Search results

1 – 10 of 14
Open Access
Article
Publication date: 12 April 2024

Aleš Zebec and Mojca Indihar Štemberger

Although businesses continue to take up artificial intelligence (AI), concerns remain that companies are not realising the full value of their investments. The study aims to…

Abstract

Purpose

Although businesses continue to take up artificial intelligence (AI), concerns remain that companies are not realising the full value of their investments. The study aims to provide insights into how AI creates business value by investigating the mediating role of Business Process Management (BPM) capabilities.

Design/methodology/approach

The integrative model of IT Business Value was contextualised, and structural equation modelling was applied to validate the proposed serial multiple mediation model using a sample of 448 organisations based in the EU.

Findings

The results validate the proposed serial multiple mediation model according to which AI adoption increases organisational performance through decision-making and business process performance. Process automation, organisational learning and process innovation are significant complementary partial mediators, thereby shedding light on how AI creates business value.

Research limitations/implications

In pursuing a complex nomological framework, multiple perspectives on realising business value from AI investments were incorporated. Several moderators presenting complementary organisational resources (e.g. culture, digital maturity, BPM maturity) could be included to identify behaviour in more complex relationships. The ethical and moral issues surrounding AI and its use could also be examined.

Practical implications

The provided insights can help guide organisations towards the most promising AI activities of process automation with AI-enabled decision-making, organisational learning and process innovation to yield business value.

Originality/value

While previous research assumed a moderated relationship, this study extends the growing literature on AI business value by empirically investigating a comprehensive nomological network that links AI adoption to organisational performance in a BPM setting.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

125

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 19 April 2024

Frank Grave, Rogier van de Wetering and Rob Kusters

Despite the relevance of how enterprise architecture (EA) contributes to organizational performance in contemporary digital technology-driven strategic renewal, little is known…

Abstract

Purpose

Despite the relevance of how enterprise architecture (EA) contributes to organizational performance in contemporary digital technology-driven strategic renewal, little is known about the position of EA artifacts. Therefore, this study aims to build an integrative model of EA artifact-enabled EA value supplemented with a research agenda to enhance our understanding further.

Design/methodology/approach

This study leveraged grounded theory techniques and a systematic review approach to develop the integrative model and research agenda.

Findings

We inductively build a model of the position of EA artifacts in EA value creation. Additionally, we elaborate a research agenda that proposes (1) an investigation of the role of an EA practice in successful strategic change, (2) an examination of how to manage EA practice value generation and (3) longitudinal research to gain insight into the evolution of value creation by EA practices.

Originality/value

This study presents a model of EA artifact-enabled EA value, thereby contributing to our understanding of the mechanisms, inhibitors and success factors associated with EA value. Following our model, the proposed research agenda contains future research areas to help us better understand the mechanisms and interrelatedness of EA practices in highly dynamic environments.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 18 April 2024

Weiwei Wu, Yang Gao and Yexin Liu

This study examines the mediating roles of the three dimensions of business intelligence (sensing capability, transforming capability and driving capability) in the relationship…

Abstract

Purpose

This study examines the mediating roles of the three dimensions of business intelligence (sensing capability, transforming capability and driving capability) in the relationship between the three dimensions of big data analytics capability (big data analytics management, technology and talent capabilities), and radical innovation among Chinese manufacturing enterprises.

Design/methodology/approach

A theoretical framework was developed using the resource-based view. The hypothesis was tested using empirical survey data from 326 Chinese manufacturing enterprises.

Findings

Empirical results show that, in the Chinese manufacturing context, business intelligence sensing capability, business intelligence transforming capability and business intelligence driving capability positively mediate the impact of big data analytics capability on radical innovation.

Practical implications

The results offer managerial guidance for leaders to properly use big data analytics capability, business intelligence and radical innovation as well as offering theoretical insight for future research in the manufacturing industry’s radical innovation.

Originality/value

This is among the first studies to examine three dimensions of big data analytics capability on the manufacturing industry’s radical innovation by considering the mediating role of three dimensions of business intelligence.

Details

Journal of Manufacturing Technology Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-038X

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1002

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2024

Valerie Nesset, Elisabeth C. Davis, Nicholas Vanderschantz and Owen Stewart-Robertson

Responding to the continuing separation of participants and researchers in LIS participatory research, a new methodology is proposed: action partnership research design (APRD). It…

Abstract

Purpose

Responding to the continuing separation of participants and researchers in LIS participatory research, a new methodology is proposed: action partnership research design (APRD). It is asserted that APRD can mitigate or remove the hierarchical structures often inherent in the research process, thus allowing for equal contribution from all.

Design/methodology/approach

Building on the bonded design (BD) methodology and informed by a scoping literature review conducted by the same authors, APRD is a human-centered research approach with the goal of empowering and valuing community partnerships. APRD originates from research investigating the use of participatory design methods to foster collaboration between two potentially disparate groups, firstly with adult researchers/designers and elementary school children, and secondly with university faculty and IT professionals.

Findings

To achieve this goal, in addition to BD techniques, APRD draws inspiration from elements of indigenous and decolonization research methodologies, particularly those with an emphasis on destabilizing power hierarchies and involving research participants as full partners.

Originality/value

APRD, which emerged from findings from previous participatory design studies, especially those of BD, is based on the premise of partnership, recognizing that each member of a design team, whether researcher or participant/user, has unique expertise to contribute. By considering participants/users as full research partners, APRD aims to flatten the hierarchies exhibited in some LIS participatory research methodologies, where participants are treated more like research subjects than partners.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 16 April 2024

Steven D. Silver

Although the effects of both news sentiment and expectations on price in financial markets have now been extensively demonstrated, the jointness that these predictors can have in…

Abstract

Purpose

Although the effects of both news sentiment and expectations on price in financial markets have now been extensively demonstrated, the jointness that these predictors can have in their effects on price has not been well-defined. Investigating causal ordering in their effects on price can further our understanding of both direct and indirect effects in their relationship to market price.

Design/methodology/approach

We use autoregressive distributed lag (ARDL) methodology to examine the relationship between agent expectations and news sentiment in predicting price in a financial market. The ARDL estimation is supplemented by Grainger causality testing.

Findings

In the ARDL models we implement, measures of expectations and news sentiment and their lags were confirmed to be significantly related to market price in separate estimates. Our results further indicate that in models of relationships between these predictors, news sentiment is a significant predictor of agent expectations, but agent expectations are not significant predictors of news sentiment. Granger-causality estimates confirmed the causal inferences from ARDL results.

Research limitations/implications

Taken together, the results extend our understanding of the dynamics of expectations and sentiment as exogenous information sources that relate to price in financial markets. They suggest that the extensively cited predictor of news sentiment can have both a direct effect on market price and an indirect effect on price through agent expectations.

Practical implications

Even traditional financial management firms now commonly track behavioral measures of expectations and market sentiment. More complete understanding of the relationship between these predictors of market price can further their representation in predictive models.

Originality/value

This article extends the frequently reported bivariate relationship of expectations and sentiment to market price to examine jointness in the relationship between these variables in predicting price. Inference from ARDL estimates is supported by Grainger-causality estimates.

Article
Publication date: 18 April 2024

Ihab Hanna Sawalha

This study aims to: (1) investigate the relationship/connection between organizational change (OC) and organizational resilience (OR) and (2) provide a basis for understanding how…

Abstract

Purpose

This study aims to: (1) investigate the relationship/connection between organizational change (OC) and organizational resilience (OR) and (2) provide a basis for understanding how organizational change can underpin or build organizational resilience.

Design/methodology/approach

An extensive literature review has been made to discuss the goals of OC as well as the enablers of OR. A number of conceptual models have been introduced to demonstrate the correlation between OC and OR and the potential role of OC in supporting OR. Empirical findings were also introduced in order to support the theoretical basis of this research.

Findings

This study argues that OC can be practiced for the purpose of building or supporting OR. A variety of views have been introduced to demonstrate the correlation between OC and OR and the role of OC in supporting OR.

Practical implications

The purpose and scope of OC should not only be confined to enabling organizations to respond to the dynamics of their business environments but also to enable organizations to withstand a wider range of internal disruptions, major incidents and external factors. This perspective provides a broader insight that is different from the traditional conceptualization of the goals and purpose of OC.

Originality/value

To the author’s knowledge, this is one of very few studies that discuss the correlation between OC and OR and the role of OC in building OR. This explains the need for more practical change initiatives that aim to elevate levels of OR.

Details

Continuity & Resilience Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2516-7502

Keywords

Article
Publication date: 10 February 2022

Andrea Herrera and Sonia Camacho

This paper aims to empirically investigate how knowledge coordination is carried out within and across expert teams in the outsourcing service desk context from the standpoint of…

Abstract

Purpose

This paper aims to empirically investigate how knowledge coordination is carried out within and across expert teams in the outsourcing service desk context from the standpoint of the information and communication technologies (ICT) provider.

Design/methodology/approach

The authors draw on an embedded case study to unravel the mechanisms used by expert teams to achieve knowledge coordination. Data collection included semi-structured interviews and document analysis over eight months.

Findings

Four groups of coordination mechanisms were found according to their nature and role in helping MESA achieve its organizational goals. The authors also identified how this set of mechanisms responds to the task-resource dependency and how it evolves over time to provide reliable ICT services. Furthermore, the analysis of four knowledge coordination dimensions inside each group uncovers the complexity of coordination in the studied context, with the “who” dimension being predominant across the groups. The analysis further reveals that the content (what) and mode of coordination (how) of each group respond to elements in the knowledge coordination process relevant for the different stages of the ICT service delivery process.

Originality/value

The case study addresses how people in outsourced services coordinate their knowledge to manage the interdependencies among the involved organizations and thus, achieving their goals. This study extends previous research that had analyzed the consequences of knowledge coordination for providers and customers by delving into the mechanisms used in this process from the provider’s point of view.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 54 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 19 April 2024

Chin Wei Liew and Nor Aziati Abdul Hamid

This study aims to collect empirical data and observe the type of influences that were causing impact to the implementation of information technology governance (ITG) mechanisms…

Abstract

Purpose

This study aims to collect empirical data and observe the type of influences that were causing impact to the implementation of information technology governance (ITG) mechanisms in Malaysia’s technical universities. This study enhanced the understanding on the status of ITG implementation and revealed internal and external influences that were shaping the types of ITG mechanisms implemented within universities and present a new perspective through the lens of resource-based view and continuous improvement.

Design/methodology/approach

This study focused on two Malaysia’s technical universities belongs under same university’s network. Five IT leaders involved in the implementations of ITG from each university were interviewed. Qualitative content analysis was used as the main analyzing method to extract categories and themes from the transcripts. Final results were produced after multiple efforts of refining categories and themes in ITG implementations.

Findings

The findings revealed that both Malaysia’s technical universities had more soundly implementations in structure mechanisms than relational and process mechanisms. The shaping of implemented mechanisms was influenced by environment surrounding the universities, internally and externally. The findings proposed that the internal and external factors are best addressed with the growth of internal ITG expertise.

Research limitations/implications

This research was conducted on two of Malaysia’s technical universities that were under a university network. Although both universities had presented the exact trend in the type of ITG mechanisms implemented in the universities, more empirical data were needed to further solidify the findings from this study. Other than that, the major respondents for this research were middle-level IT officers and leaders in the universities. Further research could be conducted specifically on top-level managements to further understand the point of views of top managements in the aspect of ITG mechanisms implementations in universities.

Originality/value

This study discussed how each factor could influence the types of ITG mechanisms implemented in Malaysia’s technical universities and concluded the attentions needed to improve the overall environment for ITG implementations in universities through the lens of resource-based view and continuous improvement.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 10 of 14