Search results

1 – 10 of over 3000
Open Access
Article
Publication date: 20 November 2019

Sung Min Kim, Gopesh Anand, Eric C. Larson and Joseph Mahoney

Enterprise systems are commonly implemented by firms through outsourcing arrangements with software vendors. However, deriving benefits from these implementations has proved to be…

4035

Abstract

Purpose

Enterprise systems are commonly implemented by firms through outsourcing arrangements with software vendors. However, deriving benefits from these implementations has proved to be a challenge, and a great deal of variation has been observed in the extent of value generated for client and vendor firms. This research examines the role of co-specialization as a strategy to make the most out of outsourced enterprise systems. The authors develop hypotheses relating resource co-specialization with two indicators of success for implementation of enterprise software: (1) exchange success and (2) firm growth.

Design/methodology/approach

The hypotheses are tested using a unique panel data set of 175 firms adopting Advanced Planning and Scheduling (APS) software, a type of enterprise system used for managing manufacturing and logistics. The authors identify organizational factors that support co-specialization and then examine how co-specialization is associated with enterprise software implementation success, controlling for the endogenous choice to co-specialize.

Findings

The empirical results suggest that resource co-specialization is positively associated with implementation success and that the two resource co-specialization pathways that are examined complement each other in providing performance benefits.

Originality/value

This paper contributes to the research literature on outsourcing. The study also provides a new empirical test using a unique data set of 175 firms adopting APS Software.

Details

Journal of Science and Technology Policy Management, vol. 10 no. 5
Type: Research Article
ISSN: 2053-4620

Keywords

Open Access
Article
Publication date: 24 January 2020

Ewa Soja and Piotr Soja

Adaptation to the requirements of digital economy is especially difficult for older workers, which is a challenge for today’s organizations due to workforce shrinking and ageing…

4982

Abstract

Purpose

Adaptation to the requirements of digital economy is especially difficult for older workers, which is a challenge for today’s organizations due to workforce shrinking and ageing. Therefore, the purpose of this paper is to investigate how it is possible to develop older employees’ potential in technology use in the business environment.

Design/methodology/approach

The authors examined how employees at various age perceive barriers during enterprise system (ES) adoption and use. This exploratory study is based on grounded theory and draws from the opinions of 187 Polish ES practitioners.

Findings

With age, emphasis on employees’ perception of mandatory ICT implementation projects is shifting from technology to people-related considerations. For older employees, job security and workload appear the most critical issues in such projects. Age-diverse collaboration appears necessary to address the problems posed by technology-related and demographic changes.

Research limitations/implications

The findings imply that incorporating multiple stakeholder perspectives and age-related considerations into research on ICT adoption appears essential.

Practical implications

ICT adoption in the business environment can be successfully supported by age-balanced team building, cooperation between younger and older employees, and age-adjusted change management initiatives.

Social implications

Supporting older employees during the implementation of mandatory business software should embrace reducing their negative attitudes to ICT-induced change by minimizing their perception of job insecurity.

Originality/value

Unlike many prior studies, the current research places age in the central role and discusses not only how it is possible to support older employees, but also how to leverage their potential in the process of ICT adoption and use in a mandatory setting.

Details

Journal of Enterprise Information Management, vol. 33 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Open Access
Article
Publication date: 18 January 2019

Christian Barth and Stefan Koch

In the last years the penetration of enterprise resource planning (ERP) systems within small, medium and large organizations increased steadily. Organizations are forced to adapt…

21162

Abstract

Purpose

In the last years the penetration of enterprise resource planning (ERP) systems within small, medium and large organizations increased steadily. Organizations are forced to adapt their systems and perform ERP upgrades in order to react to rapidly changing business environments, technological enhancements and rising pressure of competition. The purpose of this paper is to focus on the critical success factors for such projects.

Design/methodology/approach

The paper is based on a literature review and qualitative interviews with CEOs, CIOs, ERP consultants and project managers who recently carried out ERP upgrade projects in their respective organizations.

Findings

This paper identifies 14 critical success factors for ERP upgrade projects. Amongst others, effective project management, external support, the composition of the ERP team and the usage of a multiple system landscape play a key role for the success of the ERP upgrade. Furthermore, a comparison to the critical success factors for ERP implementation projects was conducted, and even though there are many similarities between these types of projects, several differences emerged.

Originality/value

ERP upgrade projects have a huge impact on organizations, but their success and antecedents for it are currently under-researched.

Details

Industrial Management & Data Systems, vol. 119 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Article
Publication date: 12 April 2018

Pejvak Oghazi, Fakhreddin Fakhrai Rad, Stefan Karlsson and Darek Haftor

The purpose of this paper is to identify the impact of enterprise systems (ESs), in particular radio frequency identification (RFID) and enterprise resource planning (ERP) systems

20074

Abstract

Purpose

The purpose of this paper is to identify the impact of enterprise systems (ESs), in particular radio frequency identification (RFID) and enterprise resource planning (ERP) systems, on supply chain management (SCM). The results of this conceptual paper demonstrate that ERP and RFID systems contribute to SCM by improving supply chain integration. Supply chain integration occurs to facilitate the flow of financing, products, and information throughout the chain. In this regard, ERP and RFID contribute to integration by enhancing the information flow across the supply chain.

Design/methodology/approach

This paper proposes a conceptual model developed from the findings of literature review within the research domains of SCM, ESs, and supply chain integration.

Findings

This conceptual study contributes to the existing theory by linking the concept of information technology, ESs to SCM. The conceptual model in this paper may provide insights for executives who wish to implement ERP or RFID systems in their businesses in order to achieve higher integration, both within internal sectors and also with supply chain partners.

Originality/value

The findings in this study contribute to the theory base by linking the concept of information technologies, ESs to SCM. The conceptual model presented in this paper can provide insights for executives who wish to implement ERP or RFID systems in their businesses in order to achieve higher integration within internal sectors and with supply chain partners. This study offers new understandings by investigating the impact of ERP and RFID together on SCM.

Details

European Journal of Management and Business Economics, vol. 27 no. 2
Type: Research Article
ISSN: 2444-8451

Keywords

Open Access
Article
Publication date: 24 September 2018

Aline de Vargas Pinto, Antônio Carlos Gastaud Maçada and Gabriela Labres Mallmann

The purpose of this paper is to provide an analysis of the studies about workaround behavior in the Information Systems (IS) area, addressing its positive and negative aspects and…

2909

Abstract

Purpose

The purpose of this paper is to provide an analysis of the studies about workaround behavior in the Information Systems (IS) area, addressing its positive and negative aspects and raising the key related issues.

Design/methodology/approach

A systematic literature review was conducted to verify how workaround behavior has been approached in IS studies. A qualitative method was adopted and implemented in two stages: selection of articles from the time period 2007-2017 in the databases Web of Science, ScienceDirect and Scopus and analysis of the selected articles.

Findings

The results showed that many studies have been concerned with identifying the principal reasons for the manifestation of workaround behavior and the measures taken to reduce its impacts. Many studies from international journals examined the implementation of an ERP along with the workaround behavior. The need to expand the national studies on workaround behavior is emphasized, because the majority of the identified studies are international.

Research limitations/implications

The key limitation is related to the period of analysis, because only articles published since 2007 were selected.

Practical implications

This paper contributes to both theory and practice, bringing relevant concepts about workaround behavior, and corroborating the importance of the studies on workaround in the IS area. The literature review of the 20 articles analyzed reveals the main features in each article, such as theoretical and methodological aspects that support the research. Based on this analysis, a conceptual map was developed presenting the most relevant points about workaround behavior, where the causes, the negative and positive consequences, the types of solutions and the organizational and individual impacts are presented.

Originality/value

Research into workaround behavior has increased in recent years, however very few studies have been conducted in Brazil. To the best of the authors' knowledge, no articles regarding Brazil and this subject were published between 2007 and 2017. Thus, this paper seeks to redress this imbalance.

Details

Revista de Gestão, vol. 25 no. 4
Type: Research Article
ISSN: 2177-8736

Keywords

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

3421

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 5 February 2018

Mario Saba, Peter Bou Saba and Antoine Harfouche

The purpose of this paper is to focus on an information technology (IT) deployment project in the specific field of agricultural cooperatives. It also aims to underline the…

2081

Abstract

Purpose

The purpose of this paper is to focus on an information technology (IT) deployment project in the specific field of agricultural cooperatives. It also aims to underline the importance of the IT implementation phase, but also the pre-implementation phase.

Design/methodology/approach

A four-year canonical action research project was conducted within a network of more than 300 agricultural cooperatives. Research was carried out both during the IT implementation and after deployment. Key information was gathered through unstructured and unofficial interviews, observations, field notes, meetings, focus groups, and documentary analysis.

Findings

Despite user resistance behavior, the findings show that information systems (IS) implementation may lead to unexpected results that extend beyond the tool’s initial objectives. Indeed, four hidden facets of the tool were revealed: inductor, symbol, pretext, and reference.

Research limitations/implications

Although the research is limited to one single-case study, it puts the emphasis on in-depth research, vs cross-sectional data collection, to analyze the relationship between IT implementation initiatives and organizational intelligence. Furthermore, the authors argue that while IS literature has separately developed related theories (actor-network theory, competitive intelligence), the authors conceptualize a whole theoretic system interrelating the two above-stated theories.

Practical implications

The implication for IS practitioners is that, by focusing only on experiences that have occurred during IT implementation, one may disregard critical information, behaviors and knowledge from unforeseen effects that have occurred after implementation. In future IT projects, IS managers therefore need to capitalize on post-implementation knowledge, through sociology of translation and competitive intelligence, in order to anticipate potential diversions from the initial objectives. Finally, while most IT implementation methods tend naturally to manage resistance maximize users’ satisfaction and to reduce potential resistance, the authors support an alternative approach. It consists into enhancing resistance in order to anticipate and resolve latent resistance behaviors directly or indirectly related to the project.

Originality/value

Despite widespread literature on resistance, appropriation or acceptance during IT projects, there is little research that addresses the impact of IT projects on organizational intelligence, and the kind of behaviors that lead to its failure or success. In the case, the implemented IT tool revealed hidden structural and organizational roles, which were unanticipated by IT designers and managers.

Open Access
Article
Publication date: 9 December 2022

Mieke Jans, Banu Aysolmaz, Maarten Corten, Anant Joshi and Mathijs van Peteghem

The Accounting Information Systems (AIS) research field emerged around 30 years ago as a subfield of accounting but is at risk to develop further as an isolated discipline…

7302

Abstract

Purpose

The Accounting Information Systems (AIS) research field emerged around 30 years ago as a subfield of accounting but is at risk to develop further as an isolated discipline. However, given the importance of digitalization and its relevance for accounting, an amalgamation of the parent research field of accounting and the subfield of accounting information systems is pivotal for continuing relevant research that is of high quality. This study empirically investigates the distance between AIS research that is included in accounting literature and AIS research that prevails in dedicated AIS research outlets.

Design/methodology/approach

To understand which topics define AIS research, all articles published in the two leading AIS journals since 2000 were analyzed. Based on this topical inventory, all AIS studies that were published in the top 16 accounting journals, also since 2000, are identified and categorized in terms of topic, subtopic and research methodology. Next, AIS studies published in the general accounting field and AIS studies published in the AIS field were compared in terms of topics and research methodology to gain insights into the distance between the two fields.

Findings

The coverage of AIS topics in accounting journals is, to no small extent, concentrated around the topics “information disclosure”, “network technologies” and “audit and control”. Other AIS topics remain underrepresented. A possible explanation might be the focus on archival studies in accounting outlets, but other elements might play a role. The findings suggest that there is only a partial overlap between the parent accounting research field and the AIS subfield, in terms of both topic and research methodology diversity. These findings suggest a considerable distance between both fields, which might hold detrimental consequences in the long run, if no corrective actions are taken.

Originality/value

This is the first in-depth investigation of the distance between the AIS research field and its parent field of accounting. This study helped develop an AIS classification scheme, which can be used in other research endeavors. This study creates awareness of the divergence between the general accounting research field and the AIS subfield. Given the latter's relevance to the accounting profession, isolation or deterioration of the AIS research must be avoided. Some actionable suggestions are provided in the paper.

Details

Accounting, Auditing & Accountability Journal, vol. 36 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1852

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 6 May 2022

Musa Nyathi and Ray Kekwaletswe

The purpose of this paper is to propose and test a model designed to realize employee and organizational performance gains in developing economies.

9193

Abstract

Purpose

The purpose of this paper is to propose and test a model designed to realize employee and organizational performance gains in developing economies.

Design/methodology/approach

Data were collected through a survey involving 35 organizations using electronic human resource management (e-HRM) systems. A purposive sampling technique was employed. Regression analysis making use of Process macro in Statistical Package for the Social Sciences (SPSS) was used to analyze the data.

Findings

Despite its infancy in African countries, e-HRM use has a positive effect on employee and organizational performance. The organization-wide gains are enhanced through employee performance mediation.

Practical implications

Electronic-HRM use, complemented by human resource best practices that impact positively on individual performance, is likely to enhance organizational performance gains. Employee performance mediation effect is likely to further enhance the effect of e-HRM usage on organizational performance.

Originality/value

This study represents a first attempt to examine the role of employee performance as an intervening variable in the relationship between e-HRM use and organizational performance. The findings bring into attention the role of organizational members' performance in explaining organizational performance gains. The findings also result in a model that should lead to increased employee and organizational performance.

Details

African Journal of Economic and Management Studies, vol. 14 no. 1
Type: Research Article
ISSN: 2040-0705

Keywords

1 – 10 of over 3000