首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到6条相似文献,搜索用时 0 毫秒
1.
Considerable research has focused on information system success (ISS) over the years largely using the models proposed by DeLone and McLean (DM) in 1992 and 2003. Several relationships found in the DM models have been sporadically supported in empirical research although the complete DM models have not been consistently applied. Studies have also interchanged relationships in the 1992 and 2003 models, tested relationships between ISS dimensions unspecified in the DM models, and examined relationships between ISS dimensions and other factors. This study presents a critical meta-review of 53 studies using DM models published between 1992 and 2019, identifies the state of ISS research, and raises several directions for research.  相似文献   

2.
Based on a survey of Chinese publicly traded firms, we report on the status of the strategic information systems planning success in China. Through this analysis of the survey data, we found that Chinese managers are not using IS as a competitive weapon though they have already realized some aspects of strategic information system planning. We also examined the differences between Eastern and Western cultural and political context factors to explain this phenomenon.  相似文献   

3.
User related issues have long been broadly discussed in the information system development (ISD) project research area. In this study, we focus on user risk and identify two risk countering approaches to demonstrate how to deal with user risk and its negative impact on ISD projects. We hypothesize that (1) user risk has a negative impact on project performance, (2) users’ bond with the project and the development team can help reduce user risk, and (3) developers’ task knowledge and vertical coordination can ease the negative impact of user risk and increase project performance. A quantitative approach with survey data collected from 240 practitioners confirmed our hypotheses. In addition, we interviewed seven developers and three user representatives to complete our understanding of this issue. Implications for academia and practitioners are discussed at the end of this paper. Suggestions for future research directions are also provided.  相似文献   

4.
This study examines the effects of the differences in organizational identities that emerged during a post-merger project that aimed at unifying the laboratory services of a large healthcare center that resulted from the merging of three hospitals by supporting them with a unique information system. We draw on the concepts of organizational identity and sensemaking to analyze the laboratory information system implementation project. Organizational identity is conceptualized as the mental representation that organizational members have of themselves as a social group in terms of practices, norms, and values and how they understand themselves to be different from members of other organizations. Data analysis suggests that divergent organizational identities and team members’ alternative interpretations of others’ practices, norms and organizational symbols, coexist during the post-merger integration phase. These interpretations are reflected in the final functionality of the information system that was different from the planned one.  相似文献   

5.
信息技术环境下组织创新的系统行为及其复杂性   总被引:5,自引:2,他引:3       下载免费PDF全文
刘景江 《科学学研究》2009,27(4):598-603
 定义了信息技术环境下企业组织创新的概念内涵;利用不连续生长曲线、吸引子、吸子盆、匹配图景、分形和非线性发展模式等复杂系统理论与方法探讨了企业组织创新的系统行为及其复杂性。结果表明:(1)信息技术环境下企业组织创新是一项协同性的系统创新,决定系统行为的四个基本变量是组织文化创新、业务流程创新、组织结构创新和信息技术创新;(2)组织文化既是稳定的吸引子,又是不稳定的混沌吸引子;组织文化创新是整个组织创新的先导和保障;(3)通过高绩效的组织创新,处于混沌边缘的组织能够跃迁到一个新的、具有更高复杂性和一致性的动态稳定阶段;(4)在组织系统不连续生长周期的相对稳定阶段和相对不稳定阶段,企业通常分别实施渐进性组织创新和根本性组织创新。  相似文献   

6.
The aims of the study were to examine enterprise information security in small and medium-sized enterprises (SMEs) in Bursa, Turkey and to compare the results with similar data gathered from different countries. This study was conducted through questionnaires consisting of 49 questions grouped into 9 sections. The questionnaires were delivered to 97 SMEs in Bursa, Turkey. The companies have been operating for 15.93 ± 11.67 (2-54) years. The number of PCs in the companies and their years of use were in the ranges of 53.51 ± 64.88 (2-240) and 12.47 ± 6.32 (1-30) years, respectively. According to the findings of this study, it can be speculated that when Communications and Operations Management and security policy improve, other security parameters in the companies, such as Organizational, Personnel and Physical and Environmental Securities improve as well. In addition, the results have shown that Turkish companies do not attach as much importance to information technology security as their counterpart companies from different countries do.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号