741 resultados para 150302 Business Information Systems
Resumo:
Electronic commerce (e-commerce) has become an increasingly important initiative among organisations. The factors affecting adoption decisions have been well-documented, but there is a paucity of empirical studies that examine the adoption of e-commerce in developing economies in the Arab world. The aim of this study is to provide insights into the salient e-commerce adoption issues by focusing on Saudi Arabian businesses. Based on the Technology-Organisational-Environmental framework, an integrated research model was developed that explains the relative influence of 19 known determinants. A measurement scale was developed from prior empirical studies and revised based on feedback from the pilot study. Non-interactive adoption, interactive adoption and stabilisation of e-commerce adoption were empirically investigated using survey data collected from Saudi manufacturing and service companies. Multiple discriminant function analysis (MDFA) was used to analyse the data and research hypotheses. The analysis demonstrates that (1) regarding the non-interactive adoption of e-commerce, IT readiness, management team support, learning orientation, strategic orientation, pressure from business partner, regulatory and legal environment, technology consultants‘ participation and economic downturn are the most important factors, (2) when e-commerce interactive adoption is investigated, IT readiness, management team support, regulatory environment and technology consultants‘ participation emerge as the strongest drivers, (3) pressure from customers may not have much effect on the non-interactive adoption of e-commerce by companies, but does significantly influence the stabilisation of e-commerce use by firms, and (4) Saudi Arabia has a strong ICT infrastructure for supporting e-commerce practices. Taken together, these findings on the multi-dimensionality of e-commerce adoption show that non-interactive adoption, interactive adoption and stabilisation of e-commerce are not only different measures of e-commerce adoption, but also have different determinants. Findings from this study may be valuable for both policy and practice as it can offer a substantial understanding of the factors that enhance the widespread use of B2B e-commerce. Also, the integrated model provides a more comprehensive explanation of e-commerce adoption in organisations and could serve as a foundation for future research on information systems.
Resumo:
The paper discusses both the complementary factors and contradictions of adoption ERP based systems with enterprise 2.0. ERP is well known as its' efficient business process management. Also the high failure rate the system implementation is famous as well. According to [1], ERP systems could achieve efficient business performance by enabling a standardized business process design, but at a cost of flexibility in operations. However, enterprise 2.0 supports flexible business process management, informal and less structured interactions [3],[4],[21]. Traditional researcher claimed efficiency and flexibility may seem incompatible in that they are different business objectives and may exist in different organizational environments. However, the paper will break traditional norms that combine ERP and enterprise 2.0 in a single enterprise to improve both efficient and flexible operations simultaneously. Based on the multiple cases studies, four cases presented different attitudes on usage ERP systems and enterprise social systems. Based on socio-technical theory, the paper presents in-depth analysis benefits of combination ERP with enterprise 2.0 for these firms.
Resumo:
Government agencies use information technology extensively to collect business data for regulatory purposes. Data communication standards form part of the infrastructure with which businesses must conform to survive. We examine the development of, and emerging competition between, two open business reporting data standards adopted by government bodies in France; EDIFACT (incumbent) and XBRL (challenger). The research explores whether an incumbent may be displaced in a setting in which the contention is unresolved. We apply Latour’s (1992) translation map to trace the enrolments and detours in the battle. We find that regulators play an important role as allies in the development of the standards. The antecedent networks in which the standards are located embed strong beliefs that become barriers to collaboration and fuel the battle. One of the key differentiating attitudes is whether speed is more important than legitimacy. The failure of collaboration encourages competition. The newness of XBRL’s technology just as regulators need to respond to an economic crisis and its adoption by French regulators not using EDIFACT create an opportunity for the challenger to make significant network gains over the longer term. ANT also highlights the importance of the preservation of key components of EDIFACT in ebXML.
Resumo:
Despite the proliferation of e-business adoption by organisations and the world-wide growth of the e-business phenomenon, there is a paucity of empirical studies that examine the adoption of e-business in the Middle East. The aim of our study is to provide insights into the salient e-business adoption issues by focusing on Saudi Arabian businesses. We developed a conceptual model for electronic business (e-business) adoption incorporating ten factors based on the technology-organization-environment framework. Survey data from 550 businesses were used to test the model and hypotheses. We conducted confirmatory factor analysis to assess the reliability and validity of constructs. The findings of the study suggest that firm technology competence, size, top management Support, technology orientation, consumer readiness, trading partner readiness and regulatory support are important antecedents of e-business adoption and utilisation. In addition, the study finds that, competitive pressure and organisational customer and competitor orientation is not a predictor for e-business adoption and utilisation. The implications of the findings are discussed and suggestions for future inquiry are presented.
Resumo:
This book contains 11 carefully revised and selected papers from the 5th Workshop on Global Sourcing, held in Courchevel, France, March 14-17, 2011. They have been gleaned from a vast empirical base brought together by leading researchers in information systems, strategic management, and operations. This volume is intended for use by students, academics, and practitioners interested in the outsourcing and offshoring of information technology and business processes. It offers a review of the key topics in outsourcing and offshoring, populated with practical frameworks that serve as a tool kit for students and managers. The topics discussed combine theoretical and practical insights, and they are extensively illustrated by case studies from client and vendor organizations. Last but not least, the book examines current and future trends in outsourcing and offshoring, paying particular attention to how innovation can be realized in global or outsourced software development environments.
Resumo:
Information and Communications Technology (ICT) is widely regarded as a key integration enabler in contemporary supply chain configurations. Furthermore, recent years have seen the vertical disintegration of supply chains as increasing numbers of manufacturers and retailers outsource significant parts of their supply chain functionality. In this environment, Third Party Logistics (3PL) providers - the majority of which are small companies - play a pivotal role. This raises important questions about the usage of ICT in this sector. However, there is a paucity of research in the field of small 3PLs with little empirical investigation into the usage of ICT by such firms. This paper presents the results of a survey on ICT systems usage in a sample of small Italian 3PLs. The results provide a technological profile of the surveyed companies, as well as an analysis of the role of ICT in customising services and of the factors influencing technology adoption.
Resumo:
The chapter discusses both the complementary factors and contradictions of adoption ERP-based systems with Enterprise 2.0. ERP is well known as IT's efficient business process management. Enterprise 2.0 supports flexible business process management, informal, and less structured interactions. Traditional studies indicate efficiency and flexibility may seem incompatible because they are different business objectives and may exist in different organizational environments. However, the chapter breaks traditional norms that combine ERP and Enterprise 2.0 in a single enterprise to improve both efficient and flexible operations simultaneously. Based on multiple case studies, the chapter analyzes the benefits and risks of the combination of ERP with Enterprise 2.0 from process, organization, and people paradigms. © 2013 by IGI Global.
Resumo:
Use of modern object-oriented methods of designing of information systems (IS) both descriptions of interrelations IS and automated with its help business-processes of the enterprises leads to necessity of construction uniform complete IS on the basis of set of local models of such system. As a result of use of such approach there are the contradictions caused by inconsistency of actions of separate developers IS with each other and that is much more important, inconsistency of the points of view of separate users IS. Besides similar contradictions arise while in service IS at the enterprise because of constant change separate business- processes of the enterprise. It is necessary to note also, that now overwhelming majority IS is developed and maintained as set of separate functional modules. Each of such modules can function as independent IS. However the problem of integration of separate functional modules in uniform system can lead to a lot of problems. Among these problems it is possible to specify, for example, presence in modules of functions which are not used by the enterprise to destination, to complexity of information and program integration of modules of various manufacturers, etc. In most cases these contradictions and the reasons, their caused, are consequence of primary representation IS as equilibrium steady system. In work [1] representation IS as dynamic multistable system which is capable to carry out following actions has been considered:
Resumo:
Online learning systems (OLS) have become center stage for corporations and educational institutions as a competitive tool in the knowledge economy. The satisfaction construct has received extensive coverage in information systems literature as an indicator of effectiveness but has been criticized for lack of validity; yet, the value construct has been largely ignored, although it has a long history in psychology, sociology, and behavioral science. The purpose of this dissertation is to investigate the value and satisfaction constructs in the context of OLS, and their perceived by learners relationship for implied effectiveness of OLS. ^ First, a qualitative phase is employed to gather OLS values from learners' focus groups, followed by a pilot phase to refine a proposed instrument, and a main phase to validate the survey. Responses were received from 75 students in four focus groups, 141 in the pilot, and 207 the main survey. Extensive data cleaning and exploratory factor analysis were done to identify factors of learners' perceived value and satisfaction of OLS. Then, Value-Satisfaction grids and the Learners' Value Index of Satisfaction (LeVIS) were developed as benchmarking tools of OLS. Moreover, Multicriteria Decision Analysis (MCDA) techniques were employed to impute value from satisfaction scores in order to reduce survey response time. ^ The results provided four satisfaction and four value factors with high reliability (Cronbach's α). Moreover, value and satisfaction were found to have low linear and nonlinear correlations, indicating that they are two distinct uncorrelated constructs. This is consistent with the literature. Value-Satisfaction grids and the LeVIS index indicated relatively high effectiveness for technology and support characteristics, relatively low effectiveness for professor's characteristics, while course and learner characteristics indicated average effectiveness. ^ The main contributions of this study include identifying, defining, and articulating the relationship between value and satisfaction constructs as assessment of users' implied IS effectiveness, as well as assessing the accuracy of MCDA procedures to predict value scores, thus reducing by half the survey questionnaire size. ^
Resumo:
Security remains a top priority for organizations as their information systems continue to be plagued by security breaches. This dissertation developed a unique approach to assess the security risks associated with information systems based on dynamic neural network architecture. The risks that are considered encompass the production computing environment and the client machine environment. The risks are established as metrics that define how susceptible each of the computing environments is to security breaches. ^ The merit of the approach developed in this dissertation is based on the design and implementation of Artificial Neural Networks to assess the risks in the computing and client machine environments. The datasets that were utilized in the implementation and validation of the model were obtained from business organizations using a web survey tool hosted by Microsoft. This site was designed as a host site for anonymous surveys that were devised specifically as part of this dissertation. Microsoft customers can login to the website and submit their responses to the questionnaire. ^ This work asserted that security in information systems is not dependent exclusively on technology but rather on the triumvirate people, process and technology. The questionnaire and consequently the developed neural network architecture accounted for all three key factors that impact information systems security. ^ As part of the study, a methodology on how to develop, train and validate such a predictive model was devised and successfully deployed. This methodology prescribed how to determine the optimal topology, activation function, and associated parameters for this security based scenario. The assessment of the effects of security breaches to the information systems has traditionally been post-mortem whereas this dissertation provided a predictive solution where organizations can determine how susceptible their environments are to security breaches in a proactive way. ^
Resumo:
In his study - File Control: The Heart Of Business Computer Management - William G. O'Brien, Assistant Professor, The School of Hospitality Management at Florida International University, initially informs you: “Even though computers are an everyday part of the hospitality industry, many managers lack the knowledge and experience to control and protect the files in these systems. The author offers guidelines which can minimize or prevent damage to the business as a whole.” Our author initially opens this study with some anecdotal instances illustrating the failure of hospitality managers to exercise due caution with regard to computer supported information systems inside their restaurants and hotels. “Of the three components that make up any business computer system (data files, programs, and hard-ware), it is files that are most important, perhaps irreplaceable, to the business,” O’Brien informs you. O’Brien breaks down the noun, files, into two distinct categories. They are, the files of extrinsic value, and its counterpart the files of intrinsic value. An example of extrinsic value files would be a restaurant’s wine inventory. “As sales are made and new shipments are received, the computer updates the file,” says O’Brien. “This information might come directly from a point-of-sale terminal or might be entered manually by an employee,” he further explains. On the intrinsic side of the equation, O’Brien wants you to know that the information itself is the valuable part of this type of file. Its value is over and above the file’s informational purpose as a pragmatic business tool, as it is in inventory control. “The information is money in the legal sense For instance, figures moved about in banking system computers do not represent dollars; they are dollars,” O’Brien explains. “If the record of a dollar amount is erased from all computer files, then that money ceases to exist,” he warns. This type of information can also be bought and sold, such as it is in customer lists to advertisers. Files must be protected O’Brien stresses. “File security requires a systematic approach,” he discloses. O’Brien goes on to explain important elements to consider when evaluating file information. File back-up is also an important factor to think about, along with file storage/safety concerns. “Sooner or later, every property will have its fire, flood, careless mistake, or disgruntled employee,” O’Brien closes. “…good file control can minimize or prevent damage to the business as a whole.”
Resumo:
The chapter discusses both the complementary factors and contradictions of adopting ERP based systems with enterprise 2.0. ERP is characterized as achieving efficient business performance by enabling a standardized business process design, but at a cost of flexibility in operations. It is claimed that enterprise 2.0 can support flexible business process management and so incorporate informal and less structured interactions. A traditional view however is that efficiency and flexibility objectives are incompatible as they are different business objectives which are pursued separately in different organizational environments. Thus an ERP system with a primary objective of improving efficiency and an enterprise 2.0 system with a primary aim of improving flexibility may represent a contradiction and lead to a high risk of failure if adopted simultaneously. This chapter will use case study analysis to investigate the use of a combination of ERP and enterprise 2.0 in a single enterprise with the aim of improving both efficiency and flexibility in operations. The chapter provides an in-depth analysis of the combination of ERP with enterprise 2.0 based on social-technical information systems management theory. The chapter also provides a summary of the benefits of the combination of ERP systems and enterprise 2.0 and how they could contribute to the development of a new generation of business management that combines both formal and informal mechanisms. For example, the multiple-sites or informal communities of an enterprise could collaborate efficiently with a common platform with a certain level of standardization but also have the flexibility in order to provide an agile reaction to internal and external events.
Resumo:
Business Process Management (BPM) is able to organize and frame a company focusing in the improvement or assurance of performance in order to gain competitive advantage. Although it is believed that BPM improves various aspects of organizational performance, there has been a lack of empirical evidence about this. The present study has the purpose to develop a model to show the impact of business process management in organizational performance. To accomplish that, the theoretical basis required to know the elements that configurate BPM and the measures that can evaluate the BPM success on organizational performance is built through a systematic literature review (SLR). Then, a research model is proposed according to SLR results. Empirical data will be collected from a survey of larg and mid-sized industrial and service companies headquartered in Brazil. A quantitative analysis will be performed using structural equation modeling (SEM) to show if the direct effects among BPM and organizational performance can be considered statistically significant. At the end will discuss these results and their managerial and cientific implications.Keywords: Business process management (BPM). Organizational performance. Firm performance. Business models. Structural Equation Modeling. Systematic Literature Review.
Resumo:
O Gerenciamento de Processo de Negócio (Business Process Management- BPM) tem sido uma prática adotada pelas organizações públicas e privadas. O BPM possibilita a identificação eficaz das necessidades e das informações necessárias para suportar a operacionalização ou a automatização do processo de negócio. Considerando que as organizações têm necessitado terceirizar esse serviço, o objetivo desse trabalho foi propor um modelo de medição para contratação dos serviços de BPM. Para atender a esse objetivo, o modelo conceitual construído partiu da premissa que a gestão da contratação de um BPM deve fornecer critérios para mensurar a demanda, ou serviço, avaliar a qualidade dos serviços prestados e a qualidade do produto recebido. O estudo adotou como instrumentos de coleta de dados a pesquisa documental e a revisão sistemática. Com base nos objetivos e questões de pesquisa foram identificados os strings para busca, definidas as fontes de busca, critérios de inclusão e exclusão dos resultados. Todos os trabalhos selecionados foram lidos e analisados e foi utilizado um mapa mental para consolidação dos resultados. Foi utilizado o GQM (Goal, Questions, Metrics) para a elaboração das medições e adotado o estudo de caso. Parte das medições propostas foram aplicadas em 13 modelos de processo de negócio do mundo real com o objetivo de verificar sua coerência e comparar os resultados. Foi realizada entrevista com especialista em modelagem de processos de negócios para avaliar os resultados obtidos e, na percepção deste especialista a maior parte das métricas propostas pela pesquisa é adequada à realidade de mercado, considerando o contexto de terceirização desse serviço.