Scielo RSS <![CDATA[JISTEM - Journal of Information Systems and Technology Management]]> vol. 12 num. 2 lang. en <![CDATA[SciELO Logo]]> <![CDATA[UNDERSTANDING SOCIAL MEDIA MINDSET OF CONSUMERS: AN INDIAN PERSPECTIVE]]> ABSTRACTSocial media play increasingly important roles as a marketing platform. In today's world, more and more retailers’ use social media to target teenagers and young adults as a result importance of bringing social networking sites (SNSs) as a part of daily life transactions cannot be underplayed. In the present paper the emphasis is upon the analyses of the social media mindset of consumers in India, and examining the impact of various variables of extended TAM in order to explain the variables that influence level of acceptance of SNS by Indian consumers. Results indicated positive and significant effects of perceived usefulness while perceived risk influenced negatively. Further, perceived ease of use and personal fit with brands both found to have a positive effect on marketing through SNS but were not significant. The results of present study in India pointed out that establishing personal fit with consumers and providing user-friendly web sites, and reducing the perceived risk has impact on developing positive attitudes. <![CDATA[ORGANIZATIONAL CONSEQUENCES OF THE ADOPTION OF MOBILE ERP SYSTEMS: CASE STUDIES IN BRAZIL]]> ABSTRACTThe use of ERP systems via mobile/wireless devices is a subject rarely studied in academic research. The aim of this paper is to explore the following research question: what are the consequences of mobile ERP use for organizations? The research method adopted was the multiple case studies in three companies located in the South of Brazil. The research results show that, in the analyzed companies, the use of mobile ERP had “positive” consequences such as increases in productivity, efficiency and effectiveness, and improvements for the users´ quality of life. However, the use also had “negative” consequences such as increased surveillance and control over employees. <![CDATA[DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY]]> ABSTRACTWith increased use of technology in organizations and rapid changes in technology cyber forensic process is also advancing into new ways. In this context, organizations also need to align their technological infrastructure to meet the challenges in conducting successful process of forensic investigations to attain maximum and desired benefits of it. The objective of this article is to perceive the status of different I.T comprising organizations in terms of cyber crime and forensic investigation process and we take Pakistan as a case here. For this purpose, a questionnaire was designed to survey different organizations to find out that how effectively they have secured their technology infrastructure and how supportive this setup could be for any forensic firm to perform the forensic investigation in case of occurrence of any cyber crime. In the critical analysis, the main finding reckoned as flaw found in these organizations was that they don't pay much importance to forensic investigation and because of this they don't incorporate forensic supportive tools such as employees’ awareness training programs, clauses in hiring documents and acquiring the services of forensic firms as per requirement. This ignorance may lead organizations towards different types of losses in case of occurrence of cyber crime and if this situation is not addressed, forensic investigation process also could not be as accurate and successful as it has to be. <![CDATA[A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS]]> ABSTRACTWe build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm's vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker's attack and information sharing are strategic complements while one hacker's attack and the other hacker's information sharing are strategic substitutes. As the firm's unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm's defense and profit decrease, and the hackers’ information sharing and profit increase. The firm's profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and, moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm's investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm's investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm's asset causes all the variables to increase linearly, except information sharing which is constant. We extend our analysis to endogenize the firm's asset and this analysis largely confirms the preceding analysis with a fixed asset. We use the software Mathematica 10.1 ( to program the model mathematically with equilibrium constraints, and perform numerical analysis illustrated graphically. <![CDATA[ASSIMILATION PATTERNS IN THE USE OF ADVANCED MANUFACTURING TECHNOLOGIES IN SMES: EXPLORING THEIR EFFECTS ON PRODUCT INNOVATION PERFORMANCE]]> ABSTRACTManufacturing small and medium-sized enterprises (SMEs) are more and more adopting advanced manufacturing technologies (AMT) aimed at fostering product innovation process, improving product quality, streamlining the production process, and gaining productivity. In this study, we analyze the relationship between AMT proficiency levels in manufacturing SMEs and product innovation performance. Using data from 616 manufacturing SMEs, and considering a wide range of various AMT (20 different types of AMT grouped into 5 categories), we derived three AMT assimilation patterns through a cluster analysis procedure combining hierarchical and non-hierarchical clustering algorithms. The analysis of the relationship between AMT assimilation patterns and product innovation performance shows a rather unexpected picture: in spite of the existence of clearly distinct patterns of AMT assimilation, we find no significant relationship between any pattern and product innovation performance. Instead, we find the organizational and environmental context of SMEs to be more determinant for product innovation performance than any of the AMT assimilation patterns. From a practical point of view, this study indicates that manufacturing SMEs managers interested in fostering their innovation capabilities through AMT assimilation need to be aware of the contingency effects of their organizational size, age, and sector of activity. <![CDATA[ADOPTION OF INFORMATION SECURITY MEASURES IN PUBLIC RESEARCH INSTITUTES]]> ABSTRACTThere are several Information Security measures recommended by international standards and literature, but the adoption by the organizations should be designated by specific needs identified by Information Security Governance structure of each organization, although it may be influenced by forces of the institutional environment in which organizations are inserted. In public research institutes, measures may be adopted as a result of pressure from Government and other agencies that regulate their activities, or by the influence of Information Security professionals, or simply adopting the same measures of leading organizations in the organizational field. This study aimed to investigate whether in public research institutes the adoption of Information Security measures is influenced by organizational factors relating to Information Security Governance, and by external factors relating to its institutional environment. The results show that these organizations are subject to institutional influences more than organizational influences.<hr/>RESUMOAs organizações dispõem de uma série de medidas de Segurança da Informação recomendadas por normas internacionais e pela literatura, mas a adoção deve ser balizada pelas necessidades específicas identificadas pela Governança da Segurança da Informação de cada organização, embora possa ser influenciada por pressões do ambiente institucional em que as organizações estão inseridas. Em institutos de pesquisa públicos, as medidas podem ser adotadas como resultado de pressões exercidas pelo Governo e outros órgãos que regulam suas atividades, ou por influência de profissionais de Segurança da Informação, ou simplesmente por serem adotadas por outras organizações de destaque nesse campo. Este trabalho teve o objetivo de investigar se nos institutos de pesquisa públicos a adoção de medidas de Segurança da Informação é influenciada por fatores organizacionais, relativos à Governança da Segurança da Informação, e por fatores externos, relativos ao ambiente institucional em que estão inseridos. Os resultados mostram que essas organizações estão mais sujeitas à influência de fatores institucionais do que de fatores organizacionais. <![CDATA[ORGANIZATIONAL IMPACTS OF THE ELECTRONIC PROCESSING SYSTEM OF THE BRAZILIAN SUPERIOR COURT OF JUSTICE]]> ABSTRACTThis paper presents a study on the social and organizational impacts of the Electronic Processing System (EPS) implemented in 2008 by the Brazilian Superior Court of Justice (SCJ). This system is part of a wider transformation process involving the implementation of a new management model at the SCJ. The theoretical framework of the research conducted is based on the Technology Enactment Theory and other studies on the role of technological innovations in public organizations (Fountain, 2005; Freitas, 2012). Its main goal was to identify the most significant factors facilitating or inhibiting the innovation adoption. Results show different impacts of the EPS on professional groups and organizations. Political, cultural and economic aspects influence stakeholders’ perceptions of the innovation, including its sustainability, time and cost saving that impact the rate of adoption and the realization of benefits both to users and the organization investing in its development. <![CDATA[USE OF VIRTUAL LEARNING ENVIRONMENTS: A THEORETICAL MODEL USING DECOMPOSED EXPECTANCY DISCONFIRMATION THEORY]]> ABSTRACTThe present study aims to investigate the determinants of satisfaction and the resulting continuance intention in the e-learning context. The constructs of decomposed expectancy disconfirmation theory (DEDT) are evaluated from the perspective of users of a virtual learning environment (VLE) in relation to expectations and perceived performance. An online survey collected responses from 197 students of a public management distance learning course. Structural equation modeling was operationalized by the method of partial least squares in Smart PLS software. The results showed that there is a relationship between quality, usability, value and value disconfirmation with satisfaction. Likewise, satisfaction proved to be decisive for continuance intention. However, there were no significant relationships between quality disconfirmation and usability disconfirmation with satisfaction. Based on the results, it is discussed the theoretical and practical implications of the structural model found by the research. <![CDATA[ICT STRATEGIC PLANNING AT PUBLIC HIGHER EDUCATIONAL ORGANIZATIONS: BUILDING AN APPROACH THROUGH ACTION RESEARCH AT UNIRIO]]> ABSTRACTThis paper's main contribution is the description of the process and experience in developing Information and Communication Technology strategic planning at a Brazilian public higher education institution. Action research was used as the scientific method and each of its research steps are presented. It also presents the instruments that were built for assessing organizational needs, the institutional diagnosis form, the required adaptations in the SISP ICT strategic planning model, as well as the reflections about the ICT strategic development process for this particular organizational context. The results evidence the feasibility of use and adaptability of the SISP ICT strategic planning model, enabling the effective ICT strategic development in similar contexts.<hr/>RESUMOEste artigo apresenta como principal contribuição a descrição do processo e experiência de formulação de planejamento estratégico de Tecnologia da Informação e Comunicação (PDTIC) em uma Instituição Federal de Ensino Superior (IFES). A Pesquisa-Ação foi o método científico utilizado e as etapas do desenvolvimento da pesquisa são narradas. São apresentados os instrumentos construídos para levantamento das necessidades organizacionais, o formulário para diagnóstico institucional, as adaptações indicadas para o modelo de planejamento estratégico do SISP requerido pelos órgãos de gestão, assim como as reflexões sobre o processo de elaboração do PDTIC neste contexto. O planejamento estratégico de ICT resultante deste trabalho demonstra a viabilidade de utilização e adaptação do modelo de planejamento estratégico do SISP, permitindo a efetiva construção do planejamento estratégico de ICT em contextos similares. <![CDATA[IT OUTSOURCING MANAGEMENT: THE STATE OF THE ART RECOGNITION BY A CONSTRUCTIVIST RESEARCH PROCESS AND BIBLIOMETRICS]]> ABSTRACTThis paper underlines the task characteristics of the emergency management life cycle. Moreover, the characteristics of three ubiquitous technologies including RFID, handheld computers and GIS are discussed and further used as a criterion to evaluate their potential for emergency management tasks. Built on a rather loose interpretation of Task-technology Fit model, a conceptual model presented in this paper advocates that a technology that offers better features for task characteristics is more likely to be adopted in emergency management. Empirical findings presented in this paper reveal the significance of task characteristics and their role in evaluating the suitability of three ubiquitous technologies before their actual adoption in emergency management.<hr/>RESUMOEste trabalho tem como objetivo identificar e conhecer os mais relevantes artigos e seus parâmetros sobre o tema Gestão da Terceirização de Tecnologia da Informação por meio de um processo construtivista – Knowledge Development Process – Constructivist (ProKnow-C). Foram selecionados 23 artigos, compondo o Portfólio Bibliográfico (PB). A partir do PB evidenciou-se que: i) o periódico mais presente foi o The Journal of Strategic Information Systems; ii) o artigo mais citado foi Poppo, L. &amp; Zenger, T. (2002); iii) o autor mais presente no PB foi o J. Goo; iv) os autores mais citados em geral foram L. P. Willcocks e M. C. Lacity; v) a palavra-chave mais presente no portfólio foi “Outsourcing”. <![CDATA[MULTI-CRITERIA PROJECT PRIORITIZATION IN A PROFESSIONAL MASTER'S PROGRAM]]> ABSTRACTResults of assessments bring changes to the organizational behavior and management of Higher Learning Institutions (HLI) and may or may not alter their institutional structure. Assessments have enabled HLI to rethink and redesign processes. As a result, institutions are becoming increasingly similar to each other, which is a phenomenon called coercive isomorphism. To propose a distinctive and positive element in the decision-making process, this study examined empirically how the AHP method (Analytic Hierarchic Process) can contribute to project prioritization in the Professional Master's Program in Business – Project Management of the University Nove de Julho (UNINOVE). This research was developed based on a case study from a theoretical-conceptual structure. This structure comprised the basis to develop and implement a structured questionnaire to build the multi-criteria hierarchical structure of the AHP method and obtain project prioritization and requirements of the assessment system developed by CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior, a government agency linked to the Brazilian Ministry of Education in charge of promoting high standards for post-graduate courses in Brazil). The results suggest that this approach can assist the coordinating committee of the Professional Master's Program of UNINOVE to prioritize projects and contribute to its performance improvement in the CAPES assessment system.<hr/>RESUMOAs pressões oriundas das avaliações podem gerar mudanças nos comportamentos organizacionais e na gestão das Instituições de Ensino Superior (IES), podendo ou não alterar a arquitetura institucional. As avaliações têm possibilitado que as IES se conheçam melhor, repensem e redesenhem seus processos. Como resultado, percebe-se que as instituições estão cada vez mais semelhantes entre si, fenômeno esse denominado isomorfismo coercitivo. Com a finalidade de propor um diferencial na tomada de decisão, este estudo analisou, empiricamente, como o método AHP (Analytic Hierarchic Process) pode contribuir para a priorização de projetos no Programa de Mestrado Profissional em Administração – Gestão de Projetos da Universidade Nove de Julho. Esta pesquisa desenvolveu-se por meio de um estudo de caso, a partir de uma estrutura teórico-conceitual, que serviu de base para a elaboração e aplicação do questionário estruturado, a fim de construir a estrutura hierárquica multicritério do método AHP e obter como resultado a priorização dos projetos e dos quesitos do sistema de Avaliação da CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível Superior). Os resultados sugerem que esta metodologia pode auxiliar o coordenador de programas de mestrado profissional, na priorização de seus projetos, e que, dessa forma, contribuiriam para a melhoria do desempenho no sistema de avaliação da CAPES. <![CDATA[USABILITY AND USE REFERENCE IN THE SOCIAL NETWORK FACEBOOK: A NETNOGRAPHIC ANALYSIS OF TECHNOLOGICAL USERS]]> RESUMOEste artigo apresenta um estudo sobre a preferência de uso das redes sociais virtuais, utilizando o Facebook como objeto de estudo, e visando identificar os fatores motivacionais para a usabilidade dessa plataforma tecnológica. A rede social Facebook foi escolhida por apresentar um cenário tecnológico de alta sociabilidade e interação virtual. Como metodologia foi utilizada a netnografia, sendo feita através da coleta das discussões em sites de notícias e fóruns de discussão norte-americanos, onde existe uma ampla participação crítica dos usuários na internet sobre os ganhos e frustrações no dado contexto. A análise de conteúdo foi realizada confrontando as categorias de usuários encontradas com a literatura sobre valores que motivam o consumo tecnológico, descrevendo os valores hedônicos, sociais, utilitários e as percepções de risco nesse consumo, quando relacionado à falta de privacidade. Os resultados demonstram 2 grupos principais de usuários dessa tecnologia e 7 subgrupos. Logo, a contribuição do estudo. A contribuição do estudo é que a formação desses grupos tecnológicos pode refletir a usabilidade de outros grupos de usuários espalhados pelo mundo. O estudo também traz para a discussão problemáticas referentes aos comportamentos dos usuários das redes virtuais que pode ser útil para as empresas e suas relações com consumidores e também no desenvolvimento de novos conhecimentos a partir dessas críticas e demandas que os consumidores digitais expõem sobre as tecnologias<hr/>ABSTRACTThis article presents a study about the preference of use in virtual social networks, using Facebook as object of study, to identify the motivational factors for the usability of this technology platform. The social network Facebook has been chosen to present a technological scenario of high sociability and virtual interaction. The methodology used was the netnography, being made through the collection of discussions in North American sites of news and forums online, where there is a large critical user participation on the internet, about the gains and frustrations in this context. The content analysis was performed comparing the categories of users found in the literature about values that motivate consumer technology, describing the hedonic, social, utilitarian values and perceptions of risk in consumption when related to lack of privacy. The results show two main groups of users of this technology and 7 subgroups. Therefore, the contribution of the study is that the formation of these groups may reflect technological usability of user groups around the world. The study also brings to the discussion issues related to the behaviors of the users of virtual networks which can be useful for businesses and their relationships with consumers and also the development of new knowledge from such criticism and demands that digital consumers expose about the technologies.