157 resultados para Ais
Resumo:
Increasingly, organizations are looking to employ Social Technology (ST) to enhance their capability with Business Process Improvement (BPI). However, little is known about how the characteristics or qualities of ST actually influence an organizations' capability at Business Process Improvement (BPI). This paper discusses the potential role of ST in process improvement by presenting an a-priory model derived by an investigation of extant research. First, the qualities of social technology that potentially support high level action possibilities related to BPI are presented (we refer to these as affordances), next these affordances are mapped to the De Bruin (2009) BPM Maturity model as a first step to understanding how ST influences BPI. This work is expected to contribute to our knowledge and understanding of the relationship between ST and BPI, and will extend existing theory on Business Process Management capability and maturity.
Resumo:
Business Process Management (BPM) is accepted globally as an organizational approach to enhance productivity and drive cost efficiencies. Studies confirm a shortage of BPM skilled professionals with limited opportunities to develop the required BPM expertise. This study investigates this gap starting from a critical analysis of BPM courses offered by Australian universities and training institutions. These courses were analyzed and mapped against a leading BPM capability framework to determine how well current BPM education and training offerings in Australia address the core capabilities required by BPM professionals globally. To determine the BPM skill-sets sought by industry, online recruitment advertisements were collated, analyzed, and mapped against this BPM capability framework. The outcomes provide a detailed overview on the alignment of available BPM education/training and industry demand. These insights are useful for BPM professionals and their employers to build awareness of the BPM capabilities required for a BPM mature organization. Universities and other training institutions will benefit from these results by understanding where demand is, where the gaps are, and what other BPM education providers are supplying. This structured comparison method could continue to provide a common ground for future discussion across university-industry boundaries and continuous alignment of their respective practices.
Resumo:
Organizational transformations reliant on successful ICT system developments (continue to) fail to deliver projected benefits even when contemporary governance models are applied rigorously. Modifications to traditional program, project and systems development management methods have produced little material improvement to successful transformation as they are unable to routinely address the complexity and uncertainty of dynamic alignment of IS investments and innovation. Complexity theory provides insight into why this phenomenon occurs and is used to develop a conceptualization of complexity in IS-driven organizational transformations. This research-in-progress aims to identify complexity formulations relevant to organizational transformation. Political/power based influences, interrelated business rules, socio-technical innovation, impacts on stakeholders and emergent behaviors are commonly considered as characterizing complexity while the proposed conceptualization accommodates these as connectivity, irreducibility, entropy and/or information gain in hierarchically approximation and scaling, number of states in a finite automata and/or dimension of attractor, and information and/or variety.
Resumo:
The need for native Information Systems (IS) theories has been discussed by several prominent scholars. Contributing to their conjectural discussion, this research moves towards theorizing IS success as a native theory for the discipline. Despite being one of the most cited scholarly works to-date, IS success of DeLone and McLean (1992) has been criticized by some for lacking focus on the theoretical approach. Following theory development frameworks, this study improves the theoretical standing of IS success by minimizing interaction and inconsistency. The empirical investigation of theorizing IS success includes 1396 respondents, gathered through six surveys and a case study. The respondents represent 70 organisations, multiple Information Systems, and both private and public sector organizations.
Resumo:
The Control Theory has provided a useful theoretical foundation for Information Systems development outsourcing (ISD-outsourcing) to examine the co-ordination between the client and the vendor. Recent research identified two control mechanisms: structural (structure of the control mode) and process (the process through which the control mode is enacted). Yet, the Control Theory research to-date does not describe the ways in which the two control mechanisms can be combined to ensure project success. Grounded in case study data of eight ISD-outsourcing projects, we derive three ‘control configurations’; i) aligned, ii) negotiated, and 3) self-managed, which describe the combinative patterns of structural and process control mechanisms within and across control modes.
Resumo:
This study presents the unique benevolent and malevolent nature of social media, intertwined to its capabilities, which influences its role as a benefactor and a competitor. We conceptualize this phenomenon as the competing-complementarity of social media. We explain competing-complementarity using Teece’s (1986) concept of complementary assets and Porter’s (2001) work on competitive forces shaping strategy and business on the Internet. We observe this phenomenon of competing-complementarity of social media on news firms and offer its evidence through opinionated data analysis.
Resumo:
Process mining has developed into a popular research discipline and nowadays its associated techniques are widely applied in practice. What is currently ill-understood is how the success of a process mining project can be measured and what the antecedent factors of process mining success are. We consider an improved, grounded understanding of these aspects of value to better manage the effectiveness and efficiency of process mining projects in practice. As such, we advance a model, tailored to the characteristics of process mining projects, which identifies and relates success factors and measures. We draw inspiration from the literature from related fields for the construction of a theoretical, a priori model. That model has been validated and re-specified on the basis of a multiple case study, which involved four industrial process mining projects. The unique contribution of this paper is that it presents the first set of success factors and measures on the basis of an analysis of real process mining projects. The presented model can also serve as a basis for further extension and refinement using insights from additional analyses.
Resumo:
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.
Resumo:
The concept of cloud computing services is appealing to the small and medium enterprises (SMEs), with the opportunity to acquire modern information technology resources as a utility and avoid costly capital investments in technology resources. However, the adoption of the cloud computing services presents significant challenges to the SMEs. The SMEs need to determine a path to adopting the cloud computing services that would ensure their sustainable presence in the cloud computing environment. Information about approaches to adopting the cloud computing services by the SMEs is fragmented. Through an interpretive design, we suggest that the SMEs need to have a strategic and incremental intent, understand their organizational structure, understand the external factors, consider the human resource capacity, and understand the value expectations from the cloud computing services to forge a successful path to adopting the cloud computing services. These factors would contribute to a model of cloud services for SMEs.
Resumo:
IT resources are indispensable in the management of Public Sector Organizations (PSOs) around the world. We investigate the factors that could leverage the IT resources in PSOs in developing economies. While research on ways to leverage IT resources in private sector organizations of developed countries is substantial, our understanding on ways to leverage the IT resources in the public sector in developing countries is limited. The current study aspires to address this gap in the literature by seeking to determine the key factors required to create process value from public sector IT investments in developing countries. We draw on the resource-centric theories to imply the nature of factors that could leverage the IT resources in the public sector. Employing an interpretive design, we identified three factors necessary for IT process value generation in the public sector. We discuss these factors and state their implications to theory and practice.
Resumo:
This paper examines the extent social media is enabling e-democracy in Fiji, Solomon Islands and Vanuatu. The study conducts an interpretative case study approach interviewing active social media users, political actors, civil servants, civilians, civil society actors and tertiary students. The study also conducts a content analysis of popular “political social media” Facebook pages in these three countries. The findings of the study suggest that social media is playing a role in facilitating citizen engagement with governments, making governments accountable and providing a means for citizens to be informed, to discuss and share views on political matters. However, social media usage is evolving quite differently in these three countries and factors such as high levels of militarism (Fiji), high levels of corruption (Solomon Islands) and also rapid ICT development (Vanuatu) have contributed towards shaping the potential of social media as a democratic enabler and political tool in these countries.
Resumo:
The banking industry is under pressure. In order to compete, banks should adapt to concentrating on the specific customer needs, following an outside-in perspective. This paper presents the design of a business model for banks that considers this development by providing flexible and comprehensive support for retail banking clients. It is demonstrated that the identification of customer processes and the consequent alignment of banking services to those processes implies great potential to increase customer retention in banking. It will be shown that information technology – especially smartphones – can serve as an interface between customer and suppliers to enable an alignment of offerings to customer processes. This approach enables the integration of banks into their customers’ lifestyle, creating emotional value added, improving the personal relationship and the customers’ affiliation with the bank. The paper presents the design of such a customer-process-centric smartphone application and derives success factors for implementation.
Resumo:
Service processes such as financial advice, booking a business trip or conducting a consulting project have emerged as units of analysis of high interest for the business process and service management communities in practice and academia. While the transactional nature of production processes is relatively well understood and deployed, the less predictable and highly interactive nature of service processes still lacks in many areas appropriate methodological grounding. This paper proposes a framework of a process laboratory as a new IT artefact in order to facilitate the holistic analysis and simulation of such service processes. Using financial services as an example, it will be shown how such a process laboratory can be used to reduce the complexity of service process analysis and facilitate operational service process control.
Resumo:
This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture with focus on our scope: the need for Service Oriented Culture. It will then, briefly, describe the method used and present the qualitative and quantitative findings related to the need for Service Oriented Culture. This research aims to cover a gap in the literature by investigating to what extent the presence of Service Oriented Culture, as one of Saudi Arabia’s cultural values, impacts on e-service use in Saudi Arabia. Surprisingly, the tested hypothesis was rejected: the presence of Service Oriented Culture is not a positive predictor of Intention to Use e-services in Saudi Arabia. It is evidenced that consideration of the impact of the cultural values will mainly contribute to the enhancement of ICTs implementation and use.