Search results

1 – 10 of over 2000
Article
Publication date: 21 March 2016

Mario Silic and Andrea Back

The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.

1344

Abstract

Purpose

The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.

Design/methodology/approach

The authors used quantitative method to survey 296 employees from 50 different countries by conducting and international study. Partial least squares -method was used for the latent variables latent variable analysis

Findings

The authors found that unified theory of acceptance and use of technology constructs are mainly validated where results suggests that performance expectancy and social influence are the most influential drivers in employee acceptance and use of UC&C in organizations. Social presence, influence of peers and superiors are the main factors to take into consideration when implementation UC&C technology.

Research limitations/implications

The study was not longitudinal in design, which should be addressed by a future study that includes multi-cultural dimensions with a longitudinal design

Practical implications

Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs to go over very precise and detailed planning process to ensure the right technology acceptance by users.

Originality/value

The authors close the existing research gap by providing useful insights into organizations regarding their UC&C technology adoption and use factors

Details

Measuring Business Excellence, vol. 20 no. 1
Type: Research Article
ISSN: 1368-3047

Keywords

Open Access
Article
Publication date: 11 December 2017

Jenelle Marie Clarke

Democratic therapeutic communities (TCs), use a “flattened hierarchy” model whereby staff and clients are considered to have an equal voice, sharing administrative and some…

2289

Abstract

Purpose

Democratic therapeutic communities (TCs), use a “flattened hierarchy” model whereby staff and clients are considered to have an equal voice, sharing administrative and some therapeutic responsibility. Using the sociological framework of interaction ritual chain theory, the purpose of this paper is to explain how TC client members negotiated and enforced community expectations through an analysis of power within everyday interactions outside of structured therapy.

Design/methodology/approach

The study used narrative ethnography, consisting of participant observation with two democratic communities, narrative interviews with 21 client members, and semi-structured interviews with seven staff members.

Findings

The findings indicate social interactions could empower clients to recognise their personal agency and to support one another. However, these dynamics could be destructive when members were excluded or marginalised. Some clients used their interactions at times to consolidate power amongst dominant members.

Practical implications

It is argued that the flattened hierarchy approach theoretically guiding TC principles does not operate as a flattened model in practice. Rather, a fluid hierarchy, whereby clients shift and change social positions, seems more suited to explaining how the power structure worked within the communities, including amongst the client group. Recognising the hierarchy as “fluid” may open dialogues within TCs as to whether, and how, members experience exclusion.

Originality/value

Explorations of power have not specifically focused on power dynamics between clients. Moreover, this is one of the first papers to look at power dynamics outside of structured therapy.

Details

Therapeutic Communities: The International Journal of Therapeutic Communities, vol. 38 no. 4
Type: Research Article
ISSN: 0964-1866

Keywords

Article
Publication date: 8 July 2014

Mario Silic and Andrea Back

– The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.

7875

Abstract

Purpose

The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.

Design/methodology/approach

The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences.

Findings

The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia.

Research limitations/implications

The literature review did not include some dedicated security journals (i.e. Cryptography).

Practical implications

The study reveals future directions and trend that the academia should consider.

Originality/value

Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.

Details

Information Management & Computer Security, vol. 22 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 9 November 2015

Mario Silic, Andrea Back and Dario Silic

– The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.

Abstract

Purpose

The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.

Design/methodology/approach

The authors conducted an extensive literature review followed by expert interviews and applied the method for taxonomy development.

Findings

This research has identified an integrative OSS risk taxonomy composed of 8 categories with 51 risk items.

Originality/value

This taxonomy is a very useful tool for practitioners during the decision-making process when evaluating, assessing and calculating risks related to OSS adoption. Moreover, researchers can use it as a starting point for future studies to better understand the OSS phenomenon.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 30 August 2023

Chrysostomos Apostolidis, Jane Brown and Jillian Farquhar

This study aims to explore stigma in payday borrowing by investigating how the stigma associated with using such a service may spill over and affect other people, entities and…

Abstract

Purpose

This study aims to explore stigma in payday borrowing by investigating how the stigma associated with using such a service may spill over and affect other people, entities and relationships beyond the user within a service ecosystem.

Design/methodology/approach

In-depth interviews exploring consumers’ lived experiences and stigma were combined with publicly available reports from key stakeholders within the payday loan (PDL) industry to create a qualitative, text-based data set. The transcripts and reports were then analysed following thematic protocols.

Findings

Analysis reveals that the stigma associated with using a stigmatised service spills over, affecting not only the borrower but other actors within the service ecosystem. The analysis uncovers three important interactions that spilled over between the actors within the stigmatised service ecosystem (SSE), which can be damaging, enabling or concealed.

Research limitations/implications

This study introduces and explores the concept of “SSEs” and investigates the impact of stigma beyond the dyadic relationships between service providers and users to consider the actors within the wider ecosystem. The findings reframe existing understandings about stigma, as this study finds that stigmatised services can play both a positive (enabling) and a negative (damaging) role within an ecosystem, and this study uncovers the role of stigma concealments and how they can affect relationships and value co-creation among different actors.

Practical implications

This study provides evidence for more robust policies for addressing stigma in different SSEs by mapping the effects of stigma spillover and its effects on the borrower and other actors.

Originality/value

This study contributes to reframing marketing priorities by extending existing work on consumer stigma by showing how the stigma of a PDL may spill over and affect other actors within a service ecosystem. Significantly, the interactions between the actors may have positive as well as negative outcomes.

Details

European Journal of Marketing, vol. 57 no. 10
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 12 October 2015

Björn Link and Andrea Back

The technological innovation of Software as a Service-Enterprise Resource Planning (SaaS-ERP) opens several relative advantages, which may be realized by choosing the proper…

2897

Abstract

Purpose

The technological innovation of Software as a Service-Enterprise Resource Planning (SaaS-ERP) opens several relative advantages, which may be realized by choosing the proper operation mode. Thus a company looking for a new ERP system faces the question: When and under what conditions does it make sense to choose a SaaS-ERP system? The paper aims to discuss these issues.

Design/methodology/approach

The relative advantage criterion of the diffusion of innovation theory, derived as operation mode differences, determine the conditions under which SaaS- or On-Premise-ERP is preferable: a classification of all main systemic operation mode differences between SaaS and On-Premise for the more complex ERP systems is presented. The systemic differences were identified by analytic generalization using triangulation between a literature review and a multiple case study with four ERP producers.

Findings

The most significant decision factors between ERP operation modes are flexibility, customization, cost, and operation and maintenance. General strategies have been derived by bringing the theoretical reasons together with the operation mode difference criteria. Typical criteria for selecting SaaS-ERP are a lack of IT-capacity or capabilities, as well as high need for flexibility, due to business development, seasonality, growth, collaboration and/or expansion. On-Premise-ERPs should be selected if specific or strategic resources would be outsourced or when major customization is a need.

Research limitations/implications

Case research is limited in that it reveals only ERP producers’ view and omits outlying cases.

Practical implications

The findings implicate that ERP selecting customers should consider and expand their criteria for ERP selection by operation mode criteria.

Originality/value

The classification of the most essential operation mode differences allows, for the first time, ERP selecting customers to design selection strategies. ERP selecting companies should strategically favor the operation mode that best suits their respective organizational characteristics so as to obtain the best possible support from the ERP operation modes.

Details

Journal of Enterprise Information Management, vol. 28 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 1 November 2006

Dirk vom Lehn

The purpose of this paper is to argue that social interaction fundamentally underpins how people examine, experience and make sense of museum exhibits. It seeks to reveal how…

3964

Abstract

Purpose

The purpose of this paper is to argue that social interaction fundamentally underpins how people examine, experience and make sense of museum exhibits. It seeks to reveal how people collaboratively view and make sense of artwork and other kinds of exhibit, and in particular how the ways of looking at and responding to exhibits arise in social interaction.

Design/methodology/approach

The analysis inspects in detail video‐recordings of visitors' conduct and interaction at exhibits. It draws on ethnomethodology and conversation analysis to reveal the social and sequential organisation of people's verbal, visual and bodily action and interaction.

Findings

The study finds that people explore museums and examine exhibits with companions while other visitors act and interact in the same locale. Which exhibits visitors look at and how they see and experience them is influenced by and arises in social interaction with others, be they companions or strangers. People display and share their experience of exhibits with others through verbal and bodily action and interaction.

Research limitations/implications

The findings bear on current debates in marketing research. They suggest that there is a lack of understanding of people's experience of exhibits in museums. They show how video‐based studies can address this gap in marketing research. Further studies are currently being conducted to shed light on the quality of people's experience at the exhibit‐face and how it may be enhanced by the deployment of interpretation resources, such as labels, touch‐screen and handheld systems.

Practical implications

The findings may have some implications for the work of curators, designers and exhibition evaluators. They suggest that social interaction needs to be taken into consideration when designing and deploying exhibits and interpretation resources, such as labels, touch‐screen information kiosks, hand‐held computers, etc.

Originality/value

The paper uses visual/video‐recordings as principal data and illustrates its findings by virtue of visual material. It introduces video‐based field studies as a method to examine cultural and visual consumption in museums. It employs an analytic and methodological framework from ethnomethodology and conversation analysis that previously have found little application in marketing and consumer research.

Details

European Journal of Marketing, vol. 40 no. 11/12
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 19 July 2013

Mario Silic and Andrea Back

The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.

2232

Abstract

Purpose

The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.

Design/methodology/approach

Case study methodology was used and 15 semi‐structured interviews were conducted with records and information management (RIM) and information security professionals from different types of organizations.

Findings

There are three main findings. First, stakeholder support is critical to drive the change and leverage organizational security culture. Second, records mobility with data security dimension represents the biggest challenge for RIM stakeholders. Third, mobile strategy and security framework are two must‐win areas for a successful mobile implementation.

Research limitations/implications

The paper does not include any end‐user perspective in interviews and this end‐user context is missing.

Practical implications

Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs undergo a very precise and detailed planning process to ensure the right technology acceptance by users.

Originality/value

The paper closes an existing research gap and provides useful insights to record management professionals and practitioners on factors that impact effective information governance implementation within the mobile dual‐use context.

Details

Records Management Journal, vol. 23 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

Content available
Article
Publication date: 12 October 2015

Zahir Irani and Muhammad Kamal

191

Abstract

Details

Journal of Enterprise Information Management, vol. 28 no. 6
Type: Research Article
ISSN: 1741-0398

Article
Publication date: 1 June 1998

Melissie C. Rumizen

The Second Comparative Study of Knowledge Creation Conference was held in St. Gallen, Switzerland, in June 1998. The conference focused on the development of ideas, concepts and…

1191

Abstract

The Second Comparative Study of Knowledge Creation Conference was held in St. Gallen, Switzerland, in June 1998. The conference focused on the development of ideas, concepts and perspectives that advance the theory and practice of knowledge creation. Three conference presentations are highlighted in this review.

Details

Journal of Knowledge Management, vol. 2 no. 1
Type: Research Article
ISSN: 1367-3270

Keywords

1 – 10 of over 2000