Search results

1 – 10 of 51
Book part
Publication date: 19 March 2024

John Thomas Flynn and Lloyd Levine

A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new…

Abstract

A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new technology seamlessly and quickly to deliver for customers, the government struggles to accomplish technology purchases and integrations with the same ease. As governments in the United States are looking to retain their current workforce and attract the next generation of workers, the technological capabilities and ethos of governments will be paramount. With nearly every industry being transformed by technology and Generation T being the first generation to have an ingrained “technology first” mindset, the ability of governments to attract these workers depends, in large part, on the ability to transform their government technology culture, policies, and practices.

In this chapter, the authors examine the administrative branch and observe two key components at the root of most technology failures: poor organizational structure in the bureaucracy and the lack of an empowered Chief Information/Technology Officer. Building upon case studies from Massachusetts and California, this chapter looks at the factors related to failure or success to understand the technology procurement culture. The chapter concludes by presenting four key “best practice” principles of public policy and administration that can be implemented by almost any governmental entity to improve their acquisition and implementation of technology.

Details

Technology vs. Government: The Irresistible Force Meets the Immovable Object
Type: Book
ISBN: 978-1-83867-951-4

Keywords

Article
Publication date: 9 February 2023

Guoqing Zhao, Jana Suklan, Shaofeng Liu, Carmen Lopez and Lise Hunter

In a competitive environment, eHealth small and medium-sized enterprises’ (SMEs’) barriers to survival differ from those of large enterprises. Empirical research on barriers to…

Abstract

Purpose

In a competitive environment, eHealth small and medium-sized enterprises’ (SMEs’) barriers to survival differ from those of large enterprises. Empirical research on barriers to eHealth SMEs in less prosperous areas has been largely neglected. This study fills this gap by employing an integrated approach to analyze barriers to the development of eHealth SMEs. The purpose of this paper is to address this issue.

Design/methodology/approach

The authors collected data through semi-structured interviews and conducted thematic analysis to identify 16 barriers, which were used as inputs into total interpretive structural modeling (TISM) to build interrelationships among them and identify key barriers. Cross-impact matrix multiplication applied to classification (MICMAC) was then applied validate the TISM model and classify the 16 barriers into four categories.

Findings

This study makes significant contributions to theory by identifying new barriers and their interrelationships, distinguishing key barriers and classifying the barriers into four categories. The authors identify that transcultural problems are the key barrier and deserve particular attention. eHealth SMEs originating from regions with cultural value orientations, such as hierarchy and embeddedness, that differ from the UK’s affective autonomy orientation should strengthen their transcultural awareness when seeking to expand into UK markets.

Originality/value

By employing an integrated approach to analyze barriers that impede the development of eHealth SMEs in a less prosperous area of the UK, this study raises entrepreneurs’ awareness of running businesses in places with different cultural value orientations.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 30 no. 2/3
Type: Research Article
ISSN: 1355-2554

Keywords

Article
Publication date: 6 February 2024

Sabine Khalil and Bahae Samhan

Cloud computing, a dominant technology, significantly impacts organizations, necessitating talent management strategies for sustained growth. This study aims to explore the impact…

Abstract

Purpose

Cloud computing, a dominant technology, significantly impacts organizations, necessitating talent management strategies for sustained growth. This study aims to explore the impact of cloud adoption on large French organizations through a “learning organization” perspective.

Design/methodology/approach

Interviews were conducted with business and IT stakeholders from 35 multinational organizations in France.

Findings

Cloud services have a high impact on large organizations, leading to a demand for cloud-related skills, a power shift from IT to business departments and increased shadow IT activities. Effective utilization requires organizational learning and a change management project, transforming organizations into productive and innovative learning organizations.

Originality/value

This paper contributes to cloud computing, organizational learning and talent management literature, offering managers a novel approach to handling cloud services.

Details

The Learning Organization, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-6474

Keywords

Article
Publication date: 28 December 2022

Maria-Isabel Sanchez-Segura, Fuensanta Medina-Dominguez, German-Lenin Dugarte-Peña, Antonio de Amescua-Seco and Roxana González Cruz

The current scenario is dominated by an urgent need for economic recovery caused by the global health emergency that has been at work since January 2020. Digital transformation…

Abstract

Purpose

The current scenario is dominated by an urgent need for economic recovery caused by the global health emergency that has been at work since January 2020. Digital transformation plays a crucial role in bringing about this recovery. However, the failure rate of digital transformation projects over the last 10 years is very high. Considering the growing demand for digital transformation from businesses, the digital transformation failure rate, if unchanged, could lead to an exponential growth in technical debt. Technical debt is acquired when the digital transformation to be deployed at a business fails. The accumulation of technical debt will lead not only to economic stalemate but possibly also to yet another setback.

Design/methodology/approach

The developed set of methodologies form what has been termed the Digital Transformation Governance Engineering Process (DTGEP). This process can help any business wishing to undertake a digital transformation project to materialize their project in a sustainable, productive and competitive way.

Findings

DTGEP prevents the generation of technical debt because organizational knowledge is aligned with the technological solution that best suits the needs of each business in order to support its strategic or business objectives.

Research limitations/implications

DTGEP has already been used to successfully discover the relationship between business features and the prospective digital transformation. However, it needs to be applied in case studies on many other businesses across the economy in order to gather more accurate information that could be clustered by sectors.

Originality/value

DTGEP was tested on a set of 25 projects, and this paper reports several interesting findings regarding its use, like the impact of the digital transformation on different parts of the business model canvas (BMC) and the intellectual capital of the organization developing the digital transformation, and how the status of the organization's intangible assets affects the decision-making process with respect to the prospective digital transformation.

Details

Kybernetes, vol. 53 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 12 April 2024

Aleš Zebec and Mojca Indihar Štemberger

Although businesses continue to take up artificial intelligence (AI), concerns remain that companies are not realising the full value of their investments. The study aims to…

Abstract

Purpose

Although businesses continue to take up artificial intelligence (AI), concerns remain that companies are not realising the full value of their investments. The study aims to provide insights into how AI creates business value by investigating the mediating role of Business Process Management (BPM) capabilities.

Design/methodology/approach

The integrative model of IT Business Value was contextualised, and structural equation modelling was applied to validate the proposed serial multiple mediation model using a sample of 448 organisations based in the EU.

Findings

The results validate the proposed serial multiple mediation model according to which AI adoption increases organisational performance through decision-making and business process performance. Process automation, organisational learning and process innovation are significant complementary partial mediators, thereby shedding light on how AI creates business value.

Research limitations/implications

In pursuing a complex nomological framework, multiple perspectives on realising business value from AI investments were incorporated. Several moderators presenting complementary organisational resources (e.g. culture, digital maturity, BPM maturity) could be included to identify behaviour in more complex relationships. The ethical and moral issues surrounding AI and its use could also be examined.

Practical implications

The provided insights can help guide organisations towards the most promising AI activities of process automation with AI-enabled decision-making, organisational learning and process innovation to yield business value.

Originality/value

While previous research assumed a moderated relationship, this study extends the growing literature on AI business value by empirically investigating a comprehensive nomological network that links AI adoption to organisational performance in a BPM setting.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 12 March 2024

J. Pedro Mendes, Miguel Marques and Carlos Guedes Soares

Organizational technologies can be classified according to the roles they play as either commodity or strategic. Commodity technologies support common operations, while strategic…

Abstract

Purpose

Organizational technologies can be classified according to the roles they play as either commodity or strategic. Commodity technologies support common operations, while strategic technologies address perceived threats to competitiveness, often identified by strategic foresight. These must go through an adoption process before playing an effective role in strategy execution. The adoption process includes known activities, ranging from sourcing (itself from in-house development to turn-key acquisition) to operational integration. This paper aims to reveal strategic technology adoption risks that arise during strategy execution.

Design/methodology/approach

A gradually developed causal loop diagram model, supported by general literature, introduces three general classes of technology adoption risks: mismatched requirements, supplier dependence and unmanaged life cycles.

Findings

Rather than managed, these risks are incurred or avoided depending on decisions made during the adoption process.

Research limitations/implications

Despite the scarce literature coverage for the approach, examples revealing the presence of adoption risks are nevertheless available in the well-documented history of enterprise resource planning (ERP).

Practical implications

Although ERP is presented as a general-purpose strategic technology, the unique business features of maritime container terminals pose serious challenges to its adoption, which provides additional support to the discussion and reinforces the conclusions.

Originality/value

The approach to identifying risks in strategic technology adoption departs from the current risk paradigm in two significant ways. First, it emphasizes policy decision-making rather than external events. Second, it views risks as systemic rather than occurring independently.

Details

Journal of Modelling in Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 28 February 2024

Magdalena Saldana-Perez, Giovanni Guzmán, Carolina Palma-Preciado, Amadeo Argüelles-Cruz and Marco Moreno-Ibarra

Climate change is a problem that concerns all of us. Despite the information produced by organizations such as the Expert Team on Climate Change Detection and Indices and the…

Abstract

Purpose

Climate change is a problem that concerns all of us. Despite the information produced by organizations such as the Expert Team on Climate Change Detection and Indices and the United Nations, only a few cities have been planned taking into account the climate changes indices. This paper aims to study climatic variations, how climate conditions might change in the future and how these changes will affect the activities and living conditions in cities, specifically focusing on Mexico city.

Design/methodology/approach

In this approach, two distinct machine learning regression models, k-Nearest Neighbors and Support Vector Regression, were used to predict variations in climate change indices within select urban areas of Mexico city. The calculated indices are based on maximum, minimum and average temperature data collected from the National Water Commission in Mexico and the Scientific Research Center of Ensenada. The methodology involves pre-processing temperature data to create a training data set for regression algorithms. It then computes predictions for each temperature parameter and ultimately assesses the performance of these algorithms based on precision metrics scores.

Findings

This paper combines a geospatial perspective with computational tools and machine learning algorithms. Among the two regression algorithms used, it was observed that k-Nearest Neighbors produced superior results, achieving an R2 score of 0.99, in contrast to Support Vector Regression, which yielded an R2 score of 0.74.

Originality/value

The full potential of machine learning algorithms has not been fully harnessed for predicting climate indices. This paper also identifies the strengths and weaknesses of each algorithm and how the generated estimations can then be considered in the decision-making process.

Details

Transforming Government: People, Process and Policy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

125

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 19 April 2024

Frank Grave, Rogier van de Wetering and Rob Kusters

Despite the relevance of how enterprise architecture (EA) contributes to organizational performance in contemporary digital technology-driven strategic renewal, little is known…

Abstract

Purpose

Despite the relevance of how enterprise architecture (EA) contributes to organizational performance in contemporary digital technology-driven strategic renewal, little is known about the position of EA artifacts. Therefore, this study aims to build an integrative model of EA artifact-enabled EA value supplemented with a research agenda to enhance our understanding further.

Design/methodology/approach

This study leveraged grounded theory techniques and a systematic review approach to develop the integrative model and research agenda.

Findings

We inductively build a model of the position of EA artifacts in EA value creation. Additionally, we elaborate a research agenda that proposes (1) an investigation of the role of an EA practice in successful strategic change, (2) an examination of how to manage EA practice value generation and (3) longitudinal research to gain insight into the evolution of value creation by EA practices.

Originality/value

This study presents a model of EA artifact-enabled EA value, thereby contributing to our understanding of the mechanisms, inhibitors and success factors associated with EA value. Following our model, the proposed research agenda contains future research areas to help us better understand the mechanisms and interrelatedness of EA practices in highly dynamic environments.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 18 April 2024

Weiwei Wu, Yang Gao and Yexin Liu

This study examines the mediating roles of the three dimensions of business intelligence (sensing capability, transforming capability and driving capability) in the relationship…

Abstract

Purpose

This study examines the mediating roles of the three dimensions of business intelligence (sensing capability, transforming capability and driving capability) in the relationship between the three dimensions of big data analytics capability (big data analytics management, technology and talent capabilities), and radical innovation among Chinese manufacturing enterprises.

Design/methodology/approach

A theoretical framework was developed using the resource-based view. The hypothesis was tested using empirical survey data from 326 Chinese manufacturing enterprises.

Findings

Empirical results show that, in the Chinese manufacturing context, business intelligence sensing capability, business intelligence transforming capability and business intelligence driving capability positively mediate the impact of big data analytics capability on radical innovation.

Practical implications

The results offer managerial guidance for leaders to properly use big data analytics capability, business intelligence and radical innovation as well as offering theoretical insight for future research in the manufacturing industry’s radical innovation.

Originality/value

This is among the first studies to examine three dimensions of big data analytics capability on the manufacturing industry’s radical innovation by considering the mediating role of three dimensions of business intelligence.

Details

Journal of Manufacturing Technology Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-038X

Keywords

1 – 10 of 51