- Knowledge Management and Sharing
- Technology Adoption and User Behaviour
- Information Technology Governance and Strategy
- Innovation and Knowledge Management
- Information Systems Theories and Implementation
- E-Government and Public Services
- Digital Platforms and Economics
- ERP Systems Implementation and Impact
- ICT Impact and Policies
- Information and Cyber Security
- Supply Chain Resilience and Risk Management
- Intellectual Capital and Performance Analysis
- Cybercrime and Law Enforcement Studies
- Business Process Modeling and Analysis
- Local Government Finance and Decentralization
- Digital Marketing and Social Media
- Usability and User Interface Design
- Multimedia Communication and Technology
- Business Strategy and Innovation
- Innovative Human-Technology Interaction
- Digital Economy and Work Transformation
- Outsourcing and Supply Chain Management
- Spam and Phishing Detection
- Management and Organizational Studies
- Economic Growth and Productivity
Auckland University of Technology
2014-2024
All India Institute of Medical Sciences, Deoghar
2023
Michigan State University
2006-2011
This paper presents a model of the drivers e-government maturity. We differentiate "maturity" from "readiness" on basis that former refers to demonstrated behavior, while latter provides an idea country's potential achieve e-government, and argue maturity is more accurate measure realized progress. investigate prevalence affluent countries in many rankings using where relationship between GDP mediated by ICT infrastructure, human capital, governance. Using data authoritative sources, we find...
Purpose Individuals can improve their task performance by using information and communications technology (ICT). However, individuals who use ICT may also suffer from negative outcomes, such as burnout anxiety, which lead to poorer well-being. While researchers have studied the positive outcomes of in aggregate, same has not been done for outcomes. Design/methodology/approach This study uses a meta-analysis 52 studies examine relationship between influence job autonomy on use. Job is...
While substantial research has examined the control of Information systems (IS) projects, most studies In this area have only how one controller manages a single group controllees. However, many IS especially enterprise projects (often initiated by an organization's corporate headquarters, and involving business unit users consultants), multiple stakeholders. The headquarters (the project's principal controller) must simultaneously ensure that various stakeholders are aligned with goals...
While information and communication technology for development (ICT4D) research examines the diverse range of topics, settings, technologies, there has been a lack attention on theorizing process (ICT)-enabled development. This paper draws Bourdieu's practice theory to provide framework doing so. captures multi-level, generative, processual nature ICT-enabled development, illustrates that is an ongoing activity recreated, reinforced, restricted by interaction between dispositions...
Purpose This study aims to understand how organizations in the service industry can encourage use of enterprise social networks (ESNs) for knowledge sharing, focusing on concepts intra-organizational trust and governance. Design/methodology/approach The authors gathered data through an online survey 104 participants from financial services industry. Data were analyzed using structural equation modelling test proposed model evaluate constructs’ reliability validity. Findings findings indicate...
Medicinal plants and herbal drugs are gaining interest of common people worldwide due to their distinctive benefits. According definition given by WHO “Herbal medicines include herbs, materials, preparations finished products that contain as active ingredients parts plants, or other plant combinations”. In developing countries medical institutes have begun discover file patents on medicinal derivatives. Expanding scale R&D sector research manufacturing units in India indicate the possible...
Abstract Western worldviews dominate the information systems (IS) literature, accepted and taken for granted as natural way of doing things. While diversity in terms gender ethnicity has been studied IS field, there is scant research on experiences Indigenous technology (IT) professionals. This study uses narrative inquiry to provide temporal, contextualised accounts IT professional from (Māori) community Aotearoa, New Zealand. These demonstrate how participants actively draw their culture...
Enterprise systems (ES) are large software packages that have been widely adopted, but complex to deploy. One way obtain more value from them is train end-users. However, little known about the effectiveness of ES training. This study examines post-training behaviour in environment through concept training transfer and theoretical framework self-determination theory. It proposes end-users' computer self-efficacy (CSE) mastery orientation (MO), as well perceived ease-of-use (PEOU) a system,...
The article discusses the concept of clan control and its usefulness for managing teams in workplace. drawbacks using traditional command systems management business are noted. method, which involves fostering a group identity through social norms coorientation within larger corporate culture, is described as useful alternative. relationship to agency theory discussed, importance team training methods use organizational socialization avoid adding unnecessary levels bureaucracy mentioned.
Hackers who engage in phishing manipulate their victims into revealing confidential information by exploiting motives, habits, and cognitive biases. Drawing on heuristic-systematic processing the anchoring effect, this study examines how contextualization of messages, form modifications to framing content, affects individuals’ susceptibility phishing. This also investigates if there is a discrepancy between way individuals believe they will react attempts actual reactions. Using two fake...
Supply chain security is an emerging topic in the supply management literature. Information a key component of security, and this study aims to identify factors that influence compliance behaviour with respect information security. A related objective understand extent which was substantive or symbolic. Adopting qualitative approach, authors conducted semi-structured interviews stakeholders based New Zealand who are involved international chains. The find affected by other organizations,...
An organization's success in e-business is significantly affected by the quality of its website. However, many websites are unable to retain attention their customers, arguably because they only cater some needs customers. This study adopts a design science approach develop new methodology for designing that addresses psychological, sociological, and cognitive individual users. The based on multidisciplinary principles drawn from field design, as provide framework structuring various...
This article contends that although much research on the business value of IT focuses firm-level impacts, studies have begun incorporating industry-level variables as explanatory factors interest to offer better contextualized explanations for differences in firms obtained from their across different industries. The authors present a multi-level model where and jointly determine firm obtains its IT. By using nested examine industry interactions, they are able control problematic violations...
A recent innovation in employee motivation systems is the introduction of ‘gamification’, which refers to use game design mechanics and principles influence behaviour enhance staff engagement. Enterprise gamification aggravate differences information availability between employers employees, employees who may be forced adopt such placed under stress, worsening employment relationships workplace. Therefore, this research examines potential legal implications gamified systems. This study...