• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 2
  • 1
  • Tagged with
  • 6
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Lärande i andra vågen : En studie om lärande inom företag efter implementering av nytt affärssystem / Learning in the Second Wave : A Study About Learning within Enterprises after Implementing a New ERP System

Hedenström, Caroline, Hörnell, Daniel January 2014 (has links)
Introducing a new type of IT-structure means a change that employees within an organization must adapt to. Today, many companies have implemented information technology in the form of Enterprise Resource Planning (ERP) Systems and find themselves in th so-called Second Wave stage where an after work is ongoing with continual improvement that involves changes that employees need to understand and act upon. To learn how to work with these recurrent misadventures is of importance because it is seen as a critical factor in order to take advantage of the ERP system and its benefits. To study this a study was conducted through personal interviews at Apoteksgruppen AB which a few years ago introduced a new ERP system. There the authors saw that employees learned in different ways depending on the position, and that the more responsibility this person had the greater freedom this person had to resolve their problems and therefore learned more effectively. The internal support team also proved to play a more important role in addition to this learning.
2

Applying Push-Pull-Mooring model to investigate non-malicious workarounds behavior

Aljohani, Nawaf Rasheed 08 August 2023 (has links) (PDF)
More than half of the violations of information systems security policies are initiated by non-malicious activities of insiders. To investigate these non-malicious activities, we utilized the theory of workaround and argued that the application of neutralization techniques impacts the use of workarounds. We built our model using three theories: the theory of workaround, push-pull-mooring theory, and techniques of neutralization. We identified the elements of workarounds related to non-malicious violations and proposed a theoretical perspective using the push-pull-mooring theory to investigate non-malicious workarounds empirically. We propose that non-malicious activities of insiders can be seen as a switching behavior, with push factors such as system dissatisfaction and time pressure, and pull factors such as convenience and alternative attractiveness. The mooring factors in our model are techniques of neutralization, including denial of injury, denial of responsibility, and defense of necessity. We employed the scenario-based factorial survey method to mitigate the effect of social desirability bias. Our mixed model analysis indicates that time pressure, convenience, denial of injury, and defense of necessity significantly impact an individual's likelihood of engaging in non-malicious workarounds. Additionally, the relative weight analysis of our model shows that convenience and time pressure explain most of the variance in our model.
3

O impacto das características do trabalho no comportamento Workaround e no uso da Shadow IT relacionados com o desempenho individual

Pinto, Aline de Vargas January 2018 (has links)
Devido a insatisfação dos usuários com os sistemas de informação (SI) disponíveis nas organizações e a necessidade de melhorar o desempenho individual na execução das tarefas, muitos grupos de trabalho implementam, de forma autônoma, recursos de tecnologia e sistemas não disponíveis pelo departamento de TI. Assim, a satisfação e o comportamento produtivo no trabalho podem ser explicados pela teoria das características do trabalho proposta por Hackman e Oldham, que podem atuar como variável preditora do uso de soluções e tecnologias alternativas. Motivada por esse contexto, esta pesquisa tem por objetivo analisar como as características do trabalho estão relacionadas com o comportamento workaround e com uso da shadow IT, avaliando o impacto no desempenho individual. O objetivo desta pesquisa foi alcançado ao longo da execução de 3 artigos. O artigo 1 apresenta uma revisão de literatura sobre os fatores: características do trabalho, comportamento workaround, uso da shadow IT e desempenho individual, sendo comprovado teoricamente a relação entre as temáticas, dando origem ao desenvolvimento do modelo teórico testado no artigo 2. No artigo 2 foi realizada a aplicação de um survey com 369 usuários de TI que possibilitou a realização de testes estatísticos para assegurar a validade e confiabilidade do modelo de pesquisa proposto no artigo 1, além do teste das 5 hipóteses propostas neste estudo. Neste artigo pode-se concluir que as características do trabalho possuem uma relação positiva com o comportamento workaround e com o uso da shadow IT. Com relação ao impacto no desempenho individual, os achados desta pesquisa demonstram que tanto o comportamento workaround quanto o uso da shadow IT possuem uma relação positiva com o desempenho individual. Ademais, confirma-se a relação entre o comportamento workaround e o uso da shadow IT que são conceitos semelhantes, mas que possuem importantes diferenças. Dentre as sugestões de pesquisa, recomenda-se o estudo do comportamento workaround com o compartilhamento do conhecimento, pois o uso de soluções alternativas proporciona uma comunicação mais rápida e dinâmica, impulsionando a colaboração entre colegas de trabalho, parceiros externos e cliente. Por fim, no artigo 3 buscou-se verificar o papel mediador do comportamento workaround e do uso da shadow IT na relação entre as características do trabalho e o desempenho individual. O principal resultado deste artigo evidencia que o efeito direto entre as características do trabalho e o desempenho não foi suportado, o que confirma a mediação total, já que o efeito indireto foi maior do que o efeito direto que não apresentou significância. Assim, o efeito das características do trabalho no desempenho individual é melhor explicado pela variável comportamento workaround e pelo uso da shadow IT. Como a análise e moderação e a mediação são conceitos similares pois descrevem uma situação em que o relacionamento de 2 construtos depende de uma terceira variável em que as diferenças estão na fundamentação teórica e na interpretação dos resultados, sugere-se um estudo comparativo que demonstre como os construtos deste modelo se comportam através da análise de moderação. / Users' dissatisfaction with the information systems (IS) available in organizations and the need to improve individual performance in the execution of tasks, many workgroups autonomously implement technology resources and systems not available to the IT department. Thus, satisfaction and productive behavior at work can be explained by the theory of the job characteristics proposed by Hackman and Oldham, which can act as a predictor of the use of alternative solutions and technologies. Motivated by this context, this research aims to analyze how the job characteristics are related to the workaround behavior and using shadow IT, evaluating the impact on individual performance. The objective of this research was achieved during the execution of 3 articles. Article 1 presents a review of the literature on the factors: job characteristics, workaround behavior, use of shadow IT and individual performance, theoretically proving the relationship between the themes, giving rise to the development of the theoretical model tested in article 2. In the article 2 a survey was carried out with 369 IT users that allowed the performance of statistical tests to ensure the validity and reliability of the research model proposed in article 1, in addition to the test of the 5 hypotheses proposed in this study. In this paper it can be concluded that the job characteristics have a positive relationship with the workaround behavior and the use of shadow IT. Regarding the impact on individual performance, the findings of this research demonstrate that both the workaround behavior and the use of shadow IT have a positive relationship with individual performance. In addition, the relationship between the workaround behavior and the use of shadow IT is confirmed, which are similar concepts, but which have important differences. Among research suggestions, it is recommended to study workaround behavior with knowledge sharing, as the use of alternative solutions provides faster and more dynamic communication, boosting collaboration among colleagues, external partners and the client. Finally, article 3 sought to verify the mediating role of the workaround behavior and the use of shadow IT in the relation between the job characteristics and the individual performance. The main result of this article shows that the direct effect between the job characteristics and the performance was not supported, which confirms the total mediation, since the indirect effect was greater than the direct effect that did not present significance. Thus, the effect of job characteristics on individual performance is best explained by the variable workaround behavior and by the use of shadow IT. Since analysis and moderation and mediation are similar concepts because they describe a situation in which the relationship of 2 constructs depends on a third variable in which the differences are in the theoretical basis and in the interpretation of the results, a comparative study is suggested that demonstrates how the constructs of this model behave through moderation analysis.
4

Validity and Reliability of a New Measure of Nursing Experience With Unintended Consequences of Electronic Health Records.

Gephart, Sheila M, Bristol, Alycia A, Dye, Judy L, Finley, Brooke A, Carrington, Jane M 10 1900 (has links)
Unintended consequences of electronic health records represent undesired effects on individuals or systems, which may contradict initial goals and impact patient care. The purpose of this study was to determine the extent to which a new quantitative measure called the Carrington-Gephart Unintended Consequences of Electronic Health Record Questionnaire (CG-UCE-Q) was valid and reliable. Then, it was used to describe acute care nurses' experience with unintended consequences of electronic health records and relate them to the professional practice environment. Acceptable content validity was achieved for two rounds of surveys with nursing informatics experts (n = 5). Then, acute care nurses (n = 144) were recruited locally and nationally to complete the survey and describe the frequency with which they encounter unintended consequences in daily work. Principal component analysis with oblique rotation was applied to evaluate construct validity. Correlational analysis with measures of the professional practice environment and workarounds was used to evaluate convergent validity. Test-retest reliability was measured in the local sample (N = 68). Explanation for 63% of the variance across six subscales (patient safety, system design, workload issues, workarounds, technology barriers, and sociotechnical impact) supported construct validity. Relationships were significant between subscales for electronic health record-related threats to patient safety and low autonomy/leadership (P < .01), poor communication about patients (P < .01), and low control over practice (P < .01). The most frequent sources of unintended consequences were increased workload, interruptions that shifted tasks from the computer, altered workflow, and the need to duplicate data entry. Convergent validity of the CG-UCE-Q was moderately supported with both the context and processes of workarounds with strong relationships identified for when nurses perceived a block and altered process to work around it to subscales in the CG-UCE-Q for electronic health record system design (P < .01) and technological barriers (P < .01).
5

Förstår utvecklare slutanvändare? : En jämförelse baserad på en undersökning av mjukvaruanvändning

Vester, Lisa, Liss, Anna January 2016 (has links)
This thesis examines if developers of software can be considered aware of the usage of the product. The study was made to reveal the developers perception about the usage, and comparing their perception with the actual usage. The scope of the study was to investigate a software system used in a contact center, specifically the part of the software where the administration is performed. The first part of the study consisted of interviews with the developers of the software to obtain their perception of the usage. Further, a second study was performed to determine the most important functionalities in the software for the end users, and evaluate the usability of the software. This was achieved by performing a contextual inquiry with end users. The results of the study concluded that the developers could be considered to have a moderate awareness of the usage. Although, the study revealed that the developers had limited understanding of the functionalities that are the most important for the end users. One of the essential functionalities according to the contextual inquiry, was left unmentioned by a majority of the developers. On the basis of Nielsen’s theoretical usability concepts, the usability of the client was evaluated as low, something the developers also were considered aware of. Finally, the study concludes a lack of a profound understanding amongst the developers regarding the difficulties and limitations that the end users face.
6

Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry

Fager, Adam January 2023 (has links)
This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. The objective is to understand how Cloud-Based Shadow IT affects employees' compliance with cloud services and to examine the understanding of IT managers regarding this phenomenon. The research problem addresses the challenges faced in ensuring compliance with regulations and effective utilization of cloud technology. By identifying the strengths, weaknesses, possibilities, and risks associated with Cloud-Based Shadow IT, this study aimed to provide insights for companies and IT managers in making informed decisions. It explores the relationship between Shadow IT and cloud services and investigates employees' and IT managers' adherence to and understanding of these issues.    The findings indicate that employees have varying levels of understanding, with limited knowledge of approved cloud services. Managers prioritize security concerns, including data compliance and ownership, but lack strategies to address knowledge gaps. The use of Cloud-Based Shadow IT has both positive and negative consequences, including increased productivity and collaboration but also data loss and non-compliance risks. Factors such as education and awareness of security risks are important for employees to understand and comply with policies. Overall, the study highlights the need for continuous education and awareness programs to improve understanding and decision-making regarding cloud services and Shadow IT.

Page generated in 0.0332 seconds