Aligning networks: implementing an enterprise-wide information system into an evolving organization
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Dual Information Systems: Supporting Organizational Working and Learning by Making Organizational Memory Transparent
Käkölä, Timo; Koota, Kalle I. (Taylor & Francis, 1999)The conceptual design of most computer-based information systems reflects a dualism of technology. During the development phase, part of the work-domain-related knowledge is formalized and encoded in the software, making ... -
The moderating impact of organizational culture on information security compliance
Ejigu, Kibrom; Siponen, Mikko; Muluneh, Tilahun (Addis Ababa University Press, 2023)This research paper investigates the association between organizational culture and employees' compliance with information security policies. Drawing upon rational choice theory (RCT) and the competing values framework ... -
Redesigning Computer-Supported Work Processes with Dual Information Systems: The Work Process Benchmarking Service
Käkölä, Timo; Koota, Kalle I. (ME Sharpe, 1999)The conceptual design of most computer-based information systems reflects a dualism of technology. During the development phase, part of the work-domain-related knowledge is formalized and encoded in the software, making ... -
Examining the role of individuals’ emotions and cognitions in organizational IT implementation
Aarrelampi, Iita-Maria (2019)Yksilön informaatioteknologian hyväksyntää ja käyttöä on tutkittu laajasti ja sen roolia onnistuneessa IT implementaatioprojektissa on tunnistettu. Vaikkakin sosiaaliset, kognitiiviset ja emotionaaliset seikat, jotka ... -
Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies
Ejigu, Kibrom; Siponen, Mikko; Muluneh, Tilahun (Association for Information Systems, 2021)Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.