scispace - formally typeset
Search or ask a question

Showing papers in "Communications of The Ais in 2005"


Journal ArticleDOI
TL;DR: The paper identifies the terminology or ontology used to describe a business model, and compares this terminology with previous work, and the general usages, roles and potential of the concept are outlined.
Abstract: This paper aims to clarify the concept of business models, its usages, and its roles in the Information Systems domain. A review of the literature shows a broad diversity of understandings, usages, and places in the firm. The paper identifies the terminology or ontology used to describe a business model, and compares this terminology with previous work. Then the general usages, roles and potential of the concept are outlined. Finally, the connection between the business model concept and Information Systems is described in the form of eight propositions to be analyzed in future work.

3,048 citations


Journal ArticleDOI
TL;DR: What factorial validity is and how to run its various aspects in PLS are explained and an annotated example with data is provided to assist in reconstructing the detailed example.
Abstract: This tutorial explains in detail what factorial validity is and how to run its various aspects in PLS. The tutorial is written as a teaching aid for doctoral seminars that may cover PLS and for researchers interested in learning PLS. An annotated example with data is provided as an additional tool to assist the reader in reconstructing the detailed example.

2,945 citations


Journal ArticleDOI
TL;DR: It is concluded that even with the consideration of contemporary structures, academicians and practitioners alike continue to explore the concept of IT governance in an attempt to find appropriate mechanisms to govern corporate IT decisions.
Abstract: With the passage of the Sarbanes-Oxley Act in the United States in 2002, and an ever-increasing corporate focus on ensuring prudent returns on technology investments, the notion of IT governance became a major issue for both business practitioners and academics. Although the term “IT governance” is a relatively new addition to the syntax of academic research, significant previous work is reported on IT decisions rights and IT loci of control, notions that are synonymous with the current understanding of IT governance. This paper presents a literature review for existing research in IT governance. A framework, named the Conceptual Framework For IT Governance Research is proposed to provide a logical structure for existing research results. Using this framework, we classify the previous literature on governance into two separate streams that follow parallel paths of advancement. A popular contemporary notion of IT governance is then presented, together with the argument that this new notion, by implicitly extending both streams of research, represents an initial amalgamation of the two paths of literature. We conclude that even with the consideration of contemporary structures, academicians and practitioners alike continue to explore the concept of IT governance in an attempt to find appropriate mechanisms to govern corporate IT decisions.

455 citations


Journal ArticleDOI
TL;DR: An in-depth analysis of the technical and business implications of adopting Radio Frequency Identification in organizational settings suggests that business needs to overcome human resource scarcity, security, legal and financial challenges and make informed decision regarding standards and process reengineering.
Abstract: This paper presents an in-depth analysis of the technical and business implications of adopting Radio Frequency Identification (RFID) in organizational settings The year 2004 marked a significant shift toward adopting RFID because of mandates by large retailers and government organizations The use of RFID technology is expected to increase rapidly in the next few years At present, however, initial barriers against widespread adoption include standards, interoperability, costs, forward compatibility, and lack of familiarity This paper describes basic components of an RFID system including tags, readers, and antennas and how they work together using an integrated supply chain model Our analysis suggests that business needs to overcome human resource scarcity, security, legal and financial challenges and make informed decision regarding standards and process reengineering The technology is not fully mature and suffers from issues of attenuation and interference A laboratory experiment conducted by the authors shows that the middleware is not yet at a “plug-and-play” stage, which means that initial adopters need to spend considerable effort to integrate RFID into their existing business processes Appendices contain a glossary of common RFID terms, a list of RFID vendors and detailed findings of the laboratory experiment

404 citations


Journal ArticleDOI
TL;DR: A discussion of e-Gov as a research field of interest both as a new application area for IS theories and methods and as a source of new insight is concluded.
Abstract: The e-Gov field (also called Electronic Government, Digital Government, Electronic Governance, and similar names) emerged in the late 1990´s. Since then it spurred several scientific conferences and journals. Because the field grew considerably in size, both its contents and position with respect to other research fields and disciplines need to be explained and discussed. What is e-Gov? What is e-Gov research? What does it mean for the field of Information Systems? This paper briefly sketches the short e-Gov history and current status, and discusses the content of the field as it appears in current research. We conclude with a discussion of e-Gov as a research field of interest both as a new application area for IS theories and methods and as a source of new insight.

386 citations


Journal ArticleDOI
TL;DR: Four methods for reviewing a body of research literature – narrative review, descriptive review, vote-counting, and meta-analysis – are compared and Meta-analysis is found to be underutilized in IS.
Abstract: Four methods for reviewing a body of research literature – narrative review, descriptive review, vote-counting, and meta-analysis – are compared. Meta-analysis as a formalized, systematic review method is discussed in detail in terms of its history, current status, advantages, common analytic methods, and recent developments. Meta-analysis is found to be underutilized in IS. Suggestions on encouraging the use of metaanalysis in IS research and procedures recommended for meta-analysis are also provided.

245 citations


Journal ArticleDOI
TL;DR: A critical review of the literature identifies both conceptual and methodological challenges faced when studying flow in CME and cautions researchers to examine hidden assumptions of theories in other disciplines before applying them to address IT related issues and concerns.
Abstract: This paper provides a critical review to analyze the promises and important challenges of studying flow, a psychological state, in the computer-mediated environments (CME). Despite the strong interest in IS, HCI, Marketing, Education, and other research disciplines over more than a decade, adapting the phenomenon of flow to computer users shows high inconsistencies and discrepancies in the literature. In addition, few studies attempt to provide a coherent picture of the area. Based on a careful examination of the literature, we identify both conceptual and methodological challenges faced when studying flow in CME. Although not all challenges are resolved, we point out directions and possible solutions for some challenges and call for more studies in this promising area. The paper further discusses implications for research in human computing behavior in general and in flow in particular. It cautions researchers to examine hidden assumptions of theories in other disciplines before applying them to address IT related issues and concerns.

231 citations


Journal ArticleDOI
TL;DR: This article reviews the most popular conceptualization of National Culture and offers suggestions for improvements in measurement and suggests that shifts might have occurred in cross-cultural IS research.
Abstract: Cross-cultural IS research is beginning to mature; however, much is left to do. This article reviews the most popular conceptualization of National Culture and offers suggestions for improvements in measurement. While Hofstedefs culture dimensions uncertainty avoidance, power distance, masculinity/femininity, and individualism/collectivism are still widely used in many disciplines; it is not guaranteed that the measures still hold after over 30 years. Empirical evidence is presented from two studies that indicate that shifts might have occurred. Because the usual national culture constructs are measured at the national level, they also should not be used in individual models of behavior or technology acceptance.

218 citations


Journal ArticleDOI
TL;DR: An Arabic instrument was developed that can be used in future research in the area of technology acceptance and with acceptable level of reliability and supported a support of the UTAUT with respect to the predictors' effect on behavioral intentions.
Abstract: Internet banking in Jordan has developed rapidly since the year 2001 as most of the Jordanian banks have adopted some form of Internet usage and launched websites to serve their customers. Such efforts will not be successful without customers accepting Internet banking. The study added to the body of knowledge in the technology acceptance domain by testing and validating the Unified Theory of Acceptance and Use of Technology. This study extends the model by adding personality dimensions and validates two relationships that were suggested in previous literature (the influence of performance expectancy in mediating the relationship between effort expectancy and social influence and behavioral intention). This study explores the individuals' Internet banking acceptance using multiple regression. The population of the study was "counter bank customers" sampled in three Jordanian banks and in three major cities in the country. The model proposed is a comprehensive model with ten independent variables and one dependent variable. The study involved translating the instrument to Arabic and using it to explore the hypothesized relationships. The results of the study indicated a support of the UTAUT with respect to the predictors' effect on behavioral intentions, and a partial support in the moderation effect. Also, the hypothesized mediation effect was supported for both relationships (effort expectancy and social influence and their relationship to behavioral intention). The proposed model of this study supported the influence of performance expectancy, social influence, self-efficacy, perceived trust and locus of control on Jordanian's intentions to use Internet banking. Part of these relationships was moderated by gender, age, education and experience. Effort expectancy (part of the UTAUT), perceived facilitating conditions, anxiety, personal innovativeness and perceived risk were not significant in predicting behavioral intention. Finally, this study developed an Arabic instrument that can be used in future research in the area of technology acceptance and with acceptable level of reliability. Implications for research and practice, limitations, future research, and conclusions are discussed at the end of the study.

154 citations


Journal ArticleDOI
TL;DR: This study reviews Stakeholder Theory and investigates its potential in relation to e-Government and makes recommendations for future work in adapting ST to the e-government context.
Abstract: The e-government field, like most young fields, lacks a strong body of well-developed theory. One strategy for coping with theoretical immaturity is to import and adapt theories from other, more mature fields. This study reviews Stakeholder Theory (ST) and investigates its potential in relation to e-Government. Originally a management theory, stakeholder theory advocates addressing the concerns of all stakeholders in a firm, as opposed to concentration on the interests of senior managers and stockholders. Apart from its original profit focus, there is no serious conceptual mismatch between stakeholder theory and government’s objective of providing policy and services for citizens and organizations – society’s stakeholders. Potential problems with adapting a management theory to a government setting are discussed. The paper further discusses how information technology impacts a stakeholder model of governance. Finally, the paper makes recommendations for future work in adapting ST to the e-government context.

140 citations


Journal ArticleDOI
TL;DR: The architecture of Sysperanto is described, a model-based ontology of the IS field, which is well enough defined to be compared to the architecture (or lack of architecture) in previous and future approaches for understanding and organizing the basic concepts about information systems.
Abstract: The challenge of defining the domain and core concepts of the IS field is a perennial topic at major IS conferences. This paper describes the architecture of Sysperanto, a model-based ontology of the IS field. Sysperanto is being developed as part of an ongoing effort to create methods that typical business professionals can use to analyze systems and system-related projects for themselves at whatever level of depth is appropriate. The name Sysperanto is meant as a metaphor combining generality (covering the IS field), vocabulary (identification of terms), and structure (internally consistent organization) to create an ontology more powerful and useful than a list of keywords or propositions. Sysperanto’s architecture provides an organizing framework for codifying the disparate and inconsistent propositions, methods, and findings that constitute the current state of IS knowledge and, in combination, form a major obstacle to knowledge accumulation and use in the IS field. Instead of yet another discussion of whether the IS field lacks a conceptual core and what might be the consequences of such a shortcoming, this paper proposes an architecture and preliminary details of a plausible set of core concepts for the IS field. It starts by summarizing Sysperanto’s goals and explaining why work system concepts, rather than information system concepts, are the core of Sysperanto. It presents Sysperanto as a terminological ontology and explains the underlying meta-model. The meta-model is designed to support tools for analyzing systems from a business viewpoint and to help in codifying and organizing knowledge in the IS field. It uses a conceptual map based on extensiveness and guidance in application to compare Sysperanto with other efforts to organize ideas in the IS field. It may be several years before a complete version of Sysperanto is tested through its use in a formal method for analyzing systems or through comparison with other attempts to codify knowledge in the IS field. Nonetheless, its architecture is well enough defined to be compared to the architecture (or lack of architecture) in previous and future approaches for understanding and organizing the basic concepts about information systems.

Journal ArticleDOI
TL;DR: Competitive pressure emerged as the most important factor in terms of relative importance, followed by IT knowledge, relative advantage, security and government support, and the five factors explain more than fifty percent of the variation in small and medium enterprises adoption.
Abstract: This study examines the effect of five factors on the adoption of electronic commerce among small and medium enterprises in Brunei Darussalam. A review of the literature shows that owner characteristics such as lack of perceived relative advantage, lack of knowledge, and perceived lack of trust are significant inhibitors while environment characteristics such as competitive pressure and, government support are significant motivators of electronic commerce in Brunei Darussalam. A questionnaire survey was conducted in 360 small and medium enterprises. A total of 184 valid responses were obtained. Stratified random sampling was adopted over other techniques to enhance representativeness. Data analysis shows that significant relationship exists between each of the five variables and electronic commerce adoption among small and medium enterprises in Brunei Darussalam. This study concludes that the five factors explain more than fifty percent of the variation in small and medium enterprises adoption. Competitive pressure emerged as the most important factor in terms of relative importance. This factor is followed by IT knowledge, relative advantage, security and government support.

Journal ArticleDOI
TL;DR: An integrated wireless architecture that is designed to use the capabilities of current and emerging wireless and mobile networks for location management, intelligent emergency system, patient monitoring, and mobile telemedicine applications is presented.
Abstract: A major challenge for healthcare is how to provide improved services to an increasing number of people using limited financial and human resources. Pervasive healthcare is considered a solution to many existing problems and a possible future of the current healthcare services. In simple terms, pervasive healthcare can be defined as healthcare to anyone, anytime, and anywhere by removing locational, time and other restraints while increasing both its coverage and quality. The broad definition includes prevention, healthcare maintenance and checkups, shortterm monitoring (or home healthcare monitoring), long-term monitoring (nursing home), personalized healthcare monitoring, incidence detection and management, and, emergency intervention, transportation and treatment. These requirements could be effectively supported by universal, efficient and reliable access to healthcare services, providers, and biomedical information that is available at any time. In this paper, several pervasive healthcare applications and related challenges are discussed. An integrated wireless architecture that is designed to use the capabilities of current and emerging wireless and mobile networks for location management, intelligent emergency system, patient monitoring, and mobile telemedicine applications is presented.

Journal ArticleDOI
TL;DR: Results from the study suggest not only that RFID technology can assist in the measurement and ultimate control of workflow processes, but also that traditional and non-traditional IS practices are necessary for successful RFID implementation.
Abstract: Healthcare facilities face limited resources and expanding expenses. Emerging information technologies offer a means for healthcare to measure and control their resources and workflow processes, and ultimately improve patient care. The usefulness of one emerging information technology, Radio Frequency Identification (RFID), is examined in a “proof of application” study conducted at a Level-1 trauma unit. Results from the study suggest not only that RFID technology can assist in the measurement and ultimate control of workflow processes, but also that traditional and non-traditional IS practices are necessary for successful RFID implementation. Lessons learned about the idiosyncrasies of RFID implementation and the cleansing and analysis of RFID-generated data are reported.

Journal ArticleDOI
TL;DR: This study focuses on the issues of external validity, coverage error and nonresponse error in IS survey research.
Abstract: This study focuses on the issues of external validity, coverage error and nonresponse error in IS survey research. Data from the empirical papers in 5 years of issues from three “A rated” IS journals are presented and analyzed. Recommendations are made based on the analyses, basic scientific principles and the authors’ experience and judgment.

Journal ArticleDOI
TL;DR: The demand for information systems graduates within the United States has likely bottomed out and slow growth is now occurring, and recommendations for improving student recruiting to the information systems major, for attracting potential employers of graduates, and for managing the production of Ph.D. graduates to match the flow of undergraduate demand are provided.
Abstract: The information systems academic discipline has faced a sharp reduction in student enrollments as the job market for undergraduate students has softened. This essay examines the recent and rapid rise and fall of university student enrollments in information systems programs and describes how these enrollment fluctuations are tied to the job opportunities of graduates. Specifically, the role that global outsourcing is playing on the employment opportunities, both in the United States and Europe, is examined. This analysis concludes that the demand for information systems graduates within the United States has likely bottomed out and slow growth is now occurring. Within Europe, general conclusions are limited, but it appears that global outsourcing is playing much less a role in Europe than in the United States. Nevertheless, although global outsourcing is indeed a factor influencing the U.S. employment picture, it is only one of several factors that have negatively impacted the U.S. job market for information systems graduates over the past few years. After examining the future macro job opportunities for information systems graduates, the paper then provides recommendations for improving student recruiting to the information systems major, for attracting potential employers of graduates, and for managing the production of Ph.D. graduates to match the flow of undergraduate demand. The essay concludes that, although shaken, the information systems academic discipline is strong and will continue to strengthen as it moves into a state of maturity and relative equilibrium.

Journal ArticleDOI
TL;DR: It is suggested that CKM is not a tool like CRM but a process that is designed to dynamically capture, create and integrate knowledge about and for customers.
Abstract: The nature and quality of a firm’s dialogue with its customers is a core capability. Few firms are able to manage this dialogue effectively and use what they know to add more value for customers and ultimately improve firm performance. Knowledge management (KM) functions are therefore being asked how their expertise can help companies do a better job in this area. This paper examines the wide variety of ways organizations use KM in their customer relationships. It begins with an examination of the need for Customer Knowledge Management (CKM) and how it differs from Customer Relationship Management (CRM). It then looks at the four different dimensions of customer knowledge and at some of the innovative ways companies use them to add value for their customers. It next discusses the key organizational challenges of implementing CKM. The paper concludes with some best practices and advice about how to implement a program of CKM successfully in an organization. It suggests that CKM is not a tool like CRM but a process that is designed to dynamically capture, create and integrate knowledge about and for customers.

Journal ArticleDOI
TL;DR: The roles of HCI in systems development are examined, the importance of considering HCI through out the entire systems development life cycle is justified, a methodology for human-centered IS development is presented, and how to apply this methodology to develop human- centered information systems is demonstrated.
Abstract: Incorporating a human computer interaction (HCI) perspective into the systems development life cycle (SDLC) is necessary to information systems (IS) success and, in turn, to the success of businesses. However, modern SDLC models are based more on organizational needs than human needs. The human interaction aspect of an information system is usually considered far too little (only the screen interface) and far too late in the IS development process (only at the design stage). Thus, often a gap exists between satisfying organizational needs and supporting and enriching human users. This problem can be addressed by carefully integrating HCI development into the SDLC process to achieve a truly human-centered IS development approach. This paper examines the roles of HCI in systems development, justifies the importance of considering HCI through out the entire systems development life cycle, presents a methodology for human-centered IS development, and demonstrates how to apply this methodology to develop human-centered information systems.

Journal ArticleDOI
TL;DR: The paper proposes an extension of the influence of perceived user resource and offers diagnostics and prescriptions for how to effect a sustainable technological adoption to support socio-economic development across Sub-Saharan Africa.
Abstract: This paper proposes and merges an extension of technology acceptance model with ideas from human development research targeting least developed countries. Specifically, the paper proposes an extension of the influence of perceived user resource, which in turn was developed from the original TAM literature. It is also tied to the Information Technology literature about socio-economic development. Our objective is to shed light on the interactions between socioeconomic development needs and factors generally innate to sub-Sahara Africa and other developing countries that impede sustainable technological adoption and diffusion. We argue that developing countries lag in adopting ‘foreign technologies’. We offer diagnostics and prescriptions for how to effect a sustainable technological adoption to support socio-economic development across Sub-Saharan Africa. This article should bring into focus this and other developing regions that are almost non-existent in mainstream Information Systems research.

Journal ArticleDOI
TL;DR: The findings suggest that personal web usage in the workplace can be potentially constructive, although the potential for negative uses as well is acknowledged.
Abstract: Personal web usage can be defined as any voluntary act of employees using their company’s web access during office hours to surf non-work related websites for non-work purposes. Previous research suggested that personal web usage is a negative force with productivity losses, congested computer resources, security costs, and the potential risk of legal liability. However, using qualitative research we investigated the attitudes of a diverse set of individuals to personal web usage. Our findings suggest that personal web usage in the workplace can be potentially constructive, although we acknowledge the potential for negative uses as well. We suggest an extension of social contract theory to explain these findings.

Journal ArticleDOI
TL;DR: It is argued that trust can help consumers overcome perceived uncertainty, thereby enhancing their intention to adopt online prescription filling, and a research model is proposed that encompasses three trust antecedents, two sources of uncertainty, and the relationships among trust, uncertainty and the consumer’s intention to adopted online prescription fill.
Abstract: Online prescription filling possesses great market potential; however, consumers’ perception of uncertainty tends to impede their adoption of online prescription filling. Trust is recognized as a critical factor affecting online shopping in general. We contend that trust can help consumers overcome perceived uncertainty, thereby enhancing their intention to adopt online prescription filling. Drawing on prior research on trust and theory of transaction cost economics, this paper proposes a research model that encompasses three trust antecedents, two sources of uncertainty, and the relationships among trust, uncertainty, and the consumer’s intention to adopt online prescription filling. The model was tested empirically using a large sample. It is found that (1) calculus-based, knowledge-based, and institution-based trust antecedents significantly affect trust,

Journal ArticleDOI
TL;DR: Based on a survey of information security professionals, it is found that ISO 17799 is comprehensive, but not parsimonious.
Abstract: To protect the information assets of organizations, many different standards and guidelines have been proposed. Among them, International standard ISO 17799 is one of the most prominent international efforts on information security. This standard provides both an authoritative statement on information security and the procedures to be adopted by organizations to ensure information security. Security professionals claim ISO 17799 to be a suitable model for information security management and an appropriate vehicle for addressing information security management issues in the modern organization. However, to our knowledge, no empirical studies have been conducted to validate this standard. Based on a survey of information security professionals, we found that ISO 17799 is comprehensive, but not parsimonious. Communications of the Association for Information Systems (Volume 15, 2005) 577-591 577 ISO 17799: “BEST PRACTICES” IN INFORMATION SECURITY MANAGEMENT? Qingxiong Ma Department of Computer Information Systems, Central Missouri State University J. Michael Pearson Department of Management Southern Illinois University jpearson@cba.siu.edu

Journal ArticleDOI
TL;DR: A tutorial on F/OSS, which conceptualizes it as an IPO system that consists of the license as the boundary of the system, the community that provides the input, the development process, and the software as the output, identifies three approaches to benefiting from F/OS that center on (1) the software, (2) the community, and (3).
Abstract: With the emergence of free and open source software (F/OSS) projects (e.g. Linux) as serious contenders to well-established proprietary software, advocates of F/OSS are quick to generalize the superiority of this approach to software development. On the other hand, some wellestablished software development firms view F/OSS as a threat and vociferously refute the claims of F/OSS advocates. This article represents a tutorial on F/OSS that tries objectively to identify and present open source software’s concepts, benefits, and challenges. From our point of view, F/OSS is more than just software. We conceptualize it as an IPO system that consists of the license as the boundary of the system, the community that provides the input, the development process, and the software as the output. After describing the evolution and definition of F/OSS, we identify three approaches to benefiting from F/OSS that center on (1) the software, (2) the community, and (3) the license respectively. Each approach is fit for a specific situation and provides a unique set of benefits and challenges. We further illustrate our points by refuting common misconceptions associated with F/OSS based upon our conceptual framework.

Journal ArticleDOI
TL;DR: The authors use root cause analysis to identify the causes of KM project abandonment in five well-documented cases of KM drawn from the literature and synthesize the findings into a Cause-Effect Diagram (CED), culminating in a causal model of KM projects abandonment.
Abstract: This paper examines the root causes of Knowledge Management (KM) project abandonment. The authors use root cause analysis to identify the causes of KM project abandonment in five well-documented cases of KM drawn from the literature. The findings are synthesized into a Cause-Effect Diagram (CED), culminating in a causal model of KM project abandonment. The model identifies three major categories for causes of KM project abandonment, namely (1) poor project implementation, (2) mismatch between the KM project and the organization’s strategy or existing structure, and (3) content deficiencies related to the creation, capture and access of knowledge content. These three major categories of causes are iteratively refined and eventually root causes emerge. KM project abandonment is compared with IS project failure, and the implications for risk management practices for KM projects are discussed.

Journal ArticleDOI
TL;DR: This study reports on data about publication productivity of information systems (IS) researchers from 1999 to 2003, collecting information about IS papers published in twelve IS journals during this period.
Abstract: University hiring, promotion and tenure decisions make researchers’ publication productivity an important issue. This study reports on data about publication productivity of information systems (IS) researchers from 1999 to 2003. We collected information about IS papers published in twelve IS journals during this period. After classification, the most productive individuals and institutions for this sample are identified. We also compared our findings with past research to demonstrate the changes in publication productivity over time. Publication productivity changes somewhat among researchers and institutions.


Journal ArticleDOI
TL;DR: This article offers a set of guidelines to assist project leaders when managing virtual project teams, developed as a result of a panel at the celebration of the 30th anniversary of the invention of the internet.
Abstract: This article offers a set of guidelines to assist project leaders when managing virtual project teams. The guidelines were developed as a result of a panel at the celebration of the 30 th

Journal ArticleDOI
TL;DR: It is concluded that an organization's characteristics are related to the return that may be gained from the use of ERP systems, and recommendations on how organizations can use ERP to add value to their primary activities, based on their organizational characteristics are offered.
Abstract: When managers and stockholders consider making an investment in information technology (IT), as with any other investment, a major concern is whether this investment will add to the performance of their organization. However, it is difficult to identify the nature of the linkage between an investment in IT in general, and Enterprise Resource Planning (ERP), in particular, to an organization's performance. In this study we extend the work of Barua et al., Lerch and Mangal, and Tallon et al. We develop a model to identify the value ERP applications add to Porter’s organizational primary activities and the information systems (IS) applications related to ERP that help deliver added value through organizational characteristics. This new model should help in assessing the potential value of an ERP investment. We examine the relationship of ERP applications and organizational characteristics to an organization’s primary activities by a path analysis of more than 200 medium and large sized manufacturing firms. The results of this investigation indicate that organizational characteristics mediate the relationship between IS applications and the value ERP can add to the organizational primary activities. Consequently, organizations with different characteristics may add different value to their primary activities by using ERP applications. We found that each primary activity was supported by some, though not necessarily all, IS applications included in most ERP packages. We conclude that an organization's characteristics are related to the return that may be gained from the use of ERP systems. We offer recommendations on how organizations can use ERP to add value to their primary activities, based on their organizational characteristics.

Journal ArticleDOI
TL;DR: The concept of workshopping a play is introduced to enable a lively discussion and deeper understanding of disaster recovery planning and to illuminate and deepen understanding of the importance of testing, evaluation, and reworking of scenarios for each potential disaster.
Abstract: Disaster recovery planning for organizations is fundamental and often urgent. Planning supports the firm’s ability to recover the core business functionality of its software, data, and systems after the occurrence of a natural or man-made disaster. Organizations must take steps to protect their software, systems and data backups from natural disasters, power outages, and even terrorist attacks. However the issue of disaster recovery is often awash in checklists or marooned in mundane statistics. Such sterile approaches tend to lead key managers, CEOs, and CIOs to relegate disaster recovery planning to a lower priority when they become overwhelmed with planning minutiae or bored with staid presentations. This paper introduces a theatre metaphor to enable a lively discussion and deeper understanding of disaster recovery planning. Specifically, we introduce the concept of workshopping a play. We explore this new approach from the world of theatrical productions to illuminate and deepen understanding of the importance of testing, evaluation, and reworking of scenarios for each potential disaster.

Journal ArticleDOI
TL;DR: Results show that e-commerce adoption is path dependent (i.e., establishments), and some differences in e- commerce orientation and experience were found across the three industry sectors studied in the survey of 10 countries.
Abstract: The paper provides baseline conditions of the U.S. e-commerce in the post-dot.com era. The article examines the key factors that act as determinants of e-commerce diffusion. It is based on qualitative analysis of the U.S. industry survey data, matched to a similar data and analyses from other countries. It presents data taken from one of the most comprehensive sample surveys yet done of the U.S. firm activity in e-commerce. The paper analyses differences among three industry sectors, and between small/medium and large firms using both qualitative interpretations and direct observations from the survey data, as well as use of structural equation modeling of e-commerce diffusion and impacts. Some differences in e-commerce orientation and experience were found across the three industry sectors studied in the survey of 10 countries. These differences are related largely to the nature of the tasks done in the respective industries, and to prior industry-level investment and learning related to e-commerce. There were also differences found in e-commerce attitudes and experience between small/medium sized enterprises (SMEs) and large establishments. Only modest differences were found between U.S. and non-U.S. establishments. Quantitative analysis found significant regression relationships with their level of statistical significance. Results show that e-commerce adoption is path dependent (i.e., establishments