Search results for "Information Systems"
showing 10 items of 1926 documents
Student agency analytics: learning analytics as a tool for analysing student agency in higher education
2020
This paper presents a novel approach and a method of learning analytics to study student agency in higher education. Agency is a concept that holistically depicts important constituents of intentional, purposeful, and meaningful learning. Within workplace learning research, agency is seen at the core of expertise. However, in the higher education field, agency is an empirically less studied phenomenon with also lacking coherent conceptual base. Furthermore, tools for students and teachers need to be developed to support learners in their agency construction. We study student agency as a multidimensional phenomenon centring on student-experienced resources of their agency. We call the analyt…
Critical Exploration of Flexible Delivery
2020
This work-in-progress research article presents an introductory qualitative study on students' perceptions of a flexibly delivered, modular computer science course. Many contemporary approaches to education rely in various ways on flexible delivery of course content. This is often done to capitalize on modern technology and the web, and to put the student ‘in the center.' However, it is becoming manifest that these approaches may challenge both the students and the equity between them, making it important to understand the effects of flexible delivery in terms of the students. In the voice of our students, flexible delivery was seen as a largely positive approach, reducing stress, promoting…
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
2023
AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Enablers of and constraints on employees' information sharing on enterprise social media
2020
PurposeThe purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two theoretical perspectives, communication privacy management theory and the technology affordance framework, as well as on empirical data in an attempt to paint a comprehensive picture of the factors shaping employees' decisions to share or not share information on enterprise social media.Design/methodology/approachThis qualitative field study is based on semi-structured interviews and enterprise social media review data from a large Nordic media organization.FindingsOn an enterprise social media platform, privacy …
User Participation in Consulting Projects: Client and Provider Role Profiles
2005
This study presents a variation scheme of participation roles in consulting projects. Typical consulting assignments in the area known as IS planning involve strategic planning and information systems management, enterprise architecture, information management or information technology governance. Participation is a crucial issue in consulting on these issues. In the literature on participation, different roles and tasks have been found, but it is not always specified, on what types of projects or systems the results are based. The literature on consulting suggests some models for work division. In a two-phase qualitative study, we first collect possible tasks in ICT consulting projects, an…
User Involvement and Entrepreneurial Action
2007
Involving users in the innovation process is a subject of much research, experimentation, and debate. Less attention has been given to the limits to user involvement that ensue from specific organizational characteristics. This article explores barriers to the utilization of users’ input in two small companies developing interactive digital applications. We contrast our findings to earlier research involving large companies to identify features of entrepreneurial sensemaking and action that influence the utilization of users’ input. We find that the small companies follow a distinct action rationality, leading to rapid implementation of some user inputs, and defensiveness toward others. Bot…
Towards Measuring the Agility of Software Business
2018
Agile development methods have been employed across the software industry. However, it is not always clear if the used methods actually help the software firms in being more agile and if agility has a positive influence in the software firm performance. Studying these questions may turn out impossible since good measurements for assessing the overall agility of software firms do not yet exist. A need is therefore detected to measure the differences in agility between firms and finding the means to evaluate the differences in agility in reliable manner. This article examines how to measure the agility of a software firm and reports initial steps in the process of developing measurement instr…
Information system implementation model and observations - Case health care, social services and other service processes in smaller municipalities
2012
Public sector in Finland is under heavy pressure to get more efficient and customer oriented. Information systems and their development is one possibility to improve municipalities’ own processes and their service offering to the inhabitants. In this study we investigated what is the status of Information Systems in municipal governance and architecture management. The situation with systems landscape and architecture is, based on our findings, very scattered and municipals do not make their decisions, for example outsourcing decisions, in a systematic way. Based on those findings, especially in small municipalities, we created a model, which municipal ICT responsible professionals can foll…
Value Co-Destruction: A Conceptual Review and Future Research Agenda
2023
The service-dominant (S-D) logic lens for understanding value co-creation and customers’ interactive roles in the service exchange has emerged as a focal theme of interest among service academics and practitioners. While recent investigations have also focused on the process of value co-destruction—that is, how potential negative outcomes occur—the concept and its distinction from value co-creation remain unclear. This conceptual review synthesizes the concept of value co-destruction and proposes a framework consisting of two interrelated dimensions—actor–actor interaction and individual actor —and their components at three temporal points of the service encounter. We distinguish value co-…