The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aged care sector has been a late adopter of social media platforms for communicating, collaborating, marketing and creating brand awareness. There is little research that examines the adoption of social media by aged care service providers for these purposes. This paper reviews the status of social media adoption in the Australian aged care industry, to understand in what ways social media can...
We investigate the determinants of CIOs' organizational role and tasks. We first review previous studies, which we classify as either evolutionary or CIO role studies. We consider them to be characteristic to the usage of certain technologies or certain periods of times. We modify Leavitt's well-known model to describe factors that shape the role and the tasks of CIOs over time, industries and technologies...
Software development activities are very critical, since most of them heavily depend on individuals' knowledge and their capabilities. This knowledge must be retained and managed in order to avoid productivity breakdowns. This paper empirically explores how knowledge is created and lost in a software organization, and discusses implications for software development. This is done through a case study...
This paper investigates how senior managers interpret and react to the strategic threats and opportunities presented by digital technologies. Strategy studies focus on one type of actor or organizational context. Instead, we considered various firms, roles and expertise. We conducted 20 hours of in-depth, elite interviews with 15 senior managers from client firms, digital marketing agencies and strategy...
Knowledge-intensive organizations are characterized by their dependency on highly skilled personnel who perform their daily work in a decentralized manner. In these organizations it is the users who make the important decisions, and therefore the organization's information security awareness is upheld by and depends on its users' combined security awareness. To assess the overall organizational security...
Today, the interaction between patients and Interactive Health Portals (IHPs) is one of the hot topics of e-health domains. Online health care providers try to improve the quality of their online services to increase patients' attraction, trust and loyalty. Dimensions of e-service quality (eSQ) in Interactive Health Portals (IHPs) are usually deployed in a heterogonous network where both human and...
Defined as the dependency to a technology that results in its excessive and compulsive use, IT addiction is seen as increasingly prevalent in today's societies. Recent research has revealed that IT addictive behaviors are creating serious problems for individuals and organizations alike. In this paper, we report the results of a qualitative study that aimed at investigating smart phone addictive usage...
This paper studies how social relationships are reshaped by the enactment of ICTs through the interplay of traditional and new actors. Building on the perspectives of an ecology of games and the sociology of translation, we propose a framework to study cross-organizational processes and technology-enabled reconfigurations of power and resources of the interrelated actors. We then illustrate the framework...
Of all the benefits public access computers (PAC) offer users, one stands apart: stronger personal connections with friends and family. A closer look at the results of a qualitative study among users of libraries, telecenters, and cybercafes in Colombia, South America, shows that social media and personal relationships can also have an important community and sociopolitical dimension. By fostering...
Partial adoption means that a perfect substitute fails to completely replace the older technologies in one's personal use even though it is judged the superior alternative. The assumption is that consumers choose to only use the superior alternative, yet, we often observe coexistence of old and new technologies. The contribution of this paper is to offer insights to the phenomenon of partial adoption:...
In our study we strive to develop a framework for the management of open value creation adoption. We conducted eighteen in-depth interviews with IS (information systems) executives and consultants responsible for open value creation projects. We combine the results of our software-supported qualitative analysis with insights from a broad range of existing related literature to develop a concise framework...
Social computing capabilities can harness the collaborative potential of many individuals, resulting in an outcome that no single individual would have been able to produce on their own. These capabilities are seeing widespread adoption in the consumer space. However, the motivations and the impediments to contribution in the consumer space do not necessarily translate into the enterprise space. In...
Significant gaps exist in our knowledge of real world social network structures, which in turn limit our understanding of how to design social software. One important reason for this has been that researchers have not been able to systematically probe individuals in sufficient detail about 'who' and 'how' they interact with in the social networks they wish to study. To address this shortcoming we...
Many failures associated with software development in particular Web-based applications are due to poor awareness of risks involved and the weak management of these risks. Hence, effective risk management has become the essential factor in ensuring the success of the Web project management. We propose RIAP (Risk Identification Architecture Pattern) model to manage risks in Web projects. It has been...
Software Product Lines (SPLs) provide a methodology for creating products based on a common set of core assets. In an environment that is already broadly successful with software reuse, including large-grained software reuse, can Software Product Lines provide a framework to understand the successes of the organization? This paper presents a case study of a large financial institution's internal software...
Although research indicates e-commerce offers viable and practical solutions for organizations to meet challenges of a predominantly changing environment, the few available studies related to SMEs in developing countries reveal a delay or failure on the part of SMEs in adopting e-transformation technologies. The various factors identified as causes for the reticence can be broadly classified as Internal...
There are 2,565 auction Web sites on online-auction list reports. Therefore, to understand consumers intention in using online auction and royalty is a critical issue. Yet, few studies have made on users intention to use online auction. Even though extensive researches focus on online shopping intention, however, we can not consider they both are same on use intention. Because online auction is involve...
In the C2C market, transaction are not dyadic, but triadic in nature including the buyer and seller as the consumer and the auction website as the market organizer. So there are two types of trust in C2C market. The interpersonal trust is focusing on the buyer and seller whose antecedents include competence, benevolence, integrity, reputation and disposition to trust. And the institutional trust is...
Through the popularity of technology, technology has revolutionized the way of teaching English writing. Research has shown that Web-based programs are beneficial for language learning. Thus, in order to find effective ways to facilitate English writing instruction, the researcher intends to seek supports from Web-based writing program. In the current research, three English writing classes (49 students...
IT security professionals' effectiveness in an organization is influenced not only by how usable their security management tools are but also by how well the organization's security management model (SMM) fits. Finding the right SMM is critical but can be challenging - trade-offs are inherent to each approach, but their implications aren't always clear. The authors present a case study of one academic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.