Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Management Information Systems

An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello Jun 2021

An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello

Electronic Theses and Dissertations

The problem addressed in this study was the literature gap regarding how internal organizational knowledge can be increased effectively within outsourcing projects. The study was a qualitative social constructionist case study composed of senior technology leaders. The purpose this study addressed was to understand the current structure of technical outsourcing contracts and how future contracts could be structured to address the problem of this study. The research incorporated how a reconceptualized absorptive capacity model, sociocognitive theory, and digital leadership mindsets could improve knowledge transfer outcomes between a vendor and client. Research shows that increasing an organization’s knowledge during an outsourcing …


Building And Testing Theory On The Role Of It In The Relationship Between Power And Performance: Implementing Enterprise Performance Management In The Organization, Mitchell Wenger Apr 2009

Building And Testing Theory On The Role Of It In The Relationship Between Power And Performance: Implementing Enterprise Performance Management In The Organization, Mitchell Wenger

Theses and Dissertations

This research builds on the literature about power and performance, offering new theory that extends the literature by accounting for the transformational effects of information technology. The role of information technology in the relationship between organizational power and performance is unclear in the literature. Management literature offers theories describing the relationship between power and performance. IS literature investigates the relationship between information technology (IT) and power and between information systems technology and performance, but is silent on the impact of IT on the relationship between power and performance. The nature of this relationship – direct, moderating, or indirect – is …


Defining Value Based Information Security Governance Objectives, Sushma Mishra Dec 2008

Defining Value Based Information Security Governance Objectives, Sushma Mishra

Theses and Dissertations

This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three …


Managing The Tension Between Standardization And Customization In It-Enabled Service Provisioning: A Sensemaking Perspective, Mark O. Lewis Aug 2008

Managing The Tension Between Standardization And Customization In It-Enabled Service Provisioning: A Sensemaking Perspective, Mark O. Lewis

Computer Information Systems Dissertations

The outsourcing literature has offered a plethora of perspectives and models for understanding decision determinants and outcomes of outsourcing of business processes. While past studies have contributed significantly to scholarly research in this area, there are an insufficient number of studies that are provider centric. Consequently, there is a need to understand how service providers address a core challenge: to achieve scalable growth by developing standardized offerings that can be sufficiently customized to meet the unique demands of individual customers. This study explores how patterns of collective action within and between a provider and two of their largest customers relate …


The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet Aug 2006

The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet

Dissertations

Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …


Upgrading Packaged Software: An Exploratory Study Of Decisions, Impacts, And Coping Strategies From The Perspectives Of Stakeholders, Huoy Min Khoo Jan 2006

Upgrading Packaged Software: An Exploratory Study Of Decisions, Impacts, And Coping Strategies From The Perspectives Of Stakeholders, Huoy Min Khoo

Computer Information Systems Dissertations

Packaged software is widely adopted and has become an integral part of most organizations’ IT portfolios. Once packaged software is adopted, upgrades to subsequent versions appear to be inevitable. To date, research on packaged software upgrade has not received the attention that it warrants, as academic research continues to focus on initial technology adoption. To explore this understudied yet important area, three research questions were proposed: (1) What influences the decision to upgrade packaged software? (2) How do stakeholders cope with software upgrade? (3) How does a packaged software upgrade affect stakeholders? A qualitative research method was used to study …


Antecedents Of Information Systems Backsourcing, Natalia Veltri Jan 2005

Antecedents Of Information Systems Backsourcing, Natalia Veltri

Electronic Theses and Dissertations

This dissertation examines backsourcing of corporate IS activities, and why IS outsourcing clients decide to backsource. Information Systems (IS) backsourcing is a business practice in which a company takes back in-house assets, activities, and skills that are part of its IS operations and were previously outsourced to one or more outside information service suppliers. Focusing on economic, strategic and relationship motives, a number of theoretical backsourcing factors is derived from transaction cost theory, agency theory, core competency perspective, IOR theory and marketing channels literature. To identify factors salient in IS backsourcing and to examine the process of backsourcing this dissertation …


Access Anytime Anyplace: An Empircal Investigation Of Patterns Of Technology Use In Nomadic Computing Environments, Karlene C. Cousins Dec 2004

Access Anytime Anyplace: An Empircal Investigation Of Patterns Of Technology Use In Nomadic Computing Environments, Karlene C. Cousins

Computer Information Systems Dissertations

With the increasing pervasiveness of mobile technologies such as cellular phones, personal digital assistants and hand held computers, mobile technologies promise the next major technological and cultural shift. Like the Internet, it is predicted that the greatest impact will not come from hardware devices or software programs, but from emerging social practices, which were not possible before. To capitalize on the benefits of mobile technologies, organizations have begun to implement nomadic computing environments. Nomadic computing environments make available the systems support needed to provide computing and communication capabilities and services to the mobile work force as they move from place …