2013
DOI: 10.4018/joeuc.2013100103
|View full text |Cite
|
Sign up to set email alerts
|

Information Technology Management Practice

Abstract: The purpose of this research is to put forth a model that examines the impact of information technology (IT) related management practices upon IT effectiveness. Given the nature and use of these practices as a management activity, control theory is used as a framework to determine if IT management practices serving as controls can achieve positive outcomes. A portion of the Control Objectives for IT (COBIT) framework is used as a proxy for management practices due to the ability to ground the COBIT practices i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 49 publications
0
8
0
1
Order By: Relevance
“…The automatic management of human resources (HR) in organizations gains objective strategic weight, and the importance of harmonized actions of HRM and elaborated business strategies is well known [5]. Many experts predict that appropriate software will become a central tool for all HR professionals [6].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The automatic management of human resources (HR) in organizations gains objective strategic weight, and the importance of harmonized actions of HRM and elaborated business strategies is well known [5]. Many experts predict that appropriate software will become a central tool for all HR professionals [6].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this paper, these factors are called CFEI. In order to detect the CFEI of IT-enabled ISO-9000 QMS, one should identify the attributes which not only help in their implementation but also show the true purpose behind their implementation, since it has widely been supported in literature that these attributes are critical to their overall success and contribution to performance improvement (Kawakami et al , 2014; Phillips, 2013).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…It also ensures that the information will be available even after the expert is no longer available with the firm. Furthermore, IT not only influences the employee’s understanding regarding the central concept behind ISO-9000 guidelines but also enhances the understanding of data analysis and techniques of process control (Carter et al , 2012; Phillips, 2013).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…The growth in IT security spending is paralleled with the increasing importance of information security as the result of organisational decision-making and topics such as board of directors' role (Curry, 2017), information security culture (Beaver, 2015), and top management support (Bailey, Kaplan, & Rezek, 2014) are increasingly more debated in practitioners' literature. Despite the acknowledged role of security and privacy in information systems studies (Lowry, Dinev, & Willison, 2017), academic research falls behind, and topics such as managerial approach to information security (Phillips, 2013;Siponen, Adam Mahmood, & Pahnila, 2014;Soomro, Shah, & Ahmed, 2016), information security awareness (Parsons et al, 2017;Siponen et al, 2014), and the role of human factors (Jaeger, 2013;Vance, Lowry, & Eggett, 2013;Yeniman Yildirim, Akalp, Aytac, & Bayram, 2011) have only recently become subjects of scholarly investigation. Overall, in the literature, to complement the traditional, technical approach to information security, calls for further research on its organisational and managerial components have been multiplying (Parsons et al, 2017;Parsons, McCormac, Butavicius, Pattinson, & Jerram, 2014;Phillips, 2013;Siponen et al, 2014;Soomro et al, 2016).…”
Section: Introductionmentioning
confidence: 99%