The Electronic Journal of Information Systems Evaluation provides critical perspectives on topics relevant to Information Systems Evaluation, with an emphasis on the organisational and management implications
For general enquiries email administrator@ejise.com
Click here to see other Scholarly Electronic Journals published by API
For a range of research text books on this and complimentary topics visit the Academic Bookshop

Information about the European Conference on Information Management and Evaluation is available here

linkedin-120 

twitter2-125 

fb_logo-125 

 

Journal Article

The Value Congruence of Social Networking Services‑a New Zealand Assessement of Ethical Information Handling  pp121-132

Tony Hooper, Tyrone Evans

© Oct 2010 Volume 13 Issue 2, ICIME 2010, Editor: Shaun Pather and Corrie Uys, pp97 - 196

Look inside Download PDF (free)

Abstract

Social networking sites on the Internet have enjoyed considerable media publicity recently. Whereas conventional social interactions leave behind no record, similar social interactions performed on social networking websites, can leave behind detailed and possibly permanent records. A literature review of social networking sites and personal privacy indicates that users may be unwary when interacting with specific social networking sites and unaware of the potential consequences of interaction, or they may deliberately ignore the risks in preference for publicity and personal relationships. A content analysis was carried out to compare the terms of use and privacy statements of six social networking sites with one another. The twelve principles of the New Zealand Privacy Act of 1993 were used in the coding template because they represent the agreed national values on information handling in New Zealand. The study demonstrated significant shortcomings in the contractual relationships between the users and social networking services that could be exploited in order to misuse personally identifiable data. It highlighted the need for users and organisations to be aware of the terms of use and privacy statements to which they become contractually bound, as well as to understand what the network may do with user’s information. Particular concern related to the accuracy of the information collected and the deletion of historic data. Social networking services terms of use and privacy statements appear to be more concerned with exculpatory clauses than demonstrating a concern for user security. Because many users, especially adolescents, are more driven by peer group pressure and the behavioural conventions of their age cohort than concern for the dangers they face when posting personal information, current theory on the role of trust in online transactions is failing to explain the contemporary behavioural phenomenon of SNS use. The social responsibility implications arising from this phenomenon and the accountability of SNSs for any misuse of personally identifiable information through their websites are discussed. Some areas for further research are suggested.

 

Keywords: social networking services, value congruence, New Zealand Privact Act 1993, privacy policies, personal security, personally identifiable information

 

Share |

Journal Article

A Case for Non‑Profit Organisations to engage in the use of Shared Computing Services  pp15-22

Barbara Crump, Raja Peter

© Jul 2014 Volume 17 Issue 1, Special issue from ECIME 2013, Editor: Prof Przemyslaw Lech, pp1 - 121

Look inside Download PDF (free)

Abstract

Abstract: The current economic climate of funding stringency has intensified the need for non‑profit organisations (NPOs) to find new delivery models of their services as a way of creating greater efficiencies and reducing costs. Consideration of improv ement to their back‑office operations is one way of addressing overheads associated with delivery functions of NPOs so that they can continue to focus on their core business activities. The overheads for back‑office functions are much larger for smaller N POs (by about 10‑15 percent) than the larger ones and interest in sharing services could appeal to that sector. One approach to reduce overhead costs is for two or more NPOs to collaborate in sharing office space and office equipment and, in some instan ces, outsourcing some functions, for example, human resources and information technology. Currently, in New Zealand, there is very little engagement by NPOs in sharing services, particularly back office computing services. It was against this background t hat meetings with representatives of eight NPOs in Wellington, New Zealand, identified the challenges they were facing. These included funding, client management, compliance with reporting (financial and non‑financial), financial management and control , governance, marketing and promotion and retention and management of staff and volunteers. Wellington City Council, as a significant funding agent of some local NPOs, commissioned a national online survey with the aim of understanding the interest and re adiness of NPOs in adopting shared computing services. The survey was developed collaboratively with the council, a computing charitable trust and a local university. The objectives of the survey were: to provide a snapshot of computing usage within the o rganisations, identify significant issues challenging the sector and understand their perceptions of shared computing services. The perceptions of the NPO representatives from across New Zealand (431 valid surveys) regarding shared services are reported in this paper. Results reveal the factors that driv

 

Keywords: Keywords: shared services, non-profit, computing, New Zealand

 

Share |

Journal Issue

Volume 13 Issue 2, ICIME 2010 / Oct 2010  pp97‑196

Editor: Shaun Pather, Corrie Uys

View Contents Download PDF (free)

Editorial

We have pleasure in presenting this special issue of EJISE.  As Information and Communications Technologies and the related Information Systems become ever more pervasive across all spheres of business, government and community based organizations, the scope of this journal has flexed to accommodate these varied settings in which pertinent research problems are located.   Consequently, in this special issue wide‑ranging problems related to the broad ambit of IS evaluation is reported on: 

As many countries continue to develop policies to enhance and sustain the growth of the SME sector, so too does the expenditure and consumption of IT amongst this category of business grow at an ever increasing rate thus warranting the attention of evaluation research. Avraam Papastathopoulos and Christina Beneki investigate an important concern with regards to the factors which are associated with the benefits from the adoption of ICTs amongst SMEs. In a study of the Greek SME sector the paper provides evidence that strategy plays a major role in the adoption and the appropriate use of ICTs.  Importantly their research also finds that prior entrepreneurial experience‑knowledge of ICT is significantly associated with the ICT performance. 

RFID technologies are increasingly used in a number of organisational settings for inventory control and management. Paul Golding and Vanesa Tennant contribute to our understanding of evaluation by proposing a methodology to evaluate the RFID inventory reader in a library.  Whilst the findings of this paper hone in on the application of RFID in a specific environment, the findings provide a basis for which evaluation of RFID in other similar contexts can take place, and thus adds to the conceptual base on RFID performance testing.

Notwithstanding many years of case studies and an increasing body of literature on ERP implementation and evaluation thereof questions continue to arise in respect of successful outcomes.  Brian O’Donovan and his co‑authors argue that during the ERP usage stage the intended efficiencies from ERP systems are not always realised. Having studied organisational memory mismatches and the resultant coping strategies their research posits that mismatches and short‑term coping strategies were found to contribute to ERP underperformance. 

In their paper Peter Weimann and co authors investigate the role of communications culture in a distributed team environment.  In assessing the role of ICTs in such an environment the paper argues that team member satisfaction and team success can only be accomplished if the communication culture in the company takes into account the technologies used and the distributed work setting. 

From amongst the various IS evaluation approaches, those apporaches which focus on the role of human stakeholders  are  worthy of a deeper understanding. Jeffrey Bagraim examines the multiple commitments of information technology knowledge workers and the related outcomes of such commitment. The results of his study challenges managers to review their assumptions about the organizational commitments of information technology knowledge workers.

Web 2.0 applications also receive attention in this issue.  Hooper and Evans investigate the value congruence of social networking services in New Zealand, and make an assessment of ethical information handling.  Their findings demonstrate significant shortcomings in the contractual relationships between the users and social networking services and they argue that this could be exploited in order to misuse personally identifiable data.

The paper by Racheal Lindsay and co‑authors discusses measures which are used to monitor data quality in the context of mobile devices in the UK police force.  Their findings show that whilst there are processes in place to verify data standards, these processes only take into consideration the structural completeness of data, and not other measurements of data quality, such as accuracy, timeliness, relevance, understandability and consistency.

Robbert in't Hout and coauthors studied how a wiki could be used to improve knowledge sharing.  The paper reports on a case study in which a consulting company was able to improve knowledge sharing amongst consultants during the devleopment of a Municipal Traffic and Transport Plan.  The findings  suggest that wikis need to be tuned to the learning styles that are available within the community that will use the tool.  In the context of knowledge sharing impolrtant lessons for wiki design are offered.

Finally, in a study of e‑government adoption, Rangarirai Matavire and co‑authors report on factors which inhibit the successful implementation of e‑government in South Africa. The findings of their research demonstrate that leadership, project fragmentation, perceived value of Information Technology, citizen inclusion and task co‑ordination are among the key inhibitors of e‑government success.

Shaun Pather and Corrie Uys

South Africa, October 2010

 

Keywords: affective commitment, boosting behaviour, communication culture, communication pattern, communication technology, data quality, e-Government, enterprise systems, entrepreneurial experience, ERP customising, ERP systems, ERP training, ERP usage, evaluation, grounded theory, helping behaviour, ICT-adoption, ICT-performance, ICT-strategy, interface design , knowledge management , law enforcement, library, mobile working, Municipal Traffic and Transport Planning, New Zealand Privacy Act 1993, ordinal regression, organisational memory, performance , personal security, personally identifiable information, privacy policies, RFID, social networking services , social software, South Africa, turnover intentions, value congruence, virtual teams, Wiki

 

Share |