Search results
1 – 10 of 229Erastus Karanja, Donna Grant and Jigish S. Zaveri
Grounded in the principal-agent theory, this study aims to develop and test hypotheses too, investigate how the firm’s strategic orientations, namely, innovation, growth…
Abstract
Purpose
Grounded in the principal-agent theory, this study aims to develop and test hypotheses too, investigate how the firm’s strategic orientations, namely, innovation, growth, differentiation and cost leadership impact the chief information officer (CIO) reporting relationship and structure.
Design/methodology/approach
The study uses content analysis to analyze a data set of press releases collected from the LexisNexis Academic wire index. The press releases were issued by firms when they hired CIOs between 2003 and 2007, yielding 128 firms, which had specific information about the CIO reporting relationship and structure.
Findings
The results reveal that firms seeking an innovation, growth or differentiation strategy have their CIOs reporting to the chief executive officer.
Research limitations/implications
The current study is motivated by the desire to replicate and extend the works of previous researchers who have assessed various CIO issues. Replication takes several forms such as the use of similar or different data sets, different research environments or reinvestigating research concepts through a different theoretical lens. This study makes use of a multi-firm data set spanning five years and the principal-agent theory as the theoretical framework to explore the CIO reporting relationship and structure. Although this study focuses on the hiring trends and the strategic orientations of the firms, future studies should explore other characteristics associated with the CIOs that might have an impact on the reporting relationship such as the years of experience, age, educational background of CIOs and information technology budgets.
Practical implications
The existing literature has not settled the debate as to whom the CIO should be reporting to and understanding the reporting relationships is important because, in many firms, the organizational structures and the reporting relationships are indicative of the power dynamics and how the organizational resources are controlled and shared.
Originality/value
Replication studies are important because they confirm, reinforce, extend and provide reliability to the paradigms and knowledge in the discipline, as well as offer reliability of the results upon which scientific progress is based.
Details
Keywords
This study examines the problems associated with the management fee on outsourced CIOs in the public pension funds in Korea and proposes a better management fee structure. The…
Abstract
This study examines the problems associated with the management fee on outsourced CIOs in the public pension funds in Korea and proposes a better management fee structure. The main results of this study are summarized as follows. First, the outsourced CIO is likely to make a profit, provided that the management cost of the outsourced CIO is lower than a fixed ratio in a fee structure. Second, the profit margin of public funds increases as the fixed ratio decreases. Third, the outsourced CIOs can make a sure profit under the existence of the fixed fee only, regardless of the performance of public funds. In addition, the profit of outsourced CIOs increases as the level of delegation fees for sub-management firms decreases. However, such a fee structure may result in making worse the overall performance of funds ultimately. Fourth, it is necessary to introduce the performance-linked fee structure when the outsourced CIOs of public pension funds are selected. Such a fee structure can mitigate the possibility that the outsourced CIOs reassigns fund to sub-management firms with low management capacities, thereby lowering the fund’s overall performance.
Details
Keywords
John Thomas Flynn and Lloyd Levine
A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new…
Abstract
A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new technology seamlessly and quickly to deliver for customers, the government struggles to accomplish technology purchases and integrations with the same ease. As governments in the United States are looking to retain their current workforce and attract the next generation of workers, the technological capabilities and ethos of governments will be paramount. With nearly every industry being transformed by technology and Generation T being the first generation to have an ingrained “technology first” mindset, the ability of governments to attract these workers depends, in large part, on the ability to transform their government technology culture, policies, and practices.
In this chapter, the authors examine the administrative branch and observe two key components at the root of most technology failures: poor organizational structure in the bureaucracy and the lack of an empowered Chief Information/Technology Officer. Building upon case studies from Massachusetts and California, this chapter looks at the factors related to failure or success to understand the technology procurement culture. The chapter concludes by presenting four key “best practice” principles of public policy and administration that can be implemented by almost any governmental entity to improve their acquisition and implementation of technology.
Details
Keywords
The aim of this study is to advance research on the position of the CISO by investigating the role that CISOs play before and after an IT security breach. There is a dearth of…
Abstract
Purpose
The aim of this study is to advance research on the position of the CISO by investigating the role that CISOs play before and after an IT security breach. There is a dearth of academic research literature on the role of a chief information security officer (CISO) in the management of Information Technology (IT) security. The limited research literature exists despite the increasing number and complexity of IT security breaches that lead to significant erosions in business value.
Design/methodology/approach
The study makes use of content analysis and agency theory to explore a sample of US firms that experienced IT security breaches between 2009 and 2015 and how these firms reacted to the IT security breaches.
Findings
The results indicate that following the IT security breaches, a number of the impacted firms adopted a reactive plan that entailed a re-organization of the existing IT security strategy and the hiring of a CISO. Also, there is no consensus on the CISO reporting structure since most of the firms that hired a CISO for the first time had the CISO report either to the Chief Executive Officer or Chief Information Officer.
Research limitations/implications
The findings will inform researchers, IT educators and industry practitioners on the roles of CISOs as well as advance research on how to mitigate IT security vulnerabilities.
Originality/value
The need for research that advances an understanding of how to effectively manage the security of IT resources is timely and is driven by the growing frequency and sophistication of the IT security breaches as well as the significant direct and indirect costs incurred by both the affected firms and their stakeholders.
Details
Keywords
William J. Tastle and Ársæll Valfells
The purpose of this paper is to establish a baseline for the study of offshore outsourcing in Iceland. After an extensive search to identify any paper (English or Icelandic) that…
Abstract
Purpose
The purpose of this paper is to establish a baseline for the study of offshore outsourcing in Iceland. After an extensive search to identify any paper (English or Icelandic) that dealt with this topic turned up empty, it was decided that a comprehensive work was necessary to provide an opportunity for future comparative research.
Design/methodology/approach
Data were secured by interviewing the chief information officers (CIOs) or equivalent officers of the 11 largest corporations (by Icelandic standards). A checklist was used to focus the initial question session, and then the CIOs were permitted, and encouraged, to muse about their information technology (IT) operations. Insights were gathered on a set of problems, and some of those identified problems were quite unexpected.
Findings
Ten trends are identified consisting of aspects of: the difficulty of hiring qualified labor in‐country; establishment of strategy resides entirely within the IT management; security remains a serious concern; offshore subcontractors sometimes place their employees within Icelandic companies; mid‐ and upper‐level employees who can strategically develop networks and systems are in strong demand; use of information system (IS)/IT standards for information security is mostly voluntary; generally, the establishment of IS/IT strategy does not remain with board of directors; virtually all Icelandic corporations engage in, or have engaged in, outsourcing over the past five years (11 sub‐trends are identified); and the business school curricula is inadequate to the needs of Icelandic corporations with respect to IT demands.
Research limitations/implications
Comparisons among Nordic and other small nations are not addressed. Virtually, every trend noted should be followed up with additional study. This paper is designed to establish baseline of current offspring activity in Iceland. It is by no means a definitive study.
Practical implications
Many research threads are identified and opened for future work. Academic programs can use this paper as motivation for modifications in existing programs and the creation of new one that better satisfies corporate needs.
Originality/value
Prior to this paper, there is no information available on the state of IT offshoring in the country of Iceland. A benchmark is now established against which future research can be measured.
Details
Keywords
James Stephen Denford and Kurt Schobel
The purpose of this paper is to explore the unique and challenging relationship between the chief financial officer (CFO) and chief information officer (CIO) in the public sector.
Abstract
Purpose
The purpose of this paper is to explore the unique and challenging relationship between the chief financial officer (CFO) and chief information officer (CIO) in the public sector.
Design/methodology/approach
In this paper, the authors operationalize the CFO–CIO relationship using upper echelon theory (UET) and propose an extension to it by introducing relationship effectiveness and role perception constructs. Applying a configurational approach to paired survey data, the authors use fuzzy set qualitative comparative analysis to examine both joint and individual role paths to success.
Findings
The CFO is ultimately responsible for financial reporting, disclosure and financial decision-making; however, regulatory changes in the accounting domain have resulted in the increased use of information technology (IT) thereby bringing the CIO to the forefront of the accounting information discussion. Thus, an improved understanding of the CFO/CIO relationship can have a direct impact on how accounting information is captured and analyzed. The authors find that CFO and CIO proximity can often increase the likelihood of an effective relationship. On an individual level, an ambidextrous approach to strategic value and cost-effectiveness is key to both CFO and CIO success.
Research limitations/implications
This study extends current models of top management team relationships by examining work proximity and role perception in the context of UET. It was conducted within the context of Canadian government and post-secondary education. The authors believe the findings can be generalized for the public sector in general; however, its applicability in the private sector, where the role of the CFO is broader, is uncertain.
Practical implications
The findings identify an opportunity for both accounting (financial) and IT communities to develop education within the context of their respective professional bodies to enhance this special relationship.
Originality/value
Recent regulatory changes in the accounting domain have brought an increased need for IT and therefore increased interaction between the CFO and CIO. This study focuses on the unique relationship between the CFO and CIO, which has a direct impact on accounting functions and highlights the importance of both the CFO and CIO having an ambidextrous approach to strategic value and cost-effectiveness if they want to be successful. In addition, it demonstrates that the relationship between the CFO and CIO is important, but more important for the success of the CIO than the CFO.
Details
Keywords
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…
Abstract
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.
Details
Keywords
Erastus Karanja and Jigish Zaveri
In most firms, accounting and financial information and reporting systems are either incorporated or embedded in computer-based information systems (IS). Despite the important…
Abstract
Purpose
In most firms, accounting and financial information and reporting systems are either incorporated or embedded in computer-based information systems (IS). Despite the important roles that these computer-based IS play in facilitating the SOX Act compliance initiatives, the act is silent on the roles of the CIOs, although it does stipulate specific functions for the CEOs, CFOs, and the auditors. Based on a detailed analysis of the extant literature, this article argues that IT units, under the leadership of the CIOs, contribute significantly in the procurement, design, implementation, and the governance of these computer-based IS. The paper aims to discuss these issues.
Design/methodology/approach
The researchers generate and empirically test hypotheses using a panel data set obtained from press releases issued by firms following the hiring of CIOs between 1999 and 2005.
Findings
The results reveal that, after the enactment of the SOX Act in 2002, many firms hired new CIOs in the post-SOX Act period. Also, many of these executives were hired to fill newly created Chief information officer (CIO) positions. The results support the argument that the SOX Act has influenced the roles of senior IT executives and IT governance.
Research limitations/implications
Although this study focused on hiring trends, there are other characteristics associated with CIOs that might have an impact on corporate IT governance. Future studies could investigate whether or not, for instance, firms reported fewer IT material weaknesses before or after the hire of the CIOs.
Originality/value
This research presents the argument and detailed discussion that while the SOX Act does not explicitly require the CIOs to sign off on the accounting/financial statements and reports, their role is fundamental in making the firm meet the SOX Act compliance standards.
Details
Keywords
Giuseppe D'Onza, Rita Lamboglia and Roberto Verona
This paper aims to analyse the relationship between the senior management and the information technology (IT) auditing undertaken in Italian banks, focusing specifically on the…
Abstract
Purpose
This paper aims to analyse the relationship between the senior management and the information technology (IT) auditing undertaken in Italian banks, focusing specifically on the internal IT auditing. The purpose of this paper is to investigate senior executives’ expectations regarding IT auditing, the techniques IT auditors apply to meet these expectations, the degree to which senior managers are satisfied with the auditing and the expectation gap.
Design/methodology/approach
We conducted 22 interviews with senior managers and IT auditors of seven Italian banks, comprising large and small financial institutions, to gain data for our analysis.
Findings
We found that overall, the IT auditors’ contributions satisfy senior managers, even though they still see room for improvement. They expect more support for the IT governance processes, specifically for the alignment between IT investments and business needs and between IT risk management and the value that IT resources provide. In addition, they want IT auditors to focus more strongly on IT security. To meet these expectations, IT auditors would have to improve their technical and non-technical skills. These skills will allow them to expand their activities, to be more proactive and to take on effective roles in IT governance processes.
Originality/value
This study contributes to the existing literature by providing insights into the internal audit function’s evolving role and into banks’ IT audit activities. It also provides a valuable insight into senior management’s expectations regarding the role IT audit activities should play to support the profession and the banking policymakers, thus providing a better understanding of IT audit activities and improving these activities’ role.
Details
Keywords
Stefano Bresciani, Alberto Ferraris, Marco Romano and Gabriele Santoro