Scielo RSS <![CDATA[JISTEM - Journal of Information Systems and Technology Management]]> vol. 14 num. 3 lang. pt <![CDATA[SciELO Logo]]> <![CDATA[ON THE ROLE OF SWITCHING COSTS AND DECISION REVERSIBILITY IN INFORMATION TECHNOLOGY ADOPTION AND INVESTMENT]]> ABSTRACT Managerial decisions on the adoption of innovative technologies by a firm are made under conditions of uncertainty and must account for network externalities that imply the benefit of a technology is received not only from its intrinsic payoff, but also from the size of the network of other adopters. The theoretical model presented in this study demonstrates that for firms evaluating information technology investment with network effects key determinants of the technology selection pattern are adoption reversibility and switching costs. If switching costs are sufficiently high to make technology adoption irreversible then safer established technologies have an advantage as choosing a riskier untested technology opens the firm to the risk of being stranded without a network of followers. With lower switching costs, the technology adoption decision is reversible which provides an advantage to riskier untested technologies. A discussion of empirical evidence on adoption patterns in information technology provides application for the theoretical model. <![CDATA[TRANSFER LEARNING FOR RESOLVING SPARSITY PROBLEM IN RECOMMENDER SYSTEMS: HUMAN VALUES APPROACH]]> ABSTRACT With the rapid rise in popularity of ecommerce application, Recommender Systems are being widely used by them to predict the response that a user will give to a given item. This prediction helps in cross selling, upselling and to increase the loyalty of their customers. However due to lack of sufficient feedback data these systems suffer from sparsity problem which leads to decline in their prediction efficiency. In this work, we have proposed and empirically demonstrated how the Transfer Learning approach using five dimensions of basic human values can be successfully used to alleviate the sparsity problem and increase the efficiency of recommender system algorithms. <![CDATA[THE ADVANCED ANALYTICS JUMPSTART: DEFINITION, PROCESS MODEL, BEST PRACTICES]]> ABSTRACT Companies are encouraged by the big data trend to experiment with advanced analytics and many turn to specialist consultancies to help them get started where they lack the necessary competences. We investigate the program of one such consultancy, Advectas - in particular the advanced analytics Jumpstart. Using qualitative techniques including semi structured interviews and content analysis we investigate the nature and value of the Jumpstart concept through five cases in different companies. We provide a definition, a process model and a set of thirteen best practices derived from these experiences, and discuss the distinctive qualities of this approach. <![CDATA[INTEGRATING INTERNAL CONTROL FRAMEWORKS FOR EFFECTIVE CORPORATE INFORMATION TECHNOLOGY GOVERNANCE]]> Abstract This paper analyzes and proposes how several internal control frameworks can be integrated to achieve effective corporate information technology governance. The fundamental tenet of the current literature in this area is that neither a single framework nor non-integrated multiple frameworks would suffice in achieving effective information technology security and governance. Using the extant literature, a deductive approach, and focusing on three popularized internal control frameworks ERM, COSO, and COBIT5, we propose a framework that can help organizations effectively and efficiently achieve information technology governance through their interaction. An integrated framework is one that links the key control objectives to strategic business objectives and, in doing so, addresses IT governance principles at both a strategic and operational level, whilst aligning IT and business management understanding of the key risk areas that characterize the organization’s goals (Goosen and Rudman, 2013). In addition, this fundamental alignment is expected to eliminate unnecessary controls and processes which in turn help improving IT governance. We expect firms seeking to adopt the proper IT governance to utilize the proposed integrated framework. <![CDATA[INFORMATION TOKEN DRIVEN MACHINE LEARNING FOR ELECTRONIC MARKETS: PERFORMANCE EFFECTS IN BEHAVIORAL FINANCIAL BIG DATA ANALYTICS]]> ABSTRACT Conjunct with the universal acceleration in information growth, financial services have been immersed in an evolution of information dynamics. It is not just the dramatic increase in volumes of data, but the speed, the complexity and the unpredictability of ‘big-data’ phenomena that have compounded the challenges faced by researchers and practitioners in financial services. Math, statistics and technology have been leveraged creatively to create analytical solutions. Given the many unique characteristics of financial bid data (FBD) it is necessary to gain insights into strategies and models that can be used to create FBD specific solutions. Behavioral finance data, a subset of FBD, is seeing exponential growth and this presents an unprecedented opportunity to study behavioral finance employing big data analytics methodologies. The present study maps machine learning (ML) techniques and behavioral finance categories to explore the potential for using ML techniques to address behavioral aspects in FBD. The ontological feasibility of such an approach is presented and the primary purpose of this study is propositioned: ML based behavioral models can effectively estimate performance in FBD. A simple machine learning algorithm is successfully employed to study behavioral performance in an artificial stock market to validate the propositions. <![CDATA[CYBER SECURITY GOVERNANCE AND MANAGEMENT FOR SMART GRIDS IN BRAZILIAN ENERGY UTILITIES]]> ABSTRACT The event of cyber security in critical infrastructures has aroused the interest and the worry of energy utilities, government, regulatory agencies, and consumers as well as of the academic and research institutions. If on one hand it is prominent the vulnerability of the cyberspace, which augments the risk of attacks in the organizational environment, on the other hand, the research leading to alternatives for the governance and management of these critical structures are still too incipient. This study aims at building a theoretical-empirical model of cyber security governance and management and testing it along with academic experts and professionals from the energy sector. By using the Delphi method and statistics techniques for validation, an assessment instrument was developed based on both the constructs: governance and management; and nine dimensions with their respective variables that allowed for an analysis of the situation of the Brazilian energy utilities regarding the protection of their cyberspaces. The contribution of the article reaches two fronts: a conceptual and empirical one as it expands and systematizes the knowledge about aspects of the governance and management of cyberspaces; and a methodological one as it proposes measuring those dimensions in energy utilities. <![CDATA[EXPLORING THE INFLUENCE OF EXECUTIVE MANAGEMENT DIVERSITY ON IT GOVERNANCE]]> ABSTRACT As all organizations are attaching more strategic importance to information technology (IT), IT governance has gained researchers’ interest. In fact, a large body of literature focuses on firm-specific or executive management attributes such as leadership as determinants of IT governance. However, it is still relevant to identify other factors influencing IT governance. Since executive management demographics and demographic diversity have an impact on strategic decisions, we explore the influence of executive management diversity on IT governance. Results suggest that IT governance for a high educational-high tenure diversity profile differs significantly from that for a low industry-moderate tenure diversity profile and a high industry-low tenure diversity profile. Furthermore, IT governance structures differ according to executive management diversity profile more than IT governance processes and relational mechanisms. <![CDATA[ABSOLUTE POVERTY AND THE DESIRE TO EMANCIPATE COMMUNITIES DRIVING MOBILE COMMUNICATION FOR DEVELOPMENT (M4D) IN AFRICA]]> ABSTRACT In its opening remarks, The Economist declares emphatically that “Paying for a taxi ride using your mobile phone is easier in Nairobi than it is in New York”. There is no denying that Information and Communication Technology for Development (ICT4D) and its subset, Mobile Communication for Development (M4D) have contributed to developments in many societies. This is particularly more dominant and prevalent in developing countries than in the developed nations. This paper reviews reasons why ICT4D/M4D is viewed as more suitable for developing nations than for developed countries despite their technological advancements and higher mobile technology penetration. The conclusion from this review suggests that, absolute poverty and the desire to emancipate communities in developing countries are the driving force for innovation in ICT4D/M4D. <![CDATA[INTERNET OF THINGS-BASED PRODUCTS/SERVICES: PROCESS AND CHALLENGES ON DEVELOPING THE BUSINESS MODELS]]> ABSTRACT Many companies nowadays are struggling to understand the unprecedented complexity of developing business models for products and services based on the Internet of Things (IoT). This article aims at investigating what are the elements to be taken into account in order to create a business model for IoT-based products/services and what are the main challenges faced in this process. To address these questions, we review the literature on the creation of business models for the IoT and we analyze data from an action research involving the generation of a business model for an IoT-based product - a smart door lock - in a small company. We explore how this process occurred and the challenges faced. <![CDATA[MODELOS DE AUDITORÍA CONTINUA: UNA PROPUESTA TAXONÓMICA]]> RESUMEN La Auditoría Continua es considerada por diversos autores como un nuevo paradigma de la Auditoría, y su materialización se logra a través de la incorporación de modelos y metodologías en la actividad diaria de la función Auditora. Este artículo, previa conceptualización de las principales características de la Auditoría Continua, presenta una propuesta taxonómica de los modelos de Auditoría Continua, para lo cual se realizará un análisis estructural de 30 modelos que han sido divulgados en el ámbito profesional y científico entre 1989 y 2014, arrojando como resultado una propuesta taxonómica basada en 3 categorías y 8 tipologías y un análisis de la orientación que han tenido los modelos de Auditoría Continua.