Search results for "Management information systems"

showing 10 items of 291 documents

New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs

2012

Software piracy is a major economic concern for organizations. Previous research indicates that neutralization, a form of rationalization, can help explain software piracy intentions. However, a knowledge gap exists in our understanding of which neutralization techniques most influence software piracy intention. To address this gap, we developed a model that explains the effects of neutralization techniques on software piracy intention. We included different types of deterrents (formal sanctions, shame, and moral belief) in our model because individuals may use neutralization techniques to mitigate feelings of guilt and shame, which, subsequently, reduce the deterrent effect. Our empirical …

Information Systems and Managementbusiness.industrymedia_common.quotation_subjectRationalization (psychology)AppealShameComputingMilieux_LEGALASPECTSOFCOMPUTINGPublic relationsManagement Information SystemsSoftwareFeelingSanctionsSociologybusinessSocial psychologyInformation Systemsmedia_commonInformation & Management
researchProduct

Moving enterprise resource planning (ERP) systems to the cloud: the challenge of infrastructural embeddedness

2021

Cloud enterprise resource planning (ERP) solutions allow organizations to support and coordinate key business processes by leveraging virtualization. Nevertheless, moving ERPs to the cloud is not straightforward, and organizational cloud ERP initiatives raise multiple concerns. We conducted an in-depth systematic review of relevant research literature and identified six key concerns related to cloud ERP implementation: a) the introduction of new ERP work arrangements, b) the migration of legacy data, c) the assurance of compliance with extant rules and regulations for security, d) the continuous alignment between ERP functionality and business processes, e) the ongoing integration between E…

Information Systems and Managementembeddednesslcsh:Management. Industrial managementcloud enterprise resource planning (erp) implementationlcsh:HD28-70Strategy and Managementorganizational sizeinformation infrastructuretransition managementVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Management Information Systems
researchProduct

Information Technology–Supported value Co-Creation and Co-Destruction via social interaction and resource integration in service systems

2022

The paper develops a conceptual framework to study the constructs of information technology (IT)-supported value co-creation and co-destruction through shared processes of social interaction and resource integration as mediated by IT and embedded in interactive value formation practices. In particular, the elements of social interaction and resource integration are identified, and the role of IT is discussed. We conduct a systematic literature review and analyze the data using the service system perspective. Our research contributes by identifying the constructs of value-creating phenomena enabled by IT from the service system perspective and presenting a research agenda for further studies…

Information Systems and Managementkäyttäjätarvonluontiresource integrationsocial interactiontietotekniikkasosiaalinen vuorovaikutusyrityksetManagement Information Systemsvalue co-creationvalue co-destructioninformation technologysystemaattiset kirjallisuuskatsauksetInformation Systemsservice systemtietojärjestelmät
researchProduct

Teaching and learning business ethics in a multicultural group

2017

Information Systems and Managementmanagement education05 social sciencesbusiness ethicsjohtamiskoulutus050105 experimental psychologyComputer Science ApplicationsManagement Information Systemsmonikulttuurisuuscase teachingconstructivist learningkonstruktivismiLiiketaloustiede - Business and managementhigher educationManagement of Technology and Innovation0502 economics and businessyritysetiikka0501 psychology and cognitive sciencesmulticultural groupkorkeakoulupedagogiikkamixed learning050203 business & managementInternational Journal of Knowledge Management Studies
researchProduct

Cautionary Note on the Two-Step Transformation to Normality

2019

ABSTRACT Templeton and Burney (2017) proposed a two-step normality transformation as a remedy for non-normally distributed data, which are commonly found in AIS research. We argue that, rather than transforming the data toward normality, researchers should first seek to analyze and understand the sources of non-normality. Using simulated datasets, we demonstrate three sources of non-normality and their consequences for regression estimation. We then demonstrate that the two-step transformation cannot solve any of these problems and that each source of non-normality can be handled with alternative, existing techniques. We further present two empirical examples to demonstrate these issues wit…

Information Systems and Managementmedia_common.quotation_subject05 social sciencesTwo step050401 social sciences methodsTransformation (music)Management Information SystemsHuman-Computer Interaction0504 sociologyManagement of Technology and InnovationAccounting0502 economics and businessMathematical economics050203 business & managementSoftwareNormalityInformation SystemsMathematicsmedia_commonJournal of Information Systems
researchProduct

Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures

2020

Abstract A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company.

Information Systems and Managementmedia_common.quotation_subjectPrincipal (computer security)030508 substance abuseShame02 engineering and technologyInformation securityManagement Information Systems03 medical and health sciencesMultinational corporation020204 information systemsCultural diversity0202 electrical engineering electronic engineering information engineeringSanctionsInformation security policyDeterrence theoryBusiness0305 other medical scienceInformation SystemsLaw and economicsmedia_commonInformation & Management
researchProduct

PASSIM – an open source software system for managing information in biomedical studies

2007

Abstract Background One of the crucial aspects of day-to-day laboratory information management is collection, storage and retrieval of information about research subjects and biomedical samples. An efficient link between sample data and experiment results is absolutely imperative for a successful outcome of a biomedical study. Currently available software solutions are largely limited to large-scale, expensive commercial Laboratory Information Management Systems (LIMS). Acquiring such LIMS indeed can bring laboratory information management to a higher level, but often implies sufficient investment of time, effort and funds, which are not always available. There is a clear need for lightweig…

Information managementBiomedical ResearchDatabases FactualMedical Records Systems ComputerizedComputer scienceBiomedical EngineeringInformation Storage and RetrievalSample (statistics)lcsh:Computer applications to medicine. Medical informaticsBiochemistryWorld Wide WebUser-Computer InterfaceDocumentationSoftwareArtificial IntelligenceStructural BiologyConfidentialitylcsh:QH301-705.5Molecular BiologyClinical Trials as Topicbusiness.industryApplied MathematicsSubject (documents)Computer Science ApplicationsManagement information systemslcsh:Biology (General)Database Management Systemslcsh:R858-859.7Programming LanguagesUser interfacebusinessSoftware
researchProduct

The Human Context of Information Systems

2005

In its past, IS research has focused on IT and the organizations that use IT. Human issues have been studied in HCI and the Human Factor Studies of MIS. Yet recently a new wave of attention has emerged to focus more explicitly on issues rising from the human context of information systems. Studies in this area are still scattered, but there seems to exist a common paradigmatic orientation in their basic assumptions of human beings and their interaction. The end-users of information systems should be seen holistically as physical, cognitive, emotional, and social beings, whose communication is rich and uses multiple media. These views add to and improve our understanding of information and k…

Information managementCognitive scienceHuman resource management systemKnowledge managementComputer sciencebusiness.industryInformation architectureInformation technologyInformation qualityInformation mappingHuman-centered computingManagement information systemsGroup information managementInformation and Communications TechnologyPersonal information managementInformation systemInformation technology architecturebusinessProceedings of the 38th Annual Hawaii International Conference on System Sciences
researchProduct

Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework

2021

Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of the main facilities when the objective is to prevent hybrid threats at the EU level and between the western countries. The main purpose of the study is to find out separating and combining factors concerning existing cyber information sharing models and information management frameworks in western countries. The aim is also to find out crucial factors, which affect the utilization of a common Early Warning System for the ECHO stakeholders. The main findings are that unclear…

Information managementComputer securitycomputer.software_genreCritical infrastructureInformation sharing Early warning Standards ECHO projectInformation systemmedia_common.cataloged_instancestandarditEuropean unionkansallinen turvallisuuskyberturvallisuusRisk managementInformation exchangemedia_commonturvallisuuspolitiikkaearly warningbusiness.industryturvallisuusympäristöInformation sharingtietojenvaihtoECHO projectManagement information systemsinformation sharingstandardsBusinesscomputertiedonkulkuDigital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84
researchProduct

A Framework for Software Risk Management

1996

We present a simple, but powerful framework for software risk management. The framework synthesizes, refines, and extends current approaches to managing software risks. We illustrate its usefulness through an empirical analysis of two software development episodes involving high risks. The framework can be used as an analytical device to evaluate and improve risk management approaches and as a practical tool to shape the attention and guide the actions of risk managers.

Information managementEngineeringKnowledge managementbusiness.industryStrategy and ManagementSoftware developmentRisk factor (computing)Library and Information SciencesManagement information systemsSoftwareRisk analysis (engineering)Risk analysis (business)Information systembusinessRisk managementInformation SystemsJournal of Information Technology
researchProduct