The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information technology (IT) is one of the major drivers of globalization. Thus, the delivery of IT services itself benefits from globalization due to the distribution of labor-intensive services and tasks to locations with lower labor costs, known as off shoring. From the client's perspective, there is also a demand for globally standardized IT services being delivered around the globe, considering...
Neurophysiological recording techniques are helping provide marketers and salespeople with an increased understanding of their targeted customers. Such tools are also providing information systems researchers more insight to their end-users. These techniques may also be used introspectively to help researchers learn more about their own techniques. Here we look to help salespeople have an increased...
Exploiting the social network paradigm in the context of online shopping opens a new world of opportunities to sellers and consumers, and constitutes a new theoretically interesting domain for scholars to investigate. The present paper discusses why to study and how to theorize about online social shopping networks (OSSNs), defined as digital arrangements via which individuals connect to each other...
Social media refer to technology artefacts that support various actors in a multiplicity of communication activities for producing user-generated content, developing and maintaining connections and social relationships, or enabling other computer-mediated interactions and collaborations. Despite the growing proliferation of social media articles, the topic of Organization Social Media (OSM) has hitherto...
Compared to traditional channels, Internet transactions are intrinsically untrustworthy in nature. We investigate the impact of social identity and reciprocity on trusting and cooperative behavior in dynamic gift giving networks by means of an online laboratory experiment, with a main focus on value transfers among the users individually and directed towards the group. In this study, we display profile...
The final report of the World Commission on the Environment and Development, also known as the Brundtland Report, defines sustainable development as "development that meets the needs of the present with-out compromising the ability of future generations to meet their own needs". Subsequent international efforts such as the Rio de Janeiro Conference in 1992, the publication of Agenda 21,...
Global organizations employ information systems (IS) to manage energy and carbon emission information. However, we know little about the factors associated with their adoption. Using primary data collected from a single organization, we first develop a simple conceptual framework for this class of information system comprising information technology (hardware and software), business processes, and...
With the rise of Cloud Computing, many predicted a paradigmatic change of IT-based business processes. However, extant research is primarily focusing on technical aspects, such as security and scalability, hence the assumed paradigm shift has not been explored in more detail yet. Focusing on Software as a Service (SaaS) as underlying Cloud model, we conducted an extensive literature review to derive...
The growing adoption of smart mobile devices, such as smart phones and tablets, is fundamentally changing the way how business is conducted. New mobile technologies exert a significant influence on individuals, organizations, and society at large. Our paper provides an analysis of empirical research on mobile computing in the information systems literature. The mobile computing paradigm has been used...
This study explores how value is co-created in one particular IT-enabled service, geocaching. Consumer Information Systems (CIS) framework is used as a sensitizing framework to study experienced geocachers' (n=14) perceptions of what they value in geocaching. The following core values emerged that motivate people to co-create value in geocaching: challenging oneself and others, joy of success, learning,...
Open data promises an increased availability of previously private, mostly governmental, datasets for service development. However, research on the topic is only starting to surface. In this article we propose a research agenda for open data service research. We review earlier relevant literature to extrapolate open data as a phenomenon from the perspective of the information systems field. Based...
This article examines the IT Service Management (ITSM) research literature, starting from past up to the present. The applied research method is the literature review, in which a search is conducted across 8 major global, regional, and national conferences as well as 71 international journals. Furthermore, different database searches are performed. In order to classify the results, a morphological...
Adoption processes in network effect markets -- like the ICT industry -- often lead to so-called "lock-ins" which means that one single standard or technology gets adopted by almost all market participants. Based on the work of Arthur [1] we present a simulation based model explaining a market's tendency to lock-in by means of two factors: the strength of network effects and the network...
Taken in isolation, algorithmic "data sciences" approaches and human-centred "visual analytics" methods hold great promise for operationalizing archival datasets and streaming real-time data in support of strategic and operational decision-making across a broad range of human activities.
This paper reports a literature review of eGovernment research in developing countries published between 2005 and 2010. From a review of 108 papers, the present study found that the papers could be mapped into five main research themes: design/implementation, adoption, impact, evaluation, and context. For each main theme, several sub-themes were identified. The research approaches used to investigate...
Insiders have trusted status that can provide malicious parties opportunity for advanced mischief. We offer a model and approach for managing insiders that can minimize or eliminate insider trust relationships in well-suited systems. Our approach can allow automatic insider identification when system activity occurs that can create trusted insiders. We illustrate our principles with example scenarios...
Many researchers having commented on the links between information technology and organizational change have reached conflicting conclusions about the causal relationship linking these two dimensions. In this article, we approach this relationship from a new angle by developing a scorecard allowing measurement of more specific dimensions of Computerization and Centralization. To develop this management...
In recent years, a large number of healthcare organisations have adopted information systems to improve their operations. An analysis of the existing literature shows that there is little concrete understanding about information systemsâ impact within the healthcare context. This study aims to improve the current understanding in the field by conducting an in-depth, exploratory study of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.