Search results

1 – 10 of over 17000
Article
Publication date: 2 November 2015

Arthur Tatnall

It is widely acknowledged that the computer has caused great societal changes over recent years, but the purpose of this paper is to relate specifically to those due to the use of

3741

Abstract

Purpose

It is widely acknowledged that the computer has caused great societal changes over recent years, but the purpose of this paper is to relate specifically to those due to the use of computers in education and teaching about computing. The adoption and use of computers in education was very much a socio-technical process with influence from people, organisations, processes and technologies: of a variety of human and non-human actors.

Design/methodology/approach

This paper makes use of actor-network theory to analyse these events and their educational and societal impact. Data were collected from published sources, interviews with those involved at the time, discussions and from personal experience and observations.

Findings

Computers have, of course, had a huge impact on society, but particularly in relation to the use of computers in school education there was a different societal impact. Some of this related directly to education, some to school administration and some to student attitudes, experiences and knowledge.

Research limitations/implications

The paper investigates the development of early courses in computing in universities and schools in Victoria, Australia. The paper does not, however, consider the use of computers in university research, only in education.

Practical implications

The paper describes the significant educational events of the era from punch-card tabulating machines in the 1930s to micro-computers in the late 1980s, and investigates the relationship between the development of courses in the Universities and those in the more vocationally oriented Colleges of Advanced Education. It examines whether one followed from the other. It also investigates the extent of the influence of the universities and CAEs on school computing.

Social implications

The advent of the computer made a significant impact on university and school education even before the internet, Google, Wikipedia and smart phones in the late 1990s and 2000s. Computers in schools cause a rethink of how teaching should be handled and of the role of the teacher.

Originality/value

This paper investigates the history of computers and education in both universities and schools in Victoria, Australia over the period from the 1930s to the early 1990s. It considers how and why this technological adoption occurred, and the nature of the resulting educational and societal change this produced. Primary and High School use of computers did not commence until the 1970s but prior to this there is a considerable and interesting history associated with the development of Higher Education courses relating to computing.

Details

Information Technology & People, vol. 28 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 21 August 2012

Steven J. Kahl, Gregory J. Liegel and JoAnne Yates

Purpose – The broader aim of this research is twofold. First, we aim to better understand how the business computer was conceptualized and used within U.S. industry. Second, this…

Abstract

Purpose – The broader aim of this research is twofold. First, we aim to better understand how the business computer was conceptualized and used within U.S. industry. Second, this research investigates the role of social factors such as relational structure, institutional entrepreneurs, and position in the formation of conceptualizations of new technologies.

Design/methodological/approach – This paper is theoretically motivated in the sense that it responds to the lack of attention to the failure of institutional entrepreneurs to change belief systems. Through detailed archival, network, and descriptive statistical analysis, the paper shows how the failed institutional entrepreneur fits conventional explanations for success. The paper then analyzes two matched cases, comparing the insurance industry's rejection of the institutional entrepreneur with manufacturing's acceptance, in order to identify what is missing in current explanations of institutional entrepreneurs.

Findings – Our analysis reveals that the role of the audience structure in interpreting the institutional entrepreneur's message influences the change outcome. In our case, the institutional entrepreneur's view of the computer as a brain that supported decision-oriented applications did not fit with views of the insurance groups who had centralized authority over interpreting the computer. Because manufacturing had less centralized control in its discourse around the computer, there were fewer constraints on assimilation, allowing the entrepreneur's views to resonate with some of the occupational groups.

Research limitations/implications – This paper develops a theoretical approach to institutional entrepreneurship that situates the entrepreneurial efforts of individual actors within a system characterized by the structure of its audience and subject to distinct historical macro-structural processes that present significant obstacles to the realization of their entrepreneurial projects.

Article
Publication date: 2 September 2014

Issam Kouatli

The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to…

1990

Abstract

Purpose

The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud.

Design/methodology/approach

A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a “risk” analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific.

Findings

After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today’s technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s).

Practical implications

Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them.

Originality/value

A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique.

Book part
Publication date: 16 September 2017

Kevin J. Boudreau

Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter…

Abstract

Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter considers a most basic question of organization in platform contexts: the choice of boundaries. Herein, I investigate how classical economic theories of firm boundaries apply to platform-based organization and empirically study how executives made boundary choices in response to changing market and technical challenges in the early mobile computing industry (the predecessor to today’s smartphones). Rather than a strict or unavoidable tradeoff between “openness-versus-control,” most successful platform owners chose their boundaries in a way to simultaneously open-up to outside developers while maintaining coordination across the entire system.

Details

Entrepreneurship, Innovation, and Platforms
Type: Book
ISBN: 978-1-78743-080-8

Keywords

Article
Publication date: 12 June 2020

Taohua Ouyang, Xin Cao, Jun Wang and Sixuan Zhang

In this study, the authors aim to address the following two research questions: (1) How do technology innovation paradoxes manifest themselves in technological changes? (2) How do…

Abstract

Purpose

In this study, the authors aim to address the following two research questions: (1) How do technology innovation paradoxes manifest themselves in technological changes? (2) How do incumbent firms manage technology innovation paradoxes through multi-level organizational ambidexterity? To do so, the authors examine technology innovation in cloud computing, which has taken shape and brought about changes to the information technology industry. Specifically, the authors examine how a traditional software company, China Standard Software Co., Ltd. (CS2C), successfully navigated the technological transition to cloud computing from its existing operating systems business by managing innovation paradoxes through multi-level ambidexterity capabilities.

Design/methodology/approach

This study examines a single exploratory case and conducts an in-depth analysis of how technology innovation paradoxes manifest themselves in technological changes and how incumbent firms manage technology innovation paradoxes through multi-level organizational ambidexterity. The data collection and analysis occurred simultaneously through three phases. In Phase 1, one of the authors who had worked at CS2C for many years enabled the authors to obtain access to the company. The data analysis during this phase provided the authors with the history and current situation of CS2C, enabling them to understand the external circumstances, such as particular historical period, and internal conditions, such as cultural and technological changes, that would be relevant throughout the course of their study. It also helped the authors identify organizational ambidexterity capability as the guiding theoretical concept for their research. In Phase 2, the authors engaged in site visits and conducted detailed interviews with employees working at CS2C. In Phase 3, most of the data analysis was conducted. When the interview data were not sufficient to support the theoretical analysis, additional data were collected via phone calls and emails, to assure data-theory-model alignment.

Findings

The authors’ findings show that technology innovation paradoxes manifest themselves as contradictory relationships and mutual support relationships between exploitative and exploratory innovation. In addition, the authors identify three integration mechanisms as key to multi-level organizational ambidexterity capabilities in managing technology innovation paradoxes in technological changes.

Originality/value

Three important theoretical implications can be drawn from our case analysis. First, this research contributes to the knowledge of innovation paradoxes during technological changes. Second, this research provides a model of multi-level organizational ambidexterity capability in technological changes. Third, this research proposes three integration mechanisms driven by three types of ambidexterity capability at different organizational levels.

Details

Internet Research, vol. 30 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 June 2002

George K. Chacko

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…

3740

Abstract

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 14 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Book part
Publication date: 29 August 2018

Paul A. Pautler

The Bureau of Economics in the Federal Trade Commission has a three-part role in the Agency and the strength of its functions changed over time depending on the preferences and…

Abstract

The Bureau of Economics in the Federal Trade Commission has a three-part role in the Agency and the strength of its functions changed over time depending on the preferences and ideology of the FTC’s leaders, developments in the field of economics, and the tenor of the times. The over-riding current role is to provide well considered, unbiased economic advice regarding antitrust and consumer protection law enforcement cases to the legal staff and the Commission. The second role, which long ago was primary, is to provide reports on investigations of various industries to the public and public officials. This role was more recently called research or “policy R&D”. A third role is to advocate for competition and markets both domestically and internationally. As a practical matter, the provision of economic advice to the FTC and to the legal staff has required that the economists wear “two hats,” helping the legal staff investigate cases and provide evidence to support law enforcement cases while also providing advice to the legal bureaus and to the Commission on which cases to pursue (thus providing “a second set of eyes” to evaluate cases). There is sometimes a tension in those functions because building a case is not the same as evaluating a case. Economists and the Bureau of Economics have provided such services to the FTC for over 100 years proving that a sub-organization can survive while playing roles that sometimes conflict. Such a life is not, however, always easy or fun.

Details

Healthcare Antitrust, Settlements, and the Federal Trade Commission
Type: Book
ISBN: 978-1-78756-599-9

Keywords

Article
Publication date: 1 January 1989

Rob Kling and Suzanne Iacono

Examines how important social and technical choices become part ofthe history of a computer‐based information system (CBIS). Argues thatCBIS should be developed in terms of their…

Abstract

Examines how important social and technical choices become part of the history of a computer‐based information system (CBIS). Argues that CBIS should be developed in terms of their social, as well as their information‐processing characteristics. Demonstrates that developing CBIS as an institutional system is important because: the useability is more critical than the technology; a well‐used CBIS with a stable structure is more difficult to replace than an unstable, ill‐used one; and CBIS vary from one social setting to another. Illustrates with a case study of a failed attempt at conversion.

Details

Office Technology and People, vol. 5 no. 1
Type: Research Article
ISSN: 0167-5710

Keywords

Article
Publication date: 23 December 2020

Merlin Stone, Eleni Aravopoulou, Ryan Stott, Brett David Parnell, Jon Machtynger, Bryan Foss and Liz Machtynger

The purpose of this paper is to show how the business model of the information and communications technology (ICT) industry has evolved and the general differences that evolution…

Abstract

Purpose

The purpose of this paper is to show how the business model of the information and communications technology (ICT) industry has evolved and the general differences that evolution has made to information management.

Design/methodology/approach

Literature review was carried out accompanied by conceptual analysis.

Findings

It shows that changes in the business model of the ICT industry have been quite dramatic and have led to significant changes in the structure of the industry.

Research limitations/implications

This research is based on analysis of the ICT industry. The analysis could be broadened to include other industries. Research into business model change should consider adopting the evolutionary approach taken in this paper.

Practical implications

Managers in the ICT industry should factor the likely evolution of business models in their industry into their planning.

Social implications

Government policymakers considering how to stimulate the development of the ICT industry in their country should be aware of the moving nature of their target.

Originality/value

This is one of the first papers to apply the evolutionary approach to business model change.

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

1 – 10 of over 17000