首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
Despite keen interest in long-term strategic outsourcing and attention to factors affecting outsourcing success, the examination on relational performance, i.e., the difference between a vendor's performance with a particular client and that with its average client base, can be hardly found. This study adopts a relational view to offshore information systems (IS) outsourcing from a vendor's perspective to explore the source of relational performance. Results highlight the importance of client-specific capabilities and trust as a self-enforcing governance mechanism in a vendor's relational performance in terms of service quality. Project management and client-specific capabilities act as substitute for each other in affecting relational service quality. In addition, while trust and learning about client contribute to client-specific capabilities, trust is also positively related to learning about client. These findings enrich our understanding of the source of outsourcing relational performance and contribute to the literatures on vendors’ capabilities in IS outsourcing.  相似文献   

2.
The advent of new information technology has radically changed the end-user computing environment over the past decade. To enhance their management decision-making capability, many organizations have made significant investments in business intelligence (BI) systems. The realization of business benefits from BI investments depends on supporting effective use of BI systems and satisfying their end user requirements. Even though a lot of attention has been paid to the decision-making benefits of BI systems in practice, there is still a limited amount of empirical research that explores the nature of end-user satisfaction with BI systems. End-user satisfaction and system usage have been recognized by many researchers as critical determinants of the success of information systems (IS). As an increasing number of companies have adopted BI systems, there is a need to understand their impact on an individual end-user's performance. In recent years, researchers have considered assessing individual performance effects from IS use as a key area of concern. Therefore, this study aims to empirically test a framework identifying the relationships between end-user computing satisfaction (EUCS), system usage, and individual performance. Data gathered from 330 end users of BI systems in the Taiwanese electronics industry were used to test the relationships proposed in the framework using the structural equation modeling approach. The results provide strong support for our model. Our results indicate that higher levels of EUCS can lead to increased BI system usage and improved individual performance, and that higher levels of BI system usage will lead to higher levels of individual performance. In addition, this study's findings, consistent with DeLone and McLean's IS success model, confirm that there exists a significant positive relationship between EUCS and system usage. Theoretical and practical implications of the findings are discussed.  相似文献   

3.
Most firms today are served by specialized IT service providers for the development and maintenance of their business information systems. During the IT service encounter, service providers and clients interact throughout the project, exchanging information, sharing knowledge and making critical decisions. From the IT service provider's viewpoint, it is important to raise the level of clients’ relationship commitment during this service encounter as their business continuity depends upon clients assessment. Intuitively, effective communication and effective service quality, mediated by trust, are critical factors in raising the level of relationship commitment. This study proposes an empirical model consisting of four critical antecedents of relationship commitment (communication effectiveness, technical service quality, functional service quality and trust) and then tests the model using data points solicited from two global firms. Study results revealed that trust is a strong mediator for relationship commitment while functional, rather than technical, service quality is a stronger mediator in forming the clients’ trust.  相似文献   

4.
Information technology (IT) has transformed business practices in the last several decades: operations, product strategies, distribution, and customer service have become increasingly dependent on IT. Moreover, IT has changed its orientation from that of pure operational utility in the 1960s and 1970s to that of a competitive weapon in the 1990s and today. These phenomena have affected the way modern organizations are managed, as well as the way IT affects the strategic activities of an organization's value-chain.In particular, aligning an organization's business and IT strategies in order to deliver higher business performance presupposes a strategic business opportunity to which information systems technology is integral. In other words, Strategic Alignment between business and IT can have a positive business impact only if we see an organization's IT components as parts of a well-integrated organizational system. If business strategy is viewed separately from IT strategy or IT strategy is viewed only as a “support” tool, then there is little likelihood that the above positive impact of strategic alignment can take place.This research suggests, develops and tests a strategic co-alignment model by examining three types of integration that impact the planning process and the overall performance of information-intensive organizations: technological integration (TI), functional integration and strategic integration (SI).The results of this research yield some useful set of guidelines for theory building for IS, as well as for the business practice aspect of IS: most interesting is the role of consistency (co-alignment) between an organization's business and strategic information systems plans to improve overall firm performance. Other recommendations include having a high degree of involvement of IS executives in corporate planning, the use of outsourcing services to promote organizational systems integration, and the importance of internal coordination mechanisms to facilitate both systems consistency and lower transaction costs. Finally, this study has employed cluster analysis and discriminant analysis to interpret the research findings.  相似文献   

5.
This paper leverages the concept of absorptive capacity to explore whether similar configurations of intellectual capital (IC) are associated with the performance of relational capital in firms. It proposes a novel implementation of graph theory to analyse similarities in knowledge assets. We use Community Innovation Survey data to examine 5813 manufacturing firms in 13 business sectors and 13 European countries. While firms rely on external relations to compensate for a lack of internal assets, we find that a company’s propensity to cooperate in innovation is associated with its own IC profile. In particular, firms with common knowledge assets are more likely to benefit from business relational capital. The main contribution of this study lies in a holistic approach to understanding how similarities in knowledge assets are linked to gains in business relational capital.  相似文献   

6.
Continued integration of technology for the purpose of connecting and exchanging data with other devices and systems over the Internet exposes information security (IS) to growing risks. Organizations can thus achieve a strategic advantage by securing IS as a pivotal information and intelligence asset. This study examined ways of motivating IS professionals to protect information security from potential risks, drawing on the theoretical frameworks of protection motivation theory (PMT) and the theory of planned behavior (TPB) as well as work-related organizational antecedents (e.g., organizational commitment and job satisfaction). This paper proposes structural equation modeling (SEM) in R as a framework for exploring relationships among the variables and determining the overall data fit to the hypotheses. SEM is a multivariate technique which simultaneously executes both factor analysis and aspects of multiple regression in order to estimate interrelated relationships while also allowing path analytic modeling to be performed with latent, unobserved variables. Using 804 questionnaires with SEM analysis, we find support for the following predictors’ associations: (a) information security attitudes and subjective norms, as constituents of TPB, significantly influenced information security protective behaviors; (b) the coping appraisals (self-efficacy and response cost) and threat appraisals (threat susceptibility and threat severity) of PMT were significantly predictive of information security protective behaviors; and (c) organizational commitment positively impacted information security protective behaviors. However, job satisfaction and perceived behavioral control as a construct of TPB were not associated with information security behaviors. The main theoretical contribution of this research is that the addition of organizational commitment allows the behavioral science model to offer a novel understanding of IS professionals’ protection motivation and actual behaviors in the Chinese context. This study has several practical implications for organizations. In order to encourage IS professionals to follow protective security behaviors, organizations should set up the belief that a close relationship with subordinates plays a vital role in ensuring information security, improve IS employees’ perception and cognition of their importance to the organization, constantly highlight the importance of information security protection, and emphasize the severe consequences of information security threats during trainings.  相似文献   

7.
There has been considerable theoretical work on the role of information systems (IS) in creating competitive advantage and enhancing organizational performance. The literature identifies a consistent lack of success by organizations in achieving business benefits from their IS investments and in particular their difficulties in obtaining a sustainable competitive advantage. A great deal of debate appears to exist nowadays related to the participation of information technology (IT) risks to organizational performance. Previous research has dealt with the examination of the existing relationships between the implemented information technology and firm's performance variables. This research focuses on the IT impact on firm's non-financial IT risk. The research was conducted using questionnaires that were sent to world's five hundred largest corporations as they were published in the fortune magazine (European edition, No. 14, 2003) and to Greek companies. The results indicate that IT risk factors affect mainly coordination and partially information ability but not productivity. Furthermore, the most significant risk factors affecting business performance are management ability, information integrity, controllability and exclusivity.  相似文献   

8.
针对中小企业技术创新难题,从技术联盟网络嵌入性的视角出发,构建不同网络关系嵌入主体对中小企业技术创新绩效影响的概念模型,探讨了不同关系嵌入主体、组织间学习能力和技术创新绩效的内在关系和影响机理,并利用239份中小企业有效样本数据进行实证分析。结果表明:商业网络关系嵌入、技术网络关系嵌入和政府网络关系嵌入均对技术创新绩效产生了显著的正向影响;组织间学习能力在商业网络关系嵌入、政府网络关系嵌入与技术创新绩效间起到完全中介的作用,而在技术网络关系嵌入与技术创新绩效间起到部分中介的作用。  相似文献   

9.
易朝辉  罗志辉 《科研管理》2015,36(10):94-103
大学衍生企业的可持续成长是学术界和企业界关注的热点问题。基于社会网络理论与企业资源观,本文构建了技术能力、网络嵌入与衍生企业绩效的概念模型,并运用结构方程模型对湖南省等134家衍生企业进行了实证检验。结果发现,网络的关系性嵌入、结构性嵌入和认知性嵌入都有利于改进衍生企业绩效,但其作用程度依次降低;技术能力与衍生企业绩效正相关,并在结构性、关系性网络嵌入与绩效之间起着中介作用,而没有中介认知性网络嵌入对衍生企业绩效的促进作用。  相似文献   

10.
高技术企业联盟中的治理匹配及其绩效分析   总被引:4,自引:1,他引:3  
以高技术企业战略联盟为背景,运用交易成本理论和关系契约理论研究高技术企业战略联盟的治理匹配程度及其联盟绩效.论述了联盟治理的基本理论,提出了基本研究假设.在此基础上,运用98个高技术企业战略联盟的数据,对基本研究假设进行实证检验,支持了交易成本理论和关系契约理论的主要观点.结果表明,联盟绩效的高低主要取决于联盟治理的匹配程度而不取决于联盟治理结构本身,与联盟交易属性、伙伴关系特征相互匹配的联盟治理结构往往能够带来更高的联盟绩效.  相似文献   

11.
对战略联盟中的公平对知识共享的影响作用进行了深入分析.结果显示,分配公平和程序公平对知识共享的影响都是正向的,而且关系承诺是这两类公平对知识共享的作用的中介变量.这一研究结论从全新的视角揭示了联盟公平与知识共享之间的关系,是战略联盟知识管理文献的进一步发展和新的贡献.  相似文献   

12.
The case(s) demonstrates the importance of business process management (BPM) and business intelligence systems (BIS) in achieving better firm performance. It has been well documented in the literature that research on the effectively usage and combination of knowledge from BPM and BIS in turbulent service environments is limited. In response, we conduct an exploratory comparative case study of four firms in banking and telecommunication industries that have implemented BPM initiative and BIS solution. Our results firstly highlight that actual results of applying BPM and BIS differ greatly from the results that were originally planned. Secondly, we find that BIS initiatives are usually driven by improving marketing and sales, while BPM initiatives are driven by improving business processes. Thirdly, we identify that there is a lack of strong commitment to using both systems for supporting performance management.  相似文献   

13.
Business groups in emerging economies frequently use international joint ventures (IJV) as a channel for knowledge acquisition and technology advancement. While IJVs provide a business group with access to new technology, how successful a group is in exploiting that new knowledge for innovative purposes depends on the groups’ ability to recombine new knowledge with its existing pool of knowledge and resources. The more resources a group spends in forming IJVs with foreign partners, the less resources the group has in developing and sustaining organizational mechanisms that facilitate integration of existing ideas and resources. Following this theoretical duality, we view the IJV–innovation relationship not as an “either–or” question, but as a question of whether and how. Specifically, viewing business groups as networks of loosely coupled firms, we examine how intra-group network structure and evolving institutional environment moderates the IJV–patenting relationship in Taiwan between 1981 and 1998.  相似文献   

14.
Despite the recognized value that mobile BI (m-BI) brings to firms, our understanding of the use of m-BI and its determinants are limited. In this study, we suggest that m-BI system quality characteristics may be among the factors that influence m-BI use. Yet, in the information systems (IS) literature there is mixed support for the relationship between system quality and system use at the individual level. Given there is research suggesting that engaged users are an indication of the technology’s success, we believe that ‘engagement’ may be the key to understanding the relationship discrepancy between system quality and use. To address this gap, we conducted a quantitative study of key informants who use m-BI, to understand what the key m-BI capabilities are and other success dimensions perceived as important by users. The results indicate that m-BI system quality attributes affect m-BI use indirectly through engagement, with this finding contributing to understanding of the complexity of IS use in mobile technologies.  相似文献   

15.
创业者的社会网络关系与自我效能感是影响初创企业绩效的重要因素.本研究通过调查问卷方式收集中国企业孵化器在孵企业及创业者数据,运用结构方程模型,对科技创业者的社会网络关系强度、创业自我效能感与科技型初创企业绩效之间关系进行了实证研究.研究发现:科技创业者的强关系对初创企业绩效具有显著的正向影响;弱关系对初创企业绩效的影响并不显著;强关系与弱关系对创业自我效能感均有显著的正向影响;科技创业者的创业自我效能感对初创企业绩效具有显著的正向影响.  相似文献   

16.
基于124份LSPs的问卷调查数据,采用潜调节结构方程模型,研究关系治理与正式控制在治理LSPs之间机会主义行为时各自及其交互作用,以及机会主义行为对联盟绩效的影响。研究表明:信任、承诺、过程控制、结果控制均可以有效遏制机会主义行为的发生,而联合行动对降低机会主义行为没有显著影响,机会主义行为对联盟绩效具有显著的负向影响;过程控制弱化了信任、承诺在降低机会主义行为方面的作用,结果控制则强化了信任、承诺、联合行动在降低机会主义行为方面的作用。  相似文献   

17.
Employees’ non-compliance with organizational information security policy (ISP) when using informational resources has become the main reason for continuous security incidents. Drawing upon technology threat avoidance theory (TTAT) and social exchange theory (SET), our study investigates the influence of supervisor-subordinate guanxi (SSG) and organizational commitment in the information security management. Our hypotheses were tested using survey data from 235 Chinese government employees. Results not only confirm the direct effect of SSG on government employees’ ISP compliance but also suggest that SSG indirectly influences compliance behavior via the mediation of organizational commitment. Organizational commitment weakens the negative influence of perceived costs on compliance behavior and also weakens the positive effect of self-efficacy on employees’ ISP compliance. For low-commitment employees, the negative influence of perceived costs on compliance behavior is more significant than that of those with strong organizational commitment, and self-efficacy exerts a stronger effect on ISP compliance for low-commitment employees than it does for high-commitment employees. This study contributes to current literature on information systems (IS) by confirming the critical roles of SSG and organizational commitment in motivating employees’ compliance behavior.  相似文献   

18.
Understanding how the application of big data analytics (BDA) generates business value is a persistent challenge in information systems (IS) research. Improving understanding of how BDA realizes business value requires unpacking theories to study the phenomenon. This study unpacks the task-technology fit (TTF) theory toward generating new and improved insights into the business value of BDA. Extant studies on TTF have mainly focused on traditional IT which is different from digital technologies like BDA that are malleable and dynamic. While TTF has primarily focused on how the technology meets task requirements, this study contends that tasks can also be structured to fit the functionality of technology. This study proposes a 2 × 2 matrix framework to explain how BDA and tasks interact. The framework indicates how the reconfigurability of tasks and the editability of BDA impact the fit between tasks and BDA. Future research should explore how the fit between tasks and BDA changes over time.  相似文献   

19.
以企业国际化的网络理论研究为基础,通过广州146家国际化企业的问卷调查所获数据,对我国企业外部关系网络与国际化绩效的关系进行实证研究。结果表明企业外部关系网络水平与企业国际化绩效存在显著正相关关系,但关系网络的不同维度对国际化绩效的作用呈现差异,其中关系维度的影响最为显著,其余依次为结构维度和认知维度。我国企业应构建坚实宽广的国际关系网络,建立合作伙伴间的识别机制、信任机制和互动互惠机制等途径提升企业国际关系网络各维度水平以促进企业成功国际化。  相似文献   

20.
Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and strategic business interests. People perceive affordances (possibilities for action) in information technology artifacts differently as cognitive structures (schema) which bias individual focus. This study explores how an individual's tendency to perceive the ‘trees’ in an IT ‘forest’ (artifact preference) affects their assessment of efforts to achieve more effective IT outcomes. The effect is demonstrated using a relatively simple IT success model. Further, in a sample of 120 survey responses supported by ten semi-structured interviews, we demonstrate that job role and organizational IT complexity systematically impact artifact perception. A better understanding of IT artifact bias promises to help organizations better assess information systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号