post-adoptive IT use. In parallel, research has examined how computer self-efficacy relates to post-adoptive IT use. While such research has found that both trust and efficacy can lead to value-added IT use and that they might do so interdependently, scant research has examined the interplay between these antecedents to post-adoptive IT use. Drawing on the Model of Proactive Work Behavior with a focus on its predictions about trust and efficacy, we develop a research model that integrates trust in technology and computer self-efficacy in the post-adoption context. Our model suggests that the two concepts are interdependent such that trust-related impacts on post-adoptive use behaviors unfold via computer-related self-efficacy beliefs. Contemporary tests of mediation on data from more than 350 respondents provided support for our model. Hence, our findings begin to open the black box by which trust-related impacts on post-adoptive behaviors unfold, revealing computer self-efficacy as an important mediating factor. In doing so, this study furthers understanding of how, and why, trust matters in post-adoptive usage, enabling strategic change management by elucidating the “fit” between technological characteristics and post-adoptive usage. 相似文献
4.
《Information Systems Management》2007,24(1):85-90
This research compares the views of CEOs and CIOs in the same organizations about the relative richness of four communications media (face-to-face, e-mail, business memo, telephone), and the current and future roles of IT in their organizations. Overall, CEOs are found to be more optimistic about the expected impacts of future IT projects. Organizations in which there was greater shared vision about the future role of IT also reported more frequent CEO/CIO communications utilizing communications channels perceived to be richer: face-to-face and e-mail. 相似文献
5.
Empirical studies have investigated the effect of attitude and behavior on IT acceptance in organizations but yielded ambiguous results. Possibly they have not effectively accounted for the moderating effects of experience gained through direct interaction with the target technology. We examined the moderating effect of the length of direct experience on IT acceptance relationships and constructs. Using multi-group invariance analysis, we demonstrated that relationships between key IT acceptance constructs differed, depending on the user's experience. The incorporation of direct experience can lead to convergent results and contribute to further understanding of the process. We discuss some implications from the knowledge that IT use is a dynamic process and suggest that IT management must account for direct experience in their decision making. 相似文献
6.
Ethical issues related to information systems are important to the information technology (IT) professionals. These issues are also significant for organizations and societies. Although considerable literature on IT and related ethical issues exists, a review of this literature has found little empirical research on ethical practices within the government and private sector organizations. Therefore, the objective of this paper is to draw inferences regarding such practices currently in these sectors. The research results indicate a significant correlation between the code of ethics and the attitude of professionals towards the unethical use of software in government and private sector organizations. These also indicate significant differences in government and private sectors. 相似文献
7.
Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT 总被引:2,自引:0,他引:2
The unified theory of acceptance and use of technology (UTAUT), a model of the user acceptance of IT, synthesizes elements from several prevailing user acceptance models. It has been credited with explaining a larger proportion of the variance of ‘intention to use’ and ‘usage behavior’ than do preceding models. However, it has not been validated in non-Western cultures. Using a survey sample collected from 722 knowledge workers using desktop computer applications on a voluntary basis in Saudi Arabia, we examined the relative power of a modified version of UTAUT in determining ‘intention to use’ and ‘usage behavior’. We found that the model explained 39.1% of intention to use variance, and 42.1% of usage variance. In addition, drawing on the theory of cultural dimensions, we hypothesized and tested the similarities and differences between the North American and Saudi validations of UTAUT in terms of cultural differences that affected the organizational acceptance of IT in the two societies. 相似文献
8.
Computer use and the gender gap: The issue of access, use, motivation, and performance 总被引:3,自引:2,他引:3
Since the beginning of computerization, it has been of interest whether there are differential effects on computer behavior, in particular in terms of computer access, computer use, and motivational variables, such as computer self-efficacy. The current research addresses the questions if the gender-related differences in this respect persist to the present day and if there is also a difference in actual performance characteristics. A sample of 48 university students (23 male) was administered a technology self-efficacy questionnaire, a survey on computer access, recorded a user diary, and turned in a computer task. Results show that the gender gap is closing as far as computer access and self-efficacy are concerned. Also, female and male students report comparable amounts of computer usage for their studies. User behavior appears to be gender-specific as males spend more time at the computer for personal purposes. There is also some evidence that male students outperform female students at a computer task (remastering of Power-Point slides). Conclusions for creating computer-based learning environments are discussed. 相似文献
9.
为保证企业IT基础架构的稳定可靠运行,结合ITIL理论中IT基础架构管理理念,设计了IT基础架构管理模型。在研究ITIL理论的基础上,为IT基础架构管理划分了三个层次,阐述层次划分的理由以及层次间的关系,最终形成完整的设计模型。在模型设计中,解释了传统的服务概念以及IT基础架构管理模型中使用到的服务的涵义,并且提出了在IT基础架构管理中包含的支撑和依赖关系模型。通过设计IT基础架构管理模型,可以有效的管理IT部门的基础设施,提高企业IT系统的稳定性。 相似文献
10.
Using resource dependency theory (RDT), this research analyzes how organizations control their information technology resources
to improve organizational performance. According to RDT, organizations must manage their dependency on external organizations
and limit external dependencies when resources are considered critical. The current study proposes and tests a portion of
a Strategic Control Model positing that managers seek to control important, strategic resources in order to create value for
the firm and to avoid dependency on external entities. Utilizing a research design that captured extensive quantitative data
on the control of IT functions and services, the research team gathered 5 years of data on 54 business units (BUs) in 27 global
companies located in seven countries. Study examined the linkages of these 54 BUs to firm performance. Locating the Extent
of Control within the firm in cases where the firm depends on IT as a strategic resource proves to be a good explanation for
effective decisions leading to higher performance. Viewing IT as a strategic resource alone does not lead to positive business
unit outcomes, but the moderating influence of Extent of Control is found to establish the complex statistical relationship
with business unit performance. For these reasons, it is critical that a theoretically grounded firm-wide process for decisions
on locating IT control is in place to capture business value.
Detmar Straub The J. Mack Robinson Distinguished Professor of Information Systems at Georgia State University, Detmar has conducted research in the areas of IT outsourcing, computer security, Net-enhanced organizations (e-Commerce), technological innovation, international IT studies, and IS research methods. He holds a DBA (Doctor of Business Administration) in MIS from Indiana and a Ph.D. in English from Penn State. Detmar has published over 145 papers in journals such as MIS Quarterly, Management Science, Information Systems Research, Journal of MIS, Journal of AIS, Decision Sciences Journal, Organization Science, Communications of the ACM, Information & Management, Communications of the AIS, IEEE Transactions on Engineering Management, DATA BASE, OMEGA, Academy of Management Executive, and Sloan Management Review. Detmar is Editor-in-Chief of MIS Quarterly and former Senior Editor for Information Systems Research and Journal of the AIS and Co-Editor of DATA BASE for Advances in Information Systems. He is also an Associate Editor for the Journal of International Management. In the past he has served as Associate Editor for Management Science and Information Systems Research, and Associate Publisher/Senior Editor/Associate Editor for MIS Quarterly as well as editorial board member on a variety of other journals. Former VP of Publications for the Association of Information Systems (AIS), he has held roles as co-program chair for AMCIS and ICIS and was elected an AIS fellow in 2005. Peter Weill is an MIT Senior Research Scientist and joined MIT Sloan faculty in 2000 to become director of MIT Sloan’s Center for Information Systems Research (CISR). MIT CISR is funded by sixty corporate sponsors, and undertakes practical research on how firms generate business value from IT. Peter has written award-winning books, journal articles, and case studies on how firms govern, invest in and get value from IT. Peter’s co-authored books include: Enterprise Architecture as Strategy: Creating a Foundation for Business Execution (Harvard Business School Press, July 2006), IT Governance: How Top Performers Manage IT Decision Rights for Superior Results (2004), Leveraging the New Infrastructure: How market leaders capitalize on information technology (1998) and Place to Space: Migrating to eBusiness Models, (2001) which won one of the Library Journal of America’s best business book of the year awards and was reviewed by the New York Times. Before joining Sloan as Director of CISR, Peter was Foundation Professor and Chair of Management and a member of the Board of Directors of Melbourne Business School. Peter has been an Associate Editor for MISQ and ISR and was a program co-chair for ICIS2000 in Brisbane. Kathy S. Schwaig is an Associate Professor of Information Systems and Associate Dean for Administration in the Coles College of Business at Kennesaw State University. Her research interests include information privacy, outsourcing, project management, knowledge management and electronic commerce. She also serves as a business consultant in information systems strategy. Dr. Schwaig has published in the Communications of the ACM, The Journal of Management Information Systems, DATABASE, Information and Organization, and Information Systems Research among others. 相似文献
Kathy S. SchwaigEmail: |
Detmar Straub The J. Mack Robinson Distinguished Professor of Information Systems at Georgia State University, Detmar has conducted research in the areas of IT outsourcing, computer security, Net-enhanced organizations (e-Commerce), technological innovation, international IT studies, and IS research methods. He holds a DBA (Doctor of Business Administration) in MIS from Indiana and a Ph.D. in English from Penn State. Detmar has published over 145 papers in journals such as MIS Quarterly, Management Science, Information Systems Research, Journal of MIS, Journal of AIS, Decision Sciences Journal, Organization Science, Communications of the ACM, Information & Management, Communications of the AIS, IEEE Transactions on Engineering Management, DATA BASE, OMEGA, Academy of Management Executive, and Sloan Management Review. Detmar is Editor-in-Chief of MIS Quarterly and former Senior Editor for Information Systems Research and Journal of the AIS and Co-Editor of DATA BASE for Advances in Information Systems. He is also an Associate Editor for the Journal of International Management. In the past he has served as Associate Editor for Management Science and Information Systems Research, and Associate Publisher/Senior Editor/Associate Editor for MIS Quarterly as well as editorial board member on a variety of other journals. Former VP of Publications for the Association of Information Systems (AIS), he has held roles as co-program chair for AMCIS and ICIS and was elected an AIS fellow in 2005. Peter Weill is an MIT Senior Research Scientist and joined MIT Sloan faculty in 2000 to become director of MIT Sloan’s Center for Information Systems Research (CISR). MIT CISR is funded by sixty corporate sponsors, and undertakes practical research on how firms generate business value from IT. Peter has written award-winning books, journal articles, and case studies on how firms govern, invest in and get value from IT. Peter’s co-authored books include: Enterprise Architecture as Strategy: Creating a Foundation for Business Execution (Harvard Business School Press, July 2006), IT Governance: How Top Performers Manage IT Decision Rights for Superior Results (2004), Leveraging the New Infrastructure: How market leaders capitalize on information technology (1998) and Place to Space: Migrating to eBusiness Models, (2001) which won one of the Library Journal of America’s best business book of the year awards and was reviewed by the New York Times. Before joining Sloan as Director of CISR, Peter was Foundation Professor and Chair of Management and a member of the Board of Directors of Melbourne Business School. Peter has been an Associate Editor for MISQ and ISR and was a program co-chair for ICIS2000 in Brisbane. Kathy S. Schwaig is an Associate Professor of Information Systems and Associate Dean for Administration in the Coles College of Business at Kennesaw State University. Her research interests include information privacy, outsourcing, project management, knowledge management and electronic commerce. She also serves as a business consultant in information systems strategy. Dr. Schwaig has published in the Communications of the ACM, The Journal of Management Information Systems, DATABASE, Information and Organization, and Information Systems Research among others. 相似文献
11.
1998年,IT服务外包进入中国并在过去的10年间得到蓬勃发展,成为信息系统领域研究的一个热点问题。理论上讲,IT服务外包使企业专注于其核心业务,有效降低成本,但实际上,IT外包必然会涉及风险并贯穿始终。本文站在外包委托企业的角度,通过对外包过程中存在的风险进行详细分析,得出企业在选择IT外包时应注意的问题和如何规避这些风险。 相似文献
12.
李旋 《计算机工程与设计》2011,32(10):3544-3547
在Gray-Area的基础上,通过评估分析,指出其优缺点,并针对Gray-Area存在的问题与不足,提出了解决思路:以Gray-Area为原型,按照人机交互的原则,使用Java在Netbean上进行开发,开发了Gray-Area-II。实验结果表明,Gray-Area-II相较于Gray-Area在文件的降级、信息的储存以及搜索结果的显示方式等问题上具有更优越的性能,在管理用户的个人信息上也更人性化,更加高效。 相似文献
13.
钟广锐 《数字社区&智能家居》2006,(2)
我国加入WTO以后,银行业面临着激烈的市场竞争,国内各银行纷纷扩大自身的业务范围,经营网点分布范围越来越广泛。但同时,相对于网点资源数量的不断增长,网点资源的管理却显滞后。本文将地理信息系统技术引入到银行网点管理信息系统中,论述了基于网络地理信息系统SuperMapIS的银行分布网点管理信息系统的开发过程。 相似文献
14.
钟广锐 《数字社区&智能家居》2006,(1):24-25
我国加入WTO以后,银行业面临着激烈的市场竞争,国内各银行纷纷扩大自身的业务范围,经营网点分布范围越来越广泛。但同时,相对于网点资源数量的不断增长,网点资源的管理却显滞后。本文将地理信息系统技术引入到银行网点管理信息系统中.论述了基于网络地理信息系统SuperMapIS的银行分布网点管理信息系统的开发过程。 相似文献
15.
Yun Zheng William Doll Xiaodong Deng Melvin Williams 《Behaviour & Information Technology》2018,37(4):311-319
This paper examines how organisational support influences learning management system (LMS) self-efficacy, technical support, and faculty-perceived benefits. An empirical study based upon responses from 379 instructors at several universities is conducted. Structural equation modelling is applied to develop and assess the measurement model, and analyse the relationships among the factors in the structural model. The results support the hypotheses that organisational support plays a primary role in enhancing faculty’s LMS self-efficacy and technical support. In turn, improved LMS self-efficacy and technical support lead to faculty-perceived benefits from using LMS. Implications are that universities can increase the use of LMS and achieve more effective outcomes from faculty for web-based distance learning and web-assisted course curricula by structuring their organisations to better support faculty in both technical and self-efficacy areas. 相似文献
16.
This paper addresses digital diversity among upper secondary students. Since 2006 digital skills and competence has been embedded as key competence in the Norwegian national curriculum. A sample of 593 Norwegian students from 43 upper secondary schools participated in a survey with a digital competence quiz and a self-report questionnaire. Analysis showed differences in students' digital competence and indication of digital diversity on both student and school level. A multilevel analysis reveals that cultural capital, language integration at home, self-efficacy, strategic use of information and average grades of the students predict 20% of the variation in students' digital competence score and 49% of the variation between schools' average digital competence score. 相似文献
17.
The impact of role stress fit and self-esteem on the job attitudes of IT professionals 总被引:2,自引:1,他引:2
We used person–job fit theory to examine the relationships between the match in IT developers’ preferred and perceived actual role stress (role stress fit) with job satisfaction and organizational commitment. Self-esteem was considered as either a potential moderator or mediator of those relationships. Results from surveys completed by IT developers in 12 Fortune 500 companies indicated that role stress fit was positively related to both job satisfaction and organizational commitment and that self-esteem significantly moderated the relationship between role stress fit and job satisfaction. The results of our research has provided insight into staff assignment and the design of coping interventions. 相似文献
18.
Computer and Internet technology continues to influence people’s lives, especially those of adolescents. The aim of this study was to explore the association between Internet use and adolescents’ lifestyles. With data from a cross-sectional survey conducted in China in 2009, a model revealing the effects of Internet use on adolescents’ lifestyles was established from a series of hierarchical regression analyses. The model shows that certain Internet habits, such as excessive online time, accessing the Internet in an Internet bar, and using the Internet for catharsis, are related to poor lifestyle habits in adolescents; however, using the Internet for purposes such as gaining knowledge and finding information positively predicts healthy lifestyles in adolescents. Implications regarding the relationship between Internet use and the lifestyles of adolescents are discussed. 相似文献
19.
20.
Privacy and its related variables are important determinants of customer behavior in the electronic market. This paper aims to examine the concern for customer privacy on the Internet, mainly with regard to disclosing personal information online. Furthermore, by establishing an experimental situation, we will analyze how this behavior is influenced by familiarity with the website sponsor, the level of control over the information the customer has and the sensitivity of the information requested.The results indicate that all the above-mentioned variables (except familiarity) have a significant impact on consumer online behavior. 相似文献