Search results

1 – 5 of 5
Article
Publication date: 21 March 2019

Nianxin Wang, Huigang Liang, Shilun Ge, Yajiong Xue and Jing Ma

The purpose of this paper is to understand what inhibit or facilitate cloud computing (CC) assimilation.

Abstract

Purpose

The purpose of this paper is to understand what inhibit or facilitate cloud computing (CC) assimilation.

Design/methodology/approach

The authors investigate the effects of two enablers, top management support (TMS) and government support (GS), and two inhibitors, organization inertia (OI) and data security risk (DSR) on CC assimilation. The authors posit that enablers and inhibitors influence CC assimilation separately and interactively. The research model is empirically tested by using the field survey data from 376 Chinese firms.

Findings

Both TMS and GS positively and DSR negatively influence CC assimilation. OI negatively moderates the TMS–assimilation link, and DSR negatively moderates the GS–assimilation link.

Research limitations/implications

The results indicate that enablers and inhibitors influence CC assimilation in both separate and joint manners, suggesting that CC assimilation is a much more complex process and demands new knowledge to be learned.

Practical implications

For these firms with a high level of OI, only TMS is not enough, and top managers should find other effective way to successfully implement structural and behavioral change in the process of CC assimilation. For policy makers, they should actively play their supportive roles in CC assimilation.

Originality/value

A new framework is developed to identify key drivers of CC assimilation along two bipolar dimensions including enabling vs inhibiting and internal vs external.

Details

Internet Research, vol. 29 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 14 December 2018

Nianxin Wang, Yajiong Xue, Huigang Liang, Zhining Wang and Shilun Ge

The purpose of this paper is to investigate the government roles in cloud computing assimilation along two dimensions: government regulation and government support.

Abstract

Purpose

The purpose of this paper is to investigate the government roles in cloud computing assimilation along two dimensions: government regulation and government support.

Design/methodology/approach

A research model was developed to depict the dual roles of government regulation and government support in cloud computing assimilation as well as the mediating effect of top management support (TMS). Using survey data collected from 376 Chinese firms that have already adopted cloud services, the authors tested the research model.

Findings

The impacts of both government regulation and government support on cloud computing assimilation are partially mediated by TMS. Government support exerts stronger impacts on TMS than government regulation.

Research limitations/implications

This study extends the current information systems literature by highlighting the specific mechanisms through which governments influence firms’ assimilation of cloud computing.

Practical implications

Governments in developing countries could actively allocate funds or enact policies to effectively encourage cloud computing assimilation.

Originality/value

This study would complement previous findings about government regulation, and develop a more holistic understanding about the dual roles of governments in information technology innovation assimilation.

Details

Information Technology & People, vol. 32 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 9 April 2020

Yu Jia, Shilun Ge and Nianxin Wang

The purpose of this study is to propose a data-driven perspective to analyze enterprise information system (EIS) feature use for understanding what and how the system features are…

Abstract

Purpose

The purpose of this study is to propose a data-driven perspective to analyze enterprise information system (EIS) feature use for understanding what and how the system features are actually used in the organization.

Design/methodology/approach

An empirical study was conducted by analyzing information system (IS) log data collected from a well-known shipbuilding manufacturer in China. The multiple analytical approach employed in this study includes social network analysis, association rules learning and human dynamics.

Findings

This study first classified IS users into 41 core users and 325 general users. Then 24 core modules and 54 general modules were identified by social network analysis, and the correlation between them was analyzed. Finally, we found that the IS use time intervals for different user groups followed a power-law distribution, and IS use displayed strong burstiness and weak memory.

Originality/value

This study proposes a data-driven perspective to investigate how the system features are actually used in the organization. This study contributes to the literature and opens a new avenue for future IS use research. Furthermore, this study informs managers how to diagnose, maintain and optimize the implemented IS in order to maximize IS benefits.

Details

Information Technology & People, vol. 34 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 August 2010

Baozhen Lee and Shilun Ge

The purpose of this paper is to analyse the personalised and social characteristics of open knowledge management in higher education based on social tagging in the Web 2.0…

1288

Abstract

Purpose

The purpose of this paper is to analyse the personalised and social characteristics of open knowledge management in higher education based on social tagging in the Web 2.0 environment.

Design/methodology/approach

Through the function of annotation in social tagging, the paper analyses its personalised characteristics of recognising the preferences of participants, and its personalised‐social characteristics of enriching content from all kinds of aspects; through the function of association of social tagging, it analyses its social characteristics of social networking, and its social‐personalised characteristics of collaborative acquisition or recommendation.

Findings

In the process of online information and open knowledge organisation and acquisition based on the annotation function of social tagging in the Web 2.0 environment, the personalised participation of individuals will lead to social results for everyone; however, in the process of online information and open knowledge creation and sharing based on the association function of social tagging, social and collaborative sharing among participants will help with personalised knowledge allocation.

Originality/value

In open knowledge management in higher education, the characteristics of personalisation and sociability based on social tagging will help to personalise the organisation and acquisition of knowledge, and help with social creation and sharing of knowledge.

Details

Online Information Review, vol. 34 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Book part
Publication date: 4 December 2020

Abdelkebir Sahid, Yassine Maleh and Mustapha Belaissaoui

This chapter presents an analysis illustrating the evolution of information systems’ development based on three interdependent phases. In the first period, information systems…

Abstract

This chapter presents an analysis illustrating the evolution of information systems’ development based on three interdependent phases. In the first period, information systems were mainly considered as a strictly technical discipline. Information technology (IT) was used to automate manual processes; each application was treated as a separate entity with the overall objective of leveraging IT to increase productivity and efficiency, primarily in an organizational context. Secondly, the introduction of networking capabilities and personal computers (instead of fictitious terminals) has laid the foundations for a new and broader use of information technologies while paving the way for a transition from technology to its actual use. During the second phase, typical applications were intended to support professional work, while many systems became highly integrated. The most significant change introduced during the third era was the World Wide Web, which transcended the boundaries of the Internet and the conventional limits of IT use. Since then, applications have become an integral part of business strategies while creating new opportunities for alliances and collaborations. Across organizational and national boundaries, this step saw a transformation of IT in the background. These new ready-to-use applications are designed to help end-users in their daily activities. The end-user experience has become an essential design factor.

Details

Strategic Information System Agility: From Theory to Practices
Type: Book
ISBN: 978-1-80043-811-8

1 – 5 of 5