首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in business schools. Of 525 Association to Advance Collegiate Schools of Business–accredited schools, 259 have IS/IT programs and 18 have telecommunications and infrastructure-related programs. IT Infrastructure, Networking-Advanced, and IT Security are the top three infrastructure-related courses. Programs also require courses including IS Project Management; Social and Professional Issues; and IS Strategy, Management and Acquisition. Data collected are used to develop a new curriculum model of IT infrastructure management program that can be offered by business schools.  相似文献   

2.
Despite the importance of knowledge complementarities to inter-firm cooperation, few researchers in information systems (IS) have examined, to date, the construct of knowledge complementarities (KC), and none have examined its role in the success of IT outsourcing alliances. In this paper, we distinguish between potential knowledge complementarities (PKC) and synergistic value, which comprise KC. PKC is conceptualized as a multidimensional construct encompassing knowledge types (similar and specialized) and knowledge domains (business and IT). Further, we examine the extent to which PKC between the client and the vendor promotes success in IT outsourcing alliances. This research also includes relative absorptive capacity because it is relevant when complementary knowledge flows between organizations. We used data from a field study of 81 firms in Korea to test the proposed model. Our findings indicate that each dimension of PKC contributes uniquely to knowledge complementarities. The results also show that PKC is significantly associated with IT outsourcing effectiveness. Relative absorptive capacity is found to be a moderator between PKC and IT outsourcing effectiveness. The theoretical and practical implications of these findings are discussed in the paper.  相似文献   

3.
Professional accounting associations, business schools, and accounting professors are increasingly faced with an important question: Which information technology (IT) competencies should be developed in accounting programs to train skilled professional accountants? Key references in accounting education show that advanced‐level training in IT is very important for accountants’ careers. Through content analysis, I investigate how Canadian CPAs are trained in IT. Results indicate that, postmerger, IT has lost ground in the CPA program. This could be mainly due to: (a) a larger coverage in finance, strategy, and governance topics; (b) challenges to promote and teach IT in terms of course development; and (c) a lack of recognition of and incentives for academic work on IT. Compared to some key players in accounting education, it appears that Canada has taken a different route with regard to the required IT competencies. Copyright © 2016 ASAC. Published by John Wiley & Sons, Ltd.  相似文献   

4.
This work analyses the strategy of outsourcing information systems and information technology (IS/IT), considering the different activities comprising the IS/IT area. The literature on IS contains numerous works that analyse outsourcing, very few of which examine the relationship with the different types of capabilities in the IS/IT area and their strategic value. Most works centre on the motives for, and advantages of, the strategy of outsourcing the IS/IT area, while scant attention has been paid to the study of the long-term consequences of outsourcing. This work develops a theoretical model which is applied to the hotel sector and which shows that hotels following a more intensive outsourcing strategy develop fewer managerial capabilities related to knowledge in the management of IS/IT resources. This negative relationship extends to other types of capabilities typical of the area and to certain organisational capabilities. A negative relationship is also observed between the level of outsourcing and the strategic value given to the IS/IT area, which may lead to a lower potential for the development of competitive advantage.  相似文献   

5.
The literature on strategic applications of information technology(IT) and strategic information systems (SIS) contains a number of "classic" success cases. These systems are successful in terms of one particular strategy framework, but there is evidence that the demands placed upon SIS are changing. Changes in the business environment and in the rate of development of technology have created a requirement for more flexibility in the strategic process. This must be supported by a "new generation" of SIS that integrate with flexible infrastructures to provide long-term effective support for a flexible business strategy. This article looks at the changing nature of the strategic: process and examines a framework that has potential to assist in these aims. A number of techniques are analyzed to assess their capability for identifying strategic applications of IT. Finally, a way of providing a flexible IS/IT infrastructure relevant to the development of a flexible SIS is discussed.  相似文献   

6.
饶艳超  陈烨 《财贸经济》2012,(7):126-132
本文通过问卷调查的方式收集企业信息化、知识共享和企业绩效的相关数据,检验了企业信息化对企业绩效的影响以及知识共享在二者关系中的作用。研究表明,企业信息化不仅与企业绩效的提升显著正相关,而且还可通过知识共享的中介作用间接影响企业绩效的提升。本文研究对理解企业信息化建设和应用过程中的知识管理行为提供了一个新的视角。  相似文献   

7.
The continued use of information technology systems by small and medium enterprises (SMEs) in developing countries has the potential to bring significant benefits but, at the same time, expose them to online cybersecurity threats. Addressing these threats is, therefore, of paramount importance for developing countries, not only because SMEs are seen as the vehicle for employment and job creation, but because research on SMEs and cybersecurity in this context is limited. This study is a contribution toward addressing this gap.

The purpose of this study is, therefore, to explore SME cybersecurity practices and the challenges they face in developing countries. The goal is to sensitize practitioners and government institutions about the challenges and practices faced by SMEs, so that the various parties can work collaboratively in providing context-specific solutions to address these challenges and improve current cybersecurity practices. The study follows a qualitative enquiry approach to solicit information from three South African SMEs that had implemented cybersecurity practices. The findings show that an SME’s perception of cybersecurity is constrained by internal factors of budget, management support, and attitudes. Further findings show that SMEs’ cybersecurity practices are affected by the landscape of cybersecurity, as well as institutional pressures.  相似文献   


8.
Abstract

The latest innovation to draw the attention of business schools and their stakeholders is electronic commerce (e-commerce). The purpose of this paper is to examine how business schools are responding to the curriculum challenge of e-commerce. The results indicate that business schools are initiating three types of responses: The first concerns programmatic changes. The second concerns changes in the disciplines of management information systems, marketing, operations management, and accounting. The third response is the establishment of centers/institutes of e-commerce. Before we report on these responses, we present an overview of e-commerce. After our responses, we present a summary of our results and predict future trends.  相似文献   

9.
Drawing on the resource-based view and the literature on big data analytics (BDA), information system (IS) success and the business value of information technology (IT), this study proposes a big data analytics capability (BDAC) model. The study extends the above research streams by examining the direct effects of BDAC on firm performance (FPER), as well as the mediating effects of process-oriented dynamic capabilities (PODC) on the relationship between BDAC and FPER. To test our proposed research model, we used an online survey to collect data from 297 Chinese IT managers and business analysts with big data and business analytic experience. The findings confirm the value of the entanglement conceptualization of the hierarchical BDAC model, which has both direct and indirect impacts on FPER. The results also confirm the strong mediating role of PODC in improving insights and enhancing FPER. Finally, implications for practice and research are discussed.  相似文献   

10.
The need of business enterprises for professionals trained for the challenges of cross-border assignments will increase exponentially through the decade. Business schools will be hard pressed to deliver programs with the scope, scale, and effectiveness necessary to address the unique competencies required for cross-cultural understanding and communication, and the complexity of global business operations. This article reviews the existing literature in order to identify the competencies that are needed by global managers and the training approaches that can successfully build those competencies. A template of 10 criteria that should be addressed by training programs for cross-border professionals is proposed and applied to a sample of business schools that currently offer executive programs. Although there are good examples of programs that meet one or more of the 10 criteria, most business schools will be required to expand and to innovate their programs in order to meet the projected demand for training.  相似文献   

11.
Abstract

During the past 30 years, there have been calls for universities and business schools to internationalize curriculum, students and faculty. As most U.S. business schools have added international components to their respective programs, the assessment of these programs was subsequently recommended from accreditation and competitive perspectives. To sustain competitiveness, business schools must expand their program assessment activities and rigorously conduct assessment at the course level as well. We propose a model of international business course assessment that links learning aims to delivery methods and reviews two separate approaches based on that model.  相似文献   

12.
ABSTRACT

A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety-hazard analysis method, Systems Theoretic Process Analysis (STPA) based on systems theory to analyze the cybersecurity related features of India’s massive digital identity program, Aadhaar. Our findings produce important insights. On one hand, it helps identify the security gaps of the Aadhaar system, and on the other hand, it provides controls using systems thinking to overcome these gaps. We contribute to understanding the world of cybersecurity practices and develop risk mitigation strategies that can benefit the Aadhaar.  相似文献   

13.
The emerging electronic economy is bringing with it rapid advances in open networks and information technology (IT) capabilities, increasing global complexity and interdependence, and increasingly short business cycle times. Many enterprises are reengineering the way they carry out their business to take advantage of these new conditions. In this article, we contend that it is also time for information systems (IS) academics to fundamentally rethink the IS research process and the intellectual infrastructure that enables it in light of these new conditions. We first examine why the current IS research process needs to be changed. We then systematically analyze needed change along 6 dimensions. The change potentials are used to propose an IS research paradigm that is based on interactive knowledge repositories and collaborative electronic networks. We propose a new intellectual infrastructure that is based on a new type of IT-enabled electronic space for the research community, which we term a cybrarium. A cybrarium is focused not only on the storage and dissemination but also on the synthesis of knowledge generated in the research community. We articulate the basic distinctions between electronic Web journals and cybrariums and show how a cybrarium leads to a fundamentally changed research process. We contend that such a redefined research process and its underlying intellectual infrastructure will enable the IS research community to make the transition to a large-scale global collaborative alliance that is faster, more forward looking, and cumulative.  相似文献   

14.
Since enterprises have become aware of technological developments; they have started to give significant importance to information technology investments. As in all university departments, also management information systems (MIS) and business informatics programs analyze the change in the industry and aim to graduate students that fit the current needs. The authors aim to evaluate the critical skills of MIS graduates and industry based on industry demand. Providing information systems support, knowledge on latest systems, managerial knowledge, systems development, project management, and teamwork comprise the six critical factors for becoming a successful MIS professional.  相似文献   

15.
As modern organizations increasingly depend on information systems (IS) to enhance work productivity and seek new business opportunities, communication effectiveness has become one of the key factors that underlie the effective performance of IS implementations and applications. Instant Messaging (IM) presents a revolution in enterprise communication. As more organizations are findings ways to utilize this near-synchronous computing communication technology to enhance communication effectiveness in the workplace, there is a compelling need to understand the factors that are important for the adoption of enterprise IM. We have developed an integrative model based on constructs of the existing IT adoption models as well as theories on motivation, innovation diffusion, and critical mass. Using responses from 140 intended subjects, we have found the results of survey data support the contentions that perceived usefulness, compatibility, enjoyment, and security are significant predictors of intention to use enterprise IM. Although perceived connectivity did not predict the intention directly, it did indirectly through perceived usefulness and perceived ease of use. Implications and future research are discussed.  相似文献   

16.
The unified theory of acceptance and use of technology (UTAUT) has been widely used to investigate factors influencing the adoption and use of information systems and technologies (IS/IT). However, studies using UTAUT are not conclusive in terms of statistical significance, direction, and magnitude. Through a meta‐analysis of empirical studies on UTAUT from 2003 to 2013, we determine how parsimonious, accurate, and robust UTAUT is at predicting acceptance and use of technology. A meta‐analysis of 74 publications reveals that performance expectancy, effort expectancy, and social influence explain IS/IT adoption, while behavioural intention is the most often measured dependent variable operationalized as a proxy for system use, supporting the strength of UTAUT as an explanatory model of IS/IT acceptance and use. Copyright © 2016 ASAC. Published by John Wiley & Sons, Ltd.  相似文献   

17.
Unethical behavior on the part of business corporations and their leaders has led many business executives and university administrators to call for the inclusion of ethics in MBA programs. This paper reviewed studies and commentary relating to the teaching of ethics in MBA programs in the United States. The results showed that ethics has not yet gained an integral place in the curricula of business schools. A plan of action for the systematic incorporation of ethics into the MBA curriculum was proposed based on the system model of training commonly used in the training field. In concluding, a question about the total responsibility of the business schools toward the promotion of ethical behavior on the part of their graduates was raised.  相似文献   

18.
The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the “productivity paradoxon” of the 1990s, Carr’s widely recognized paper “IT doesn’t matter”, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain “IS business value”. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research.  相似文献   

19.
In the current dramatically changing business environment, innovation capability is the key to attaining competitive advantages for firms. Drawing on the concept of alignment, the present research proposes a service innovation alignment model within which service innovation and strategic use of information technology (IT) coexist in evaluating performance. Data for hypotheses testing are collected from top-ranked service companies in Taiwan. A total of 165 surveys were collected. Performance implications of alignment are examined using fit as covariation approach. The findings demonstrate that the alignment between service innovation and the strategic use of IT has significant impacts on service innovation performance as well as business performance.  相似文献   

20.
Companies are increasingly confronted with the question of whether or not the adoption of information technologies (IT) turns out to be a profitable venture. Thus, there is a great need for methods which allow for both the analysis and evaluation of the economic value of IT investments. In this paper we introduce the concept of potentials modeling which integrates a value-oriented perspective into information modeling. More specifically, we set out to explore the economic value of service-oriented architectures (SOA). The practicability of our approach is illustrated on the basis of a simplified application example. It is hoped that this paper will make a contribution to the ongoing discussion of IT value and stimulates further research in the field of value-oriented information systems (IS).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号