Search results

1 – 8 of 8
Article
Publication date: 22 June 2018

Riccardo Rialti, Giacomo Marzi, Mario Silic and Cristiano Ciappei

The purpose of this paper is to explore the effect of big data analytics-capable business process management systems (BDA-capable BPMS) on ambidextrous organizations’ agility. In…

3664

Abstract

Purpose

The purpose of this paper is to explore the effect of big data analytics-capable business process management systems (BDA-capable BPMS) on ambidextrous organizations’ agility. In particular, how the functionalities of BDA-capable BPMS may improve organizational dynamism and reactiveness to challenges of Big Data era will be explored.

Design/methodology/approach

A theoretical analysis of the potential of BDA-capable BPMS in increasing organizational agility, with particular attention to the ambidextrous organizations, has been performed. A conceptual framework was subsequently developed. Next, the proposed conceptual framework was applied in a real-world context.

Findings

The research proposes a framework highlighting the importance of BDA-capable BPMS in increasing ambidextrous organizations’ agility. Moreover, the authors apply the framework to the cases of consumer-goods companies that have included BDA in their processes management.

Research limitations/implications

The principal limitations are linked to the need to validate quantitatively the proposed framework.

Practical implications

The value of the proposed framework is related to its potential in helping managers to fully understand and exploit the potentiality of BDA-capable BPMS. Moreover, the implications show some guidelines to ease the implementation of such systems within ambidextrous organizations.

Originality/value

The research offers a model to interpret the effects of BDA-capable BPMS on ambidextrous organizations’ agility. In this way, the research addresses a significant gap by exploring the importance of information systems for ambidextrous organizations’ agility.

Details

Business Process Management Journal, vol. 24 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 12 October 2018

Andrea Caputo, Giacomo Marzi, Jane Maley and Mario Silic

The purpose of this study is to map the intellectual structure of conflict management studies by investigating the key themes, concepts and their relationships for the period…

8225

Abstract

Purpose

The purpose of this study is to map the intellectual structure of conflict management studies by investigating the key themes, concepts and their relationships for the period 2007-2017. The study updates the previous decade (1997-2006) investigation by Ma et al. (2008) to reflect the increased publication efforts in the field.

Design/methodology/approach

Bibliometric analysis was used to trace the development path of the extant literature. The study included activity indicators such as distribution of articles and most-cited journals; relationship indicators such as co-author analysis and keyword analysis; and the mapping of the theoretical foundations.

Findings

The analysis identified five key themes that help track the direction of conflict management research: negotiation, mediation, trust, conflict management styles and performance.

Originality/value

These themes show a wider diversification of topics in the field than in the past, corroborating previous results about the reputation and maturity of conflict management as an independent scientific field of research. This study will help scholars to improve their understanding of the evolution of conflict management studies and the direction that conflict management research is taking, in particular, identifying available avenues for future research.

Details

International Journal of Conflict Management, vol. 30 no. 1
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 21 March 2016

Mario Silic and Andrea Back

The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.

1343

Abstract

Purpose

The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.

Design/methodology/approach

The authors used quantitative method to survey 296 employees from 50 different countries by conducting and international study. Partial least squares -method was used for the latent variables latent variable analysis

Findings

The authors found that unified theory of acceptance and use of technology constructs are mainly validated where results suggests that performance expectancy and social influence are the most influential drivers in employee acceptance and use of UC&C in organizations. Social presence, influence of peers and superiors are the main factors to take into consideration when implementation UC&C technology.

Research limitations/implications

The study was not longitudinal in design, which should be addressed by a future study that includes multi-cultural dimensions with a longitudinal design

Practical implications

Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs to go over very precise and detailed planning process to ensure the right technology acceptance by users.

Originality/value

The authors close the existing research gap by providing useful insights into organizations regarding their UC&C technology adoption and use factors

Details

Measuring Business Excellence, vol. 20 no. 1
Type: Research Article
ISSN: 1368-3047

Keywords

Article
Publication date: 8 May 2018

Mario Silic and Christian Ruf

In order for financial institutions to cope with increased competitive pressure from the financial technology companies, offering digital services such as a mobile service system…

1421

Abstract

Purpose

In order for financial institutions to cope with increased competitive pressure from the financial technology companies, offering digital services such as a mobile service system (MSS) targeted for high net worth individuals (HNWIs) becomes critical. Despite long-term trustworthy relationships between HNWIs and financial advisors, studies suggest that the formation of initial trust poses a significant challenge. The purpose of this paper is to identify various features related to initial trust antecedents.

Design/methodology/approach

The study was conducted using the survey data, and employs variance-based structural equation modeling (SEM) techniques to test hypotheses.

Findings

The findings from a closed experiment with 107 participants suggest that compared to more traditional service systems, customers are more prone to the construct of service quality, and specifically professional, prompt, dependable and timely financial advice.

Originality/value

The study validated key constructs that positively influence the initial trust formation process and ultimately the intention to use in an MSS for the financial advisory. The authorts particularly emphasized the rebalancing and monitoring steps in the financial planning process between HNWIs and client advisors.

Details

International Journal of Bank Marketing, vol. 36 no. 3
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 9 November 2015

Mario Silic, Andrea Back and Dario Silic

– The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.

Abstract

Purpose

The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.

Design/methodology/approach

The authors conducted an extensive literature review followed by expert interviews and applied the method for taxonomy development.

Findings

This research has identified an integrative OSS risk taxonomy composed of 8 categories with 51 risk items.

Originality/value

This taxonomy is a very useful tool for practitioners during the decision-making process when evaluating, assessing and calculating risks related to OSS adoption. Moreover, researchers can use it as a starting point for future studies to better understand the OSS phenomenon.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 July 2014

Mario Silic and Andrea Back

– The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.

7875

Abstract

Purpose

The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.

Design/methodology/approach

The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences.

Findings

The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia.

Research limitations/implications

The literature review did not include some dedicated security journals (i.e. Cryptography).

Practical implications

The study reveals future directions and trend that the academia should consider.

Originality/value

Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.

Details

Information Management & Computer Security, vol. 22 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 19 July 2013

Mario Silic and Andrea Back

The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.

2232

Abstract

Purpose

The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.

Design/methodology/approach

Case study methodology was used and 15 semi‐structured interviews were conducted with records and information management (RIM) and information security professionals from different types of organizations.

Findings

There are three main findings. First, stakeholder support is critical to drive the change and leverage organizational security culture. Second, records mobility with data security dimension represents the biggest challenge for RIM stakeholders. Third, mobile strategy and security framework are two must‐win areas for a successful mobile implementation.

Research limitations/implications

The paper does not include any end‐user perspective in interviews and this end‐user context is missing.

Practical implications

Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs undergo a very precise and detailed planning process to ensure the right technology acceptance by users.

Originality/value

The paper closes an existing research gap and provides useful insights to record management professionals and practitioners on factors that impact effective information governance implementation within the mobile dual‐use context.

Details

Records Management Journal, vol. 23 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

Abstract

Details

Business Process Management Journal, vol. 24 no. 5
Type: Research Article
ISSN: 1463-7154

1 – 8 of 8