833 resultados para Information technology usage
Resumo:
The value of information technology (IT) is often realized when continuously being used after users’ initial acceptance. However, previous research on continuing IT usage is limited for dismissing the importance of mental goals in directing users’ behaviors and for inadequately accommodating the group context of users. This in-progress paper offers a synthesis of several literature to conceptualize continuing IT usage as multilevel constructs and to view IT usage behavior as directed and energized by a set of mental goals. Drawing from the self-regulation theory in the social psychology, this paper proposes a process model, positioning continuing IT usage as multiple-goal pursuit. An agent-based modeling approach is suggested to further explore causal and analytical implications of the proposed process model.
Resumo:
Understanding information technology’s (ITs) contribution to business value is an imperative issue, and while we have attempted to untangle the relationship between IT and business value with some success, our knowledge of specific factors leading to ITs contribution to business value still remains limited. In this paper we propose that complementing IT resources, by establishing a sound IT platform with capable organisational resources may aid in ITs ability to contribute to business value. We suggest that performance measurement of this contribution be undertaken at the business process level first, and then mapped through to firm level performance measurement to obtain a better understanding of the path of IT business value contribution.
Resumo:
The impact of ICT (information and communications technology) on the logistics service industry is reshaping its organisation and structure. Within this process, the nature of changes resulting from ICT dissemination in small 3PLs (third party logistics providers) is still unclear, although a large number of logistics service markets, especially in the EU context, are populated by a high number of small 3PLs. In addition, there is still a gap in the literature where the role of technological capability in small 3PLs is seriously underestimated. This gives rise to the need to develop investigation in this area. The paper presents the preliminary results of a case study analysis on ICT usage in a sample of 7 small Italian 3PLs. The results highlight some of the barriers to effective ICT implementation, as well as some of the critical success factors.
Resumo:
This study provides novel evidence on the extent to which auditors perceive the usage and importance of audit technology in an emerging market. It explores the types of audit technology tools used and factors influencing the use of these; it tests the association between the perceived use and importance of the tools and firm-specific/ auditor-specific characteristics. Using interviews and questionnaires from auditors at Big 4 and international non-Big 4 audit firms, the findings reflect the highly perceived importance of using audit technology in technical and administrative procedures, specifically to assess risk. We find that the perceived use and importance of audit technology is relatively higher for those in Big 4 firms, with less years of auditor experience and higher auditor technology expertise, and those in management positions. The results provide policy makers with guidance on the opportunities and challenges of using information technology in the audit process.
Resumo:
The business value of information technology (IT) is realized through the continuous use of IT subsequent to users’ adoption. Understanding post-adoptive IT usage is useful in realizing potential IT business value. Most previous research on post-adoptive IT usage, however, dismisses the unintentional and unconscious aspects of usage behavior. This paper advances understanding of the unintentional, unconscious, and thereby automatic usage of IT features during the post-adoptive stage. Drawing from Social Psychology literature, we argue human behaviors can be triggered by environmental cues and directed by the person’s mental goals, thereby operating without a person’s consciousness and intentional will. On this basis, we theorize the role of a user’s innovativeness goal, as the desired state of an act to innovate, in directing the user’s unintentional, unconscious, and automatic post-adoptive IT feature usage behavior. To test the hypothesized mechanisms, a human experiment employing a priming technique, is described.
Resumo:
Includes bibliography
Resumo:
This paper consists of a detailed case narrative on how a leading Australian Finance organisation has utilised contemporary Business Process Management (BPM) concepts for improving the IT incident management processes within the whole organisation. The target audience includes practitioners who are interested in BPM case studies and Academics who may be seeking case studies for innovative teaching practices.
Resumo:
Research and innovation in the built environment is increasingly taking on an inter-disciplinary nature. The built environment industry and professional practice have long adopted multi and inter-disciplinary practices. The application of IT in Construction is moving beyond the automation and replication of discrete mono and multi-disciplinary tasks to replicate and model the improved inter-disciplinary processes of modern design and construction practice. A major long-term research project underway at the University of Salford seeks to develop IT modelling capability to support the design of buildings and facilities that are buildable, maintainable, operable, sustainable, accessible, and have properties of acoustic, thermal and business support performance that are of a high standard. Such an IT modelling tool has been the dream of the research community for a long time. Recent advances in technology are beginning to make such a modelling tool feasible.----- Some of the key problems with its further research and development, and with its ultimate implementation, will be the challenges of multiple research and built environment stakeholders sharing a common vision, language and sense of trust. This paper explores these challenges as a set of research issues that underpin the development of appropriate technology to support realisable advances in construction process improvements.
Resumo:
Various reasons have been proffered for female under-representation in tertiary information technology (IT) courses and the IT industry with most relating to cultural moirés. The 2006 Geek Goddess calendar was designed to alter IT’s “geeky image” and the term is used here to represent young women enrolled in pre-service IT teaching courses. Their special mix of IT and teaching draws on conflicting stereotypes and represents a micro-climate which is typically lost in studies of IT occupations because of the aggregation of all IT roles. This paper will report on a small-scale investigation of female students (N=25) at a university in Queensland (Australia) studying to become teachers of secondary IT subjects. They are entering the IT industry, gendered as a “male” occupation, through the safe space of teaching a discipline allied to feminine qualities of nurturing. They are “geek goddesses” who – perhaps to balance the masculine and feminine of these occupations - have decided to go to school rather than into corporations or government.