Search results

1 – 10 of over 22000
To view the access options for this content please click here
Article

Ramaraj Palanisamy, Jacques Verville, Christine Bernadas and Nazim Taskin

The purpose of this paper is to understand the decision process of enterprise software acquisition. The research aims to focus on identifying significant influences on…

Abstract

Purpose

The purpose of this paper is to understand the decision process of enterprise software acquisition. The research aims to focus on identifying significant influences on enterprise software acquisition decisions.

Design/methodology/approach

As a research model and theoretical background, the organizational buying model (OBB) is proposed for the acquisition of enterprise systems. Influences on enterprise software acquisition decision processes were found by an empirical study carried out from a practitioner's perspective. The study collected data via a mail survey administered to information systems (IS) professionals involved in the acquisition of enterprise software (ES). The survey questionnaire was developed based on a previous research project and a literature review. Organizational buying behavior (OBB) models in the literature served as the basis for the influences included in the survey instrument. Factor analysis was carried out on the survey data to identify the most significant factors/influences.

Findings

The following five factors emerged as significant influences on the acquisition decision process of enterprise software: ES strategy and performance; BPR and adaptability; management commitment and user buy‐in; single vendor integrated solution; and consultants, team‐location, and vendor's financing. These factors are discussed and managerial implications are extracted. Conclusions are derived from the study findings and guidelines for further research are suggested.

Research limitations/implications

The present study provides a starting point for further research in understanding a more comprehensive list of influences on enterprise software acquisition. A bigger sample from more industries is required to examine whether the significance of the influences remains stable.

Originality/value

Using OBB models has proven to be useful for organizations in making effective decisions on enterprise software acquisition.

Details

Journal of Enterprise Information Management, vol. 23 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article

Srinivasa Raghavan R., Jayasimha K.R. and Rajendra V. Nargundkar

Organizations worldwide are adopting software as a service (SaaS) applications, where they pay a subscription fee to gain access rather than buying the software. The…

Abstract

Purpose

Organizations worldwide are adopting software as a service (SaaS) applications, where they pay a subscription fee to gain access rather than buying the software. The extant models on software acquisition processes, several of which are based on organizational buying behavior, do not sufficiently explain how SaaS application acquisition decisions are made. This study aims to investigate the acquisition process organizations follow for SaaS software, the changes to the roles of the Chief Information Officer (CIO) and the business user and also looks at the impact of SaaS on the proliferation of unauthorized software systems.

Design/methodology/approach

The authors used exploratory research using the grounded theory approach based on 18 in-depth interviews conducted with respondents who have studied with enterprise software delivered on-premise and as SaaS in different roles such as sales, consulting, CIO, information technology (IT) management and product development.

Findings

The authors identified a need to classify the SaaS software and developed a framework that uses software specificity and its strategic importance to the organization to classify SaaS applications. The aforementioned framework is used to explain how software evaluation processes have changed for different kinds of SaaS applications. The authors also found that the CIO’s and the business users’ have changed substantially in SaaS application evaluations and found evidence to show that shadow IT will be restricted to some classes of SaaS applications.

Originality/value

By focusing on the changes to the roles and responsibilities of the members of the buying center, this paper provides unique insights into how the acquisition process of SaaS is different from the extant models used to explain enterprise software acquisitions. An understanding of how information search is conducted by the business users will help software vendors to target business users better.

Details

Journal of Business & Industrial Marketing, vol. 35 no. 4
Type: Research Article
ISSN: 0885-8624

Keywords

To view the access options for this content please click here
Article

Jaffar Ahmad Alalwan and Heinz Roland Weistroffer

The purpose of this paper is to provide a comprehensive literature review of enterprise content management (ECM) research, a conceptual framework of areas of concern…

Abstract

Purpose

The purpose of this paper is to provide a comprehensive literature review of enterprise content management (ECM) research, a conceptual framework of areas of concern regarding ECM, and an agenda for future ECM research, based on the review and conceptual framework.

Design/methodology/approach

To gain an understanding of the ECM literature, a structured research approach is adopted, consisting of two phases. The first phase consists of identifying the relevant ECM research papers. In the second phase, the analysis phase, the current ECM research is categorized based on three structural pillars: system component dimensions, system lifecycle, and strategic managerial aspects.

Findings

After a review and classification of 91 ECM publications, it is found that ECM involves several sophisticated and interacting technical, social, organizational, and business aspects. The current ECM literature can be grouped around three main pillars: the first pillar consists of the four ECM component dimensions (tools, strategy, process, and people). The second pillar is the enterprise system lifecycle (adoption, acquisition, evolution, and evaluation). The final pillar is the strategic managerial aspect (change management, and management commitment). Based on the review and a proposed conceptual framework, an agenda for future research around the aforementioned three pillars is suggested.

Originality/value

There is a lack of ECM meta‐analysis research that explains the current state of the field. This paper contributes to information systems research by describing and classifying the published literature in ECM and by pointing out the gaps where further research is most needed. Furthermore, the paper provides a framework that may provide a conceptual structure for future studies.

Details

Journal of Enterprise Information Management, vol. 25 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article

Ramaraj Palanisamy, Jacques Verville and Nazim Taskin

As the wrong Enterprise Software (ES) acquisition can lead an organization with chronically exceeded budgets and settling for minimum returns, so can an unfavorable…

Abstract

Purpose

As the wrong Enterprise Software (ES) acquisition can lead an organization with chronically exceeded budgets and settling for minimum returns, so can an unfavorable contractual agreement. Often the acquiring organizations become vulnerable to risks and mistakes as the software contracts are habitually written using legal terminologies and mainly to the advantage of the vendor. To avoid costly ES contracting mistakes, the purpose of this paper is to empirically identify the critical success factors (CSFs) of contracting in the context of ES acquisition.

Design/methodology/approach

A questionnaire survey was conducted to gather the data for this study. Statistical analysis conducted for this study include descriptive statistics, factor analysis with reliability and validity tests and nonparametric test.

Findings

The five key factors are: contractual assurance, forward compatibility and licensing; right to use, own and use of own, confidentiality and payment; software acceptance; license assignment; and vendor obligation for intellectual property. The research and managerial implications of these factors are given in discussion.

Research limitations/implications

As with most empirical studies, the subjectivity of the opinion of respondents from only two industries presents some limitations to generalization. Another limitation is the respondent has been asked for the degree of criticality for each of the contracting issue given in the questionnaire. There could be critical issues other than the listed ones which are more specific to the organization.

Practical implications

The results can be used by managers to improve their understanding on the critical contractual issues in ES acquisition negotiations.

Originality/value

The significant value of this study identifies the CSFs for ES contract negotiations while acquiring the software.

Details

Journal of Enterprise Information Management, vol. 28 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article

Shancang Li, Theo Tryfonas and Honglei Li

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for…

Abstract

Purpose

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.

Design/methodology/approach

Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.

Findings

IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc.

Practical implications

The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT.

Originality/value

The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article

Wikus Erasmus and Carl Marnewick

Success in the information systems (IS) project domain is elusive despite extensive research on the topic. Governance is seen as the greatest contributor to project…

Abstract

Purpose

Success in the information systems (IS) project domain is elusive despite extensive research on the topic. Governance is seen as the greatest contributor to project success. The purpose of this paper is to investigate and report on the current perceptions and implementation of information technology (IT) governance within IS portfolio management to develop a sub-framework to guide practitioners. This sub-framework forms part of a grand IS project, programme and portfolio governance framework of which this study forms a contributing part.

Design/methodology/approach

The researchers followed a mixed-methods approach through utilising Q-methodology and inverted factor analysis.

Findings

The results provided a sub-framework recommending specific IT governance practices to be applied to IS portfolios. The recommendations are categorised as activities to be maintained, enhanced and/or implemented.

Research limitations/implications

The research only had participants from South African organisations and as such cannot be reliably extrapolated to other regions.

Originality/value

The resultant sub-framework provides stakeholders and practitioners involved in IS portfolios an opportunity to examine their own approaches and be confronted with possibilities in their portfolio management activities. Further research to be conducted includes creating a grand framework to address the linkages between portfolio, programme and project management as it relates to IT governance on various strategic levels.

Details

International Journal of Managing Projects in Business, vol. 14 no. 3
Type: Research Article
ISSN: 1753-8378

Keywords

To view the access options for this content please click here
Article

Zhao Cai, Hefu Liu, Qian Huang, Yue Kang and Liang Liang

The purpose of this paper is to discuss the relationship between psychological contract and knowledge sharing behavior in the enterprise system (ES) post-implementation…

Abstract

Purpose

The purpose of this paper is to discuss the relationship between psychological contract and knowledge sharing behavior in the enterprise system (ES) post-implementation stage. The fulfillment and obligation of psychological contract are proposed as antecedents of knowledge sharing behavior performed by client firms. Additionally, entrepreneurial orientation (EO) is considered a moderator in the relationship between psychological contract and knowledge sharing.

Design/methodology/approach

This study adopted the questionnaire survey to collect data from 132 client firms of a focal ES provider in the garment industry of China. Hierarchical regression analysis was used for data analysis.

Findings

Psychological contract fulfillment is negatively related to knowledge sharing, whereas the positive role of psychological contract obligation is supported. EOstrengthens the role of both psychological contract fulfillment and obligation in shaping knowledge sharing behavior of client firms.

Originality/value

This study adopts forward- and backward-looking approaches in decision making as a theoretical lens to investigate how to improve client firms’ knowledge sharing behavior through psychological contract. By figuring out the roles of psychological contract and EO in influencing knowledge sharing, this research benefits both vendor and client firms in maintaining sustainable collaboration and continuous improvement of ES projects.

Details

Information Technology & People, vol. 33 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article

Alon Peled

Argues that leaders with extensive backgrounds in organizational politics are more likely than technology‐focused leaders to complete their information technology…

Abstract

Argues that leaders with extensive backgrounds in organizational politics are more likely than technology‐focused leaders to complete their information technology projects successfully. Describes how successful technological leaders in the public sector manage their projects, mainly upwards and outwards, and tailor their technical visions to the day‐to‐day reality of their organizations. Compares the evolution and fate of two information technology projects, one managed by a technology‐oriented scientist (success) and the other by a politics‐driven bureaucrat (failure). Proposes that senior decision makers can hone the political skills of their technological leaders by training them on the “soft” skills of management and helping them balance the skill sets of their teams. Suggests how to change current incentive systems in order to encourage technological leaders to politick their projects to success.

Details

Leadership & Organization Development Journal, vol. 21 no. 1
Type: Research Article
ISSN: 0143-7739

Keywords

To view the access options for this content please click here
Book part

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

To view the access options for this content please click here
Article

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination…

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

1 – 10 of over 22000