• Title/Summary/Keyword: role of information technology

Search Result 2,669, Processing Time 0.026 seconds

IT Manager Behavior in Crisis Response: Understanding Crisis Cases Using Recommendations from the Crisis Management Literature

  • Tommi Tapanainen;Olivier Lisein;Ryuichi Hosoya;Taro Kamioka
    • Asia pacific journal of information systems
    • /
    • v.29 no.1
    • /
    • pp.144-164
    • /
    • 2019
  • In their role as stewards of organizational information technology (IT), IT managers participate in crisis management activities. While much has been said about the power of technology in improving preparation for emergencies, the behavior of IT managers in crisis situations is not well understood. This paper addresses IT manager actions during the crisis response effort, when appropriate actions need to be taken at short notice. Recognizing that few guidelines exist for IT managers in these situations, we use recommendations from the crisis management literature in analyzing five earthquake cases from Japan and Taiwan. We identify several recommendations from this set for IT managers, which are related mainly to communications and leadership behaviors, suggesting that the IT manager role is a vital one in crisis response. The research additionally shows that recommendations from the crisis management literature have value also when applied to IT managers. Finally, we conclude on several ways that our understanding of IT manager crisis response could be developed by future research.

A Study on the Adoption of Accounting Information Systems in Mandatory Environments : Using TAM and TPB (비자발적 환경의 회계정보시스템 수용에 관한 연구 : TAM과 TPB를 이용하여)

  • Chang Won-Kyung;Kim Tae-Kyun
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.1
    • /
    • pp.173-189
    • /
    • 2005
  • The technology acceptance model (TAM) is a lot of cited in information technology adoption and usage researches. TAM has a base in psychological research, is parsimonious, explains usage behavior quite well, and can be operationalized with valid and reliable instruments. But TAM has been conducted primarily in volitional environments of the adoption of new technology. This paper discusses technology acceptance in accounting information systems to examine TAM with subjective norm and perceived behavioral control in mandated using environments. The results show that in mandatory environments such as accounting information systems, subjective norm is not a significant effect on the behavioral intention. Perceived usefulness and perceived behavioral control are significant the factor on the behavioral intention. The implications of finding are that perceived usefulness and perceived behavioral control play major role in technology acceptance rather than subjective norm in accounting information systems with mandatory environments.

  • PDF

On the Role of Prefabricated Speech in L2 Acquisition Process: An Information Processing Approach

  • Boo, Kyung-Soon
    • Annual Conference on Human and Language Technology
    • /
    • 1991.10a
    • /
    • pp.196-208
    • /
    • 1991
  • This study focused on the role of prefabricated speech (routines and patterns) in the L2 acquisition process. The data for this study consisted of spontaneous speech samples and various observational records of three Korean children learning English as L2 in a nursery school. The specific questions addressed here were: (1) What routines, patterns, and creative constructions did the children use? (2) What was the general trend in the three children's use of routines, patterns, and creative constructions over time? The data were collected over a period of one school year by observing the children in their school. The findings were discussed from the perspective of human information processing. This study found that prefabricated speech played a significant role in the three children's L2 acquisition. The automatic processing of prefabricated speech appeared to enable the children to reduce the burden on their information processing systems, which allowed the saved resources available for other language development activities. Also, the children's language development was evident in their increase in the use of patterns. The children were moving from heavy dependence on wholly unanalyzed routines to increased use of partly unanalyzed patterns. This increased control was the result of an increase in procedural knowledge.

  • PDF

The Role of Technology-Transfer-Oriented Subsidies in Building Companies' Absorptive Capacity and Innovation: Evidence from Peruvian MSMEs

  • Maria Fernanda Ricalde-Chahua;Christian Fernando Libaque-Saenz
    • Asia pacific journal of information systems
    • /
    • v.33 no.2
    • /
    • pp.444-467
    • /
    • 2023
  • Micro, small, and medium-sized enterprises (MSMEs) have been acknowledged to play a key role in promoting innovation and economic development. In Peru, 99.5% of formal firms are MSMEs, thus promoting innovation in these firms could have a significant impact on the Peruvian economy. In spite of Innovate Peru's efforts, Peru is still one of the countries that invests the least in innovation, with MSMEs offering low value added. Innovate Peru has launched programs (technological missions) to improve MSMEs' innovation through technology-transfer-oriented subsidies, which may strengthen companies' absorptive capacity (AC) and thus their capabilities to identify and integrate internal and external knowledge. This study assesses the impact of these programs on MSMEs. Data were collected from 85 MSMEs that participated in Innovate Peru's technological missions between 2014 and 2016. Findings show that all the dimensions of AC have a positive impact on innovation; however, the impact of economic subsidy was found to be non-significant. Theoretical and practical implications are discussed.

The Mediating Role of Self-Regulation Between Digital Literacy and Learning Outcomes in the Digital Textbook for Middle School English

  • LEE, Jeongmin;MOON, Jiyoon;CHO, Boram
    • Educational Technology International
    • /
    • v.16 no.1
    • /
    • pp.58-83
    • /
    • 2015
  • Digital textbooks draw attention as a new format of educational material, using the advantages of information technology; this innovative learning tool requires consideration as a part of successful and effective learning. The main purpose of the article is to investigate the mediating role of self-regulation between digital literacy and learning outcomes (academic performance and learning motivation) when using digital textbooks as a learning tool in Middle School English. Both descriptive and regression analysis were used as data analyses methods. The main findings of this study were as follows: first, digital literacy and self-regulation significantly predicted academic performance and learning motivation; second, self-regulation fully mediated between digital literacy and academic performance; third, self-regulation partially mediated between digital literacy and learning motivation. The research results proved the effects of digital literacy and self-regulation on the learning outcomes and mediating role of self-regulation between digital literacy and learning outcomes. These results help to design and implement effective lessons when using a digital textbook in Middle school English.

The Evolving Role of Mileage in e-Business: Private e-Money Perspective (e-비즈니스에서 마일리지의 새로운 역할: 사적 전자화폐 관점)

  • Park Seung-bong;Han Jae-min
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.11a
    • /
    • pp.444-453
    • /
    • 2004
  • This research investigates the rising new role of mileage system as private e-money in a exploratory study. The key research questions are 'How does mileage system evolve with expansion of e-business and what are the cases for real experiences in 'money-like' mileage and their implications?' This research focuses on the proposition that mileage points created in commercial transactions as a royalty program are observed to serve a new role as payment tool. In an attempt to identify factors that determine mileage system as private money, we employ three factors: confidence, transaction cost, and monetary freedom. Also, this research proposes a direction for further research and follow-up studies to establish legal and institutional issues and the relevant architecture, all of which are essential elements to make the mileage points global money with a certain trade ratio in the near future.

  • PDF

The Evolving Role of Mileage in e-Business: Private e-Money Perspective (e-비즈니스에서 마일리지의 새로운 역할 : 사적 전자화폐 관점)

  • Park, Seung-Bong;Han, Jae-Min
    • The Journal of Information Systems
    • /
    • v.13 no.2
    • /
    • pp.119-134
    • /
    • 2004
  • This research investigates the rising new role of mileage system as private e-money in a exploratory study. The key research questions are "How does mileage system evolve with expansion of e-business and what are the cases for real experiences in 'money-like' mileage and their implications?" This research focuses on the proposition that mileage points created in commercial transactions as a royalty program are observed to serve a new role as payment tool. In an attempt to identify factors that determine mileage system as private money, we employ three factors: confidence, transaction cost, and monetary freedom. Also, this research proposes a direction for further research and follow-up studies to establish legal and institutional issues and the relevant architecture, all of which are essential elements to make the mileage points global money with a certain trade ratio in the near future.

  • PDF

Context awareness Access Control for Ubiquitous Environment (유비쿼터스 환경을 위한 상황 인식 접근제어)

  • Shin, Dong-Wook;Hwang, Yu-Dong;Park, Dong-Gue
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.470-482
    • /
    • 2008
  • This paper propose role base access control model that use context information for ubiquitous environment. Concept of access control that use context information assigns permission that can approach in some information or object in part. And do so that can assigned user in part to it and acquire permission. So it can approach in information or object. Therefore, user approaches in information or object in assigned role, and the role that is allocated ro own is having. So, do so that can secure information or utilization of object safety. Proposa1 model investigated lacking restriction item in GEO-RBAC model. So, it considered that present new restriction condition and role conflict in various case. Also, to GEO-RBAC model proposed suitable model, analyzed old model's advantage, shortcoming. And it presented proposal model to GEO-RBAC because improving this.

  • PDF

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

Context Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 컨텍스트 접근 제어 고찰)

  • Jung Heon-Man;Lee Se-Hoon
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.175-184
    • /
    • 2006
  • In this paper, we study to two research direction about information security in ubiquitous computing environment. First, researches on context-aware access control using user's context or environment conditions based on role-based control. Second, researches on model for access control about context information in ubiquitous computing utilizing role base access control model. Two research directions are the one of the most important point technology in that embody ubiquitous environment in the actual world.

  • PDF