You are previewing Strategic Adoption of Technological Innovations.
O'Reilly logo
Strategic Adoption of Technological Innovations

Book Description

Strategic Adoption of Technological Innovations brings together research from practitioners on the development, use, and importance of information technology in order to achieve organizational performance. This comprehensive collection is useful for academicians, scholars, researchers and other industry professionals to provide an understanding of strategy and use of information systems in organizations and entities.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Associate Editors
    2. List of Reviewers
  5. Preface
    1. STRATEGIC APPLICATION OF INFORMATION TECHNOLOGY: A DIVERSITY OF TECHNOLOGIES AND ISSUES
    2. STRATEGIC TECHNOLOGIES AND INNOVATION: CHALLENGES AND DETERMINANTS OF CREATIVITY, JUSTIFICATION, DESIGN, AND ADOPTION
    3. STRATEGIC INFORMATION TECHNOLOGY: A RANGE OF APPLICATIONS AND IMPACTS
    4. STRATEGY AND APPLICATIONS: ADOPTION, USE, AND EFFECTS OF TECHNOLOGICAL INNOVATIONS
    5. CONCLUSIONS ON THE CURRENT AND FUTURE STATE OF STRATEGIC INFORMATION TECHNOLOGY AND APPLICATIONS: WHERE ARE WE AND WHERE ARE WE GOING NEXT?
  6. Chapter 1: Redefining the Information Technology in the 21st Century
    1. ABSTRACT
    2. INTRODUCTION
    3. CHALLENGE OF COMPUTING POWERS
    4. CONCLUSION
  7. Chapter 2: Strategic Market and Customer Driven IS/IT Planning Model
    1. ABSTRACT
    2. INTRODUCTION
    3. IMPLICATIONS AND CONCLUSION
  8. Chapter 3: The Duality of Information Technology Roles
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. METHOD
    5. RESULTS AND DISCUSSION
    6. CONCLUSION
    7. APPENDIX A
  9. Chapter 4: A Systematic Approach to Evaluating Open Source Software
    1. ABSTRACT
    2. INTRODUCTION
    3. PREVIOUS AND RELATED WORK
    4. MODEL DEVELOPMENT
    5. METHODOLOGY
    6. DATA ANALYSIS
    7. RESULTS AND ANALYSIS
    8. DISCUSSION AND IMPLICATIONS
    9. CONCLUSION
  10. Chapter 5: Social Media Intelligence in the Exploration of National Cultural Dimensions for Online Social Communities
    1. ABSTRACT
    2. INTRODUCTION
    3. RESULTS AND DISCUSSION
    4. CONCLUSION
    5. APPENDIX A
  11. Chapter 6: Citizen Journalism
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. METHODOLOGY
    5. FINDINGS AND DISCUSSION
    6. CONCLUSION
  12. Chapter 7: Capability Development of Customers
    1. ABSTRACT
    2. INTRODUCTION
    3. THE CONCEPT OF CAPABILITY APPROACH:
    4. CAPABILITY DEVELOPMENT OF THE CUSTOMER
    5. BUSINESS OPPORTUNITY
    6. DEVELOPMENT
    7. INFORMATION AND COMMUNICATION TECHNOLOGY
    8. E-CHOUPAL
    9. THE SOCIAL IMPACT OF E-CHOUPALS:
    10. SKS MICROFINANCE
    11. GROWTH
    12. TECHNOLOGY
    13. PRINCIPLES
    14. A TATA INITIATIVE
    15. SOFTWARE THAT CRACKS A HARD NUT:
    16. FUNCTIONAL LITERACY:
    17. THE RESULTS
    18. INDIVIDUAL BENEFITS
    19. CONCLUSION
  13. Chapter 8: Critical Analysis of Expansion Strategies of SAP, IBM, Oracle and Microsoft in the area of Business Intelligence
    1. ABSTRACT
    2. INTRODUCTION
    3. RESEARCH METHODOLOGY
    4. MAJOR BI COMPANIES
    5. GROWTH STRATEGIES OF APPLICATION & INFRASTRUCTURE VENDORS IN BI DOMAIN.
    6. SAP
    7. IBM
    8. CUSTOMER REACTIONS TO THE NEW BI PARADIGM
    9. IMPACT OF THE ACQUISITIONS
    10. CONCLUSION
  14. Chapter 9: Representation Type Preferences in Operational Business Process Redesign
    1. ABSTRACT
    2. INTRODUCTION
    3. RESEARCH BACKGROUND
    4. THE CFI MODEL
    5. FORMALIZING THE CFI MODEL
    6. TESTING THE CFI MODEL
    7. RESULTS
    8. DISCUSSION
    9. CONCLUSION
    10. APPENDIX A.
    11. APPENDIX B.
    12. APPENDIX C.
  15. Chapter 10: Studies on Utilizing the Three Famous International Index Systems to Evaluate Scientific Research Level of Higher Learning Institutions
    1. ABSTRACT
    2. BRIEF INTRODUCTION OF SCI, EI AND ISTP
    3. PROBLEMS OF USING THE SCI ETC. TO EVALUATE THE RESEARCH EFFICIENCY OF HIGHER LEARNING INSTITUTIONS
    4. EVALUATION ON EFFICIENCY OF UNIVERSITY BY COMPREHENSIVE FACTOR
    5. DISCUSSION ON “COMPREHENSIVE FACTOR” ANALYSIS METHOD
    6. CONCLUSION
  16. Chapter 11: Creativity Enhancement
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. METHODOLOGY
    5. RESULTS AND DISCUSSION
    6. CONCLUSIONS AND FUTURE RESEARCH
  17. Chapter 12: Information Technology Capability, Knowledge Assets and Firm Innovation
    1. ABSTRACT
    2. INTRODUCTION
    3. IT CAPABILITY AND FIRM INNOVATION
    4. LITERATURE REVIEW
    5. THEORETICAL FRAMEWORK
    6. IMPLICATIONS AND FUTURE RESEARCH
  18. Chapter 13: Finding the Role of Time Lags in Radio Frequency Identification Investment
    1. ABSTRACT
    2. INTRODUCTION
    3. THEORETICAL BACKGROUND
    4. CONCEPTUAL FRAMEWORK
    5. CONCLUSION
  19. Chapter 14: Service Quality Dimensions Within Technology-Based Banking Services
    1. ABSTRACT
    2. INTRODUCTION
    3. NATURE OF SERVICES
    4. SERVICE LANDSCAPE
    5. OPTIMIZATION
    6. THE ROLE OF TECHNOLOGY
    7. SERVICE QUALITY
    8. EXPECTANCY THEORY
    9. EXPECTATION-DISCONFIRMATION THEORY
    10. SERVQUAL SCALE
    11. BANKING TECHNOLOGY-BASED SERVICES
    12. SERVICE QUALITY CONCEPTUALIZATION
    13. SERVQUAL VERSUS SERVPERF
    14. SELF-SERVICE TECHNOLOGIES SERVICE QUALITY MODEL (SSTQUAL)
    15. CONSEQUENCES OF SERVICE QUALITY
    16. CURRENT FINDINGS
    17. CUSTOMERS’ PERCEPTION OF SERVICE QUALITY VERSUS SATISFACTION
    18. BEHAVIORAL INTENTIONS
    19. METHODOLOGY
    20. SURVEY INSTRUMENT
    21. SURVEY DATA ANALYSIS
    22. CONCLUSION
    23. APPENDIX A.
    24. APPENDIX B.
  20. Chapter 15: Impact of Prior Usage Experience on the Intention to Adopt 3G Mobile Service for the Youth in Hong Kong
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. RESEARCH MODEL AND HYPOTHESES
    5. METHODOLOGY AND DATA ANALYSES
    6. DISCUSSION
    7. CONCLUSION
    8. APPENDIX
  21. Chapter 16: Use of Technology in the Household
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. CONCLUSION
  22. Chapter 17: Process and Structural Implications for IT-Enabled Outsourcing
    1. ABSTRACT
    2. INTRODUCTION
    3. THEORY DEVELOPMENT
    4. CASE ILLUSTRATIONS OF OUTSOURCING PROCESSES AND STRUCTURES
    5. DISCUSSION
    6. CONCLUSION
  23. Chapter 18: A Proposed Architecture for Autonomous Mobile Agent Intrusion Prevention and Malware Defense in Heterogeneous Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. WHAT IS AN AUTONOMOUS MOBILE AGENT?
    5. THE PLAYERS
    6. THE INTERFACE AGENT
    7. THE SYSTEM CONFIGURATION AGENT
    8. THE ANALYSIS AGENT
    9. THE POLICY ENFORCEMENT AGENT
    10. THE TACTICS AGENT
    11. THE KILL AGENT
    12. SYSTEM ARCHITECTURE
    13. THE AGENT SERVER
    14. THE CLIENT HOST
    15. AGENT MOBILITY AND TRANSPORT
    16. AGENT COMMUNICATION
    17. SECURING THE MOBILE AGENT FROM COMPROMISE PROTECTION
    18. NON-REPUDIATION
    19. TRUST
    20. SUMMARY
  24. Chapter 19: A Nearly One-to-One Method to Convert Analog Signals into a Small Volume of Data
    1. ABSTRACT
    2. INTRODUCTION
    3. BLACK AND WHITE STILL PICTURES
    4. CONCLUSION
    5. COLOR STILL PICTURES
    6. CONCLUSION
    7. CONCLUSION
    8. CONCLUSION
    9. CONCLUSION
  25. Compilation of References
  26. About the Contributors