Search results

1 – 10 of 13
Article
Publication date: 1 December 1997

Mahbubur Rahim, Khaled Khan and Mohd. Hasan Selamat

In recent years, computer‐aided software engineering tools (CASE) have emerged to provide automation support to the software development process. Such automation is a…

Abstract

In recent years, computer‐aided software engineering tools (CASE) have emerged to provide automation support to the software development process. Such automation is a revolutionary progress which promises dramatic improvement in software quality and productivity. However, despite such promises, CASE tools have not proved to be effective in some organizations owing to the fact that far fewer efforts are expended by organizations on evaluation for selection and introduction of appropriate CASE tools. Proposes a conceptual model on CASE environment that is assembled from two distinct but related processes : “CASE selection” and “CASE adoption”. Further argues that CASE adoption process will be affected if an organization fails to select appropriate CASE tools. Therefore, the success of CASE adoption is very much dependent on the process of CASE selection. Moreover, there is also a possibility that even a suitable CASE tool may not contribute positively, if it is not adopted systematically. Thus, if the CASE adoption fails then a CASE environment would not function. Against this background, cites two case studies describing the experiences of two organizations that adopted a particular brand of front‐end CASE tool. One organization was successful in introducing the tool, and experienced considerable improvement in quality and productivity. Conversely, the same CASE tool failed to achieve its purpose in another organization. In the light of the model, further describes why and how CASE failed in one organization, and was considered successful in another. Finally, also highlights the lessons learned from their experiences.

Details

Information Technology & People, vol. 10 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 March 2000

Mahbubur Rahim, Mohd. Noah Abd. Rahman and Afzaal H. Seyal

This article reports the results of a survey in Brunei Darussalam concerning the use of pirated software among academics. Though, the suspicion of academics using pirated software…

2440

Abstract

This article reports the results of a survey in Brunei Darussalam concerning the use of pirated software among academics. Though, the suspicion of academics using pirated software has long been circulating around in East and South East Asia, no “hard data” has ever been collected. This article confirms the suspicion, and provides new information on the use of pirated software outside the USA. Also reveals the type of tasks accomplished by academics with pirated software, and identifies the reasons for using such software. Moreover, relates academics’ use of pirated software with nine factors related to demographics, computer exposure, and job profile of academics. The findings are discussed, and are compared with some related findings reported elsewhere. Finally, concludes with some suggestions to curb piracy, and identifies areas of further research.

Details

Information Management & Computer Security, vol. 8 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 11 November 2014

Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler and Michael H. Breitner

This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications…

7464

Abstract

Purpose

This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature.

Design/methodology/approach

This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories.

Findings

The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented.

Research limitations/implications

Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum.

Practical implications

This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs.

Originality/value

This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.

Details

Management Research Review, vol. 37 no. 12
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 7 September 2010

Ali Al‐Aufi and Paul Genoni

The purpose of this paper is to investigate disciplinary differences in the use of networked information for research and scholarly communication at Sultan Qaboos University…

662

Abstract

Purpose

The purpose of this paper is to investigate disciplinary differences in the use of networked information for research and scholarly communication at Sultan Qaboos University (SQU), Oman. The paper produced quantitative data on how and why academics within different disciplines utilise networked information either made available internally through the university library, or externally through services accessed by the internet.

Design/methodology/approach

A questionnaire survey was conducted with academic staff at SQU.

Findings

Statistical analysis found a number of significant differences between respondents in the science disciplines and those in the social sciences and humanities with regard to their use of, and attitudes towards, digital information services. While respondents from science disciplines show overall longer and more frequent use of networked information, respondents from humanities and social sciences indicated more positive attitudes towards library networked services.

Research limitations/implications

The Arab country context presents a challenge in determining the degree to which results can be extrapolated to other environments, in that disciplines are also divided by language. Science disciplines teach in English, and the social science and humanities in Arabic.

Originality/value

While similar studies have been undertaken in developed countries, this study is an attempt to establish some data for a developing Arab country.

Details

Library Hi Tech, vol. 28 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 February 2023

Yvonne Lee, WeiLee Lim and Ho Sai Eng

This paper aims to analyse the unified theory of acceptance and use of technology (UTAUT) and UTAUT2 constructs used in research on information and communication technology (ICT…

Abstract

Purpose

This paper aims to analyse the unified theory of acceptance and use of technology (UTAUT) and UTAUT2 constructs used in research on information and communication technology (ICT) adoption and use among micro, small and medium enterprises (MSMEs) in non-organisation for economic co-operation and development (OECD) countries. It also investigates the areas of ICT adoption along the value chain in studies using these constructs.

Design/methodology/approach

Systematic literature review (SLR) was conducted, where 910 studies were retrieved manually in five academic databases. Forty-eight studies were finalised after four filtration levels.

Findings

Majority of the studies were published within the past six years, and 85.42% were studies in the form of journal papers. UTAUT constructs more researched compared to UTAUT2 constructs. More than half of the studies investigated ICT application in value chain boundaries, while 16 studies were organisation-wide studies.

Research limitations/implications

With developments in MSMEs’ technology, the UTAUT2 model must be expanded to internal company operations including finance and infrastructure maintenance. To boost competitiveness and productivity, non-OECD authorities should focus on the cost and user-centric characteristics of MSMEs’ technology adoption.

Originality/value

Although SLRs on UTAUT and UTAUT2 constructs have been attempted previously, this study contributes to the body of knowledge by focusing analysis on the application of those constructs on MSMEs in non-OECD countries and also by situating ICT adoption along the value chain of enterprises.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 4
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 4 December 2020

Sunday C. Eze, Vera C. Chinedu-Eze and Adenike O. Bello

Although several researchers have made significant efforts to examine the adoption of social media marketing technology in Nigeria, many have focussed on large organizations while…

1637

Abstract

Purpose

Although several researchers have made significant efforts to examine the adoption of social media marketing technology in Nigeria, many have focussed on large organizations while others have constantly extrapolated the findings obtained in the Western world as if small and medium enterprises (SMEs) have the same structure, managerial capabilities, and operate in the same way. This has hindered the development of an integrated framework aimed at unravelling the factors shaping the adoption of social media marketing applications in SMEs in Nigeria. The paper, therefore, aims to explore some antecedent factors that shape SMEs adoption of social media marketing applications in SMEs in Nigeria.

Design/methodology/approach

The study deployed a qualitative approach with the use of unstructured and semi-structured interviews with a total of 20 participants drawn purposeful from Nigeria directories and analysed by using a hybrid method of thematic analysis.

Findings

The study developed an extended technology–organization–environment framework (TOE) framework that incorporated the communication context, which aids in identifying 11 key success factors shaping SMEs adoption of social media marketing technology in Nigeria. The findings associated with the extended TOE framework show that they have an impact on social media marketing technology adoption in SMEs.

Research limitations/implications

Because the researchers adopted the qualitative method, the findings may lead to some bias in the analysis of the data which may limit the insights into the key factors shaping the adoption of social media marketing technology adoption. Future studies may adopt a mixed-method approach or a comparative approach to confirm the finding and to better understand the critical factors linked to the framework. Although it is believed the with the use of thematic data analysis, the results are well associated with the structure; however, the structure has limitations. Drawing from the data analysis, the factors are limited. Other factors which may positively influence social media marketing adoption in SMEs. Hence, further studies are needed in this area in a bid to explore these factors by using different research appraoches.

Originality/value

The study has enriched the existing TOE framework and provided insights into the dominant issue faced by SMEs in adopting social media marketing technology, provided an analytical dimension, reliable explanation of these finding and tool for evaluating some of the challenges faced by SMEs in the adoption of social media marketing technology.

Details

Journal of Science and Technology Policy Management, vol. 12 no. 1
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 15 July 2019

Kristijan Mirkovski, Robert M. Davison and Maris G. Martinsons

Drawing on transaction cost economics (TCE) and social exchange theory (SET), the purpose of this paper is to explain why and how external environment, governance structures and…

Abstract

Purpose

Drawing on transaction cost economics (TCE) and social exchange theory (SET), the purpose of this paper is to explain why and how external environment, governance structures and interpersonal relationships influence information and communication technology (ICT)-enabled information sharing in supply chains (SCs) of small- and medium-sized enterprises (SMEs) from developing economies.

Design/methodology/approach

The authors adopt a theory-building approach using a multiple case study design, including four SMEs operating in SCs from two developing economies (i.e. Republic of North Macedonia and People’s Republic of China), in which the authors conduct both within-case and cross-case analyses.

Findings

Social bonds (known as vrski in Macedonian and guanxi in Chinese) were found to govern buyer–supplier exchanges by supporting the establishment of personal trust and the reduction of distrust. These social bonds compensate for the institutional deficiencies in developing economies and thus encourage ICT-enabled information sharing by SMEs in their SCs.

Research limitations/implications

By applying the theoretical perspectives of TCE and SET to the cross-case analysis, the authors develop nine propositions to explain ICT-enabled information sharing and its interdependencies with external environment, governance structures and interpersonal relationships in developing economies. Further research is recommended to refine and test the generalizability of the theoretical model.

Practical implications

Firms have to develop and nurture social bonds with their suppliers from developing economies to reduce risks related to the environmental uncertainty and institutional voids. This can increase trust and decrease distrust associated with ICT-enabled information sharing.

Originality/value

The study examines why and how external environment (environmental uncertainty and institutional environment), social bonds (vrski and guanxi) and interpersonal mechanisms (trust and distrust) influence ICT-enabled information sharing of SMEs operating in developing economies.

Details

The International Journal of Logistics Management, vol. 30 no. 3
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 14 June 2019

Sunday C. Eze, Sulaimon Olatunji, Vera Chinwendu Chinedu-Eze, Adenike O. Bello, Adebanji Ayeni and Fred Peter

Most studies in information behaviour have focussed on information behaviour aspects such as environmental uncertainty, scanning behaviour of top management executives, student…

Abstract

Purpose

Most studies in information behaviour have focussed on information behaviour aspects such as environmental uncertainty, scanning behaviour of top management executives, student and women information behaviour, information source and credibility, while little is known about the information behaviour of small- and medium-sized enterprises (SMEs) when the need for emerging information and communication technology (EICT) adoption decision-making arises. This paper, therefore, aims to explore the major determinants of perceived information need for EICT adoption by UK small service-oriented businesses.

Design/methodology/approach

The study adopted qualitative method to explore 13 key determinants of SME managers’ information behaviour for EICT adoption decision-making by using both unstructured and semi-structured interviews at two different stages with 20 participants drawn purposeful from Luton directories.

Findings

The study developed an extended technology, organisation and environment (TOE) framework by identifying and incorporating the information context which helped to unveil 13 key determinants of perceived information need and their impact on EICT adoption decision-making in SMEs. This further provided insight into understanding SMEs’ information behaviour. While the determinants associated with TOE and information contexts influence SMEs’ perceived information need for EICT adoption, the extent at which these four constructs shape SMEs’ perceived information need for EICT adoption decision-making differs.

Research limitations/implications

The limitation of this study emerged because of the use of qualitative methodologies in relation to the research design, rigour in the collection and management of the large volume of the raw data, the data analysis and the credibility of the findings. This may lead to unforeseen respondent – and research – bias in the data analysis, which may lead to limited understanding of alternatives and insights into the key determinants of perceived information need for EICT adoption decision. Hence, other measures and approaches such as case study and mix-method could be deployed to further validate the findings. Also, one of the limitations of qualitative study has been the issue of theoretical generalizability of the framework. The generalizability of the formwork needs to be established across a wider range of population. Future studies may apply a confirmatory statistical techniques to test and ascertain the validity and reliability of the framework across a wider population. Such studies may be used as a benchmark for the theoretical constructs and the factors that may lead to success or failure of mobile marketing technology adoption.

Originality/value

The study has further enriched TOE framework and provided an analytical dimension for exploring key determinants of SMEs’ perceived information need for EICT adoption decision-making. It also demonstrates the capacity to provide a reliable explanation of the determinants and serves as a tool for evaluating the benefits or challenges of SMEs’ information behaviours when the need for EICT adoption arises.

Details

The Bottom Line, vol. 32 no. 2
Type: Research Article
ISSN: 0888-045X

Keywords

Article
Publication date: 13 July 2022

Sunday C. Eze, Vera C. Chinedu-Eze, Hart Okorie Awa and Temitope A. Asiyanbola

This paper aims to consolidate the state of research on information behaviour. Regardless of the scholarly surge on information behaviour using numerous models and extended ones…

Abstract

Purpose

This paper aims to consolidate the state of research on information behaviour. Regardless of the scholarly surge on information behaviour using numerous models and extended ones, gaps still exist on the development of more pragmatic frameworks that explain and/or predict the information behaviour across different fragmented environmental situations. Therefore, this paper extends technology-organization-environment (T-O-E) framework and synthesizes different research positions into a multi-dimensional framework that assists small and medium enterprises (SMEs) to understand their information behaviour and to make informed decisions on the adoption of emerging information communication technology (EICT).

Design/methodology/approach

This study deployed an inductive approach; data were generated from unstructured and semi-structured interviews with 20 participants drawn purposively from Luton directories.

Findings

This study developed a more integrated framework underpinned by T-O-E framework, which helped to identify how EICT adoption is critically shaped by perceived information need, information sources selection and the factors determining information source selection.

Research limitations/implications

Qualitative research is normally subjective, inductive, interpretive and limited on the sample used. However, because of the limited number of interviews used, as well as industry-specific nature of the study, the generalization of the framework and the findings will be difficult, hence, the need to test the framework on a broader population and cross-context testing.

Originality/value

The T-O-E framework is extended to Expectancy (T-O-E-E) to provide a more robust insight into information behaviour of SMEs from a multi-dimensional perspective. It also offers a more analytical framework for exploring critical issues identified and demonstrates the capacity to provide a reliable explanation to the findings. Further, it serves as a tool for assessing the benefits or challenges of SMEs information behaviour especially on the EICT adoption decision.

Details

Journal of Science and Technology Policy Management, vol. 14 no. 6
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 17 October 2018

Sunday C. Eze, Sulaimon Olatunji, Vera C. Chinedu-Eze and Adenike O. Bello

While a substantial number of studies have examined information behaviour, most centred on choice of information source, student information behaviour, information behaviour of…

15944

Abstract

Purpose

While a substantial number of studies have examined information behaviour, most centred on choice of information source, student information behaviour, information behaviour of women, environmental uncertainty and scanning behaviour of top-level hotel executives. However, little is known about how the small and medium enterprise (SME) managers scan, seek, gather, document and use information relevant for emerging information and communication technology (EICT) adoption decision-making. This paper aims to examine the key success factors influencing SME manager’s information behaviour on EICT adoption decision-making.

Design/methodology/approach

This study deploys a qualitative approach to exploring 16 key success factors shaping SME managers’ information behaviour on EICT adoption decision-making. More specifically, the study adopted both unstructured and semi-structured interviews with 20 small business managers drawn purposeful from Crunch Database.

Findings

This study develops an extended technology, organisation and environment framework by incorporating the information context which helped to unravel 16 key success factors influencing small business managers’ information behaviour on EICT. From the technology context, uncertainty driven, compatibility, replacement of legacy technology, relative advantages, lack of technical know-how and perceived affordability fit for purpose influence SME managers’ information behaviour. Users’ acceptance information, efficiency driven, owner’s support shape the organisation context of perceived information need; competitor’s intelligence gathering, customer’s information gathering provider credibility and government policy influence the environmental context of perceived information need; and finally, perceived information sources credibility, herding event, testimonial and openness to other people’s ideas and experiences are shaped by the information context.

Research limitations/implications

Qualitative research is normally subjective, interpretive and limited on the sample used. Because of the limited number of interviews, the generalisation of the framework and the finding is difficult. Therefore, the finding and the framework need to be established across broader population. The findings are vital considering the fact that small business managers are limited in knowledge and the study may improve the way and manner they go about seeking and gathering information relevant in adopting new ICT.

Originality/value

This research provides further insight into SME managers’ information behaviour by developing a framework and identifying main factors influencing SMEs information behaviours on EICT. Therefore, understanding such factors will enrich their knowledge on some of the factors that may shape their decisions during EICT adoption decision to make effective decision.

Details

The Bottom Line, vol. 31 no. 3/4
Type: Research Article
ISSN: 0888-045X

Keywords

1 – 10 of 13