Search results
1 – 10 of over 24000Ramaraj Palanisamy, Jacques Verville, Christine Bernadas and Nazim Taskin
The purpose of this paper is to understand the decision process of enterprise software acquisition. The research aims to focus on identifying significant influences on enterprise…
Abstract
Purpose
The purpose of this paper is to understand the decision process of enterprise software acquisition. The research aims to focus on identifying significant influences on enterprise software acquisition decisions.
Design/methodology/approach
As a research model and theoretical background, the organizational buying model (OBB) is proposed for the acquisition of enterprise systems. Influences on enterprise software acquisition decision processes were found by an empirical study carried out from a practitioner's perspective. The study collected data via a mail survey administered to information systems (IS) professionals involved in the acquisition of enterprise software (ES). The survey questionnaire was developed based on a previous research project and a literature review. Organizational buying behavior (OBB) models in the literature served as the basis for the influences included in the survey instrument. Factor analysis was carried out on the survey data to identify the most significant factors/influences.
Findings
The following five factors emerged as significant influences on the acquisition decision process of enterprise software: ES strategy and performance; BPR and adaptability; management commitment and user buy‐in; single vendor integrated solution; and consultants, team‐location, and vendor's financing. These factors are discussed and managerial implications are extracted. Conclusions are derived from the study findings and guidelines for further research are suggested.
Research limitations/implications
The present study provides a starting point for further research in understanding a more comprehensive list of influences on enterprise software acquisition. A bigger sample from more industries is required to examine whether the significance of the influences remains stable.
Originality/value
Using OBB models has proven to be useful for organizations in making effective decisions on enterprise software acquisition.
Details
Keywords
Srinivasa Raghavan R., Jayasimha K.R. and Rajendra V. Nargundkar
Organizations worldwide are adopting software as a service (SaaS) applications, where they pay a subscription fee to gain access rather than buying the software. The extant models…
Abstract
Purpose
Organizations worldwide are adopting software as a service (SaaS) applications, where they pay a subscription fee to gain access rather than buying the software. The extant models on software acquisition processes, several of which are based on organizational buying behavior, do not sufficiently explain how SaaS application acquisition decisions are made. This study aims to investigate the acquisition process organizations follow for SaaS software, the changes to the roles of the Chief Information Officer (CIO) and the business user and also looks at the impact of SaaS on the proliferation of unauthorized software systems.
Design/methodology/approach
The authors used exploratory research using the grounded theory approach based on 18 in-depth interviews conducted with respondents who have studied with enterprise software delivered on-premise and as SaaS in different roles such as sales, consulting, CIO, information technology (IT) management and product development.
Findings
The authors identified a need to classify the SaaS software and developed a framework that uses software specificity and its strategic importance to the organization to classify SaaS applications. The aforementioned framework is used to explain how software evaluation processes have changed for different kinds of SaaS applications. The authors also found that the CIO’s and the business users’ have changed substantially in SaaS application evaluations and found evidence to show that shadow IT will be restricted to some classes of SaaS applications.
Originality/value
By focusing on the changes to the roles and responsibilities of the members of the buying center, this paper provides unique insights into how the acquisition process of SaaS is different from the extant models used to explain enterprise software acquisitions. An understanding of how information search is conducted by the business users will help software vendors to target business users better.
Details
Keywords
Jaffar Ahmad Alalwan and Heinz Roland Weistroffer
The purpose of this paper is to provide a comprehensive literature review of enterprise content management (ECM) research, a conceptual framework of areas of concern regarding…
Abstract
Purpose
The purpose of this paper is to provide a comprehensive literature review of enterprise content management (ECM) research, a conceptual framework of areas of concern regarding ECM, and an agenda for future ECM research, based on the review and conceptual framework.
Design/methodology/approach
To gain an understanding of the ECM literature, a structured research approach is adopted, consisting of two phases. The first phase consists of identifying the relevant ECM research papers. In the second phase, the analysis phase, the current ECM research is categorized based on three structural pillars: system component dimensions, system lifecycle, and strategic managerial aspects.
Findings
After a review and classification of 91 ECM publications, it is found that ECM involves several sophisticated and interacting technical, social, organizational, and business aspects. The current ECM literature can be grouped around three main pillars: the first pillar consists of the four ECM component dimensions (tools, strategy, process, and people). The second pillar is the enterprise system lifecycle (adoption, acquisition, evolution, and evaluation). The final pillar is the strategic managerial aspect (change management, and management commitment). Based on the review and a proposed conceptual framework, an agenda for future research around the aforementioned three pillars is suggested.
Originality/value
There is a lack of ECM meta‐analysis research that explains the current state of the field. This paper contributes to information systems research by describing and classifying the published literature in ECM and by pointing out the gaps where further research is most needed. Furthermore, the paper provides a framework that may provide a conceptual structure for future studies.
Details
Keywords
Ramaraj Palanisamy, Jacques Verville and Nazim Taskin
As the wrong Enterprise Software (ES) acquisition can lead an organization with chronically exceeded budgets and settling for minimum returns, so can an unfavorable contractual…
Abstract
Purpose
As the wrong Enterprise Software (ES) acquisition can lead an organization with chronically exceeded budgets and settling for minimum returns, so can an unfavorable contractual agreement. Often the acquiring organizations become vulnerable to risks and mistakes as the software contracts are habitually written using legal terminologies and mainly to the advantage of the vendor. To avoid costly ES contracting mistakes, the purpose of this paper is to empirically identify the critical success factors (CSFs) of contracting in the context of ES acquisition.
Design/methodology/approach
A questionnaire survey was conducted to gather the data for this study. Statistical analysis conducted for this study include descriptive statistics, factor analysis with reliability and validity tests and nonparametric test.
Findings
The five key factors are: contractual assurance, forward compatibility and licensing; right to use, own and use of own, confidentiality and payment; software acceptance; license assignment; and vendor obligation for intellectual property. The research and managerial implications of these factors are given in discussion.
Research limitations/implications
As with most empirical studies, the subjectivity of the opinion of respondents from only two industries presents some limitations to generalization. Another limitation is the respondent has been asked for the degree of criticality for each of the contracting issue given in the questionnaire. There could be critical issues other than the listed ones which are more specific to the organization.
Practical implications
The results can be used by managers to improve their understanding on the critical contractual issues in ES acquisition negotiations.
Originality/value
The significant value of this study identifies the CSFs for ES contract negotiations while acquiring the software.
Details
Keywords
Shancang Li, Theo Tryfonas and Honglei Li
The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various…
Abstract
Purpose
The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.
Design/methodology/approach
Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.
Findings
IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc.
Practical implications
The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT.
Originality/value
The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.
Details
Keywords
Wikus Erasmus and Carl Marnewick
Success in the information systems (IS) project domain is elusive despite extensive research on the topic. Governance is seen as the greatest contributor to project success. The…
Abstract
Purpose
Success in the information systems (IS) project domain is elusive despite extensive research on the topic. Governance is seen as the greatest contributor to project success. The purpose of this paper is to investigate and report on the current perceptions and implementation of information technology (IT) governance within IS portfolio management to develop a sub-framework to guide practitioners. This sub-framework forms part of a grand IS project, programme and portfolio governance framework of which this study forms a contributing part.
Design/methodology/approach
The researchers followed a mixed-methods approach through utilising Q-methodology and inverted factor analysis.
Findings
The results provided a sub-framework recommending specific IT governance practices to be applied to IS portfolios. The recommendations are categorised as activities to be maintained, enhanced and/or implemented.
Research limitations/implications
The research only had participants from South African organisations and as such cannot be reliably extrapolated to other regions.
Originality/value
The resultant sub-framework provides stakeholders and practitioners involved in IS portfolios an opportunity to examine their own approaches and be confronted with possibilities in their portfolio management activities. Further research to be conducted includes creating a grand framework to address the linkages between portfolio, programme and project management as it relates to IT governance on various strategic levels.
Details
Keywords
Zhao Cai, Hefu Liu, Qian Huang, Yue Kang and Liang Liang
The purpose of this paper is to discuss the relationship between psychological contract and knowledge sharing behavior in the enterprise system (ES) post-implementation stage. The…
Abstract
Purpose
The purpose of this paper is to discuss the relationship between psychological contract and knowledge sharing behavior in the enterprise system (ES) post-implementation stage. The fulfillment and obligation of psychological contract are proposed as antecedents of knowledge sharing behavior performed by client firms. Additionally, entrepreneurial orientation (EO) is considered a moderator in the relationship between psychological contract and knowledge sharing.
Design/methodology/approach
This study adopted the questionnaire survey to collect data from 132 client firms of a focal ES provider in the garment industry of China. Hierarchical regression analysis was used for data analysis.
Findings
Psychological contract fulfillment is negatively related to knowledge sharing, whereas the positive role of psychological contract obligation is supported. EOstrengthens the role of both psychological contract fulfillment and obligation in shaping knowledge sharing behavior of client firms.
Originality/value
This study adopts forward- and backward-looking approaches in decision making as a theoretical lens to investigate how to improve client firms’ knowledge sharing behavior through psychological contract. By figuring out the roles of psychological contract and EO in influencing knowledge sharing, this research benefits both vendor and client firms in maintaining sustainable collaboration and continuous improvement of ES projects.
Details
Keywords
Argues that leaders with extensive backgrounds in organizational politics are more likely than technology‐focused leaders to complete their information technology projects…
Abstract
Argues that leaders with extensive backgrounds in organizational politics are more likely than technology‐focused leaders to complete their information technology projects successfully. Describes how successful technological leaders in the public sector manage their projects, mainly upwards and outwards, and tailor their technical visions to the day‐to‐day reality of their organizations. Compares the evolution and fate of two information technology projects, one managed by a technology‐oriented scientist (success) and the other by a politics‐driven bureaucrat (failure). Proposes that senior decision makers can hone the political skills of their technological leaders by training them on the “soft” skills of management and helping them balance the skill sets of their teams. Suggests how to change current incentive systems in order to encourage technological leaders to politick their projects to success.
Details
Keywords
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…
Abstract
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Details
Keywords
Jinyu Yang, Bin Liu and Lihua Yuan
This paper comes to the point from the tax competition of local government in investment promotion and capital introduction. This paper aims to empirically examine the internal…
Abstract
Purpose
This paper comes to the point from the tax competition of local government in investment promotion and capital introduction. This paper aims to empirically examine the internal mechanism of enterprises obtaining land resources from local government and its resulting equity investment increase and economic consequences of overinvestment.
Design/methodology/approach
The data of China’s A-share listed companies from 2007 to 2014 were used to test the relationship between the increase in enterprise equity investment and the acquisition of land resources and overinvestment. The descriptive statistics, correlation analysis and least squares linear regression were used to solve the above question.
Findings
One of the reasons for the enterprise equity increase is to obtain scarce land resources. The enterprise acquisition for land resources leads to overinvestment. The equity investment increase from obtaining land resources will further stimulate enterprise group to overinvest.
Research limitations/implications
The authors could not get the actual data of land that subsidiaries have obtained directly. In this research, the authors get the data using consolidated statements and subsidiary statements indirectly.
Practical implications
The results make contributions to the influencing factors and economic consequence of the enterprise investment structural deviation.
Social implications
It provides reference to optimize the “interaction” relationship between government and enterprises.
Originality/value
It identified the “dual-channel” conduction mechanism between land resource acquisition and enterprise overinvestment.
Details