Joey F. George, Kevin Scheibe, Anthony M. Townsend and Brian Mennecke
This paper aims to investigate the extent to which newly agile organizations followed 2001’s Agile Manifesto, especially in terms of the 12 principles of the agile approach, as…
Abstract
Purpose
This paper aims to investigate the extent to which newly agile organizations followed 2001’s Agile Manifesto, especially in terms of the 12 principles of the agile approach, as included in the Manifesto.
Design/methodology/approach
The authors conducted in-depth case studies of groups in three large business organizations that had recently adopted agile. Two researchers spent one day at each site, attending daily standups and conducting interviews with managers, developers and customers.
Findings
Across the three organizations, developers were faithful to two agile principles: the primacy of delivering valuable software continually and regular reflections on the process with an eye toward improvement. The developers were uniformly unfaithful to the principle that requires face-to-face communication. Each organization varied in their adherence to the remaining nine principles. Obstacles to faithful adoption included the experience of the organization with agile, the extent to which the industry was regulated and the extent to which developers and customers were physically dispersed.
Originality/value
While past research on agile development is extensive, this paper examines perspectives on the method and its adoption through the lens of the original Agile Manifesto and its 12 principles. The principles were grouped into three broader categories – software delivery, people and process – to provide additional insights and to sharpen the analysis.
Details
Keywords
This article revisits Nicolas Carr's popular Harvard Review article IT Doesn't Matter on its ten-year anniversary. The purpose is to analyze Carr's argument by analyzing the…
Abstract
Purpose
This article revisits Nicolas Carr's popular Harvard Review article IT Doesn't Matter on its ten-year anniversary. The purpose is to analyze Carr's argument by analyzing the development of the argument itself as opposed to finding exceptions to the argument, which has been done in the past.
Design/methodology/approach
The authors use co-evolutionary theory as a case against Carr's argument by showing that Carr has only looked at the growth of IT from a population ecology perspective and has failed to anticipate the adaptive nature of IT within the organization.
Findings
The authors show that Carr's new rules for IT management may not be applicable if viewed through the lens of the three principles of self-renewing organizations espoused by co-evolutionary theory.
Research limitations/implications
The authors provide a new basis for evaluating the strategic nature of IT and offer a background for future research and case studies into evaluating IT strategic competitive advantage within the organization.
Practical implications
The research provides guidelines for organizations to better decide how to strategically implement IT to more fully utilize its capabilities.
Originality/value
The paper provides a new method for refuting a popular article by attacking the argument as opposed to finding exceptions to the argument. This is valuable to those who wish to evangelize the strategic capacity of IT within the organization.
Details
Keywords
Shu Schiller, Fiona Fui-Hoon Nah, Andy Luse and Keng Siau
The gender composition of teams remains an important yet complex element in unlocking the success of collaboration and performance in the metaverse. In this study, the authors…
Abstract
Purpose
The gender composition of teams remains an important yet complex element in unlocking the success of collaboration and performance in the metaverse. In this study, the authors examined the collaborations of same- and mixed-gender dyads to investigate how gender composition influences perceptions of the dyadic collaboration process and outcomes at both the individual and team levels in the metaverse.
Design/methodology/approach
Drawing on expectation states theory and social role theory, the authors hypothesized differences between dyads of different gender compositions. A blocked design was utilized where 432 subjects were randomly assigned to teams of different gender compositions: 101 male dyads, 59 female dyads and 56 mixed-gender dyads. Survey responses were collected after the experiment.
Findings
Multilevel multigroup analyses reveal that at the team level, male dyads took on the we-impress manifestation to increase satisfaction with the team solution. In contrast, female and mixed-gender dyads adopted the we-work-hard-on-task philosophy to increase satisfaction with the team solution. At the individual level, impression management is the key factor associated with trust in same-gender dyads but not in mixed-gender dyads.
Originality/value
As one of the pioneering works on gender effects in the metaverse, our findings shed light on two fronts in virtual dyadic collaborations. First, the authors offer a theoretically grounded and gendered perspective by investigating male, female and mixed-gender dyads in the metaverse. Second, the study advances team-based theory and deepens the understanding of gender effects at both the individual and team levels (multilevel) in a virtual collaboration environment.
Details
Keywords
The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life implications, as…
Abstract
Purpose
The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life implications, as well as to recommend ways in which the threat may be mitigated.
Design/methodology/approach
The methodology adopted consisted of an extensive literature review on topics to include cyber crime, virtual worlds, and financial crime.
Findings
Virtual worlds such as Second Life play a key role in supporting real world activities such as education, training and business and as such, should not be dismissed purely as a “gaming” environment. In addition, emerging technologies coupled with the lack of legislation and regulation within virtual worlds has created an environment where a variety of crimes can be committed without fear of detection or prosecution. A further concern is its use by criminals as a vehicle to mask real life crimes such as fraud, identify theft and money laundering. The question is to what extent the blurring of the virtual and real life environments can be clarified in order to minimise the risk of abuse of virtual environments by criminal elements, which have direct consequences in the real world.
Originality/value
This paper serves as a useful guide to alert and educate security professionals, the judiciary, law enforcement and policy makers of the significance and the extent of the use of “virtual” environments in cyberspace for criminal means, such as fraud and money laundering. Findings are supported by a conclusion which includes recommendations for tackling these issues.