Search results
1 – 8 of 8Riccardo Rialti, Giacomo Marzi, Mario Silic and Cristiano Ciappei
The purpose of this paper is to explore the effect of big data analytics-capable business process management systems (BDA-capable BPMS) on ambidextrous organizations’ agility. In…
Abstract
Purpose
The purpose of this paper is to explore the effect of big data analytics-capable business process management systems (BDA-capable BPMS) on ambidextrous organizations’ agility. In particular, how the functionalities of BDA-capable BPMS may improve organizational dynamism and reactiveness to challenges of Big Data era will be explored.
Design/methodology/approach
A theoretical analysis of the potential of BDA-capable BPMS in increasing organizational agility, with particular attention to the ambidextrous organizations, has been performed. A conceptual framework was subsequently developed. Next, the proposed conceptual framework was applied in a real-world context.
Findings
The research proposes a framework highlighting the importance of BDA-capable BPMS in increasing ambidextrous organizations’ agility. Moreover, the authors apply the framework to the cases of consumer-goods companies that have included BDA in their processes management.
Research limitations/implications
The principal limitations are linked to the need to validate quantitatively the proposed framework.
Practical implications
The value of the proposed framework is related to its potential in helping managers to fully understand and exploit the potentiality of BDA-capable BPMS. Moreover, the implications show some guidelines to ease the implementation of such systems within ambidextrous organizations.
Originality/value
The research offers a model to interpret the effects of BDA-capable BPMS on ambidextrous organizations’ agility. In this way, the research addresses a significant gap by exploring the importance of information systems for ambidextrous organizations’ agility.
Details
Keywords
Andrea Caputo, Giacomo Marzi, Jane Maley and Mario Silic
The purpose of this study is to map the intellectual structure of conflict management studies by investigating the key themes, concepts and their relationships for the period…
Abstract
Purpose
The purpose of this study is to map the intellectual structure of conflict management studies by investigating the key themes, concepts and their relationships for the period 2007-2017. The study updates the previous decade (1997-2006) investigation by Ma et al. (2008) to reflect the increased publication efforts in the field.
Design/methodology/approach
Bibliometric analysis was used to trace the development path of the extant literature. The study included activity indicators such as distribution of articles and most-cited journals; relationship indicators such as co-author analysis and keyword analysis; and the mapping of the theoretical foundations.
Findings
The analysis identified five key themes that help track the direction of conflict management research: negotiation, mediation, trust, conflict management styles and performance.
Originality/value
These themes show a wider diversification of topics in the field than in the past, corroborating previous results about the reputation and maturity of conflict management as an independent scientific field of research. This study will help scholars to improve their understanding of the evolution of conflict management studies and the direction that conflict management research is taking, in particular, identifying available avenues for future research.
Details
Keywords
The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.
Abstract
Purpose
The purpose of this paper is to reveal factors that drive the adoption and use of unified communications and collaboration (UC&C) technology in organizations.
Design/methodology/approach
The authors used quantitative method to survey 296 employees from 50 different countries by conducting and international study. Partial least squares -method was used for the latent variables latent variable analysis
Findings
The authors found that unified theory of acceptance and use of technology constructs are mainly validated where results suggests that performance expectancy and social influence are the most influential drivers in employee acceptance and use of UC&C in organizations. Social presence, influence of peers and superiors are the main factors to take into consideration when implementation UC&C technology.
Research limitations/implications
The study was not longitudinal in design, which should be addressed by a future study that includes multi-cultural dimensions with a longitudinal design
Practical implications
Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs to go over very precise and detailed planning process to ensure the right technology acceptance by users.
Originality/value
The authors close the existing research gap by providing useful insights into organizations regarding their UC&C technology adoption and use factors
Details
Keywords
In order for financial institutions to cope with increased competitive pressure from the financial technology companies, offering digital services such as a mobile service system…
Abstract
Purpose
In order for financial institutions to cope with increased competitive pressure from the financial technology companies, offering digital services such as a mobile service system (MSS) targeted for high net worth individuals (HNWIs) becomes critical. Despite long-term trustworthy relationships between HNWIs and financial advisors, studies suggest that the formation of initial trust poses a significant challenge. The purpose of this paper is to identify various features related to initial trust antecedents.
Design/methodology/approach
The study was conducted using the survey data, and employs variance-based structural equation modeling (SEM) techniques to test hypotheses.
Findings
The findings from a closed experiment with 107 participants suggest that compared to more traditional service systems, customers are more prone to the construct of service quality, and specifically professional, prompt, dependable and timely financial advice.
Originality/value
The study validated key constructs that positively influence the initial trust formation process and ultimately the intention to use in an MSS for the financial advisory. The authorts particularly emphasized the rebalancing and monitoring steps in the financial planning process between HNWIs and client advisors.
Details
Keywords
Mario Silic, Andrea Back and Dario Silic
– The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.
Abstract
Purpose
The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.
Design/methodology/approach
The authors conducted an extensive literature review followed by expert interviews and applied the method for taxonomy development.
Findings
This research has identified an integrative OSS risk taxonomy composed of 8 categories with 51 risk items.
Originality/value
This taxonomy is a very useful tool for practitioners during the decision-making process when evaluating, assessing and calculating risks related to OSS adoption. Moreover, researchers can use it as a starting point for future studies to better understand the OSS phenomenon.
Details
Keywords
– The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.
Abstract
Purpose
The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.
Design/methodology/approach
The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences.
Findings
The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia.
Research limitations/implications
The literature review did not include some dedicated security journals (i.e. Cryptography).
Practical implications
The study reveals future directions and trend that the academia should consider.
Originality/value
Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.
Details
Keywords
The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.
Abstract
Purpose
The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual‐use context.
Design/methodology/approach
Case study methodology was used and 15 semi‐structured interviews were conducted with records and information management (RIM) and information security professionals from different types of organizations.
Findings
There are three main findings. First, stakeholder support is critical to drive the change and leverage organizational security culture. Second, records mobility with data security dimension represents the biggest challenge for RIM stakeholders. Third, mobile strategy and security framework are two must‐win areas for a successful mobile implementation.
Research limitations/implications
The paper does not include any end‐user perspective in interviews and this end‐user context is missing.
Practical implications
Awareness through education and training of employees needs to be given very particular attention in the future mobile implementations. Moreover, management and employee support is the critical component of the effective information security governance framework implementation. Finally, mobile strategy needs undergo a very precise and detailed planning process to ensure the right technology acceptance by users.
Originality/value
The paper closes an existing research gap and provides useful insights to record management professionals and practitioners on factors that impact effective information governance implementation within the mobile dual‐use context.
Details
Keywords
Manlio Del Giudice, Pedro Soto-Acosta, Elias Carayannis and Veronica Scuotto