Search results

1 – 7 of 7
To view the access options for this content please click here
Article

Ramaraj Palanisamy and Yang Wu

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies…

Abstract

Purpose

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?

Design/methodology/approach

These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.

Findings

The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.

Research limitations/implications

The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.

Practical implications

The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.

Social implications

Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.

Originality/value

This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article

Ramaraj Palanisamy, Jacques Verville, Christine Bernadas and Nazim Taskin

The purpose of this paper is to understand the decision process of enterprise software acquisition. The research aims to focus on identifying significant influences on…

Abstract

Purpose

The purpose of this paper is to understand the decision process of enterprise software acquisition. The research aims to focus on identifying significant influences on enterprise software acquisition decisions.

Design/methodology/approach

As a research model and theoretical background, the organizational buying model (OBB) is proposed for the acquisition of enterprise systems. Influences on enterprise software acquisition decision processes were found by an empirical study carried out from a practitioner's perspective. The study collected data via a mail survey administered to information systems (IS) professionals involved in the acquisition of enterprise software (ES). The survey questionnaire was developed based on a previous research project and a literature review. Organizational buying behavior (OBB) models in the literature served as the basis for the influences included in the survey instrument. Factor analysis was carried out on the survey data to identify the most significant factors/influences.

Findings

The following five factors emerged as significant influences on the acquisition decision process of enterprise software: ES strategy and performance; BPR and adaptability; management commitment and user buy‐in; single vendor integrated solution; and consultants, team‐location, and vendor's financing. These factors are discussed and managerial implications are extracted. Conclusions are derived from the study findings and guidelines for further research are suggested.

Research limitations/implications

The present study provides a starting point for further research in understanding a more comprehensive list of influences on enterprise software acquisition. A bigger sample from more industries is required to examine whether the significance of the influences remains stable.

Originality/value

Using OBB models has proven to be useful for organizations in making effective decisions on enterprise software acquisition.

Details

Journal of Enterprise Information Management, vol. 23 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article

Ramaraj Palanisamy

This paper provides a model for IS planning for building flexibility and success, by considering volatile environment and the possibilities for leveraging the user's…

Abstract

Purpose

This paper provides a model for IS planning for building flexibility and success, by considering volatile environment and the possibilities for leveraging the user's cognitive capabilities.

Design/methodology/approach

A review of existing IS planning models is given to identify the shortcomings in building flexibility and success. A model is evolved by hypothesizing user involvement in IS planning leads to IS flexibility; and flexibility in IS enables organizational flexibility and IS success. The control variables were considered at the user, IS, and organizational levels. The proposed model was examined by a questionnaire survey, in which 296 users and planners from 42 organizations participated.

Findings

The study results validated the proposed model that IS success and organizational flexibility could be achieved through IS flexibility, which could be generated by involving users in IS planning. Also, the study results have shown that user expectations, perceived personal usefulness, and users' internal flexibility possess a high driver power for user involvement.

Research limitations/implications

The variables included in the model are not exhaustive, and the validity of the model has not been tested in a real life situation.

Originality/value

This paper explains the ways of collaborating with users and top management to plan a flexible IS by studying the impending changes in the environment.

Details

Industrial Management & Data Systems, vol. 105 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

To view the access options for this content please click here
Article

Ramaraj Palanisamy, Jacques Verville and Nazim Taskin

As the wrong Enterprise Software (ES) acquisition can lead an organization with chronically exceeded budgets and settling for minimum returns, so can an unfavorable…

Abstract

Purpose

As the wrong Enterprise Software (ES) acquisition can lead an organization with chronically exceeded budgets and settling for minimum returns, so can an unfavorable contractual agreement. Often the acquiring organizations become vulnerable to risks and mistakes as the software contracts are habitually written using legal terminologies and mainly to the advantage of the vendor. To avoid costly ES contracting mistakes, the purpose of this paper is to empirically identify the critical success factors (CSFs) of contracting in the context of ES acquisition.

Design/methodology/approach

A questionnaire survey was conducted to gather the data for this study. Statistical analysis conducted for this study include descriptive statistics, factor analysis with reliability and validity tests and nonparametric test.

Findings

The five key factors are: contractual assurance, forward compatibility and licensing; right to use, own and use of own, confidentiality and payment; software acceptance; license assignment; and vendor obligation for intellectual property. The research and managerial implications of these factors are given in discussion.

Research limitations/implications

As with most empirical studies, the subjectivity of the opinion of respondents from only two industries presents some limitations to generalization. Another limitation is the respondent has been asked for the degree of criticality for each of the contracting issue given in the questionnaire. There could be critical issues other than the listed ones which are more specific to the organization.

Practical implications

The results can be used by managers to improve their understanding on the critical contractual issues in ES acquisition negotiations.

Originality/value

The significant value of this study identifies the CSFs for ES contract negotiations while acquiring the software.

Details

Journal of Enterprise Information Management, vol. 28 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

Content available
Article

Zahir Irani and Muhammad Kamal

Abstract

Details

Journal of Enterprise Information Management, vol. 28 no. 1
Type: Research Article
ISSN: 1741-0398

To view the access options for this content please click here
Article

Umesh Gulla and M.P. Gupta

The purpose of this paper is to suggest a framework that would guide the practicing manager to decide the degree of information systems (IS) outsourcing.

Abstract

Purpose

The purpose of this paper is to suggest a framework that would guide the practicing manager to decide the degree of information systems (IS) outsourcing.

Design/methodology/approach

The proposed framework has been derived from the findings of a previous empirical study and qualitative inputs. Analytical hierarchy process (AHP) is then used to apply the framework. The framework is finally validated in three India‐based banks.

Findings

The proposed framework helps in creating a strategic alignment between the business strategy and information system strategy. The application of the framework shows the preference of managers towards high IS outsourcing. Strategic alignment and medium term impact emerge the important factors in IS outsourcing. The validity of the framework is proved in three banks.

Research limitations/implications

The validation exercise has been done on a small sample due to resources constraints and a study involving a larger sample is desired. Further, it is advised to review the framework on regular intervals and make suitable changes in decision factors.

Practical implications

The framework is helpful to managers in identifying the critical factors which can act as useful inputs in taking informed decisions on the degree of IS outsourcing.

Originality/value

The paper fills some of the gaps in IS outsourcing by suggesting a practice‐ oriented framework that guides the decision maker to undertake a systematic and structured approach in arriving at an outsourcing decision. The framework has evolved from the practices of banks in India for which there does not exist any similar research.

Details

Journal of Enterprise Information Management, vol. 25 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article

Surendran Arumugam, Ashok K.R., Suren N. Kulshreshtha., Isaac Vellangany and Ramu Govindasamy

This paper aims to explore the impact of climate change on yields and yield variances in major rainfed crops and measure possible changes in yields under projected climate…

Abstract

Purpose

This paper aims to explore the impact of climate change on yields and yield variances in major rainfed crops and measure possible changes in yields under projected climate changes in different agro-climatic zones of Tamil Nadu, India. Although many empirical studies report the influence of climate change on crop yield, only few address the effect on yield variances. Even in such cases, the reported yield variances were obtained through simulation studies rather than from actual observations. In this context, the present study analyzes the impact of climate change on crops yield and yield variance using the observed yields.

Design/methodology/approach

The Just-Pope yield function (1978) is used to analyze the impact of climate change on mean yield and variance. The estimated coefficient from Just-Pope yield function and the projected climatic data for the year 2030 are incorporated to capture the projected changes in crop yield and variances.

Findings

By the year 2030, the yield of pulses is estimated to decline in all the zones (Northeast, Northwest, Western, Cauvery delta, South and Southern zones), with significant declines in the Northeast zone (6.07 per cent), Cauvery delta zone (3.55 per cent) and South zone (3.54 per cent). Sorghum yield may suffer more in Western zone (2.63 per cent), Southern zone (1.92 per cent) and Northeast zone (1.62 per cent). Moreover, the yield of spiked millet is more likely to decrease in the Southern zone (1.39 per cent), Northeast zone (1.21 per cent) and Cauvery delta zone (0.24 per cent), and the yield of cotton may also decline in the Northeast zone (12.99 per cent), Northwest zone (8.05 per cent) and Western zone (2.10 per cent) of Tamil Nadu, India.

Originality/value

The study recommends introducing appropriate crop insurance policies to address possible financial losses to the farmers. Prioritizing area-specific stress-tolerant crop varieties without complementing yield would sustain crops cultivation further.

Details

International Journal of Climate Change Strategies and Management, vol. 7 no. 4
Type: Research Article
ISSN: 1756-8692

Keywords

1 – 7 of 7