Search results for "Management information systems"
showing 10 items of 291 documents
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
2012
Software piracy is a major economic concern for organizations. Previous research indicates that neutralization, a form of rationalization, can help explain software piracy intentions. However, a knowledge gap exists in our understanding of which neutralization techniques most influence software piracy intention. To address this gap, we developed a model that explains the effects of neutralization techniques on software piracy intention. We included different types of deterrents (formal sanctions, shame, and moral belief) in our model because individuals may use neutralization techniques to mitigate feelings of guilt and shame, which, subsequently, reduce the deterrent effect. Our empirical …
Moving enterprise resource planning (ERP) systems to the cloud: the challenge of infrastructural embeddedness
2021
Cloud enterprise resource planning (ERP) solutions allow organizations to support and coordinate key business processes by leveraging virtualization. Nevertheless, moving ERPs to the cloud is not straightforward, and organizational cloud ERP initiatives raise multiple concerns. We conducted an in-depth systematic review of relevant research literature and identified six key concerns related to cloud ERP implementation: a) the introduction of new ERP work arrangements, b) the migration of legacy data, c) the assurance of compliance with extant rules and regulations for security, d) the continuous alignment between ERP functionality and business processes, e) the ongoing integration between E…
Information Technology–Supported value Co-Creation and Co-Destruction via social interaction and resource integration in service systems
2022
The paper develops a conceptual framework to study the constructs of information technology (IT)-supported value co-creation and co-destruction through shared processes of social interaction and resource integration as mediated by IT and embedded in interactive value formation practices. In particular, the elements of social interaction and resource integration are identified, and the role of IT is discussed. We conduct a systematic literature review and analyze the data using the service system perspective. Our research contributes by identifying the constructs of value-creating phenomena enabled by IT from the service system perspective and presenting a research agenda for further studies…
Teaching and learning business ethics in a multicultural group
2017
Cautionary Note on the Two-Step Transformation to Normality
2019
ABSTRACT Templeton and Burney (2017) proposed a two-step normality transformation as a remedy for non-normally distributed data, which are commonly found in AIS research. We argue that, rather than transforming the data toward normality, researchers should first seek to analyze and understand the sources of non-normality. Using simulated datasets, we demonstrate three sources of non-normality and their consequences for regression estimation. We then demonstrate that the two-step transformation cannot solve any of these problems and that each source of non-normality can be handled with alternative, existing techniques. We further present two empirical examples to demonstrate these issues wit…
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
2020
Abstract A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company.
PASSIM – an open source software system for managing information in biomedical studies
2007
Abstract Background One of the crucial aspects of day-to-day laboratory information management is collection, storage and retrieval of information about research subjects and biomedical samples. An efficient link between sample data and experiment results is absolutely imperative for a successful outcome of a biomedical study. Currently available software solutions are largely limited to large-scale, expensive commercial Laboratory Information Management Systems (LIMS). Acquiring such LIMS indeed can bring laboratory information management to a higher level, but often implies sufficient investment of time, effort and funds, which are not always available. There is a clear need for lightweig…
The Human Context of Information Systems
2005
In its past, IS research has focused on IT and the organizations that use IT. Human issues have been studied in HCI and the Human Factor Studies of MIS. Yet recently a new wave of attention has emerged to focus more explicitly on issues rising from the human context of information systems. Studies in this area are still scattered, but there seems to exist a common paradigmatic orientation in their basic assumptions of human beings and their interaction. The end-users of information systems should be seen holistically as physical, cognitive, emotional, and social beings, whose communication is rich and uses multiple media. These views add to and improve our understanding of information and k…
Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework
2021
Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of the main facilities when the objective is to prevent hybrid threats at the EU level and between the western countries. The main purpose of the study is to find out separating and combining factors concerning existing cyber information sharing models and information management frameworks in western countries. The aim is also to find out crucial factors, which affect the utilization of a common Early Warning System for the ECHO stakeholders. The main findings are that unclear…
A Framework for Software Risk Management
1996
We present a simple, but powerful framework for software risk management. The framework synthesizes, refines, and extends current approaches to managing software risks. We illustrate its usefulness through an empirical analysis of two software development episodes involving high risks. The framework can be used as an analytical device to evaluate and improve risk management approaches and as a practical tool to shape the attention and guide the actions of risk managers.