Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Behavioral control theory (2)
- Project control (2)
- Social capital (2)
- Artificial intelligence (1)
- Balance of threat (1)
-
- Business innovation (1)
- Business transformation (1)
- Change management (1)
- Clan control (1)
- Design practice (1)
- Enterprises (1)
- Formal control (1)
- Gamification (1)
- IT projects (1)
- Industry 4.0 (1)
- Innovation strategies (1)
- Outsourcing (1)
- Persuasive System Design (1)
- Power (1)
- Project management (1)
- Quantum AI (1)
- Quantum computing (1)
- Technology use over time (1)
- User interface (1)
- Vendor transition (1)
Articles 1 - 8 of 8
Full-Text Articles in Business
Forging The Future: Strategic Approaches To Quantum Ai Integration For Industry Transformation, Meng Leong How, Sin Mei Cheah
Forging The Future: Strategic Approaches To Quantum Ai Integration For Industry Transformation, Meng Leong How, Sin Mei Cheah
CMP Research
The fusion of quantum computing and artificial intelligence (AI) heralds a transformative era for Industry 4.0, offering unprecedented capabilities and challenges. This paper delves into the intricacies of quantum AI, its potential impact on Industry 4.0, and the necessary change management and innovation strategies for seamless integration. Drawing from theoretical insights and real-world case studies, we explore the current landscape of quantum AI, its foreseeable influence, and the implications for organizational strategy. We further expound on traditional change management tactics, emphasizing the importance of continuous learning, ecosystem collaborations, and proactive approaches. By examining successful and failed quantum AI implementations, lessons …
Towards Establishing Design Principles For Balancing Usability And Maintaining Cognitive Abilities, Gayathri Balasubramanian, Hyowon Lee, King Wang Poon, Wee Kiat Lim, Wai Keet Yong
Towards Establishing Design Principles For Balancing Usability And Maintaining Cognitive Abilities, Gayathri Balasubramanian, Hyowon Lee, King Wang Poon, Wee Kiat Lim, Wai Keet Yong
CMP Research
While technology has improved the speed, accuracy, and efficiency of work, its prolonged use also weakens users’ cognitive abilities over time. By creating usable, efficient, emotive, and engaging experiences, HCI researchers and practitioners have inadvertently led users to offload their innate capabilities onto their devices. How should technology be (re)designed so as to reduce the negative effects of on users’ cognitive abilities when used over time? In this paper, we discuss a set of design principles intended to help designers consider how long-term use of their artefacts could maintain and even improve users’ unassisted abilities and reduce negative impacts of …
The Evolution Of Enterprise Resource Planning Systems As An It Innovation: A Performative Perspective, Adrian Yeow, Wee Kiat Lim
The Evolution Of Enterprise Resource Planning Systems As An It Innovation: A Performative Perspective, Adrian Yeow, Wee Kiat Lim
CMP Research
How can we improve theorizing on IT innovation? We first draw on theories from IS research and science and technology studies (STS) to explain IT innovation. By showing how limited these research streams can be because they have not accounted for the act of theorizing itself, we next turn to the theory of performativity as a candidate theory to extend our understanding of IT innovation. We use an exemplar of IT innovation, enterprise resource planning (ERP) systems, to develop a performative perspective of the IT innovation process. Based on our preliminary data collection and analysis, we surfaced the role of …
Enacting Clan Control In Complex It Projects: A Social Capital Perspective, Cecil Eng Huang Chua, Wee Kiat Lim, Christina Soh, Siew Kien Sia
Enacting Clan Control In Complex It Projects: A Social Capital Perspective, Cecil Eng Huang Chua, Wee Kiat Lim, Christina Soh, Siew Kien Sia
CMP Research
The information technology project control literature has documented that clan control is often essential in complex multistakeholder projects for project success. However, instituting clan control in such conditions is challenging as people come to a project with diverse skills and backgrounds. There is often insufficient time for clan control to develop naturally. This paper investigates the question , "How can clan control be enacted in complex IT projects? " Recognizing social capital as a resource , we conceptualize a clan as a group with strong social capital (i.e., where its members have developed their structural, cognitive, and relational ties to …
Managing Risk In A Failing It Project: A Social Constructionist View, Wee Kiat Lim, Siew Kien Sia, Adrian Yeow
Managing Risk In A Failing It Project: A Social Constructionist View, Wee Kiat Lim, Siew Kien Sia, Adrian Yeow
CMP Research
Why do IT projects continue to stumble, despite the proliferation of risk management methodologies and a growing body of knowledge on project risk assessment and mitigation? In this paper, we propose an alternative theoretical perspective that views project risk as a social construction process shaped by the risk accounts of social groups and actors within an implementation context. Risk management is embedded in the social processes where risks are negotiated and contested, with some risk accounts amplified and some attenuated. Through the analysis of a large IT implementation in an Asian logistics firm and its trajectory of successive crises, we …
Switching It Outsourcing Suppliers: Enhancing Transition Readiness, Siew Kien Sia, Wee Kiat Lim, Kanapaty Pelly Periasamy
Switching It Outsourcing Suppliers: Enhancing Transition Readiness, Siew Kien Sia, Wee Kiat Lim, Kanapaty Pelly Periasamy
CMP Research
As IT outsourcing continues to gather momentum and mature, the decision to change suppliers at the end of a contract, or even earlier, has become an inevitable reality for many. This article sheds light on the management challenges associated with transitioning from one outsourcing supplier to another. Based on the “painful” experience of a large public-sector organization that chose not to renew its contract with a supplier that had operated its online portal and call center for five years, we provide insights into what makes a client organization “transition-ready.” We then describe the actions an organization can take before, during, …
Threat-Balancing In Vendor Transition, Cecil Eng Huang Chua, Wee Kiat Lim, Siew Kien Sia, Christina Soh
Threat-Balancing In Vendor Transition, Cecil Eng Huang Chua, Wee Kiat Lim, Siew Kien Sia, Christina Soh
CMP Research
While many outsourcing contracts are expiring, and vendor transition is becoming an increasing concern, little research helps organizations manage vendor transition. This paper explores vendor transition across two case sites. In one case, the outgoing vendor cooperated with the client which resulted in the client distancing itself from interactions between vendors. In the second case, the outgoing vendor was openly hostile, with the result that the client allied with the incoming vendor to manage vendor transition. These findings mirror expectations from balance of threat theory, a political science theory about interactions between nations. Balance of threat theory predicts that outgoing …
Building Swift Clan Control In Complex It Projects, Cecil Eng Huang Chua, Wee Kiat Lim, Christina Soh, Siew Kien Sia
Building Swift Clan Control In Complex It Projects, Cecil Eng Huang Chua, Wee Kiat Lim, Christina Soh, Siew Kien Sia
CMP Research
Clan control is often essential in complex multi-stakeholder projects for project success. Furthermore, clan control is especially important during requirements analysis which occurs at project inception. How can controllers quickly institute clan control in complex IT projects? Through the case analysis of a large IT project, we observed that clan control can be accelerated by the purposeful application of formal controls to build social capital. Our findings corroborate the notion that, properly structured, clan control can emerge quickly in a multi-stakeholder project to improve the likelihood of IT implementation success.