Search results for "Management information systems"
showing 10 items of 291 documents
ERP in action — Challenges and benefits for management control in SME context
2013
ERP systems have fundamentally re-shaped the way business data is collected, stored, disseminated and used throughout the world. However, the existing research in accounting has provided only relatively few empirical findings on the implications for management control when companies implement ERP systems as the technological platform. Especially scarce are the findings concerning the production phase, after implementation, when the information processes, related work practices and the new information contents can be seen as established. In this paper we explored and theorized the benefits, challenges and problems for management control when an ERP system is in use, four years after the impl…
Key Information Systems Management Issues in Estonia for the 2000s and A Comparative Analysis
2006
AbstractThis study reports key information system (IS) management issues in Estonia, for a second time since 1993. The study enlists the views of knowledgeable practitioners from both the information technology (IT) and non-IT (business managers) fields. The primary objective was to compare and contrast the findings in the previous study with the present effort. Other secondary objectives included investigating the views across professional classifications and sectors. Further, a comparison between Estonia (an emerging economy) and Norway (a developed country) was made. The findings of the study indicate the following: 1) the past decade has produced salient changes in the ranking of key IS…
Enterprise social media and cyber-slacking: A Kahn’s model perspective
2021
Abstract This study investigates the associations between enterprise social media (ESM) use, psychological conditions, and cyber-slacking in the workplace and examines the mediating role of psychological conditions between ESM use and cyber-slacking. The study utilizes Kahn’s framework to develop a research model and investigate various associations, and it employs a cross-sectional design, testing the developed research model with 277 ESM users from Chinese enterprises. The study results suggest that ESM use stimulates various psychological conditions that discourage cyber-slacking behaviors and significantly mediate the associations between ESM use and cyber-slacking.
Implications of Theories of Language for Information Systems
1985
This article demonstrates how language views can be adopted into an information systems context. We distinguish here between five language views: denotational, generative, cognitive, behavioristic, and interactionist. These views differ in their assumptions about he origin of linguistic behavior, the primary functions of language, elements of language, and the nature of linguistic knowledge. Information system development approaches can be characterized by their underlying language views. This explains great differences in development methods and research. Thus, language views have implications and should be chosen continency for a given information system context.
Toward a Unified Model of Information Security Policy Compliance
2018
Information systems security (ISS) behavioral research has produced different models to explain security policy compliance. This paper (1) reviews 11 theories that have served the majority of previous information security behavior models, (2) empirically compares these theories (Study 1), (3) proposes a unified model, called the unified model of information security policy compliance (UMISPC), which integrates elements across these extant theories, and (4) empirically tests the UMISPC in a new study (Study 2), which provided preliminary empirical support for the model. The 11 theories reviewed are (1) the theory of reasoned action, (2) neutralization techniques, (3) the health belief model,…
2016
2020
Abstract Interest in studying information systems discontinuance has been increasing lately, yet there is no consensus on what it means. To improve the situation, we conduct a comprehensive review of current literature on IS discontinuance and identify 55 studies published during 1991–2017 that specifically focus on the topic. Our conceptual analysis disentangles the process, content, and context of the phenomenon, revealing that over the course of a typical IS lifecycle, IS discontinuance may materialize at least in five distinct forms: rejection, regressive discontinuance, quitting, temporary discontinuance, and replacement. After elaborating their distinctions, we discuss their theoretic…
Executives' role in digital transformation
2022
This conceptual paper revisits and updates the concept of top management support (TMS), which has been the long-established rationale for explaining the role of top managers in digitalization activities. In our view, the concept of TMS is grounded in technological determinism, accounts for attitudinal and behavioral aspects that appear to be little more than exhortation and accepts the occasional responsibility of top managers in technology management. We consider both the crucial role that top managers may play in the digitalization process and the fact that digital technologies have become pervasive in today’s organizations. Then, we develop a model by which top managers and digital techn…
Domain-specific knowledge representation and inference engine for an intelligent tutoring system
2013
One of the most challenging steps in learning algebra is the translation of word problems into symbolic notation. This paper describes an Intelligent Tutoring System (ITS) that focuses on this stage of the problem solving process. On the one hand, a domain specific inference engine and a knowledge representation mechanism are proposed. These are based on a description language based on hypergraphs, and the idea of using conceptual schemes to represent the student's knowledge. As a result, the system is able to simultaneously: (a) represent all potential algebraic solutions to a given word problem; (b) keep track of the student's actions; (c) univocally determine the current state of the res…
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
2015
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded mixed results, leading IS security scholars and practitioners to question the validity of the conventional fear appeal framework and the manner in which fear appeal behavioral modeling theories, such as protection motivation theory (PMT), have been applied to the study of information security phenomena. We contend that the conventional fear appeal rhetorical framework is inadequate when used in the context of information security t…