Search results

1 – 10 of over 11000

Abstract

Details

Information Services for Innovative Organizations
Type: Book
ISBN: 978-0-12465-030-5

Book part
Publication date: 28 June 1991

Karen Horny

Abstract

Details

Library Technical Services: Operations and Management
Type: Book
ISBN: 978-1-84950-795-0

Book part
Publication date: 15 September 2022

Caner Asbaş and Şule Tuzlukaya

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Book part
Publication date: 22 July 2013

AnnaLee Saxenian

Computer systems firms in Silicon Valley are responding to rising costs of product development, shorter product cycles and rapid technological change by focusing and building…

Abstract

Computer systems firms in Silicon Valley are responding to rising costs of product development, shorter product cycles and rapid technological change by focusing and building partnerships with suppliers, both within and outside of the region. Well-known firms like Hewlett-Packard and Apple Computers and lesser known ones like Silicon Graphics and Pyramid Technology are organized to combine the components and sub-systems made by specialist suppliers into new computer systems. As these firms collaborate to both define and manufacture new systems, they are institutionalizing their capacity to learn from one another. Three cases - a contract manufacturer, a silicon foundry, and the joint development of a microprocessor - illustrate how inter-firm networks help account for the sustained technological dynamism of the regional economy.

Details

Collaboration and Competition in Business Ecosystems
Type: Book
ISBN: 978-1-78190-826-6

Keywords

Book part
Publication date: 28 September 2015

Md Shah Azam

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and…

Abstract

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and non-economic activities. Researchers have increasingly focused on the adoption and use of ICT by small and medium enterprises (SMEs) as the economic development of a country is largely dependent on them. Following the success of ICT utilisation in SMEs in developed countries, many developing countries are looking to utilise the potential of the technology to develop SMEs. Past studies have shown that the contribution of ICT to the performance of SMEs is not clear and certain. Thus, it is crucial to determine the effectiveness of ICT in generating firm performance since this has implications for SMEs’ expenditure on the technology. This research examines the diffusion of ICT among SMEs with respect to the typical stages from innovation adoption to post-adoption, by analysing the actual usage of ICT and value creation. The mediating effects of integration and utilisation on SME performance are also studied. Grounded in the innovation diffusion literature, institutional theory and resource-based theory, this study has developed a comprehensive integrated research model focused on the research objectives. Following a positivist research paradigm, this study employs a mixed-method research approach. A preliminary conceptual framework is developed through an extensive literature review and is refined by results from an in-depth field study. During the field study, a total of 11 SME owners or decision-makers were interviewed. The recorded interviews were transcribed and analysed using NVivo 10 to refine the model to develop the research hypotheses. The final research model is composed of 30 first-order and five higher-order constructs which involve both reflective and formative measures. Partial least squares-based structural equation modelling (PLS-SEM) is employed to test the theoretical model with a cross-sectional data set of 282 SMEs in Bangladesh. Survey data were collected using a structured questionnaire issued to SMEs selected by applying a stratified random sampling technique. The structural equation modelling utilises a two-step procedure of data analysis. Prior to estimating the structural model, the measurement model is examined for construct validity of the study variables (i.e. convergent and discriminant validity).

The estimates show cognitive evaluation as an important antecedent for expectation which is shaped primarily by the entrepreneurs’ beliefs (perception) and also influenced by the owners’ innovativeness and culture. Culture further influences expectation. The study finds that facilitating condition, environmental pressure and country readiness are important antecedents of expectation and ICT use. The results also reveal that integration and the degree of ICT utilisation significantly affect SMEs’ performance. Surprisingly, the findings do not reveal any significant impact of ICT usage on performance which apparently suggests the possibility of the ICT productivity paradox. However, the analysis finally proves the non-existence of the paradox by demonstrating the mediating role of ICT integration and degree of utilisation explain the influence of information technology (IT) usage on firm performance which is consistent with the resource-based theory. The results suggest that the use of ICT can enhance SMEs’ performance if the technology is integrated and properly utilised. SME owners or managers, interested stakeholders and policy makers may follow the study’s outcomes and focus on ICT integration and degree of utilisation with a view to attaining superior organisational performance.

This study urges concerned business enterprises and government to look at the environmental and cultural factors with a view to achieving ICT usage success in terms of enhanced firm performance. In particular, improving organisational practices and procedures by eliminating the traditional power distance inside organisations and implementing necessary rules and regulations are important actions for managing environmental and cultural uncertainties. The application of a Bengali user interface may help to ensure the productivity of ICT use by SMEs in Bangladesh. Establishing a favourable national technology infrastructure and legal environment may contribute positively to improving the overall situation. This study also suggests some changes and modifications in the country’s existing policies and strategies. The government and policy makers should undertake mass promotional programs to disseminate information about the various uses of computers and their contribution in developing better organisational performance. Organising specialised training programs for SME capacity building may succeed in attaining the motivation for SMEs to use ICT. Ensuring easy access to the technology by providing loans, grants and subsidies is important. Various stakeholders, partners and related organisations should come forward to support government policies and priorities in order to ensure the productive use of ICT among SMEs which finally will help to foster Bangladesh’s economic development.

Details

E-Services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-325-9

Keywords

Abstract

Details

Designing XR: A Rhetorical Design Perspective for the Ecology of Human+Computer Systems
Type: Book
ISBN: 978-1-80262-366-6

Book part
Publication date: 10 December 2015

Chun Kit Lok

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior…

Abstract

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior of E-payment systems that employ smart card technology becomes a research area that is of particular value and interest to both IS researchers and professionals. However, research interest focuses mostly on why a smart card-based E-payment system results in a failure or how the system could have grown into a success. This signals the fact that researchers have not had much opportunity to critically review a smart card-based E-payment system that has gained wide support and overcome the hurdle of critical mass adoption. The Octopus in Hong Kong has provided a rare opportunity for investigating smart card-based E-payment system because of its unprecedented success. This research seeks to thoroughly analyze the Octopus from technology adoption behavior perspectives.

Cultural impacts on adoption behavior are one of the key areas that this research posits to investigate. Since the present research is conducted in Hong Kong where a majority of population is Chinese ethnicity and yet is westernized in a number of aspects, assuming that users in Hong Kong are characterized by eastern or western culture is less useful. Explicit cultural characteristics at individual level are tapped into here instead of applying generalization of cultural beliefs to users to more accurately reflect cultural bias. In this vein, the technology acceptance model (TAM) is adapted, extended, and tested for its applicability cross-culturally in Hong Kong on the Octopus. Four cultural dimensions developed by Hofstede are included in this study, namely uncertainty avoidance, masculinity, individualism, and Confucian Dynamism (long-term orientation), to explore their influence on usage behavior through the mediation of perceived usefulness.

TAM is also integrated with the innovation diffusion theory (IDT) to borrow two constructs in relation to innovative characteristics, namely relative advantage and compatibility, in order to enhance the explanatory power of the proposed research model. Besides, the normative accountability of the research model is strengthened by embracing two social influences, namely subjective norm and image. As the last antecedent to perceived usefulness, prior experience serves to bring in the time variation factor to allow level of prior experience to exert both direct and moderating effects on perceived usefulness.

The resulting research model is analyzed by partial least squares (PLS)-based Structural Equation Modeling (SEM) approach. The research findings reveal that all cultural dimensions demonstrate direct effect on perceived usefulness though the influence of uncertainty avoidance is found marginally significant. Other constructs on innovative characteristics and social influences are validated to be significant as hypothesized. Prior experience does indeed significantly moderate the two influences that perceived usefulness receives from relative advantage and compatibility, respectively. The research model has demonstrated convincing explanatory power and so may be employed for further studies in other contexts. In particular, cultural effects play a key role in contributing to the uniqueness of the model, enabling it to be an effective tool to help critically understand increasingly internationalized IS system development and implementation efforts. This research also suggests several practical implications in view of the findings that could better inform managerial decisions for designing, implementing, or promoting smart card-based E-payment system.

Details

E-services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-709-7

Keywords

Abstract

Details

Information Services for Innovative Organizations
Type: Book
ISBN: 978-0-12465-030-5

Book part
Publication date: 17 March 2010

Michael P. O’Driscoll, Paula Brough, Carolyn Timms and Sukanlaya Sawang

The impact of technology on the health and well-being of workers has been a topic of interest since computers and computerized technology were widely introduced in the 1980s. Of…

Abstract

The impact of technology on the health and well-being of workers has been a topic of interest since computers and computerized technology were widely introduced in the 1980s. Of recent concern is the impact of rapid technological advances on individuals’ psychological well-being, especially due to advancements in mobile technology that have increased many workers’ accessibility and expected productivity. In this chapter we focus on the associations between occupational stress and technology, especially behavioral and psychological reactions. We discuss some key facilitators and barriers associated with users’ acceptance of and engagement with information and communication technology. We conclude with recommendations for ongoing research on managing occupational health and well-being in conjunction with technological advancements.

Details

New Developments in Theoretical and Conceptual Approaches to Job Stress
Type: Book
ISBN: 978-1-84950-713-4

Book part
Publication date: 5 June 2011

Linda R. Most

Research into the library as place investigates the role of public library buildings as destinations, physical places where people go for various reasons ranging from making use…

Abstract

Research into the library as place investigates the role of public library buildings as destinations, physical places where people go for various reasons ranging from making use of the library's resources and services or seeking to fulfill an information or reading need to less easily identified reasons that may include using the library's building as a place to make social or business contacts, to build or reinforce community or political ties, or to create or reinforce a personal identity. This study asks: How are one rural US public library system's newly constructed buildings functioning as places? The answer is derived from answers to sub-questions about adult library users, user, and staff perceptions of library use, and observed use of library facilities. The findings are contextualized using a framework built of theories from human geography, sociology, and information studies.

This case study replicates a mixed-methods case study conducted at the main public libraries in Toronto and Vancouver in the late1990s and first reproduced in Halifax, Nova Scotia in 2006. It tests methods used in large urban settings in a rural, small-town environment. This study also expands on its antecedents by using thematic analysis to determine which conceptualizations of the role of the public library as place are most relevant to the community under investigation.

The study relies on quantitative and qualitative data collected via surveys and interviews of adult library users, interviews of library public service staff members, structured observations of people using the libraries, and analysis of selected administrative documents. The five sets of data are triangulated to answer the research sub-questions.

Thematic analysis grounded in the conceptual framework finds that public realm theory best contextualizes the relationships that develop between library staff members and adult library users over time. The study finds that the libraries serve their communities as informational places and as familiarized locales rather than as third places, and that the libraries facilitate the generation of social capital for their users.

Details

Advances in Library Administration and Organization
Type: Book
ISBN: 978-1-78052-014-8

Keywords

1 – 10 of over 11000