Hilfe Warenkorb Konto Anmelden
 
 
   Schnellsuche   
     zur Expertensuche                      
Networked Information Technologies
  Großes Bild
 
Networked Information Technologies
von: Jan Damsgaard, Helle Zinner Henriksen (Eds.)
Kluwer Academic Publishers, 2004
ISBN: 9781402078620
231 Seiten, Download: 3748 KB
 
Format:  PDF
geeignet für: Apple iPad, Android Tablet PC's Online-Lesen PC, MAC, Laptop

Typ: A (einfacher Zugriff)

 

 
eBook anfordern
Inhaltsverzeichnis

  Contents 5  
  Editors’ preface 7  
  Chapter 1 The Socio-political Construction of CareSys 13  
     1. INTRODUCTION 13  
     2. THEORETICAL BACKGROUND 14  
     3. RESEARCH METHOD 15  
     4. CARESYS – A SYSTEM FOR THE ADMINISTRATION OF ELDERLY CARE 16  
     5. AN ANALYTICAL FRAMEWORK FOR ACTOR SENSITIVE EVALUATION 17  
        5.1 From Idea to IT system 17  
        5.2 Intended and Experienced Effects 18  
        5.3 ‘The Due Process Model’ 19  
     6. HOW TO CARRY OUT AN ACTOR SENSITIVE EVALUATION 21  
     7. ANALYSIS OF THE COMPUTERIZATION PROCESS OF CARESYS 21  
        7.1 The Politicians 22  
           7.1.1 Realized Effects 24  
           7.1.2 Unrealized Effects 24  
           7.1.3 Experienced Side Effects 24  
        7.2 The Home-Help Assistants 24  
           7.2.1 Realized Effects 25  
           7.2.2 Unrealized Effects 25  
           7.2.3 Side Effects 25  
        7.3 The Establishment of CareSys as Negotiation 25  
     8. SUMMARY 27  
     9. CONCLUSION 27  
     ACKNOWLEDGMENTS 28  
     REFERENCES 28  
  Chapter 2 Information and Communication Technologies Diffusion in Industrial Districts 31  
     INTRODUCTION 1. 32  
     THE INTERPRETIVE PROCESS APPROACH TO INNOVATION DIFFUSION 2. 33  
     THE SOCIAL PROCESS OF THE INNOVATION 3. 34  
     THE SOCIAL CONTEXT OF THE INNOVATION 4. 37  
     THE CONTENT OF THE INNOVATION 5. 39  
     DISCUSSION AND CONCLUSION 6. 42  
     REFERENCES 47  
  Chapter 3 Where is the Innovation? 51  
     1. INTRODUCTION 51  
     2. RESEARCH SETTING AND METHODOLOGY 53  
        2.1 Data Collection and Analysis 54  
     3. THE ADOPTION OF QUICKPLACE IN SUMMA 55  
        3.1 The Successful Diffusion 56  
        3.2 The Not so Successful Adoption 58  
     4.DISCUSSION 59  
        4.1 A Strategy for the Diffusion of Virtual Workspaces 61  
     5. CONCLUDING REMARKS 62  
     ACKNOWLEDGEMENTS 63  
     REFERENCES 63  
  Chapter 4 Co-ordination of E-government 65  
     1. INTRODUCTION 65  
     2. THEORETICAL BACKGROUND 66  
     3. LOSS OF CONTROL 70  
     4. WHAT IS E-GOVERNMENT? 73  
     5. MANAGING E-GOVERNMENT 75  
        5.1 Managing Risk 75  
        5.2 Nature of Management Involvement 76  
        5.3 E- government as Infrastructure 78  
     6. CO-ORDINATING E-GOVERNMENT 78  
        6.1 Setting Ambitions Right 78  
        6.2 Dimensions of IT Co- ordination 80  
        6.3 Practical Mechanisms for Co- ordination 82  
        6.4 Discussion 84  
     7. CONCLUSIONS 86  
     ACKNOWLEDGEMENTS 87  
     REFERENCES 87  
  Chapter 5 Translations in Network Configurations 91  
     1. INTRODUCTION 91  
     2. METHOD 93  
     3. THE CASE 94  
     4. THEORY 94  
     5. THE IMPLEMENTATION PROCESS 96  
        5.1 Pilot Implementation 97  
        5.2 Integrating into existing infrastructure 98  
        5.3 Management of the change process 99  
     6. UNFOLDING CONFIGURATIONS 100  
        6.1 The Partial Network 100  
        6.2 The Extended Network 101  
     7. DISCUSSION AND CONCLUDING REMARKS 102  
     ACKNOWLEDGEMENTS 104  
     REFERENCES 104  
  Chapter 6 MIS and the Dynamics of Legitimacy in Health Care 107  
     1. INTRODUCTION 107  
     2. THEORETICAL FRAMEWORK 108  
     3. RESEARCH METHOD – COLLECTION OF DATA 111  
     4. THE FIELD STUDY 111  
     5. THE EXPLORATIVE PHASE (1987-1992) 112  
     6. THE TIGHT SPOT PHASE (1992-1997) 116  
     7. THE CONSOLIDATION PHASE 119  
     8. DISCUSSION: THE DYNAMICS OF LEGITIMACY 120  
        8.1 Ongoing Failure as an Acting Legitimate Force 120  
        8.2 The Ambiguity of Participation 122  
     9. CONCLUDING REMARK 123  
     REFERENCES 125  
  Chapter 7 Role Model for the Organisational IT Diffusion Process 127  
     1. INTRODUCTION 127  
     2. ACTION RESEARCH PROCESS IN SCANDI 128  
        2.1 First Round of Diagnosis, Action and Learning 129  
        2.2 Second Round of Diagnosis, Action and Learning 132  
        2.3 Third and Final Round 133  
        2.4 Validity of this Action Research Study 134  
     3. THE ROLE MODEL DESCRIBED 134  
        3.1 How the Role Model can be Used? 135  
     4. USING THE ROLE MODEL AND IDENTIFYING DIFFUSION RISKS 136  
        4.1 The Owner 136  
           4.1.1 The Risk of Not Having the Role as Owner Filled 137  
           4.1.2 Situation 1: User Group has Taken the Initiative 137  
           4.1.3 Situation 2: The Project Initiated Below 138  
        4.2 The Diffusion Project Manager 138  
           4.2.1 The Risk of Not Having the Role as Diffusion Project Manager Filled? 138  
        4.3 The Champion 139  
           4.3.1 What if the Role as Champion is not Occupied? 139  
        4.4 The Target User Group 140  
     5. SUMMARY AND CONCLUSION 140  
     REFERENCES 141  
  Chapter 8 Should Buyers Try to Shape IT-markets through Non-market (Collective) Action? 143  
     1. INTRODUCTION 143  
     2. THE ESTABLISHED INTERPRETATION OF NETWORK EFFECTS 145  
     3. WEAKNESSES OF THE ESTABLISHED INTERPRETATION OF NETWORK EFFECTS 147  
     4. A TRANSACTION COST THEORETIC INTERPRETATION OF NETWORK EFFECTS 149  
        4.1 The meaning of “ new technology” 150  
        4.2 Two types of transaction costs 151  
        4.3 Degree of standardization and modularization 152  
        4.4 Outlines of the model 153  
     5. HOW BUYERS CAN INFLUENCE PRODUCT DECISIONS OF VENDORS 156  
     6. CONCLUSIONS 160  
     REFERENCES 162  
  Chapter 9 Exploring Application Service Provision 165  
     1. INTRODUCTION 165  
     2. THE CONCEPT OF APPLICATION SERVICE PROVISION 167  
     3. REASONS FOR ADOPTING OR IGNORING THE ASP CONCEPT IN SMEs 168  
     4. THREE ASPS AND THREE RELATED CUSTOMERS 170  
        4.1 The Horizontal ASP 171  
        4.2 The Vertical ASP 171  
        4.3 The Enterprise ASP 172  
        4.4 Manufacturing Company A 173  
        4.5 The Travel Agency 173  
        4.6 Manufacturing Company B 174  
     5. FINDINGS OF THE STUDY 174  
     6. CONCLUSIONS 176  
     REFERENCE 177  
  Chapter 10 A Framework for the Investigation of the Institutional Layer of IT Diffusion 179  
     1. INTRODUCTION 179  
     2. DIFFUSION OF IT INNOVATION 180  
     3. DIFFUSION OF ELECTRONIC COMMERCE AS TECHNOLOGY INNOVATION 182  
     4. THE STAKEHOLDER CONCEPT 184  
     5. STAKEHOLDERS IN INNOVATION DIFFUSION 185  
     A FRAMEWORK FOR THE INVESTIGATION OF ELECTRONIC COMMERCE DIFFUSION 6. 186  
     7. SUMMARY- POSSIBLE APPLICATIONS OF THE PROPOSED FRAMEWORK 187  
     REFERENCES 188  
  Chapter 11 Taking Organizational Implementation Seriously: The Case of IOS Implementation 193  
     1. INTRODUCTION 193  
     2. WAYS OF LOOKING AT INFORMATION SYSTEMS IMPLEMENTATION 195  
        2.1 When is Implementation? 195  
        2.2 Why is Implementation Problematic? 197  
     3. IMPLEMENTATION OF INFORMATION SYSTEMS 199  
        3.1 Large Organizations – Learning Comes First 200  
        3.2 Small Companies 202  
     4. IMPLEMENTATION EXPERIENCES FROM THE CASE ORGANIZATION 204  
     5. CONCLUSIONS 206  
     REFERENCES 208  
  Chapter 12 Ten Years on: Reflections on the Past and Future of 8.6 211  
     PANEL MEMBERS 212  
     PANEL CHAIR 212  
     PANEL 213  
  Chapter 13 Networked Technologies – The Role of Networks in the Diffusion and Adoption of Software Process Improvement 215  
     1. SOFTWARE PROCESS IMPROVEMENT 216  
        1.1 Background 216  
        1.2 Adoption and Diffusion of Software Process Improvement 216  
     2. PANELISTS 217  
     3. SPI AS A NETWORKED TECHNOLOGY 218  
        3.1 The Role of Stakeholders and Networks in SPI Adoption 218  
        3.2 Network Mechanisms 221  
     4. ISSUES AND CHALLENGES 222  
     REFERENCES 222  
  Chapter 14 Open Source Software: Placebo or Panacea? 225  
     1. OPEN SOURCE SOFTWARE: PLACEBO OR PANACEA? 225  
        1.1 Organization of Open Source Software Development 226  
        1.2 Selling and Implementing Open Source Software 227  
        1.3 Open Source from an industry perspective 227  
        1.4 Challenges to Open Source Software 227  
           1.4.1 Challenges from a Software Engineering Perspective 227  
           1.4.2 Challenges from a Business Perspective 227  
           1.4.3 Challenges from a Socio-Cultural Perspective 228  
     2. ABOUT THE PANELISTS 228  
  Chapter 15 The Diffusion and Adoption of Mobile Computing 229  
     INTRODUCTION 229  
  More eBooks at www.ciando.com 0  


nach oben


  Mehr zum Inhalt
Kapitelübersicht
Kurzinformation
Inhaltsverzeichnis
Leseprobe
Blick ins Buch
Fragen zu eBooks?

  Medientyp
  eBooks
  eJournal
  alle

  Navigation
Belletristik / Romane
Computer
Geschichte
Kultur
Medizin / Gesundheit
Philosophie / Religion
Politik
Psychologie / Pädagogik
Ratgeber
Recht
Reise / Hobbys
Sexualität / Erotik
Technik / Wissen
Wirtschaft

  Info
Hier gelangen Sie wieder zum Online-Auftritt Ihrer Bibliothek
© 2008-2024 ciando GmbH | Impressum | Kontakt | F.A.Q. | Datenschutz