Search results

1 – 10 of over 3000
Book part
Publication date: 10 October 2006

Stuart Eimer

The Congress of Industrial Organizations’ (CIO) choice to build a labor party in New York was facilitated by an unusual institutional context that permitted unions to back a labor…

Abstract

The Congress of Industrial Organizations’ (CIO) choice to build a labor party in New York was facilitated by an unusual institutional context that permitted unions to back a labor party while simultaneously endorsing other party's candidates. Though the CIO–ALP (American Labor Party) became a major political force in New York, CIO links to the party were ultimately severed after factions in the CIO–ALP opted to back a third party presidential candidacy. The rise and fall of the CIO–ALP highlights the need to be attentive to institutional context when explaining organized labor's “exceptional” choice to forgo building a national labor party in the United States.

Details

Political Power and Social Theory
Type: Book
ISBN: 978-1-84950-437-9

Book part
Publication date: 19 March 2024

John Thomas Flynn and Lloyd Levine

A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new…

Abstract

A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new technology seamlessly and quickly to deliver for customers, the government struggles to accomplish technology purchases and integrations with the same ease. As governments in the United States are looking to retain their current workforce and attract the next generation of workers, the technological capabilities and ethos of governments will be paramount. With nearly every industry being transformed by technology and Generation T being the first generation to have an ingrained “technology first” mindset, the ability of governments to attract these workers depends, in large part, on the ability to transform their government technology culture, policies, and practices.

In this chapter, the authors examine the administrative branch and observe two key components at the root of most technology failures: poor organizational structure in the bureaucracy and the lack of an empowered Chief Information/Technology Officer. Building upon case studies from Massachusetts and California, this chapter looks at the factors related to failure or success to understand the technology procurement culture. The chapter concludes by presenting four key “best practice” principles of public policy and administration that can be implemented by almost any governmental entity to improve their acquisition and implementation of technology.

Details

Technology vs. Government: The Irresistible Force Meets the Immovable Object
Type: Book
ISBN: 978-1-83867-951-4

Keywords

Book part
Publication date: 6 May 2003

José-Marie Griffiths

During the 1980s, as organizational uses of information technology (IT) increased in both number of users and amount of use, and as more technology options presented themselves…

Abstract

During the 1980s, as organizational uses of information technology (IT) increased in both number of users and amount of use, and as more technology options presented themselves, organizations began to appoint senior personnel as “technology czars.” For executives outside the IT industry, particularly those focused on other aspects of running an enterprise (various business units, finance, human resources, etc.), the IT world seemed to be chaotic, out of control and full of terminological confusion. IT budgets and expenditures were growing rapidly and demands for service continued to increase both in scale and scope. Meanwhile organizational IT units seemed unresponsive, and curiously resistant to change. Central IT units in universities seemed stuck in the mainframe culture of home-grown, customized system development and controlled access at a time when distributed client-server computing offered the promise of low cost, local control and agility. As a result, many local IT support units evolved throughout academic institutions, placing even greater demand on scarce institutional resources and fuelling the potentially explosive tension between central administrative and local authority.

Details

Advances in Library Administration and Organization
Type: Book
ISBN: 978-1-84950-206-1

Book part
Publication date: 30 December 2004

John Logan

The campaign for striker replacement legislation, which began in the late 1980s and had effectively ended by the mid-1990s, was the most important political battle over labor…

Abstract

The campaign for striker replacement legislation, which began in the late 1980s and had effectively ended by the mid-1990s, was the most important political battle over labor legislation since the defeat of the Labor Law Reform Bill in 1978. Striker replacement was the AFL-CIO’s top legislative priority in the early 1990s and, coming quickly after the passage of NAFTA, which labor had opposed, the defeat of its campaign solidified organized labor’s reputation for failure in legislative battles. As yet, however, the political campaign for striker replacement legislation has attracted surprisingly little attention from industrial relations scholars.

Details

Advances in Industrial & Labor Relations
Type: Book
ISBN: 978-1-84950-305-1

Article
Publication date: 10 January 2024

Gaurav Bansal and Zhuoli Axelton

IT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and…

Abstract

Purpose

IT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.

Design/methodology/approach

A controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.

Findings

The findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.

Research limitations/implications

This study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).

Practical implications

This study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.

Social implications

This study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.

Originality/value

This study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect. In addition, the study elucidates how gender roles shape employees' responses to different leadership styles through gender stereotyping and internalization.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 15 August 2022

Serdar Turedi and Asligul Erkan-Barlow

The purpose of this paper is to examine the effects of managerial myopia on information technology (IT) investment. Specifically, it aims to investigate the influence of chief…

Abstract

Purpose

The purpose of this paper is to examine the effects of managerial myopia on information technology (IT) investment. Specifically, it aims to investigate the influence of chief information officer (CIO) compensation on IT investment and the moderating role of the board monitoring strength on this relationship.

Design/methodology/approach

The study examines a sample of 194 firms listed on US stock exchanges with a CIO position in 2019. The authors employ hierarchical regression analysis to test the hypothesis.

Findings

The results show that CIO compensation negatively influences IT investment. Further, even though vigilant board monitoring does not necessarily reduce such opportunistic behaviors, weak board monitoring creates an environment for such actions.

Research limitations/implications

First, the cross-sectional data can limit the results' generalizability. Second, the sampling frame is not perfectly random as it consists of firms that have CIO compensation information in the ExecuComp for 2019. Third, we include only two measures of board monitoring strength.

Practical implications

Board of directors should wisely select compensation packages' components since equity incentives potentially exacerbate managerial myopia. Moreover, firms may regulate CIOs' investment behaviors through board-level IT governance.

Originality/value

This study is one of the few studies that utilize CIO sensitivity to measure CIO compensation. Moreover, by examining the factors affecting IT investment behavior, this study sheds light on CIO incentives' impact on IT investment behaviors. Finally, to the best of the authors' knowledge, this is the first study to investigate board monitoring's role in the relationship between CIO sensitivity and IT investment intensity.

Details

Review of Behavioral Finance, vol. 15 no. 6
Type: Research Article
ISSN: 1940-5979

Keywords

Article
Publication date: 3 March 2023

Rocky Chung-Ngam Cheng, Xiaohua Men, J.J. Po-An Hsieh, Zhuo June Cheng, Xiaocong Cui, Tiange Wang and Sheng-Hsun Hsu

In the era of the digital economy, organizations are under much pressure to justify their information technology (IT) spending on digital transformation. Some organizations have…

Abstract

Purpose

In the era of the digital economy, organizations are under much pressure to justify their information technology (IT) spending on digital transformation. Some organizations have thus implemented IT chargeback, an IT governance (ITG) mechanism, to clarify and allocate IT costs among various business units. While practitioners have stressed the importance of IT chargeback, there has been little theoretical effort that investigates its strategic effects and boundary conditions.

Design/methodology/approach

Synthesizing the ITG literature and the resource-based view (RBV), the authors develop a research model to examine if IT chargeback affects IT–business strategic alignment and, in turn, organizational performance and how human IT resources strengthen the impacts of IT chargeback. The authors designed a survey to collect data from 103 firms and tested the model using partial least squares (PLS).

Findings

The authors found that IT chargeback promoted strategic alignment and then organizational performance only for firms with business-competent chief information officers (CIOs), rather than IT-competent business executives.

Originality/value

This study enriches the ITG literature by exploring the strategic value of an IT cost governance mechanism (i.e. IT chargeback). This study further proposes and validates a measure of IT chargeback. Drawing on the RBV, this study quantitatively investigates the strategic impacts and boundary contingencies of IT chargeback. This study also advances the CIO literature by identifying the strategic leading role, instead of the traditional supporting role, of CIOs in modern organizations.

Details

Internet Research, vol. 33 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 16 August 2013

Johan Magnusson and Bendik Bygstad

IT governance has become the recognized norm system for chief information officers. The purpose of this paper is to understand how CIOs relate to these norms, by studying how they…

Abstract

Purpose

IT governance has become the recognized norm system for chief information officers. The purpose of this paper is to understand how CIOs relate to these norms, by studying how they legitimate incompliance with the norms.

Design/methodology/approach

The paper uses an interpretive, qualitative, structured interview study with 18 CIOs in large Swedish organizations regarded as having excellent IT governance practice, using motive talk as analytical lens to identify the informants’ relationship to norms.

Findings

The study identifies norm‐specific patterns for how CIOs legitimate incompliance with IT governance, finding that CIOs use a combination of excuse and justifications as strategies of legitimation. The study also finds that CIOs display a tendency of not contesting IT governance‐related norms unless these are in conflict with neighboring professional jurisdictions. This is regarded as an identification of the “margins” of IT governance.

Research limitations/implications

The study illustrates how the theory of motive talk is a viable road ahead for future studies of IT professionals. The generalizability of the identified patterns of legitimation is limited by the selection of large organizations with solely male CIOs, as well as the selection of solely organizations that have succeeded in establishing external legitimacy concerning IT governance and the organizations being Swedish.

Practical implications

CIOs aspiring to increase their legitimacy should avoid direct conflicts with neighboring professions. In addition to this, they should also aspire to be clear in a separation of motive talk and actual practice, since full norm compliance may be detrimental to their factual operations.

Originality/value

The originality of this paper lies in the methodological approach of combining motive talk and speech acts to investigate CIO legitimation practices.

Details

Information Technology & People, vol. 26 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 May 2020

Wafa Bouaynaya

The purpose of this paper is to contribute to a growing body of research on information systems security, by studying open source alternatives for cloud computing. Several…

Abstract

Purpose

The purpose of this paper is to contribute to a growing body of research on information systems security, by studying open source alternatives for cloud computing. Several questions have been raised about the reliability of these promising but ambiguous offers, as the adoption of a cloud solution within an enterprise is generally accompanied by a change in the chief information officer (CIOs) role and loss of expertise.

Design/methodology/approach

The research uses a mixed research methodology: a first step is based on a questionnaire survey to investigate the security aspects of open source and understand the role of CIOs in the migration process. The investigation involved nearly 800 companies operating in the cloud computing sector in 16 European countries between November 2015 and January 2016. Then, this paper completes the research with a qualitative study by examining the activity of two sample companies.

Findings

Research confirms that open source cloud solutions offer a higher level of security than proprietary solutions. It is also noted that the role of CIOs is delegated to a third external actor: a transition CIO. Transition CIO is the guarantor of the strategic and security choices of small and medium enterprises.

Research limitations/implications

These findings have important implications and great value to managers and cloud computing providers, in terms of formulating better cloud computing solutions. This study can also assist in increasing their understanding of the new role of CIO in the migration process to cloud computing.

Originality/value

This study contributes to the body of research on cloud computing. It is first of its kind with its focus on open source alternatives. Another novelty of this research is that it suggests a new conception for the CIOs role in the migration to cloud computing. Finally, the findings of this study would serve as a European market study to different companies interested in cloud computing.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 25 March 2021

James Stephen Denford and Kurt Schobel

The purpose of this paper is to explore the unique and challenging relationship between the chief financial officer (CFO) and chief information officer (CIO) in the public sector.

Abstract

Purpose

The purpose of this paper is to explore the unique and challenging relationship between the chief financial officer (CFO) and chief information officer (CIO) in the public sector.

Design/methodology/approach

In this paper, the authors operationalize the CFO–CIO relationship using upper echelon theory (UET) and propose an extension to it by introducing relationship effectiveness and role perception constructs. Applying a configurational approach to paired survey data, the authors use fuzzy set qualitative comparative analysis to examine both joint and individual role paths to success.

Findings

The CFO is ultimately responsible for financial reporting, disclosure and financial decision-making; however, regulatory changes in the accounting domain have resulted in the increased use of information technology (IT) thereby bringing the CIO to the forefront of the accounting information discussion. Thus, an improved understanding of the CFO/CIO relationship can have a direct impact on how accounting information is captured and analyzed. The authors find that CFO and CIO proximity can often increase the likelihood of an effective relationship. On an individual level, an ambidextrous approach to strategic value and cost-effectiveness is key to both CFO and CIO success.

Research limitations/implications

This study extends current models of top management team relationships by examining work proximity and role perception in the context of UET. It was conducted within the context of Canadian government and post-secondary education. The authors believe the findings can be generalized for the public sector in general; however, its applicability in the private sector, where the role of the CFO is broader, is uncertain.

Practical implications

The findings identify an opportunity for both accounting (financial) and IT communities to develop education within the context of their respective professional bodies to enhance this special relationship.

Originality/value

Recent regulatory changes in the accounting domain have brought an increased need for IT and therefore increased interaction between the CFO and CIO. This study focuses on the unique relationship between the CFO and CIO, which has a direct impact on accounting functions and highlights the importance of both the CFO and CIO having an ambidextrous approach to strategic value and cost-effectiveness if they want to be successful. In addition, it demonstrates that the relationship between the CFO and CIO is important, but more important for the success of the CIO than the CFO.

Details

Journal of Accounting & Organizational Change, vol. 17 no. 3
Type: Research Article
ISSN: 1832-5912

Keywords

1 – 10 of over 3000