
Journal of Systems and Information Technology
SCOPUS (1997-2004,2007-2023)
1758-8847
1328-7265
Anh Quốc
Cơ quản chủ quản: Emerald Group Publishing Ltd.
Các bài báo tiêu biểu
The purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address social media security risks more effectively.
This paper begins by reviewing the disparate discussions in literature on social media security risks and mitigation techniques. Based on an extensive review, some key insights were identified and summarized to help organizations more effectively address social media security risks.
Many organizations do not have effective social media security policy in place and are unsure of how to develop effective social media security strategies to mitigate social media security risks. This paper provides guidance to organizations to mitigate social media security risks that may threaten the organizations.
The paper consolidates the fragmented discussion in literature and provides an in‐depth review of social media security risks and mitigation techniques. Practical insights are identified and summarized from an extensive literature review. Sharing these insights has the potential to encourage more discussion on best practices for reducing the risks of social media to organizations.
– The purpose of this research work is to find a methodology for the strategic development of competitive advantage for information technology (IT) companies (Mezger and Violani, 2011). The ultimate aim of this project is to develop a methodological approach on this issue, based on dynamic simulation models (DSM) (Wirahadikusumah and Abraham, 2003). With the aid of DSM, senior managements of organizations will have the opportunity to make decisions of assured success. This success shall be guaranteed by the realization of entrepreneurial activity in a safe and inexpensive computing environment before actual investment.
– This paper highlights the advantages of the dynamic modelling of systems aiming at developing competitive advantage for IT companies (Ordóñez de Pablos, 2006). In this research, we have used the science of design and the research methodology for testing the concept of modelling as well as the process of modelling. The models have been completed through a series of alternations and iterations in the design, development, simulation, testing and evaluation.
– This paper examines the interface among several dimensions for the development of dynamic models. The validity and usefulness of those models in the process of decision-making has been confirmed by the usage of dynamic models in various sectors.
– This paper applies the system and the concepts of dynamic modelling, which are pioneering elements as to their nature and evolution. Although the sector, where the modelling was applied, is an IT company, the concepts and principles investigated, developed and validated can be applied to most enterprises.
The extended unified theory of acceptance and use of technology (UTAUT2) model has been adapted and applied by scholars to gain insight into mobile banking (m-banking) usage. By combining three perspectives, UTAUT2, gamification (GM) and generational cohort theory, this study aims to investigate the factors which impact m-banking usage and examine the moderating effect of generations Y and Z on the relationship between GM and intention to use m-banking.
The adopted model was tested in a quantitative study by using partial least square structural equation modelling. A total of 380 valid questionnaires from a transition country, Albania, have been examined.
In the study, scientific evidence concerning the UTAUT2 model and GM elements are provided. Thus, facilitation conditions, habit and hedonic motivation were found to be significant determinants of GM. Moreover, the results revealed that age moderates the relationship between GM and behavioural intention (BI). Compared to generation Z, individuals born prior to 1996 (generation Y), exhibited a much stronger relationship.
Although Albania bears similarities with other transition countries in terms of regional, economic and political environments, the generalisation of these results to another context is rather limited.
This paper offers a model integrating UTAUT2, GM and generational cohorts in the context of a transition country. The findings can be applied in the form of guidelines for a number of financial institutions.
Besides identifying the determinants of m-banking adoption and GM, this study notably reveals the importance of generational cohorts because it governs the effect of GM on m-banking BI.
This study aims to explore the impact of system quality dimensions, namely, ease of use, accessibility, interactivity and website innovativeness on service quality (SQ) and customer satisfaction.
The study used a quantitative approach, by using a survey method. The unit of analysis was the individual. A total of 618 questionnaires were randomly distributed to university students and staff in Jordan. The partial least square path-modeling method was used in the estimation of causal relationships of the constructs examined in the study.
The outcomes of this study showed that ease of use, interactivity and website innovativeness have significant positive relationships with the SQ. Consequently, SQ significantly influences customer satisfaction.
Limitations of this research were related to the unit of analysis, as it was conducted within the geographical region of Jordan and the university context, where the culture and level of the technological advancement may be different than other countries.
This research can assist mobile commerce (m-commerce) service policymakers to formulate significant policies that could enhance the nature of services being rendered and thus bring greater benefits to the customers.
This research has extended the body of knowledge on emerging trends in m-commerce innovation adoption, more specifically in the university context. Furthermore, it offers insight on the importance of m-commerce in the minds of customers, in such a way that it will bring about the intention to repeat patronage in the future.
If IS educators are to provide their students with an understanding of the overall context in which they will develop professional careers, they must have good information about graduates’ employment destinations and their workforce experiences. That information is difficult to obtain from standard data collections. This paper explores the early job experiences of IS graduates using survey and interview data. While the graduates have a strong IS professional orientation and experience friendly work environments, their expectations of access to interesting work, career advice and opportunities for advancement appear to outstrip their experience in the workplace.
Recognizing the difficulty inherent in studying organizational change stimulated by the external environment, this paper seeks to present a four‐phase model useful for collecting information and for analyzing the impact of organization‐environment dynamics.
In the context of a case study of academic health centers, a research methods model is offered with four phases: case study; comparative case study; experimental/quasi experimental; and meta analysis. This four‐phase methodology relies on varying information styles and data streams within the context of exploratory, comparative, and large dataset analysis.
The synthesis of research approach highlights the strengths, weaknesses, and the linkage to system thinking in theory and in practice and are illustrated by the case.
Mixed methods approaches are increasingly sought and used in multi‐disciplinary research and applied settings. The model is useful for examining the multiple effects of the organization environment on a wide range of industries, with medical/health care demonstrated here.
Few models of mixed methods approaches exist – this one synthesizes existing approaches incorporating many types of “data”.
The aim of this study is to evaluate effectiveness of several end‐user training methods during the deployment of a new information system in an Israeli financial institution.
Four training methods, namely, frontal (lectures), simulator (e‐learning), mentor (personal guidance), and hybrid (mix of the three aforementioned methods) were all compared in terms of the number of referrals to an online helpdesk following training sessions.
A pair‐wise analysis to pinpoint the source of the differences between the various training methods indicates that all training methods are significantly different except for frontal and simulator and therefore an organization considering these two methods can select them indifferently. A combination of mentor and simulator was found to be significantly inferior to the frontal and simulator hybrid method.
The main limitation of the study is that evaluation was based on data associated with a specific organization, and thus external validity to other industries or countries is somewhat limited. Among other limitations are cross‐organizational differences in terms of: difficulty of calls, individual experience in the IS/IT area, and prior exposure to similar technologies.
Although this research does not recommend a specific training method, our findings suggest that deploying a new software system is a matter that requires early assessment by the organization and that the best results are obtained by employing the hybrid training approach.
The use of the number of referrals to an online helpdesk is a novel metric for measuring training effectiveness. The study also investigates the decline of the number of referrals over time.
Requirements engineering is a crucial phase in software development. Software development in a virtual domain adds another dimension to the process of requirements engineering. There has been growing interest in virtual teams, and more specifically in virtual software development. While structured software development methods are the obvious first choice for project managers to ensure a virtual software development team remains on track, the social and cultural aspects of requirements engineering cannot be ignored. These social aspects are especially important across different cultures, and have been shown to affect the success of an information system. The discussion in this paper is centred around the requirements engineering processes of a virtual team in a Thai Software House. This paper explains the issues and challenges of requirements engineering in a virtual domain from a social and cultural perspective. Project managers need to encourage a balance between structured methods and social aspects in requirements engineering for virtual team members. Cultural and social aspects influence the relationship between the virtual team and the client.
This empirical study aims to understand the interrelationship among the key technology adoption factors including social influence, individual existing knowledge, and individual perceptions of technology (i.e. usefulness, ease of use, and enjoyment) and their effects on individual intention to use a free voluntary service.
The survey method is employed to collect data from universities offering the free mobile messaging service. A structural equation modeling analysis technique is used to analyze data reliability and validity in the measurement model and examine causal relationships among the constructs in the structural model.
The results show that social influence affects individual knowledge and perceptions of the service (perceived usefulness, perceived ease of use, and perceived enjoyment) and successively influences the individual intention to use the free voluntary service. This study indicates that the intrinsic value of perceived enjoyment has a greater impact than the extrinsic value of perceived usefulness in terms of its effect on individual intention to use a free voluntary service. In addition, the effect of perceived usefulness of alternative systems should be taken into account when using perceived usefulness from the technology acceptance model to predict individual's technology adoption decisions under the free voluntary setting.
This study fills the gap in the technology adoption literatures regarding the free voluntary service adoption based on social influence, individual knowledge, and individual perceptions of technology. It assists academics to understand the drivers of technology acceptance under the free voluntary setting and provides guidance for organizations to increase users' acceptability of their free voluntary services.