Search results

1 – 10 of over 11000
Open Access
Article
Publication date: 7 June 2023

Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…

1296

Abstract

Purpose

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.

Design/methodology/approach

The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.

Findings

Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.

Practical implications

This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.

Originality/value

To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.

Details

Journal of Knowledge Management, vol. 27 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2266

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 2 September 2019

Rolando Gonzales and Jonathan Wareham

In this study, three models were empirically compared, the DeLone and McLean model, the Seddon model and the Modified Seddon model, by measuring the impact of a business…

3300

Abstract

Purpose

In this study, three models were empirically compared, the DeLone and McLean model, the Seddon model and the Modified Seddon model, by measuring the impact of a business intelligence system (BIS) in companies in Peru. After that, the mediators and dependent constructs were analysed to determine if they were behaving properly (a good level of variance explanation and significant relations with others constructs). The study used a sample of 104 users of the BIS, from companies in several important economic sectors, in a quasi-voluntary context and with six constructs: information quality, system quality, service quality, system dependence (system use), user satisfaction and perceived usefulness (individual impact).

Design/methodology/approach

To interpret the results, the authors used structural equations. The idea was to look for the best fit and explanations for the outcomes. The main difference in these models is that the DeLone and McLean model considers system dependence (system use) as a part of information system success, but in the Seddon model, it is a consequence of it.

Findings

The Seddon model seems to show the best fit and explanation for the outcomes. After that, a review of the system use construct was realised, because of its limited variance explained and the few significant relations with other constructs, to improve its explanation power in future research.

Research limitations/implications

It is estimated that the sample includes more than 15 per cent of all the companies that use a BISs in Peru, so the size of the sample is adequate, but it is not entirely random and therefore limits the generalizability of outcomes. Besides that, a sample size that is bigger could be better for the sake of making a more detailed analysis, permitting the use of some items with less power, or the use of another statistical procedure for structural equations such as the Asymptotical Distribution Free, permitting a more detailed analysis (Hair et al., 2006).

Originality/value

Business intelligence (BI), one of the most important components of information systems (IS), is playing a very relevant role in business in this time of high competition, high amounts of data and new technology. Currently, companies feel pressured to respond quickly to change and complicated conditions in the market, needing to make the correct tactical, operational and strategic decisions (Chugh and Grandhi, 2013). BI is one of the most important drivers of the decade (Gartner, 2013). Big companies of IS are creating special units specialised in BI, helping companies become more efficient and effective in daily operations.

Details

Journal of Economics, Finance and Administrative Science, vol. 24 no. 48
Type: Research Article
ISSN: 2077-1886

Keywords

Open Access
Article
Publication date: 17 March 2020

Ioanna Falagara Sigala, William J. Kettinger and Tina Wakolbinger

The purpose of this study is to explore what design principles need to be considered in Enterprise Resource Planning (ERP) systems for humanitarian organizations (HOs) to enable…

5510

Abstract

Purpose

The purpose of this study is to explore what design principles need to be considered in Enterprise Resource Planning (ERP) systems for humanitarian organizations (HOs) to enable agile, adaptive and aligned (Triple-A) humanitarian supply chain capabilities and digitize humanitarian operations.

Design/methodology/approach

This study follows an embedded case study approach with a humanitarian medical relief organization, Médecins Sans Frontières (MSF), which engaged in a multiyear ERP design at its humanitarian field missions.

Findings

This research shows that ERP systems for humanitarian organizations should be designed as unique systems addressing humanitarian organizations' challenges and unique missions, their value generation processes, and resource base in an effort to improve organizational performance. This study presents 12 general design principles that are unique for humanitarian organizations. These design principles provide a high-level structure of guidance under which specific requirements can be further defined and engineered to achieve success.

Research limitations/implications

The results of this study are based on a single case study limiting generalizability. However, the case study was analyzed and presented as an embedded case study with five autonomous subunits using different business processes and following different adoption and implementation approaches. Therefore, the findings are derived based on considerable variance reflective of humanitarian organizations beyond MSF.

Practical implications

This study recognizes that HOs have unique routines that standard commercial ERP packages do not address easily at the field level. The primary contribution of this research is a set of design principles that consider these unique routines and guide ERP development in practice. National and international HOs that are planning to implement information systems, private companies that are trading partners of HOs as well as vendors of ERP systems that are looking for new opportunities would all benefit from this research.

Originality/value

This study fills the gap in the humanitarian literature regarding the design of ERP systems for humanitarian organizations that enable Triple–A supply chain capabilities and it advances the knowledge of the challenges of ERP design by HOs in the context of humanitarian operations.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 10 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 10 August 2023

Douglas Legramante, Ana Azevedo and Jose Manuel Azevedo

This paper aims to analyse the factors that influence the satisfaction and intention of continuity of use, of teachers and students, regarding using Moodle in undergraduate…

2324

Abstract

Purpose

This paper aims to analyse the factors that influence the satisfaction and intention of continuity of use, of teachers and students, regarding using Moodle in undergraduate courses in one Campus at the Federal Institute of Rondônia in Brazil. The starting point was an integration of DeLone and McLean's Information Systems Success Model (ISSM) with Davis' Technology Acceptance Model (TAM).

Design/methodology/approach

A quantitative research approach was adopted. After the definition of the hypotheses, data were collected through self-administered questionnaires. The questionnaires were designed to measure the five constructs: Quality of Information (QI), Perceived Ease of Use (PEOU), Perceived Usefulness (PU), User Satisfaction (US) and Behavioural Intention to use (BI) that make up the conceptual model of the study. The data were analysed based on 144 valid questionnaires. The technique of maximum likelihood estimation was adopted in the data analysis through structural equation modelling (SEM).

Findings

The results confirmed six of the nine hypothesised relationships. QI positively impacts PEOU and US. PEOU positively impacts PU, which in turn positively impacts US and BI. Similarly, US positively impacts Moodle's BI. It was also evidenced that PU is the strongest predictor of US.

Practical implications

These results can help educational institutions, managers, administrators and designers of e-learning systems to develop strategies to increase Moodle's user satisfaction.

Originality/value

This study provides insights into the perception of students and teachers regarding the use of Moodle. A model that integrates constructs from two models widely used in research related to e-learning (TAM and ISSM) was used in a developing country context. This is important, given cultural differences and social idiosyncrasies in different contexts, particularly in an educational institution in the Amazonia region in northern Brazil.

Details

The International Journal of Information and Learning Technology, vol. 40 no. 5
Type: Research Article
ISSN: 2056-4880

Keywords

Open Access
Article
Publication date: 26 April 2018

Reijo Savolainen

The purpose of this paper is to clarify the conceptual issues of information behaviour research by reviewing the approaches to information interaction in the context of information

8067

Abstract

Purpose

The purpose of this paper is to clarify the conceptual issues of information behaviour research by reviewing the approaches to information interaction in the context of information seeking and retrieval (IS&R).

Design/methodology/approach

The study uses the conceptual analysis focussing on four pioneering models for interactive IS&R proposed by Belkin, Ingwersen and Ingwersen and Järvelin.

Findings

A main characteristic of models for information interaction is the tripartite setting identifying information resources accessible through information systems, intermediary/interface and user. Dialogue is a fundamental constituent of information interaction. Early models proposed by Belkin and Ingwersen focussed on the dialogue occurring in user-intermediary interaction, while more recent frameworks developed by Ingwersen and Järvelin devote more attention to dialogue constitutive of user-information system interaction.

Research limitations/implications

As the study focusses on four models developed within the period of 1984-2005, the findings cannot be generalised to depict the phenomena of information interaction as a whole. Further research is needed to model the specific features of information interaction occurring in the networked information environments in particular.

Originality/value

The study pioneers by providing an in-depth analysis of the ways in which pioneering researchers have conceptualised the phenomena of interaction in the context of IS&R. The findings contribute to the elaboration of the conceptual space of information behaviour research.

Open Access
Article
Publication date: 24 September 2018

Aline de Vargas Pinto, Antônio Carlos Gastaud Maçada and Gabriela Labres Mallmann

The purpose of this paper is to provide an analysis of the studies about workaround behavior in the Information Systems (IS) area, addressing its positive and negative aspects and…

2903

Abstract

Purpose

The purpose of this paper is to provide an analysis of the studies about workaround behavior in the Information Systems (IS) area, addressing its positive and negative aspects and raising the key related issues.

Design/methodology/approach

A systematic literature review was conducted to verify how workaround behavior has been approached in IS studies. A qualitative method was adopted and implemented in two stages: selection of articles from the time period 2007-2017 in the databases Web of Science, ScienceDirect and Scopus and analysis of the selected articles.

Findings

The results showed that many studies have been concerned with identifying the principal reasons for the manifestation of workaround behavior and the measures taken to reduce its impacts. Many studies from international journals examined the implementation of an ERP along with the workaround behavior. The need to expand the national studies on workaround behavior is emphasized, because the majority of the identified studies are international.

Research limitations/implications

The key limitation is related to the period of analysis, because only articles published since 2007 were selected.

Practical implications

This paper contributes to both theory and practice, bringing relevant concepts about workaround behavior, and corroborating the importance of the studies on workaround in the IS area. The literature review of the 20 articles analyzed reveals the main features in each article, such as theoretical and methodological aspects that support the research. Based on this analysis, a conceptual map was developed presenting the most relevant points about workaround behavior, where the causes, the negative and positive consequences, the types of solutions and the organizational and individual impacts are presented.

Originality/value

Research into workaround behavior has increased in recent years, however very few studies have been conducted in Brazil. To the best of the authors' knowledge, no articles regarding Brazil and this subject were published between 2007 and 2017. Thus, this paper seeks to redress this imbalance.

Details

Revista de Gestão, vol. 25 no. 4
Type: Research Article
ISSN: 2177-8736

Keywords

Open Access
Article
Publication date: 22 December 2021

Stephen McCarthy, Wendy Rowan, Nina Kahma, Laura Lynch and Titiana Petra Ertiö

The dropout rates of open e-learning platforms are often cited as high as 97%, with many users discontinuing their use after initial acceptance. This study aims to explore this…

2126

Abstract

Purpose

The dropout rates of open e-learning platforms are often cited as high as 97%, with many users discontinuing their use after initial acceptance. This study aims to explore this anomaly through the lens of affordances theory, revealing design–reality gaps between users' diverse goals and the possibilities for action provided by an open IT artefact.

Design/methodology/approach

A six-month case study was undertaken to investigate the design implications of user-perceived affordances in an EU sustainability project which developed an open e-learning platform for citizens to improve their household energy efficiency. Thematic analysis was used to reveal the challenges of user continuance behaviour based on how an open IT artefact supports users in achieving individual goals (e.g. reducing energy consumption in the home) and collective goals (lessening the carbon footprint of society).

Findings

Based on the findings, the authors inductively reveal seven affordances related to open e-learning platforms: informing, assessment, synthesis, emphasis, clarity, learning pathway and goal-planning. The findings centre on users' perception of these affordances, and the extent to which the open IT artefact catered to the goals and constraints of diverse user groups. Open IT platform development is further discussed from an iterative and collaborative perspective in order to explore different possibilities for action.

Originality/value

The study contributes towards research on open IT artefact design by presenting key learnings on how the designers of e-learning platforms can bridge design–reality gaps through exploring affordance personalisation for diverse user groups. This can inform the design of open IT artefacts to help ensure that system features match the expectations and contextual constraints of users through clear action-oriented possibilities.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 3 May 2022

Shahrokh Nikou, Mark De Reuver and Matin Mahboob Kanafi

Information and digital literacy have recently received much interest, and they are being viewed as critical strategic organisational resources and skills that employees need to…

14674

Abstract

Purpose

Information and digital literacy have recently received much interest, and they are being viewed as critical strategic organisational resources and skills that employees need to obtain in order to function at their workplaces. Yet, the role of employees' literacy seems to be neglected in current literature. This paper aims to explore the roles that information and digital literacy play on the employees' perception in relation to usefulness and ease of use of digital technologies and consequently their intention to use technology in the practices they perform at the workplace.

Design/methodology/approach

This paper builds a conceptual model with key constructs (information literacy and digital literacy) as new antecedents to the technology acceptance model and aims to establish that information literacy and digital literacy are indirect determinants of employees' intention to use digital technologies at the workplace. The data set used in this paper comprises of 121 respondents and structural equation modelling was used.

Findings

The findings reveal that both information literacy and digital literacy have a direct impact on perceived ease of use of technology but not on the perceive usefulness. The findings also show that both literacies have an indirect impact on the intention to use digital technology at work via attitude towards use.

Practical implications

Managers and decision-makers should pay close attention to the literacy levels of their staff. Because literacies are such an important skillset in the digital age, managers and chief information officers may want to start by identifying which work groups or individuals require literacy training and instruction, and then provide specific and relevant training or literacy interventions to help those who lack sufficient literacy.

Originality/value

This is one of the first studies to consider information literacy and digital literacy as new antecedents of the technology acceptance model at the workplace environment.

Details

Journal of Documentation, vol. 78 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 3 January 2024

Eloy Gil-Cordero, Pablo Ledesma-Chaves, Rocío Arteaga Sánchez and Ari Melo Mariano

The aim of this study is to examine the behavioral intention (BI) to adopt the Coinbase Wallet by Spanish users.

10656

Abstract

Purpose

The aim of this study is to examine the behavioral intention (BI) to adopt the Coinbase Wallet by Spanish users.

Design/methodology/approach

A survey was administered to individuals residing in Spain between March and April 2021. There were 301 questionnaires analyzed. This research applies a new predictive model based on technology acceptance model (TAM) 2, the unified theory of acceptance and use of technology (UTAUT) model, the theory of perceived risk and the commitment trust theory. A mixed partial least squares structural equation modeling (PLS-SEM)/fuzzy-set qualitative comparative analysis (fsQCA) methodology was employed for the modeling and data analysis.

Findings

The results showed that all the variables proposed have a direct and positive influence on the intention to use a Coinbase Wallet. The findings present clear directions for traders, investors and academics focused on improving their understanding of the characteristics of these markets.

Originality/value

First, this study addresses important concerns relating to the adoption of crypto-wallets during the global pandemic. Second, this research contributes to the existing literature by adding electronic word of mouth (e-WOM), trust, web quality and perceived risk as new drivers of the intention to use the Coinbase Wallet, providing unique and innovative insights. Finally, the study offers a solid methodological contribution by integrating linear (PLS) and nonlinear (fsQCA) techniques, showing that both methodologies provide a better understanding of the problem and a more detailed awareness of the patterns of antecedent factors.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

1 – 10 of over 11000