You are previewing Knowledge and Technology Adoption, Diffusion, and Transfer.
O'Reilly logo
Knowledge and Technology Adoption, Diffusion, and Transfer

Book Description

Understanding the adoption, diffusion, and transfer of technology in the marketplace is vital for the success of any organization. Knowledge and Technology Adoption, Diffusion, and Transfer: International Perspectives is filled with original scientific and quality research articles on management information systems, technology diffusion, and business systems application aspects of e-commerce, e-government, and mobile application. As a forum of multi-disciplinary and interdisciplinary dialogue, it addresses research on all aspects of innovation diffusion in the field of business computing technologies and their past, present, and future use. This title serves as a vital source of information for researchers and practitioners alike.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Associate Editors and List of Reviewers
    1. Associate Editors
    2. List of Reviewers
  5. Preface
  6. Chapter 1: Harnessing Information and Communication Technologies for Diffusing Connected Government Applications in Developing Countries
    1. ABSTRACT
    2. INTRODUCTION
    3. THEORETICAL FRAMEWORK
    4. DIFFUSION OF INNOVATIONS THEORY
    5. CONNECTED GOVERNMENT CONCEPT AND THE SYSTEMS THEORY
    6. CASE STUDY
    7. CASE DESCRIPTION
    8. RESEARCH FRAMEWORK
    9. RESEARCH PROBLEM
    10. RESEARCH METHOD
    11. FINDINGS
    12. E-ADMINISTRATION (E-MANAGEMENT)
    13. INTER-ORGANISATIONAL COLLABORATION
    14. ANALYSIS OF FINDINGS
    15. INNOVATION
    16. COMMUNICATION CHANNELS
    17. TIME
    18. SOCIAL SYSTEM
    19. RECOMMENDATIONS
    20. DISCUSSION
    21. CONCLUSION
    22. SUMMARY
    23. LIMITATIONS
    24. RELATED FURTHER STUDIES
    25. APPENDIX A
  7. Chapter 2: An Efficient and Simple Algorithm for Matrix Inversion
    1. ABSTRACT
    2. INTRODUCTION
    3. (A). SIMPLE ALGORITHM FOR MATRIX INVERSION
    4. LEMMA:
    5. (B). CODE (IN C LANGUAGE)
    6. NUMERICAL EXAMPLE
    7. ITERATION 1:
    8. ITERATION 2:
    9. ITERATION 3:
    10. ANALYSIS OF CALCULATIONS PERFORMED
    11. COMPARATIVE RESULTS OF COMPUTER SIMULATION
    12. CONCLUSION
  8. Chapter 3: Thirst for Business Value of Information Technology
    1. ABSTRACT
    2. INTRODUCTION
    3. IT PRODUCTIVITY PARADOX
    4. REASONS WHY IT BUSINESS VALUE IS NOT FULLY REFLECTED
    5. AMBIGUOUS IDENTITY OF IT BUSINESS VALUE
    6. BLURRED REFLECTION OF IT BUSINESS VALUE
    7. MISUNDERSTOOD VALUE REALIZATION PROCESS
    8. POOR BUSINESS-IT ALIGNMENT
    9. COMPLICATIONS FROM MEDIATING FACTORS
    10. CONCLUSION
  9. Chapter 4: Adoption of Short Messaging Service (SMS) in Malaysia
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. ADOPTION OF SMS
    4. 3. RESEARCH METHODOLOGY
    5. 4. RESEARCH FINDINGS
    6. 5. DISCUSSION AND CONCLUSION
  10. Chapter 5: A Study of the Systemic Relationship Between Worker Motivation and Productivity
    1. ABSTRACT
    2. BACKGROUND ON MOTIVATION THEORY
    3. MOTIVATION SUBSYSTEMS
    4. SYSTEMIC MOTIVATION
    5. MOTIVATION SYSTEM INTERRELATIONSHIP
    6. A CASE STUDY AND APPLICATION
    7. CONCLUSION: THE FOURTH THEORY OF MOTIVATION – A CENTRAL CONSTRUCT
  11. Chapter 6: E-Government Initiative in the Sultanate of Oman
    1. ABSTRACT
    2. INTRODUCTION
    3. E-GOVERNMENT DEFINITION AND IMPLEMENTATION
    4. METHODOLOGY
    5. RESEARCH APPROACH
    6. ICT SECTOR IN OMAN
    7. CASE STUDY (UBAR)
    8. CONCLUSION
  12. Chapter 7: Mobile Commerce Use among UK Mobile Users
    1. ABSTRACT
    2. INTRODUCTION
    3. THE RATIONALE FOR A MOBILE TECHNOLOGY FRAMEWORK
    4. CONCEPTUAL MOBILE TECHNOLOGY FRAMEWORK AND HYPOTHESIZED RELATIONSHIPS
    5. DATA ANALYSIS AND FINDINGS
    6. MOBILE TASKS’ CHARACTERISTICS
    7. REGRESSION ANALYSIS FOR THE NETWORK FIT AND M-COMMERCE UTILIZATION
    8. MOBILE OPERATORS’ IMPACT ON M-COMMERCE UTILIZATION
    9. MOBILE VENDORS’ IMPACT ON M-COMMERCE UTILIZATION
    10. CONCLUSION AND RECOMMENDATIONS
    11. ‘NETWORK FIT’ FINDINGS
    12. APPENDIX 1
    13. APPENDIX 2
  13. Chapter 8: An Efficient and Generic Algorithm for Matrix Inversion
    1. ABSTRACT
    2. INTRODUCTION
    3. FUTURE WORK
    4. CONCLUSION
  14. Chapter 9: Saving DBMS Resources While Running Batch Cycles in Data Warehouses
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE RESEARCH
    4. DATA WAREHOUSE REFRESH METHODOLOGIES
    5. COMPUTING RESOURCE USAGE AND SAVINGS
    6. CONCLUSION
  15. Chapter 10: Internet Adoption from Omani Organizations' Perspective
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. CONCLUSION
  16. Chapter 11: Electronic Training Methods
    1. ABSTRACT
    2. INTRODUCTION
    3. DEFINITION OF TRAINING
    4. MODERN TRAINING METHODS
    5. COMPUTER-BASED TRAINING
    6. WEB-BASED TRAINING
    7. E-LEARNING
    8. COACHING
    9. TRAINING IN SMALL AND MEDIUM SIZED ENTERPRISES (SMES)
    10. DEVELOPMENT OF HYPOTHESES
    11. RESEARCH METHODOLOGY
    12. RESULTS
    13. SUMMARY OF THE FINDINGS
    14. CONCLUSION
    15. RECOMMENDATION
  17. Chapter 12: Problems of Initiating International Knowledge Transfer
    1. ABSTRACT
    2. INTRODUCTION
    3. METHODOLOGY
    4. THEORETICAL FRAMEWORK
    5. THE ROLE OF CROSS-BORDER CO-OPERATION ORGANISATION: CASE OF HELSINKI-TALLINN EUREGIO
    6. USAGE OF LIVING LABS’ METHOD IN ENHANCING HELSINKI-TALLINN CROSS-BORDER CO-OPERATION AND METROPOLITAN REGIONAL INTEGRATION
    7. DISCUSSION AND SUGGESTIONS FOR FUTURE RESEARCH
  18. Chapter 13: Mobile Commerce Use among UK Mobile Users Based on a Proposed Mobile Network Utilization Framework
    1. ABSTRACT
    2. INTRODUCTION
    3. THE RATIONALE FOR A MOBILE TECHNOLOGY FRAMEWORK
    4. CONCEPTUAL MOBILE TECHNOLOGY FRAMEWORK AND HYPOTHESIZED RELATIONSHIPS
    5. DATA ANALYSIS AND FINDINGS
    6. FACTOR ANALYSIS
    7. MOBILE TASKS’ CHARACTERISTICS
    8. REGRESSION ANALYSIS FOR THE NETWORK FIT AND M-COMMERCE UTILIZATION
    9. CONCLUSIONS AND RECOMMENDATIONS
    10. APPENDIX 1
    11. APPENDIX 2
  19. Chapter 14: A Study on the Internet Security and its Implication for E-Commerce in Yemen
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
  20. Chapter 15: Supply Chain Management Practices and Firm Performance
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
  21. Chapter 16: Traditional Job-Related Factors and Career Salience in IT-Based Workplace
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CAREER SALIENCE AND IT CHALLENGE
    4. 3. METHODOLOGY
    5. 4. ANALYSIS AND DISCUSSION
    6. 5. CONCLUSION AND LIMITATION
    7. APPENDIX I: RESEARCH INSTRUMENT
  22. Chapter 17: The Impact of Technology Anxiety on the Use of Mobile Financial Applications
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. RESEARCH MODEL AND HYPOTHESES
    5. HYPOTHESES DEVELOPMENT
    6. RESEARCH METHODOLOGY AND RESULTS
    7. DISCUSSION AND IMPLICATIONS
    8. CONCLUSION
  23. Chapter 18: The Influence of Internet Security on E-Business Competence in Jordan
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
  24. Chapter 19: Human Talent Forecasting using Data Mining Classification Techniques
    1. ABSTRACT
    2. INTRODUCTION
    3. HR DECISION APPLICATION
    4. TALENT MANAGEMENT
    5. DATA MINING IN HRM
    6. CLASSIFICATION IN DATA MINING
    7. TALENT MANAGEMENT USING DATA MINING
    8. CONCLUSION
  25. Chapter 20: Computing Gamma Calculus on Computer Cluster
    1. ABSTRACT
    2. HIGHER-LEVEL PARALLEL COMPUTING - IMPLICIT PARALLELISM
    3. γ-CALCULUS
    4. IMPLEMENTATION IN IBM TUPLE SPACE
    5. IMPLEMENTATION IN OPENCL
    6. IMPLEMENTING THE “ADD” GAMMA ABSTRACTION
    7. CONCLUSION
  26. Chapter 21: Determinants of the Use of Knowledge Sources in the Adoption of Open Source Server Software
    1. ABSTRACT
    2. INTRODUCTION
    3. THEORETICAL BACKGROUND
    4. CONCEPTUAL MODEL
    5. RESEARCH METHOD
    6. EMPIRICAL ANALYSIS
    7. DISCUSSION AND IMPLICATIONS
    8. CONCLUSION
  27. Compilation of References
  28. About the Contributors