Search results

1 – 10 of 86
Article
Publication date: 15 August 2016

A.A. Oni, C.K. Ayo, S. Oni and V.W. Mbarika

Information and communication technology has been identified as a viable tool to proffer solution to the societal problem of disconnect between democratic actors. The issue of…

Abstract

Purpose

Information and communication technology has been identified as a viable tool to proffer solution to the societal problem of disconnect between democratic actors. The issue of sustainability and citizens’ acceptance of online public participation, however, remains a major issue of concern requiring adequate attention. This study therefore aims to develop a strategic framework for e-democracy implementation and sustainability.

Design/methodology/approach

Systematic qualitative review using Grounded Theory Method was adopted to develop the e-democracy strategic framework.

Findings

The strategic framework is generic and has the potential to serve as a spring board for e-democracy implementation. It abstracts existing strategies and best practice that can be adopted to add value to e-democracy implementation. Using this framework, developing nations can take advantage of their present level of technological development to give voice to the voiceless and improve their democratic system.

Practical implications

E-democracy implementation should be backed up with policy framework which explicitly states the vision, objectives, policies guiding e-democracy implementation and the oversight bodies responsible for monitoring and evaluation. The implementation plan should clearly identify the implementation approach, levels of engagement, roles of various stakeholders and tools and technology to be involved. Government willingness to harness citizens input and commit resource to e-participation is of paramount importance.

Originality/value

The framework developed is useful for the e-democracy research community and government in executing successful e-democracy implementation and evaluating its impact on democratic outcomes.

Details

Transforming Government: People, Process and Policy, vol. 10 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 22 August 2019

Arash Asiaei and Nor Zairah Ab. Rahim

The purpose of this study is to develop a model to understand the relationships among technology, organizational and environmental (TOE) contexts, intention to adopt cloud…

2416

Abstract

Purpose

The purpose of this study is to develop a model to understand the relationships among technology, organizational and environmental (TOE) contexts, intention to adopt cloud computing (IACC) and actual usage of cloud computing (AUCC) in small and medium enterprises (SMEs) in Malaysia as a developing country. More specifically, this paper seeks to explore the mediation effect of IACC on the relationship between TOE context and AUCC.

Design/methodology/approach

A positivist research approach was selected for this study. Drawing largely upon the TOE framework, this study uses survey data from 209 Malaysian SMEs. Structural equation modelling (SEM) based on partial least squares (PLS) was used to assess the structural relations of the research model.

Findings

The results of the structural model show that data security, technology readiness, top management support, competitive pressure and innovativeness are the most significant factors in predicting the adoption of cloud computing in Malaysian SMEs. Further, the results indicate that intention to adopt cloud computing can play a mediating role between TOE factors and the actual usage of cloud computing.

Research limitations/implications

The focus upon Malaysian SMEs may diminish the generalizability of the findings. This study provides profound insight into the management and foundation of cloud computing, different types of cloud services and deployment models that could facilitate the management of enterprise strategic resources and contribute to the performance improvement. This study also provides another important implication for practitioners regarding the absolute necessity of value drivers’ identification within enterprise and understand the causal relationships, which are vital in driving those values.

Practical implications

This study provides several practical guidance for practitioners in deploying cloud services which are most suitable option for their specific technology requirement in their enterprise to enjoy the full benefits of their intangible assets. Another significant implication of this study lies in the fact that it may require a different emphasis on nature and adoption design when there is a higher level of stress on technology-related and cloud computing resources.

Originality/value

This study contributes to the extant literature by developing an integrative model to identify how a wide set of contextual factors can determine the intention to adopt cloud computing and, in turn, influence the actual usage of cloud computing in SMEs in Malaysia as a developing country.

Details

Journal of Science and Technology Policy Management, vol. 10 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 4 February 2014

John Effah

The purpose of this paper is to investigate the experiences of dot-com pioneers in developing countries to complement the experience of their counterparts from the developed world…

744

Abstract

Purpose

The purpose of this paper is to investigate the experiences of dot-com pioneers in developing countries to complement the experience of their counterparts from the developed world as documented in the dot-com boom and bust literature. Beginning from this literature, dot-com phenomenon in the developed world has attracted much research. However, despite some entrepreneurial attempts to promote the innovation in the developing world, less is known about dot-coms there.

Design/methodology/approach

The study follows interpretive case study methodology and actor-network theory to understand the formation, initial success and final failure of a dot-com pioneer in the developing country of Ghana.

Findings

The developing country dot-com pioneer transferred e-tail technology from the developed world. The under-developed infrastructure in the developing world forced the technology to be adapted to local context. The firm managed to succeed temporarily by engaging with actors from both the developed and the developing world. It, however, collapsed largely due to inflation in its developing country context, which rendered its stockless business model with purchasing on order to deliver economically unfeasible as purchasing prices outrun sales prices.

Research limitations/implications

The findings are based on historical reconstruction of events which may differ from current circumstances. The study, however, demonstrates how pioneer dot-coms in developing countries may have fared and offers implications for research and practice.

Practical implications

Stockless e-business model with purchase on order to supply may not be economically feasible under inflationary conditions as purchase prices may outstrip sales prices. Entrepreneurs need to pay attention not only to the virtual world but also the physical world which equally contribute to e-business practice.

Originality/value

The paper is the first attempt to offer insight into the experiences of developing country dot-com pioneers to complement the literature from the developed world.

Details

Journal of Enterprise Information Management, vol. 27 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 17 October 2008

Richard Boateng, Richard Heeks, Alemayehu Molla and Robert Hinson

E‐commerce is diffusing into developing countries (DCs), and is assumed to help deliver the international development agenda. But how can the connection between e‐commerce and…

9591

Abstract

Purpose

E‐commerce is diffusing into developing countries (DCs), and is assumed to help deliver the international development agenda. But how can the connection between e‐commerce and socio‐economic development be conceptualised? The aim of this paper is to analyse that connection by drawing from the development studies discipline to take a broader perspective on e‐commerce than that so far provided by firm‐level research.

Design/methodology/approach

The authors adopt a literature survey approach, drawing their conceptual foundations from development studies, and supplementing this from the e‐commerce literature.

Findings

The paper develops a new, integrated model that explains the way in which e‐commerce can contribute to socio‐economic development.

Research limitations/implications

This new model can help provide a foundation for future research on e‐commerce in DCs; research on e‐commerce policy as well as impact assessment research.

Practical implications

The discussion and model provide development agencies, governments, consultants and business people working in DCs with a clearer sense of the contribution e‐commerce can make; assisting them in prioritization, planning, and evaluation of e‐commerce projects.

Originality/value

The paper provides the first integrated perspective on the broader contribution of e‐commerce to the growth and development of DCs.

Details

Internet Research, vol. 18 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 13 November 2009

Sunyoung Cho, Lars Mathiassen and Michael Gallivan

The purpose of this paper is to help explain the paradox between the high potential of telehealth innovations and their slow diffusion by investigating the challenges involved in…

2198

Abstract

Purpose

The purpose of this paper is to help explain the paradox between the high potential of telehealth innovations and their slow diffusion by investigating the challenges involved in a successful case.

Design/methodology/approach

The paper is based on a longitudinal study of a telestroke program from 2003‐2007 seen from the point‐of‐view of the inventors. The program was initially used by a network of hospitals; it faced several challenges when the inventors sought to diffuse it to a broader marketplace; but, the inventors eventually succeeded to create a viable technology and business model.

Findings

The authors offer a process model of this telehealth innovation consisting of four phases: invention, pilot test, commercialization, and penetration – with each phase demarcated by specific actors and activities. In addition, a chasm between the pilot test within a network of hospitals and the subsequent commercialization of a product aimed for the market is identified. Finally, the authors reveal how key actors negotiated the chasm to successfully diffuse the innovation beyond the initial hospital setting.

Originality/value

The paper offers two contributions. First, it contributes a new model of IT‐enabled innovation processes seen from the inventor's perspective and emphasizing the diffusion chasm as a key challenge. Second, it contributes a longitudinal, in‐depth analysis of a telehealth innovation from initial invention to successful market penetration.

Details

Information Technology & People, vol. 22 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 13 April 2018

Shashi Bala and Puja Singhal

This study aims to endeavor to explore the extent of gender digital divide(GDD) in Uttar Pradesh (U.P., IT-Hub of North India), a most populous state of India, with a particular…

1302

Abstract

Purpose

This study aims to endeavor to explore the extent of gender digital divide(GDD) in Uttar Pradesh (U.P., IT-Hub of North India), a most populous state of India, with a particular focus on the first and second order of digital divide, including availability, access time and use of the internet.

Design/methodology/approach

The authors have adopted stratified multistage sampling procedure for this research and conducted an empirical study on the data set of 600 respondents of six districts of U.P. to perform the inter-regional analysis. Furthermore, χ2 method has been used to reveal the factors responsible for the GDD among selected districts of UP.

Findings

Statistical results clearly indicate that out of 12 sub-districts, most of the districts suffered from first order as well as second order of GDD, and this gender disparity within an increasing digitization environment is due to the existence of exclusion from basic technological skills, social norms and financial constraints.

Practical implications

The results have implications for the U.P. Government in general and policymakers behind digitization projects in particular as well as the promoters of gender equality including researchers and fellows.

Originality/value

This study is the first to illustrate the orders of the digital gender gap in a developing economy such as India and to gain an insight into the factors behind it. This research will also consider a promising avenue for future work.

Details

Journal of Information, Communication and Ethics in Society, vol. 16 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 14 June 2013

Fanta T. Jetu and René Riedl

Information systems (IS) research in developing countries (DCs) has attracted increasing attention over recent years. Nevertheless, empirical studies in these countries in…

2062

Abstract

Purpose

Information systems (IS) research in developing countries (DCs) has attracted increasing attention over recent years. Nevertheless, empirical studies in these countries in general, and particularly those drawing on the cultural values influencing project team success (PTS), are still far from satisfactory. Hence, scholars strongly recommend this specific area as prime research territory to improve the successful development and implementation of IS initiatives in DCs. The purpose of this paper is to provide better insights and an improved understanding about the cultural values influencing PTS.

Design/methodology/approach

In order to investigate the cultural values which may affect PTS, data were collected from project experts working on business process reengineering and information technology projects in ten public and private organizations in the service sector in Ethiopia (n=200 questionnaires). A multivariate model was employed to identify the most important cultural values.

Findings

The results indicate that personally focused cultural values (e.g. openness to change) rather than socially focused cultural values (e.g. self‐transcendence) have the most significant influence on project team performance. Moreover, cultural values (independent of their designation as personally or socially focused) were found to have a strong relationship with two out of three dimensions of PTS, namely, project team learning and development, as well as project team working spirit, when compared to project team leadership.

Originality/value

Identifying the relationships between cultural values and the dimensions of PTS contributes to the establishment of theoretical insights into the success factors of IS projects in DCs. Moreover, it also assists practitioners, particularly project managers, in maximizing the possibility of PTS, which has been shown to be a major determinant of overall project success.

Details

International Journal of Managing Projects in Business, vol. 6 no. 3
Type: Research Article
ISSN: 1753-8378

Keywords

Book part
Publication date: 25 June 2012

Abby Swanson Kazley, Amy C. McLeod and Karen A. Wager

Purpose – Use of telemedicine is increasingly prevalent in order to provide better access to expert care, and we examine telemedicine use internationally.Design/methodology  

Abstract

Purpose – Use of telemedicine is increasingly prevalent in order to provide better access to expert care, and we examine telemedicine use internationally.

Design/methodology – Using Donabedian's structure, process outcome framework, we conduct an analysis of published studies in the United States, Europe, and Asia to examine the uses, conditions treated, barriers, and future of telemedicine.

Findings – We identify several similarities and challenges to telemedicine use in each region. We find use of videoconferencing between providers or providers and patients for the treatment of acute and chronic conditions. Studies in the United States are more likely to identify applications for the use of chronic conditions, whereas studies in Europe or Asia are more likely to use them for acute access to expertise. Each region reported comparable challenges in reimbursement, liability, technology, and provider licensing.

Research limitations – We compare available research articles from three diverse regions, and many of the articles were merely descriptive in nature. Furthermore, the number of articles per region varied.

Practical implications – Barriers to telemedicine use include a lack of reimbursement, language commonality, technological availability, physician licensure or credentialing, trained support staff and patient privacy, and security assurances. Practitioners and policy makers should work to address these barriers.

Originality/value – Through this work, a summary of the research to date describes telemedicine use in the United States, Asia, and Europe. Identification of use and barriers may provide impetus for improving access to care by finding ways to increase telemedicine use through standardization.

Details

Health Information Technology in the International Context
Type: Book
ISBN: 978-1-78052-859-5

Keywords

Article
Publication date: 18 July 2008

Junaidah Hashim

The purpose of this study is to identify learning barriers in information communication technology (ICT) adoption among working women in Malaysia. Regardless of gender, it would…

4012

Abstract

Purpose

The purpose of this study is to identify learning barriers in information communication technology (ICT) adoption among working women in Malaysia. Regardless of gender, it would be advantageous for all individuals in today's society to acquire basic ICT skills. Despite significant growth in ICT professionals during the last two decades, there remains a gender imbalance, particularly in developing countries such as Malaysia.

Design/methodology/approach

The study uses a self‐developed questionnaire to measure the learning barriers and ICT adoption. The survey instrument was developed from the constructs used in the individual innovativeness theory and theory of perceived attributes. The questionnaires were administered face‐to‐face to a total of 315 working women, who participated as respondents in this study.

Findings

The findings revealed that the working women in Malaysia possess only average level of ICT skills. They seldom use the internet and e‐mail at their workplace or at home, they do not face serious learning barriers with respect to ICT, and they have complexity as their innovation characteristics. However, they are innovators in the adopters' categories. The combined variance in the characteristics of learning barriers, ICT skills, and ICT usage amounted to 70 per cent in innovation characteristics.

Practical implications

This study reduces the knowledge gap regarding the identification of learning barriers, ICT skills, and ICT usage as predictors of ICT adoption among working women in Malaysia. These factors have been overlooked by some previous researchers. This study also calls attention to the fact that employers and training agencies that are responsible to provide ICT training to women employees must understand and employ the proper learning approaches and methods that ought to be used in adult training and education. Malaysian women are able to adopt an innovation with a high degree of uncertainty at the time of adoption, and it is believed that with correct and suitable training schemes Malaysian working women can acquire appropriate ICT skills and become competent in using ICT at the workplace. With managerial skills and ICT‐based competencies, the working women would have a lot more knowledge seeking skills, increased access to up‐to‐date information, be effective in decision making, and establish networking and linkages. With this they will stand a better chance for promotion and advancement.

Originality/value

The sample of this study is unique. This study was conducted in a multi‐ethnic, multi‐cultural and multi‐lingual society. Malaysia presents an interesting case study on working women because it is a society undergoing rapid changes from its strong traditional religious and cultural norms to modern values about women.

Details

Gender in Management: An International Journal, vol. 23 no. 5
Type: Research Article
ISSN: 1754-2413

Keywords

Article
Publication date: 20 December 2019

Wu He, Ivan Ash, Mohd Anwar, Ling Li, Xiaohong Yuan, Li Xu and Xin Tian

An organization’s ability to successfully manage intellectual capital is determined by the actions of its employees to prevent or minimize information security incidents. To…

2491

Abstract

Purpose

An organization’s ability to successfully manage intellectual capital is determined by the actions of its employees to prevent or minimize information security incidents. To prevent more data breaches to intellectual capital, organizations must provide regular cybersecurity awareness training for all personnel. The purpose of this paper is to investigate the effect of different evidence-based cybersecurity training methods on employees’ cybersecurity risk perception and self-reported behavior.

Design/methodology/approach

The study participants were randomly assigned into four groups (i.e. malware report, malware videos, both malware report and malware videos and no interventions) to assess the effects of cybersecurity training on their perceptions of vulnerability, severity, self-efficacy, security intention as well as their self-reported cybersecurity behaviors.

Findings

The results show that evidence-based malware report is a relatively better training method in affecting employees’ intentions of engaging in recommended cybersecurity behaviors comparing with the other training methods used in this study. A closer analysis suggests whether the training method contains self-relevant information could make a difference to the training effects.

Originality/value

This paper reports an in-depth investigation on how different evidence-based cybersecurity training methods impact employees’ perceptions of susceptibility, severity, self-efficacy, security intention as well as on their self-reported cybersecurity behaviors.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

1 – 10 of 86