{"title":"An Interview with Kevin Lipscomb, CIO of Averett University, USA","authors":"Sergey Samoilenko","doi":"10.1080/1097198x.2020.1752085","DOIUrl":"https://doi.org/10.1080/1097198x.2020.1752085","url":null,"abstract":"","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"44 1","pages":"165 - 168"},"PeriodicalIF":2.0,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77809296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do We Need to Understand the World to Know It? Knowledge in a Big Data World","authors":"V. Grover","doi":"10.1080/1097198X.2019.1701623","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701623","url":null,"abstract":"In both practice and academia, the incredible access to data is creating a marked disruption. The perfect storm of massive amounts of digital data, sophisticated analytical tools and cheap, scalable processing power has fostered a data-driven mindset in both corporate and academic practices. These are being embraced to varying degrees in companies around the world as well as in global academic communities. However, swinging the pendulum in the relationship between knowledge and data too far toward data can have adverse consequences. This editorial offers a cautionary note for both companies and academia. For a number of years, in practice, the distinction between data, information, and knowledge could be stated with some level of precision. Data are raw facts and figures that can become information when massaged and placed in the right context. The value-adding activities from data to information are largely the domain of information systems. Knowledge, however, adds experience and expertise to the information and often resides in tacit form in people’s heads. So, the Knowledge Management System (KMS) popularity that started in the 1990s was intended to capture knowledge (largely tacit) and put it in a system that could benefit others in the organization (Davenport & Grover, 2001). KM processes include externalization (taking tacit knowledge and representing it in a KMS) and internalization (making this knowledge accessible to people who might need it). For example, a global consulting firm might have a team that concluded a multiyear project in Malaysia – and their experiences, successes, failures, precautions, and guidance in a KMS – could be invaluable for other teams initiating projects in that region. KM practices included creating the right incentives for knowledge to flow between people and the system, as well as embedding knowledge into products and services offered. In academic research, particularly the social sciences including Information Systems, knowledge is largely represented as an abstraction – a theory or model – that explains or predicts the real world. It is in the efficacy of these abstractions, as assessed through logic or impact, that academics gain their esteem. The advent of “big data” in recent years, along with advanced analytics and machine learning has created a disruption both in the practice of KM as well as in the importance of abstraction. Big data, through its global reach and its sheer volume, velocity, and variety, along with computationally intensive analysis, offers opportunities for generating new insights. Mining of big data and digital streams can yield fresh perspectives for decision-makers, optimize and automate processes, and discover new ways to understand and fulfill customers’ needs. It can also offer precision of predictions to important questions in both practice and academia. However, in observing the ready embrace of big data and analytics there are also signs that some companies and researchers ","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"72 1","pages":"1 - 4"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79038870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Interview with Theo Breuers, Chief Executive Officer of COMPO Software, the Netherlands","authors":"Kyootai Lee, K. Joshi","doi":"10.1080/1097198X.2019.1701641","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701641","url":null,"abstract":"This interview introduces how innovative firms are employing interesting new technologies to improve their product line up and better serve customer needs. Facial recognition and biometric identification are opening new avenues for application of IT in personnel administration and other areas. This interview also highlights how European firms need to comply with EU’s strict General Data Protection Regulation (GDPR) regulation designed to ensure safeguards for data collected by firms from individuals in designing their new IT applications and products. Theo Breuers, CEO of Compo Software, founded the company in 1984. In the first few years, the firm focused on automation. In 2004 he and his team discovered the possibilities of application of IT in personnel registration and administration, and later entered the computer-controlled ticketing and event registration market. He recognized the value of face recognition technologies in proving better service to his customers and integrated them in his firm’s products.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"1 1","pages":"76 - 78"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90868646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mari Karjalainen, M. Siponen, Petri Puhakainen, Suprateek Sarker
{"title":"Universal and Culture-dependent Employee Compliance of Information Systems Security Procedures","authors":"Mari Karjalainen, M. Siponen, Petri Puhakainen, Suprateek Sarker","doi":"10.1080/1097198X.2019.1701355","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701355","url":null,"abstract":"ABSTRACT Employee information systems security behavior (ISSB) is a key concern for organizations. Previous studies have proposed models aimed at explaining employees’ ISSB and related behavioral change. While these studies have contributed to our understanding of the reasons for ISSB (change), there is a lack of research related to cultural differences and distinguishing cultural-specific reasons for ISSB. This paper takes the first step in addressing this research gap by theorizing about employee ISSB based on empirical material collected in Finland, Switzerland, the UAE, and China. This paper suggests that ISSB constitute a learned information systems security (ISS) conventions that may be somewhat generic across different cultures; however, different paradigms of learning seem to be effective in different cultures for supporting behavioral change. From a theoretical perspective, the results help us to understand why employees comply or do not comply with ISS procedures. This study also highlights the need for future research on employee compliance to understand cultural differences regarding key ISS interventions. Finally, from a managerial perspective, the theory suggests that different cultures require different ISS interventions.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"8 1","pages":"24 - 5"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81010982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Outsourcing in the Public Sector: A Descriptive Framework from a Literature Review","authors":"J. M. Marco-Simó, J. Pastor-Collado","doi":"10.1080/1097198X.2019.1701357","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701357","url":null,"abstract":"ABSTRACT Despite its economic scale, IT outsourcing (ITO) in the public sector (PS) has not yet been deeply analyzed by academic literature when compared with ITO focused on the private sector. In fact, the question has often been raised as to whether ITO in the PS should be regarded as completely different to ITO in the private sector. In order to contribute to this discussion, our first goal in this paper is, after a review of the academic literature, to summarize the covered topics in a descriptive framework that facilitates the understanding both for researchers and practitioners of the ITO phenomena in the Public Sector. This framework is organized in four main categories that explain the context (the features of the PS) and the rationale of the ITO process (Why, What and How) in the PS. Then, we use this framework to face our second goal: highlight to which extent differences in ITO process between the public and private sectors are clear and can impact upon the implementation of the ITO. Although the conclusions indicate that there are quite a number of points of coincidence, partly because both sectors have organizations with a certain degree of publicness, they also reflect some aspects that are intrinsic to the PS (as the prioritization of non-economistic values, the application of industrial policies, or the search of collaborative sourcing, among others) and which need to be borne in mind in any work tackling ITO in this context.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"12 1","pages":"25 - 52"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73887452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Participating in Critical Discourse: A Critical Research Study of Clinicians’ Concerns for A Ghanaian Hospital E-mail System","authors":"Frank Nyame-Asiamah, P. Kawalek","doi":"10.1080/1097198X.2019.1701356","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701356","url":null,"abstract":"ABSTRACT A growing body of information systems (IS) literature advocates the explicit use of suitable critical theories to explore power issues in developing countries and make IS research findings more accessible to systems’ users and the wider audiences for consumption. We respond to this debate in IS by applying critical research perspectives to discuss the power implications of Internet and e-mail resource distribution in a Ghanaian teaching hospital in a way that addresses clinicians’ concerns of using Internet services for healthcare practices. We applied critical qualitative approaches to collect and analyze data from clinicians, healthcare managers, and the hospital’s internal documents. It was found that managers exercised their powers to allocate Internet facilities selectively on the contestable account that clinicians might misuse the Internet if they were given access while clinicians sought to empower themselves as co-planners who could make technology choices and add new value to the existing normative decisions of the managers. The outcomes show that critical researchers can directly relate to decision-making powers, recognize their powers and expose structures that surround them, and emancipate people whose Internet resource needs are restricted to co-involve in technology adoption and distribution processes.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"123 1","pages":"53 - 75"},"PeriodicalIF":2.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85683819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Analytics Applications in Latin America and Emerging Economies","authors":"Roberto Vinaja","doi":"10.1080/1097198X.2019.1701728","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1701728","url":null,"abstract":"","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"2017 1","pages":"79 - 81"},"PeriodicalIF":2.0,"publicationDate":"2019-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79642455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“The Early Bird Catches the Worm - First Mover Advantage through IoT Adoption for Indian Public Sector Retail Oil Outlets”","authors":"S. Das","doi":"10.1080/1097198x.2019.1679588","DOIUrl":"https://doi.org/10.1080/1097198x.2019.1679588","url":null,"abstract":"ABSTRACT This paper identifies the various significant factors that contribute to the Internet of Things (IoT) adoption at the Indian Oil Marketing Companies (OMCs') Retail Oil Outlets (ROO) and empirically tests the model of constituents for the same. The logistic regression analysis was applied, using a survey of 402 respondents, to predict the adoption of IoT at the OMCs' ROO. Using the 7 factors as predictors, the regression analysis output showed a significant impact from 5 factors-People, Technologies, Processes, Data Security, and Competitive Advantage. To transform the existing ROO into “smart pumps, and to fully realize the expected benefits from the investment in IoT, the OMCs' need to give increased emphasis to these 5 factors. It tests the applicability of the PolySocial Reality (PoSR) framework and Thing Theory at the OMCs' ROO extending the literature by incorporating 'processes' to the existent framework of people, devices and communication technologies within the IoT ecosystem. “Data Security” and “Interoperability” tie up these four components together enabling a seamless flow of digital data among them and empowering the organization to realize “competitive advantage”","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"31 1","pages":"280 - 308"},"PeriodicalIF":2.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90092206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Scrum Culture: Introducing Agile Methods in Organizations","authors":"Roberto Vinaja","doi":"10.1080/1097198x.2019.1679956","DOIUrl":"https://doi.org/10.1080/1097198x.2019.1679956","url":null,"abstract":"","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"74 1","pages":"309 - 311"},"PeriodicalIF":2.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90371185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khendum Choden, K. Bagchi, G. Udo, P. Kirs, G. Frankwick
{"title":"The Influence of Cultural Values on Information and Communication Technology (ICT) Diffusion Levels: A Cross-National Study","authors":"Khendum Choden, K. Bagchi, G. Udo, P. Kirs, G. Frankwick","doi":"10.1080/1097198X.2019.1679586","DOIUrl":"https://doi.org/10.1080/1097198X.2019.1679586","url":null,"abstract":"ABSTRACT It has been posited that information and communication technology (ICT) diffusion can be explained by national culture since individuals from different cultures think and behave differently toward the development and use of ICT. To the best of our knowledge, the impact of Schwartz’s model of cultural dimensions on ICT diffusion level has not yet been investigated. This study explored the diffusion level using Schwartz’s three national cultural dimensions: autonomy vs. embeddedness, egalitarianism vs. hierarchy, and mastery vs. harmony. Data were obtained for 73 nations on three ICTs: Internet usage, mobile phones, and fixed broadband connections. The correlation results showed that autonomy vs. embeddedness and egalitarianism vs. hierarchy influenced ICT diffusion levels. The regression results showed that autonomy vs. embeddedness had significant impact on diffusion levels. The implications of these findings are discussed.","PeriodicalId":45982,"journal":{"name":"Journal of Global Information Technology Management","volume":"43 1","pages":"243 - 256"},"PeriodicalIF":2.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83487579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}