Search results
1 – 10 of over 3000
The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.
Abstract
Purpose
The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.
Design/methodology/approach
The authors used quantitative method to survey 296 employees from 50 different countries by conducting and international study. Partial least squares -method was used for the latent variables latent variable analysis
Findings
The authors found that unified theory of acceptance and use of technology constructs are mainly validated where results suggests that performance expectancy and social influence are the most influential drivers in employee acceptance and use of UC&C in organizations. Social presence, influence of peers and superiors are the main factors to take into consideration when implementation UC&C technology.
Research limitations/implications
The study was not longitudinal in design, which should be addressed by a future study that includes multi-cultural dimensions with a longitudinal design
Practical implications
Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs to go over very precise and detailed planning process to ensure the right technology acceptance by users.
Originality/value
The authors close the existing research gap by providing useful insights into organizations regarding their UC&C technology adoption and use factors
Details
Keywords
Democratic therapeutic communities (TCs), use a “flattened hierarchy” model whereby staff and clients are considered to have an equal voice, sharing administrative and some…
Abstract
Purpose
Democratic therapeutic communities (TCs), use a “flattened hierarchy” model whereby staff and clients are considered to have an equal voice, sharing administrative and some therapeutic responsibility. Using the sociological framework of interaction ritual chain theory, the purpose of this paper is to explain how TC client members negotiated and enforced community expectations through an analysis of power within everyday interactions outside of structured therapy.
Design/methodology/approach
The study used narrative ethnography, consisting of participant observation with two democratic communities, narrative interviews with 21 client members, and semi-structured interviews with seven staff members.
Findings
The findings indicate social interactions could empower clients to recognise their personal agency and to support one another. However, these dynamics could be destructive when members were excluded or marginalised. Some clients used their interactions at times to consolidate power amongst dominant members.
Practical implications
It is argued that the flattened hierarchy approach theoretically guiding TC principles does not operate as a flattened model in practice. Rather, a fluid hierarchy, whereby clients shift and change social positions, seems more suited to explaining how the power structure worked within the communities, including amongst the client group. Recognising the hierarchy as “fluid” may open dialogues within TCs as to whether, and how, members experience exclusion.
Originality/value
Explorations of power have not specifically focused on power dynamics between clients. Moreover, this is one of the first papers to look at power dynamics outside of structured therapy.
Details
Keywords
– The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.
Abstract
Purpose
The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.
Design/methodology/approach
The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences.
Findings
The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia.
Research limitations/implications
The literature review did not include some dedicated security journals (i.e. Cryptography).
Practical implications
The study reveals future directions and trend that the academia should consider.
Originality/value
Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.
Details
Keywords
Mario Silic, Andrea Back and Dario Silic
– The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.
Abstract
Purpose
The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.
Design/methodology/approach
The authors conducted an extensive literature review followed by expert interviews and applied the method for taxonomy development.
Findings
This research has identified an integrative OSS risk taxonomy composed of 8 categories with 51 risk items.
Originality/value
This taxonomy is a very useful tool for practitioners during the decision-making process when evaluating, assessing and calculating risks related to OSS adoption. Moreover, researchers can use it as a starting point for future studies to better understand the OSS phenomenon.
Details
Keywords
Chrysostomos Apostolidis, Jane Brown and Jillian Farquhar
This study aims to explore stigma in payday borrowing by investigating how the stigma associated with using such a service may spill over and affect other people, entities and…
Abstract
Purpose
This study aims to explore stigma in payday borrowing by investigating how the stigma associated with using such a service may spill over and affect other people, entities and relationships beyond the user within a service ecosystem.
Design/methodology/approach
In-depth interviews exploring consumers’ lived experiences and stigma were combined with publicly available reports from key stakeholders within the payday loan (PDL) industry to create a qualitative, text-based data set. The transcripts and reports were then analysed following thematic protocols.
Findings
Analysis reveals that the stigma associated with using a stigmatised service spills over, affecting not only the borrower but other actors within the service ecosystem. The analysis uncovers three important interactions that spilled over between the actors within the stigmatised service ecosystem (SSE), which can be damaging, enabling or concealed.
Research limitations/implications
This study introduces and explores the concept of “SSEs” and investigates the impact of stigma beyond the dyadic relationships between service providers and users to consider the actors within the wider ecosystem. The findings reframe existing understandings about stigma, as this study finds that stigmatised services can play both a positive (enabling) and a negative (damaging) role within an ecosystem, and this study uncovers the role of stigma concealments and how they can affect relationships and value co-creation among different actors.
Practical implications
This study provides evidence for more robust policies for addressing stigma in different SSEs by mapping the effects of stigma spillover and its effects on the borrower and other actors.
Originality/value
This study contributes to reframing marketing priorities by extending existing work on consumer stigma by showing how the stigma of a PDL may spill over and affect other actors within a service ecosystem. Significantly, the interactions between the actors may have positive as well as negative outcomes.
Details
Keywords
The technological innovation of Software as a Service-Enterprise Resource Planning (SaaS-ERP) opens several relative advantages, which may be realized by choosing the proper…
Abstract
Purpose
The technological innovation of Software as a Service-Enterprise Resource Planning (SaaS-ERP) opens several relative advantages, which may be realized by choosing the proper operation mode. Thus a company looking for a new ERP system faces the question: When and under what conditions does it make sense to choose a SaaS-ERP system? The paper aims to discuss these issues.
Design/methodology/approach
The relative advantage criterion of the diffusion of innovation theory, derived as operation mode differences, determine the conditions under which SaaS- or On-Premise-ERP is preferable: a classification of all main systemic operation mode differences between SaaS and On-Premise for the more complex ERP systems is presented. The systemic differences were identified by analytic generalization using triangulation between a literature review and a multiple case study with four ERP producers.
Findings
The most significant decision factors between ERP operation modes are flexibility, customization, cost, and operation and maintenance. General strategies have been derived by bringing the theoretical reasons together with the operation mode difference criteria. Typical criteria for selecting SaaS-ERP are a lack of IT-capacity or capabilities, as well as high need for flexibility, due to business development, seasonality, growth, collaboration and/or expansion. On-Premise-ERPs should be selected if specific or strategic resources would be outsourced or when major customization is a need.
Research limitations/implications
Case research is limited in that it reveals only ERP producers’ view and omits outlying cases.
Practical implications
The findings implicate that ERP selecting customers should consider and expand their criteria for ERP selection by operation mode criteria.
Originality/value
The classification of the most essential operation mode differences allows, for the first time, ERP selecting customers to design selection strategies. ERP selecting companies should strategically favor the operation mode that best suits their respective organizational characteristics so as to obtain the best possible support from the ERP operation modes.
Details
Keywords
The purpose of this paper is to argue that social interaction fundamentally underpins how people examine, experience and make sense of museum exhibits. It seeks to reveal how…
Abstract
Purpose
The purpose of this paper is to argue that social interaction fundamentally underpins how people examine, experience and make sense of museum exhibits. It seeks to reveal how people collaboratively view and make sense of artwork and other kinds of exhibit, and in particular how the ways of looking at and responding to exhibits arise in social interaction.
Design/methodology/approach
The analysis inspects in detail video‐recordings of visitors' conduct and interaction at exhibits. It draws on ethnomethodology and conversation analysis to reveal the social and sequential organisation of people's verbal, visual and bodily action and interaction.
Findings
The study finds that people explore museums and examine exhibits with companions while other visitors act and interact in the same locale. Which exhibits visitors look at and how they see and experience them is influenced by and arises in social interaction with others, be they companions or strangers. People display and share their experience of exhibits with others through verbal and bodily action and interaction.
Research limitations/implications
The findings bear on current debates in marketing research. They suggest that there is a lack of understanding of people's experience of exhibits in museums. They show how video‐based studies can address this gap in marketing research. Further studies are currently being conducted to shed light on the quality of people's experience at the exhibit‐face and how it may be enhanced by the deployment of interpretation resources, such as labels, touch‐screen and handheld systems.
Practical implications
The findings may have some implications for the work of curators, designers and exhibition evaluators. They suggest that social interaction needs to be taken into consideration when designing and deploying exhibits and interpretation resources, such as labels, touch‐screen information kiosks, hand‐held computers, etc.
Originality/value
The paper uses visual/video‐recordings as principal data and illustrates its findings by virtue of visual material. It introduces video‐based field studies as a method to examine cultural and visual consumption in museums. It employs an analytic and methodological framework from ethnomethodology and conversation analysis that previously have found little application in marketing and consumer research.
Details
Keywords
The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.
Abstract
Purpose
The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.
Design/methodology/approach
Case study methodology was used and 15 semi‐structured interviews were conducted with records and information management (RIM) and information security professionals from different types of organizations.
Findings
There are three main findings. First, stakeholder support is critical to drive the change and leverage organizational security culture. Second, records mobility with data security dimension represents the biggest challenge for RIM stakeholders. Third, mobile strategy and security framework are two must‐win areas for a successful mobile implementation.
Research limitations/implications
The paper does not include any end‐user perspective in interviews and this end‐user context is missing.
Practical implications
Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs undergo a very precise and detailed planning process to ensure the right technology acceptance by users.
Originality/value
The paper closes an existing research gap and provides useful insights to record management professionals and practitioners on factors that impact effective information governance implementation within the mobile dual‐use context.
Details
Keywords
Although the Turkish-US alliance has had recurrent tensions and frictions during seven decades, it is experiencing troubles that might be terminal and could also undo the economic…