945 resultados para Strategic Information Management


Relevância:

90.00% 90.00%

Publicador:

Resumo:

The research investigates the past, present and potential future role of Information Specialists (ISps) in process oriented companies. It tests the proposition that ISps in companies that have undertaken formal process reengineering exercises are likely to become more proactive and more business oriented (as opposed to technically oriented) than they had previously been when their organisations were organised along traditional, functional lines. A review of existing literature in the area of Business Process Reengineering and Information Management reveals a lack of consensus amongst researchers concerning the appropriate role for ISps during and after BPR. Opinion is divided as to whether IS professionals should reactively support BPR or whether IT/IS developments should be driving these initiatives. A questionnaire based ‘Descriptive Survey’ with 60 respondents is used as a first stage of primary data gathering. This is followed by follow-up interviews with 20 of the participating organisations to gather further information on their experiences. The final stage of data collection consists of further in-depth interview with four case study companies to provide an even richer picture of their experiences. The results of the questionnaire are analysed and displayed in the form of simple means, frequencies and bar graphs. The ‘NU-DIST’ computer based discourse analysis package was tried in relation to summarising the interview findings, but this proved cumbersome and a visual collation method is preferred. Overall, the researcher contends that the supposition outlined above is proven, and she concludes the research by suggesting the implications of these findings. In particular she offers a ‘Framework for Understanding and Action’ which is deemed to be relevant to both practitioners and future researchers.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Theory suggests that firms that adopt innovation share some common characteristics, just as those who do not adopt innovation and firms adopt a particular technology because the functions provided by the chosen technology fulfils their needs. Building on these arguments, this research project investigates the antecedents and consequences of e-business adoption among manufacturing firms in Malaysia. This thesis develops from the existing literature of organisational innovation adoption, information technology and strategic marketing/management. It further adds to the existing literature by using cultural-based predictors representing organisational characteristics consisting of market orientation, innovativeness and organisational learning. The study also formalises the theoretical framework of organisational-environment-technology. This study develops a new construct called technology motivation in addition to the introduction of several e-business technology scales. The results substantiate the significance of firm technology motivation in determining firm adoption of the various e-business initiatives. In addition, business environment and market orientation are found to influence firm choice of technology motivation. Meanwhile, innovativeness and organisational learning are shown to influence the magnitude of a firm’s e-business adoption. Finally, the results show that firm adoption of e-business technology does not influence organisational performance. This investigation clarifies the rationale and importance of firm technology motivation in adopting the various e-business initiatives. It also highlights the importance of having the appropriate organisational culture in ensuring a successful technology adoption.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Modern managers are under tremendous pressure in attempting to fulfil a profoundly complex managerial task, that of handling information resources. Information management, an intricate process requiring a high measure of human cognition and discernment, involves matching a manager's lack of information processing capacity against his information needs, with voluminous information at his disposal. The nature of the task will undoubtedly become more complex in the case of a large organisation. Management of large-scale organisations is therefore an exceedingly challenging prospect for any manager to be faced with. A system that supports executive information needs will help reduce managerial and informational mismatches. In the context of the Malaysian public sector, the task of overall management lies with the Prime Minister and the Cabinet. The Prime Minister's Office is presently supporting the Prime Minister's information and managerial needs, although not without various shortcomings. The rigid formalised structure predominant of the Malaysian public sector, so opposed to dynamic treatment of problematic issues as faced by that sector, further escalates the managerial and organisational problem of coping with a state of complexity. The principal features of the research are twofold: the development of a methodology for diagnosing the problem organisation' and the design of an office system. The methodological development is done in the context of the Malaysian public sector, and aims at understanding the complexity of its communication and control situation. The outcome is a viable model of the public sector. `Design', on the other hand, is developing a syntax or language for office systems which provides an alternative to current views on office systems. The design is done with reference to, rather than for, the Prime Minister's Office. The desirable outcome will be an office model called Office Communication and Information System (OCIS).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The existing literature has given little consideration to social values of information technology in general or of wireless technology in particular. The purpose of this paper is thus to shed new light on this issue. Based on an interpretive case study, we examine two healthcare organisations and discover that social values are often manifested beyond, as well as within, organisations. A matrix of social values in relation to technology changes and their interactions with various stakeholders is further discussed. The matrix helps understand how various social values emerge from and revolve around organisations’ strategic management of information technology. The implications of the findings about social values are discussed and future research directions are suggested.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Missing in the organizational learning literature is an integrative framework that reflects the emotional as well as the cognitive dynamics involved. Here, we take a step in this direction by focusing in depth over time (five years) on a selected organization which manufactures electronic equipment for the office industry. Drawing on personal construct theory, we define organizational learning as the collective re-construal of meaning in the direction of strategically significant themes. We suggest that emotions arise as members reflect on progress or lack of progress in achieving organizational learning. Our evidence suggests that invalidation - where organizational learning fails to correspond with expectations - gives rise to anxiety and frustration, while validation - where organizational learning is aligned with or exceeds expectations - evokes comfort or excitement. Our work aims to capture the key emotions involved as organizational learning proceeds. © The Author(s) 2012.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Enterprise resource planning (ERP) projects are risky. But if they are implemented appropriately, they can provide competitive advantage to organisations. Therefore, ERP implementation has become one of the most critical aspects of today's information management research. The main purpose of this article is to describe a new ERP risk assessment framework (RAF) that can be used to increase the success of ERP implementation. In this article, through a case study based in a leading UK-based energy service provider, we demonstrate the new RAF, which has been shown to help identify and mitigate risks in ERP implementation. In contrast to other research, this RAF identifies risks hierarchically in external engagement, programme management, work stream and work package levels across technical, schedule, operational, business and organisational categories. This not only helped to develop responses to mitigate risks but also facilitates on-going risk control.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper, we propose a text mining method called LRD (latent relation discovery), which extends the traditional vector space model of document representation in order to improve information retrieval (IR) on documents and document clustering. Our LRD method extracts terms and entities, such as person, organization, or project names, and discovers relationships between them by taking into account their co-occurrence in textual corpora. Given a target entity, LRD discovers other entities closely related to the target effectively and efficiently. With respect to such relatedness, a measure of relation strength between entities is defined. LRD uses relation strength to enhance the vector space model, and uses the enhanced vector space model for query based IR on documents and clustering documents in order to discover complex relationships among terms and entities. Our experiments on a standard dataset for query based IR shows that our LRD method performed significantly better than traditional vector space model and other five standard statistical methods for vector expansion.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Supply Chain Risk Management (SCRM) has become a popular area of research and study in recent years. This can be highlighted by the number of peer reviewed articles that have appeared in academic literature. This coupled with the realisation by companies that SCRM strategies are required to mitigate the risks that they face, makes for challenging research questions in the field of risk management. The challenge that companies face today is not only to identify the types of risks that they face, but also to assess the indicators of risk that face them. This will allow them to mitigate that risk before any disruption to the supply chain occurs. The use of social network theory can aid in the identification of disruption risk. This thesis proposes the combination of social networks, behavioural risk indicators and information management, to uniquely identify disruption risk. The propositions that were developed from the literature review and exploratory case study in the aerospace OEM, in this thesis are:- By improving information flows, through the use of social networks, we can identify supply chain disruption risk. - The management of information to identify supply chain disruption risk can be explored using push and pull concepts. The propositions were further explored through four focus group sessions, two within the OEM and two within an academic setting. The literature review conducted by the researcher did not find any studies that have evaluated supply chain disruption risk management in terms of social network analysis or information management studies. The evaluation of SCRM using these methods is thought to be a unique way of understanding the issues in SCRM that practitioners face today in the aerospace industry.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper builds on a Strategic Activity Framework (Jarzabkowski, 2005) and activity based theories of development (Vygotsky, 1978) to model how Enterprise Systems are used to support emerging strategy. It makes three contributions. Firstly, it links fluidity and extensiveness of system use to patterns of strategising. Fluidity - the ability to change system use as needs change - is supported by interactive strategising, where top managers communicate directly with the organisation. Extensiveness requires procedural strategising, embedding system use in structures and routines. Secondly, it relates interactive and procedural strategising to the importance of the system - procedural strategising is more likely to occur if the system is strategically important. Thirdly, using a scaffolding metaphor it identifies patterns in the activities of top managers and Enterprise System custodians, who identify process champions within the organisational community, orient them towards system goals, provide guided support, and encourage fluidity through pacing implementation with learning.© 2013 Published by Elsevier B.V. All rights reserved.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The Indian Petroleum Industry is passing through a very dynamic business environment due to liberalization. Effective project management for developing new infrastructures and maintaining the existing facilities has been considered as one of the means for remaining competitive but these practices suffer from many shortcomings, as time, cost and quality non-achievements are part and parcel of almost every project. This study focuses on identifying the specific causes of project failure by demonstrating first the characteristics of projects in Indian Petroleum industry and suggests some remedial measures for resolving these issues. The suggested project management model is integrated through information management system and demonstrated through a case study.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

There is growing evidence that client firms expect outsourcing suppliers to transform their business. Indeed, most outsourcing suppliers have delivered IT operational and business process innovation to client firms; however, achieving strategic innovation through outsourcing has been perceived to be far more challenging. Building on the growing interest in the IS outsourcing literature, this paper seeks to advance our understanding of the role that relational and contractual governance plays in achieving strategic innovation through outsourcing. We hypothesized and tested empirically the relationship between the quality of client-supplier relationships and the likelihood of achieving strategic innovation, and the interaction effect of different contract types, such as fixed-price, time and materials, partnership and their combinations. Results from a pan-European survey of 248 large firms suggest that high-quality relationships between clients and suppliers may indeed help achieve strategic innovation through outsourcing. However, within the spectrum of various outsourcing contracts, only the partnership contract, when included in the client contract portfolio alongside either fixed-price, time and materials or their combination, presents a significant positive effect on relational governance and is likely to strengthen the positive effect of the quality of client-supplier relationships on strategic innovation.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Local Government Authorities (LGAs) are mainly characterised as information-intensive organisations. To satisfy their information requirements, effective information sharing within and among LGAs is necessary. Nevertheless, the dilemma of Inter-Organisational Information Sharing (IOIS) has been regarded as an inevitable issue for the public sector. Despite a decade of active research and practice, the field lacks a comprehensive framework to examine the factors influencing Electronic Information Sharing (EIS) among LGAs. The research presented in this paper contributes towards resolving this problem by developing a conceptual framework of factors influencing EIS in Government-to-Government (G2G) collaboration. By presenting this model, we attempt to clarify that EIS in LGAs is affected by a combination of environmental, organisational, business process, and technological factors and that it should not be scrutinised merely from a technical perspective. To validate the conceptual rationale, multiple case study based research strategy was selected. From an analysis of the empirical data from two case organisations, this paper exemplifies the importance (i.e. prioritisation) of these factors in influencing EIS by utilising the Analytical Hierarchy Process (AHP) technique. The intent herein is to offer LGA decision-makers with a systematic decision-making process in realising the importance (i.e. from most important to least important) of EIS influential factors. This systematic process will also assist LGA decision-makers in better interpreting EIS and its underlying problems. The research reported herein should be of interest to both academics and practitioners who are involved in IOIS, in general, and collaborative e-Government, in particular. © 2013 Elsevier Ltd. All rights reserved.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article proposes a framework to evaluate corporate environmental strategies. In the proposed framework, a company's environmental risks are analyzed on two dimensions, One dimension, the endogenous environmental risks, arises from the internal operations of the company. The other dimension, the exogenous environmental risks, are determined by the company's external world: its location, its ecological setting, and the demographic characteristics of the physical environment in which it operates. Four environmental management approaches are defined as a function of endogenous and exogenous environmental risks: reactive, proactive, strategic, and crisis preventive. The framework was applied in a survey of 141 company representatives in Hungary. A relationship was sought between the a priori defined environmental management approaches based on technology and location and the companies' environmental management characteristics defined by senior managers. Variables that differentiated among the four environmental management approaches were identified and ranked. The study concludes that there is a relatively well-defined relationship between the environmental risks of companies and the nature of their environmental management approaches, Implementing a strategic environmental management approach may not be the best option for all companies - although there is a growing pressure to do so.