Search results

1 – 9 of 9
Article
Publication date: 26 January 2021

Ting-Peng Liang, Lionel Robert, Suprateek Sarker, Christy M.K. Cheung, Christian Matt, Manuel Trenz and Ofir Turel

This paper reports the panel discussion on the topic of artificial intelligence (AI) and robots in our lives. This discussion was held at the Digitization of the Individual (DOTI…

2462

Abstract

Purpose

This paper reports the panel discussion on the topic of artificial intelligence (AI) and robots in our lives. This discussion was held at the Digitization of the Individual (DOTI) workshop at the International Conference on Information Systems in 2019. Three scholars (in alphabetical order: Ting-Peng Liang, Lionel Robert and Suprateek Sarker) who have done AI- and robot-related research (to varying degrees) were invited to participate in the panel discussion. The panel was moderated by Manuel Trenz.

Design/methodology/approach

This paper introduces the topic, chronicles the responses of the three panelists to the questions the workshop chairs posed and summarizes their responses, such that readers can have an overview of research on AI and robots in individuals' lives and insights about future research directions.

Findings

The panelists discussed four questions with regard to their research experiences on AI- and robot-related topics. They expressed their viewpoints on the underlying nature, potential and effects of AI in work and personal life domains. They also commented on the ethical dilemmas for research and practice and provided their outlook for future research in these emerging fields.

Originality/value

This paper aggregates the panelists' viewpoints, as expressed at the DOTI workshop. Crucial ethical and theoretical issues related to AI and robots in both work and personal life domains are addressed. Promising research directions to these cutting-edge research fields are also proposed.

Details

Internet Research, vol. 31 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Book part
Publication date: 4 December 2020

Abdelkebir Sahid, Yassine Maleh and Mustapha Belaissaoui

This chapter presents an analysis illustrating the evolution of information systems’ development based on three interdependent phases. In the first period, information systems…

Abstract

This chapter presents an analysis illustrating the evolution of information systems’ development based on three interdependent phases. In the first period, information systems were mainly considered as a strictly technical discipline. Information technology (IT) was used to automate manual processes; each application was treated as a separate entity with the overall objective of leveraging IT to increase productivity and efficiency, primarily in an organizational context. Secondly, the introduction of networking capabilities and personal computers (instead of fictitious terminals) has laid the foundations for a new and broader use of information technologies while paving the way for a transition from technology to its actual use. During the second phase, typical applications were intended to support professional work, while many systems became highly integrated. The most significant change introduced during the third era was the World Wide Web, which transcended the boundaries of the Internet and the conventional limits of IT use. Since then, applications have become an integral part of business strategies while creating new opportunities for alliances and collaborations. Across organizational and national boundaries, this step saw a transformation of IT in the background. These new ready-to-use applications are designed to help end-users in their daily activities. The end-user experience has become an essential design factor.

Details

Strategic Information System Agility: From Theory to Practices
Type: Book
ISBN: 978-1-80043-811-8

Article
Publication date: 15 March 2013

Sutirtha Chatterjee, Jeffrey W. Merhout, Suprateek Sarker and Allen S. Lee

The purpose of this paper is to longitudinally test the propositions of the Electronic Market Hypothesis (EMH) within the context of the US home mortgage industry.

1148

Abstract

Purpose

The purpose of this paper is to longitudinally test the propositions of the Electronic Market Hypothesis (EMH) within the context of the US home mortgage industry.

Design/methodology/approach

The paper uses a deductive, positivist case study, through a systematic examination of “texts” in the trade press over three time periods: 1995‐1999, 2000‐2002, and 2003‐2007.

Findings

EMH propositions, while generally not found to be valid in the early years, were more consistent with evidence in the home mortgage industry in the later period.

Research limitations/implications

Throws fresh light on the debate between the appropriateness and the inappropriateness of the EMH as a core theory explaining the influence of Information Technology on market and industry structures.

Practical implications

Designing of corporate strategies to foster efficient market mechanisms.

Originality/value

Using a relatively uncommon (analysis of primary data from trade press articles) qualitative research methodology which could serve as a guideline for future research. This approach offers opportunities to use various trade press sources to perform studies on the effects of IT on people, such as analyzing how IT departments are adapting their governance practices as workers increasingly use personal computing devices to access organizational assets (e.g., networks, applications, and data).

Details

Information Technology & People, vol. 26 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 11 January 2022

Fred Niederman and Elizabeth White Baker

This to show how critical success factors (CSFs) from practitioner-oriented research can be tested and used to generate new theory.

Abstract

Purpose

This to show how critical success factors (CSFs) from practitioner-oriented research can be tested and used to generate new theory.

Design/methodology/approach

This paper uses an extended example regarding the integration of IT departments following organizational mergers and acquisitions to illustrate in proof of concept that such practitioner-oriented research can generate new substantive theory and be used to begin a cycle of representation-testing leading to enhancing domain knowledge. The method used consists of the identification of an exemplary practitioner-oriented research article, restatement of CSFs into testable propositions, gathering data through interviews with phenomenon participants, analyzing and interpreting data relative to these CSFs, then presenting the results pertaining to these CSFs and observations from examining them holistically.

Findings

No CSFs were affirmed in all cases, neither were they rejected in all cases. The pattern of answers reveals a significant difference between factors representing general management best practices and technical practices. The higher frequency among management factors shows a relative universality to these items, whereas the technical issues are noted less frequently as they each apply to smaller subsets of all post mergers and acquisitions integrations but remain critical when they do apply. This set of responses suggests that the frequency of responses does not indicate the importance of any given factor across settings.

Research limitations/implications

This study suggests (1) CSFs, while generally helpful, can also be misleading when applied such that, where of potential importance, they can be brought into a theorizing mode for refinement and extraction of additional knowledge; (2) that CSFs can be sorted into those tending toward general management principles that apply most frequently in contrast to those of critical importance but applicable across fewer situations; and (3) that as a proof of concept the case to theory transformation method can work to introduce heuristic knowledge into a process-initiating theorizing, raising prospects for subsequent continued improvement.

Practical implications

Assuming robust reporting of CSFs in well-conducted cases, this study knows that at least in one setting these factors were important in achieving particular results. However, this study does not know, without subsequent testing and theorizing, whether the factor applies across circumstances and whether it requires particular handling (e.g. timing may be critical but relies on varied conditions to indicate when actions need be taken). By theorizing based upon CSFs for important IS phenomena, the authors create a bridge between knowledge as used in practice and the scientific tools for increasing its value over time.

Originality/value

Although the authors know of case and multiple case studies surfacing best practices in post mergers and acquisitions integrations, they know of no broad studies across numerous organizations; they also know of no studies demonstrating the relationship of management and technical CSFs in an IS phenomenon. Further, although there are other techniques advocated for theory initiation and building, the authors know of none that transforms heuristic or anecdotal knowledge for subsequent theorizing and continual improvement at a more detailed level than mid-range theory.

Details

Information Technology & People, vol. 35 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Abstract

Details

Strategic Information System Agility: From Theory to Practices
Type: Book
ISBN: 978-1-80043-811-8

Content available
Article
Publication date: 1 March 2001

Ned Kock and Francis Lau

1375

Abstract

Details

Information Technology & People, vol. 14 no. 1
Type: Research Article
ISSN: 0959-3845

Article
Publication date: 8 November 2022

Ernesto Tavoletti and Vas Taras

This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).

Abstract

Purpose

This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).

Design/methodology/approach

Using a systematic literature review approach, it identifies all articles in the Web of Science from 1999 to 2021 that include the term GVTs (in the title, the abstract or keywords) and finds 175 articles. The VOSviewer software was applied to analyze the bibliometric data.

Findings

The analysis revealed three dialogizing research clusters in the GVTs literature: a pioneering management information systems and organizational cluster, a general management cluster and a growing international management and behavioural studies cluster. Furthermore, it highlights the most cited articles, authors, journals and nations, and the network of strong and weak links regarding co-authorships and co-citations. Additionally, this study shows a change in research patterns regarding topics, journals and disciplinary approaches from 1999 to 2021. Finally, the analysis illustrates the position and centrality in the network of the most relevant actors.

Practical implications

The findings can guide management practitioners, educators and researchers to the most meaningful clusters of publications on GVTs, and help navigate and make sense of the vast body of the available literature. The importance of GVTs has been growing in the past two decades, and Covid-19 has accelerated the trend.

Originality/value

This study provides an updated and comprehensive systematic literature review on GVTs. To the best of the authors’ knowledge, it is also the first systematic literature review and bibliometry on GVTs. It concludes by suggesting future research paths.

Details

Management Research Review, vol. 46 no. 8
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 8 January 2021

Ron Chi-Wai Kwok, Alvin Chung Man Leung, Stanley Sai-chuen Hui and Clara Choi-Ki Wong

Due to lack of motivation, individuals often fail to perform regular exercise. In view of this, we developed a virtual trainer system (VTS) to encourage users to perform simple…

Abstract

Purpose

Due to lack of motivation, individuals often fail to perform regular exercise. In view of this, we developed a virtual trainer system (VTS) to encourage users to perform simple exercise routines regularly.

Design/methodology/approach

A design science approach is adopted to develop a VTS to motivate users to exercise. Study findings are based on a field experiment with 91 participants recruited from a university in Hong Kong.

Findings

Outcome-oriented reminders foster stronger perceived risks of health and perceived value of exercises, whereas virtual trainer attractiveness has insignificant effect. Perceived value of exercises is positively related to exercise participation, which has a positive relationship with work productivity.

Research limitations/implications

The findings answer question of how to motivate people to continue exercising.

Practical implications

Findings provide insights for fitness companies to design online exercise training for users.

Social implications

VTS can promote regular exercise and healthy life.

Originality/value

This research shows that interactive virtual agents can motivate users to exercise regularly. It contributes to the burgeoning research on the use of IT artifacts for improving exercise participation and provides practical insights into VTS designs.

Details

Internet Research, vol. 31 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 9 of 9