• Corpus ID: 37454342

Literature Review of Information Technology Adoption Models at Firm Level

  • T. Oliveira , Maria F. O. Martins
  • Published 2011
  • Computer Science, Business, Economics

Figures and Tables from this paper

figure 1

1,364 Citations

Organizational adoption of digital information and technology: a theoretical review, organizational adoption of information technologies: a literature review, integrating industry characteristics in inter-organizational is adoption models: a mixed method approach.

  • Highly Influenced

Impact of inter organizational networks on adoption process of information technology

Management information system adoption at the farm level: evidence from the literature, review on it adoption: insights from recent technologies, e-business adoption at the firm level: comparing the predictive power of competing is adoption models, factors influencing the adoption of information technology in the hotel industry. an analysis in a developing country, roles of individual perception in technology adoption at organization level: behavioral model versus toe framework, recent progress of factors influencing information technology adoption in local government context, 55 references, an integrated model of information systems adoption in small businesses, determinants of e-business diffusion: a test of the technology diffusion perspective, a perception-based model for edi adoption in small businesses using a technology-organization-environment framework.

  • Highly Influential

Determinants of Information Technology Adoption in Portugal

Electronic data interchange and small organizations: adoption and impact of technology, why do firms adopt e-procurement systems using logistic regression to empirically test a conceptual model, firms patterns of e-business adoption: evidence for the european union-27., the process of innovation assimilation by firms in different countries: a technology diffusion perspective on e-business, information technology implementation research: a technological diffusion approach, innovation diffusion in global contexts: determinants of post-adoption digital transformation of european companies, related papers.

Showing 1 through 3 of 0 Related Papers

  •  Sign into My Research
  •  Create My Research Account
  • Company Website
  • Our Products
  • About Dissertations
  • Español (España)
  • Support Center

Find your institution

Examples: State University, [email protected]

Other access options

  • More options

Select language

  • Bahasa Indonesia
  • Português (Brasil)
  • Português (Portugal)

Welcome to My Research!

You may have access to the free features available through My Research. You can save searches, save documents, create alerts and more. Please log in through your library or institution to check if you have access.

Welcome to My Research!

Translate this article into 20 different languages!

If you log in through your library or institution you might have access to this article in multiple languages.

Translate this article into 20 different languages!

Get access to 20+ different citations styles

Styles include MLA, APA, Chicago and many more. This feature may be available for free if you log in through your library or institution.

Get access to 20+ different citations styles

Looking for a PDF of this document?

You may have access to it for free by logging in through your library or institution.

Looking for a PDF of this document?

Want to save this document?

You may have access to different export options including Google Drive and Microsoft OneDrive and citation management tools like RefWorks and EasyBib. Try logging in through your library or institution to get access to these tools.

Want to save this document?

  • Document 1 of 1
  • More like this
  • Scholarly Journal

Literature Review of Information Technology Adoption Models at Firm Level

No items selected.

Please select one or more items.

Select results items first to use the cite, email, save, and export options

Abstract: Today, information technology (IT) is universally regarded as an essential tool in enhancing the competitiveness of the economy of a country. There is consensus that IT has significant effects on the productivity of firms. These effects will only be realized if, and when, IT are widely spread and used. It is essential to understand the determinants of IT adoption. Consequently it is necessary to know the theoretical models. There are few reviews in the literature about the comparison of IT adoption models at the individual level, and to the best of our knowledge there are even fewer at the firm level. This review will fill this gap. In this study, we review theories for adoption models at the firm level used in information systems literature and discuss two prominent models: diffusion on innovation (DOI) theory, and the technology, organization, and environment (TOE) framework. The DOI found that individual characteristics, internal characteristics of organizational structure, and external characteristics of the organization are important antecedents to organizational innovativeness. The TOE framework identifies three aspects of an enterprise's context that influence the process by which it adopts and implements a technological innovation: technological context, organizational context, and environmental context. We made a thorough analysis of the TOE framework, analysing the studies that used only this theory and the studies that combine the TOE framework with other theories such as: DOI, institutional theory, and the Iacovou, Benbasat, and Dexter model. The institutional theory helps us to understand the factors that influence the adoption of interorganizational systems (IOSs); it postulates that mimetic, coercive, and normative institutional pressures existing in an institutionalized environment may influence the organization's predisposition toward an IT-based interorganizational system. The Iacovou, Benbasat, and Dexter model, analyses IOSs characteristics that influence firms to adopt IT innovations. It is based on three contexts: perceived benefits, organizational readiness, and external pressure. The analysis of these models takes into account the empirical literature, and the difference between independent and dependent variables. The paper also makes recommendations for future research.

Keywords: information technology, diffusion of innovations (DOI) theory, technology-organization-environment (TOE) framework, interorganizational systems (IOSs), institutional theory

1. Introduction

These days, information technology (IT) is universally regarded as an essential tool in enhancing the competitiveness of the economy of a country. It is commonly accepted today that IT has significant effects on the productivity of firms. These effects will only be fully realized if, and when, IT are widely spread and used. It is crucial, therefore, to understand the determinants of IT adoption and the theoretical models that have arisen addressing IT adoption. There are not many reviews of literature about the comparison of IT adoption models at the individual level, and to the best of our knowledge there are a smaller number at the firm level. This review will fill this gap.

In this study, we review theories for adoption models at the firm level used in information systems (IS) literature and discuss two prominent models, presented in Section 2. The two models reviewed are: diffusion on innovation (DOI) (Rogers 1995); and the technology, organization, and environment (TOE) framework (Tornatzky and Fleischer 1990), since most studies on IT adoption at the firm level are derived from theories such as these two (Chong et al. 2009). Section 3 presents an extensive analysis of the TOE framework, analysing the studies that used only this theory and the studies that combine the TOE framework with other theories such as: DOI, institutional theory, and the Iacovou et al. (1995) model. In the last section, we present the conclusions.

2. Models of IT adoption

There are many theories used in IS research (Wade 2009). We are interested only in theories about technology adoption. The most used theories are the technology acceptance model (TAM) (Davis 1986, Davis 1989, Davis et al. 1989), theory of planned behaviour (TPB) (Ajzen 1985, Ajzen 1991), unified theory of acceptance and use of technology (UTAUT) (Venkatesh et al. 2003), DOI (Rogers 1995), and the TOE framework (Tornatzky and Fleischer 1990). We will develop only the DOI, and especially the TOE framework, because they are the only ones that are at the firm level. The TAM, TPB and UTAUT are at the individual level.

DOI is a theory of how, why, and at what rate new ideas and technology spread through cultures, operating at the individual and firm level. DOI theory sees innovations as being communicated through certain channels over time and within a particular social system (Rogers 1995). Individuals are seen as possessing different degrees of willingness to adopt innovations, and thus it is generally observed that the portion of the population adopting an innovation is approximately normally distributed over time (Rogers 1995). Breaking this normal distribution into segments leads to the segregation of individuals into the following five categories of individual innovativeness (from earliest to latest adopters): innovators, early adopters, early majority, late majority, laggards (Rogers 1995). The innovation process in organizations is much more complex. It generally involves a number of individuals, perhaps including both supporters and opponents of the new idea, each of whom plays a role in the innovation-decision.

Based on DOI theory at firm level (Rogers 1995), innovativeness is related to such independent variables as individual (leader) characteristics, internal organizational structural characteristics, and external characteristics of the organization (Figure 1). (a) Individual characteristics describes the leader attitude toward change. (b) Internal characteristics of organizational structure includes observations according to Rogers (1995) whereby: "centralization is the degree to which power and control in a system are concentrated in the hands of a relatively few individuals"; "complexity is the degree to which an organization's members possess a relatively high level of knowledge and expertise"; "formalization is the degree to which an organization emphasizes its members' following rules and procedures"; "interconnectedness is the degree to which the units in a social system are linked by interpersonal networks"; "organizational slack is the degree to which uncommitted resources are available to an organization"; "size is the number of employees of the organization". (c) External characteristics of organizational refers to system openness.

Since the early applications of DOI to IS research, the theory has been applied and adapted in various ways. Some examples are presented in Table 1.

2.2 Technology, organization, and environment context

The TOE framework was developed in 1990 (Tornatzky and Fleischer 1990). It identifies three aspects of an enterprise's context that influence the process by which it adopts and implements a technological innovation: technological context, organizational context, and environmental context (Figure 2). (a) Technological context describes both the internal and external technologies relevant to the firm. This includes current practices and equipment internal to the firm (Starbuck 1976), as well as the set of available technologies external to the firm (Thompson 1967, Khandwalla 1970, Hage 1980). (b) Organizational context refers to descriptive measures about the organization such as scope, size, and managerial structure. (c) Environmental context is the arena in which a firm conducts its business-its industry, competitors, and dealings with the government (Tornatzky and Fleischer 1990).

The TOE framework as originally presented, and later adapted in IT adoption studies, provides a useful analytical framework that can be used for studying the adoption and assimilation of different types of IT innovation. The TOE framework has a solid theoretical basis, consistent empirical support (see Tables 2 and 3), and the potential of application to IS innovation domains, though specific factors identified within the three contexts may vary across different studies.

This framework is consistent with the DOI theory, in which Rogers (1995) emphasized individual characteristics, and both the internal and external characteristics of the organization, as drivers for organizational innovativeness. These are identical to the technology and organization context of the TOE framework, but the TOE framework also includes a new and important component, environment context. The environment context presents both constraints and opportunities for technological innovation. The TOE framework makes Rogers' innovation diffusion theory better able to explain intrafirm innovation diffusion (Hsu et al. 2006). Thus, the next Section analyses the studies that adopted TOE framework.

3. Empirical literature of the TOE framework

We thoroughly analyse the TOE framework and present an exhaustive description of studies that draw on this theory. Section 3.1 discusses the relevant papers that used only the TOE framework as a theoretical model (Table 2), while Section 3.2 includes some papers that combined the TOE framework with other theoretical models (Table 3).

3.1 Studies that used only the TOE framework

Several authors used only the TOE framework to understand different IT adoptions, such as: electronic data interchange (EDI) (Kuan and Chau 2001); open systems (Chau and Tam 1997); web site (Oliveira and Martins 2008); e-commerce (Liu 2008, Martins and Oliveira 2009, Oliveira and Martins 2009); enterprise resource planning (ERP) (Pan and Jang 2008); business to business (B2B) e-commerce (Teo et al. 2006); e-business (Zhu et al. 2003, Zhu and Kraemer 2005, Zhu et al. 2006b, Lin and Lin 2008, Oliveira and Martins 2010a); knowledge management systems (KMS) (Lee et al. 2009). The variables analysed, methods used, data, and context of empirical studies are presented in Table 2.

3.2 Studies that used the TOE framework combined with other theories

Some authors used the TOE framework with other theories to understand IT adoption (Thong 1999, Gibbs and Kraemer 2004, Hsu et al. 2006, Zhu et al. 2006a, Li 2008, Soares-Aguiar and Palma-Dos-Reis 2008, Chong et al. 2009, Oliveira and Martins 2010b). In Table 3 we can see that DOI, institutional theory, and the Iacovou et al. (1995) model were used in combination with the TOE framework to better understand IT adoption decisions.

Studies combining the TOE framework and DOI theories include the following. Thong (1999) joins CEO characteristics from DOI to the TOE framework. Chong et al. (2009) add innovation attributes (relative advantage, compatibility, and complexity) from DOI and an additional new factor in the adoption study called information sharing culture characteristics to the TOE framework. Zhu et al. (2006a) combined relative advantage, compatibility, cost, and security concern from DOI with the TOE framework. Wang et al. (2010) add relativeve advantage, complexity, and compatibility from DOI to the TOE framework. Additional theories include those listed below.

3.2.1 Institutional theory

Institutional theory emphasizes that institutional environments are crucial in shaping organizational structure and actions (Scott and Christensen 1995, Scott 2001). According to the institutional theory, organizational decisions are not driven purely by rational goals of efficiency, but also by social and cultural factors and concerns for legitimacy. Institutions are transported by cultures, structures, and routines and operate at multiple levels. The theory claims that firms become more similar due to isomorphic pressures and pressures for legitimacy (Dimaggio and Powell 1983). This means that firms in the same field tend to become homologous over time, as competitive and customer pressures motivate them to copy industry leaders. For example, rather than making a purely internally driven decision to adopt e-commerce, firms are likely to be induced to adopt and use e-commerce by external isomorphic pressures from competitors, trading partners, customers, and government.

Several recent studies have taken an institutional approach to e-commerce or EDI diffusion and assimilation (Purvis et al. 2001, Chatterjee et al. 2002, Teo et al. 2003). It is well known that mimetic, coercive, and normative institutional pressures existing in an institutionalized environment may influence organizations' predisposition toward an IT-based interorganizational system (Teo et al. 2003). Mimetic pressures are observed when firms adopt a practice or innovation imitating competitors (Soares-Aguiar and Palma-Dos-Reis 2008). Coercive pressures are a set of formal or informal forces exerted on organizations by other organizations upon which the former organizations depend (Dimaggio and Powell 1983). Normative pressures come from dyadic relationships where companies share some information, rules, and norms. Sharing these norms through relational channels amongst members of a network facilitates consensus, which, in turn, increases the strength of these norms and their potential influence on organizational behaviour (Powell and DiMaggio 1991).

Some studies combine the TOE framework with the institutional theory (Gibbs and Kraemer 2004, Li 2008, Soares-Aguiar and Palma-Dos-Reis 2008). The institutional theory adds to the environmental context of the TOE framework external pressures, which include pressure from competitors and pressure exerted by trading partners.

3.2.2 Iacovou et al. (1995) model

Iacovou et al. (1995) analysed interorganizational systems (IOSs) characteristics that influence firms to adopt IT innovations in the context of EDI adoption. Their framework is well suited to explain the adoption of an IOS. It is based on three factors: perceived benefits, organizational readiness, and external pressure (see Figure 3). Perceived benefits is a different factor from the TOE framework, whereas organizational readiness is a combination of the technology and organization context of the TOE framework. Hence, IT resources is similar to technology context and financial resources is similar to organizational context. The external pressure in the Iacovou et al. (1995) model adds the trading partners to the external task environmental context of the TOE framework as a critical role of IOSs adoptions.

Hsu et al. (2006) used the DOI theory, the TOE framework, and the Iacovou et al. (1995) model to explain e-business use. Their model proposed four constructs (perceived benefits, organizational readiness, external pressure, and environment). Organization readiness, is consistently used in all three frameworks in the literature. Environment is from the TOE framework. Perceived benefits and external pressure are from the Iacovou et al. (1995) model.

Oliveira and Martins (2010b) used the TOE framework, and the Iacovou et al. (1995) model to explain adoption of e-business by firms belonging to European Union (EU) countries, by comparing the effect across two different industries: telecommunications and tourism. Their model proposed comprises three dimensions (perceived benefits, technology and organizational readiness, and environmental and external pressure). The perceived benefits dimension comes from the Iacovou et al. (1995) model. The technology and organizational readiness is a combination of TOE from the Tornatsky and Fleischer (1990) framework and organizational readiness from the Iacovou et al. (1995) model. The environmental and external pressure is also a combination from both earlier studies.

4. Conclusions

This paper made a review of literature of IT adoption models at the firm level. Most empirical studies are derived from the DOI theory and the TOE framework. As the TOE framework includes the environment context (not included in the DOI theory), it becomes better able to explain intra-firm innovation adoption; therefore, we consider this model to be more complete. The TOE framework also has a solid theoretical basis, consistent empirical support, and the potential of application to IS adoption. For this reason an extensive analysis of the TOE framework was undertaken, analysing empirical studies that use only the TOE model, and empirical studies that combine this model with the DOI theory, the institutional theory, and the Iacovou et al. (1995) model, and concluding that the same context in a specific theoretical model can have different factors.

In terms of further research, we think that for more complex new technology adoption it is important to combine more than one theoretical model to achieve a better understanding of the IT adoption phenomenon.

Ajzen, I. (1985) From intentions to actions: A theory of planned behavior, Berlin, Springer.

Ajzen, I. (1991) The theory of planned behavior, "Organizational Behavior and Human Decision Processes", Vol. 50, pp 179-211.

Beatty, R.C., Shim, J.P. and Jones, M.C. (2001) Factors influencing corporate web site adoption: A time-based assessment, "Information & Management", Vol. 38, No. 6, pp 337-354.

Bradford, M. and Florin, J. (2003) Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems, "International Journal of Accounting Information Systems", Vol. 4, No. 3, p p205-225.

Chatterjee, D., Grewal, R. and Sambamurthy, V. (2002) Shaping up for e-commerce: Institutional enablers of the organizational assimilation of web technologies, "MIS Quarterly", Vol. 26, No. 2, pp 65-89.

Chau, P.Y.K. and Tam, K.Y. (1997) Factors affecting the adoption of open systems: An exploratory study, "MIS Quarterly", Vol. 21, No. 1, pp 1-24.

Chong, A.Y.L., Ooi, K.B., Lin, B.S. and Raman, M. (2009) Factors affecting the adoption level of c-commerce: An empirical study, "Journal of Computer Information Systems", Vol. 50, No. 2, pp 13-22.

Cooper, R.B. and Zmud, R.W. (1990) Information technology implementation research - a technological diffusion approach, "Management Science", Vol. 36, No. 2, pp 123-139.

Davis, F.D. (1986) A technology acceptance model for empirically testing new end-user information systems: Theory and results, Sloan School of Management, Massachusetts Institute of Technology.

Davis, F.D. (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology, "MIS Quarterly", Vol. 13, No. 3, pp 319-340.

Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989) User acceptance of computer-technology - a comparison of 2 theoretical-models, "Management Science", Vol. 35, No. 8, pp 982-1003.

Dimaggio, P.J. and Powell, W.W. (1983) The iron cage revisited - institutional isomorphism and collective rationality in organizational fields, "American Sociological Review", Vol. 48, No. 2, pp 147-160.

Eder, L.B. and Igbaria, M. (2001) Determinants of intranet diffusion and infusion, "Omega-International Journal of Management Science", Vol. 29 (3), pp 233-242.

Gibbs, L.J. and Kraemer, K.L. (2004) A cross-country investigation of the determinants of scope of e-commerce use: An institutional approach, "Electronic Markets", Vol. 14, No. 2, pp 124-137.

Hage, J. (1980) Theories of organizations: Forms, process and transformation, New York, John Wiley & Sons.

Hsu, P.F., Kraemer, K.L. and Dunkle, D. (2006) Determinants of e-business use in us firms, "International Journal of Electronic Commerce", Vol. 10, No. 4, pp 9-45.

Iacovou, C.L., Benbasat, I. and Dexter, A.S. (1995) Electronic data interchange and small organizations: Adoption and impact of technology, "MIS Quarterly", Vol. 19, No. 4, pp 465-485.

Khandwalla, P. (1970) Environment and the organization structure of firms, McGill University, Montreal, Faculty of Management.

Kuan, K.K.Y. and Chau, P.Y.K. (2001) A perception-based model for edi adoption in small businesses using a technology-organization-environment framework, "Information & Management", Vol. 38, No. 8, pp 507-521.

Lee, O.K., Wang, M., Lim, K.H. and Peng, Z. (2009) Knowledge management systems diffusion in chinese enterprises: A multistage approach using the technology-organization-environment framework, "Journal of Global Information Management", Vol. 17, No. 1, pp 70-84.

Li, Y.H. (2008) "An empirical investigation on the determinants of e-procurement adoption in chinese manufacturing enterprises". 2008 International Conference on Management Science & Engineering (15th), California, USA, Vols I and II, Conference Proceedings, pp 32-37.

Lin, H.F. and Lin, S.M. (2008) Determinants of e-business diffusion: A test of the technology diffusion perspective, "Technovation", Vol. 28, No. 3, pp 135-145.

Liu, M. (2008) "Determinants of e-commerce development: An empirical study by firms in shaanxi, china". 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, October, Vols 1-31, pp 9177-9180.

Martins, M. and Oliveira, T. (2009) "Determinants of e-commerce adoption by small firms in portugal", Proceedings of the 3rd european conference on information management and evaluation. Gothenburg, Sweden, September, pp 328-338.

Oliveira, T. and Martins, M.F. (2009). "Deteminants of information technology adoption in Portugal", ICE-B 2009: Proceedings of the international conference on e-business, Milan. Italy, July, pp 264-270.

Oliveira, T. and Martins, M.F. (2010a) Firms patterns of e-business adoption: Evidence for the european union- 27, "The Electronic Journal Information Systems Evaluation Volume", Vol. 13, No. 1, pp 47-56.

Oliveira, T. and Martins M.F. (2010b) Understanding e-business adoption across industries in European countries, ,"Industrial Management & Data System", Vol. 110, No. 9, pp. 1337-1354.

Oliveira, T. and Martins, M.F.O. (2008) "A comparison of web site adoption in small and large portuguese firms", ICE-B 2008: Proceedings of the international conference on e-business, Porto, Portugal, July, pp 370-377.

Pan, M.J. and Jang, W.Y. (2008) Determinants of the adoption of enterprise resource planning within the technology-organization-environment framework: Taiwan's communications, "Journal of Computer Information Systems", Vol. 48, No. 3, pp 94-102.

Powell, W. and Dimaggio, P. (1991) The new institutionalism in organizational analysis, Chicago, Univ. of Chicago Press.

Purvis, R.L., Sambamurthy, V. and Zmud, R.W. (2001) The assimilation of knowledge platforms in organizations: An empirical investigation, "Organization Science", Vol. 12, No. 2, pp 117-135.

Rogers, E.M. (1995) Diffusion of innovations, Fourth Edition ed., New York, Free Press.

Scott, W.R. (2001) Institutions and organizations, 2 ed. Thousand Oaks, CA, Sage Publications.

Scott, W.R. and Christensen, S. (1995) The institutional construction of organizations: International and longitudinal studies Thousand Oaks, CA, Sage Publications.

Soares-Aguiar, A. and Palma-Dos-Reis, A. (2008) Why do firms adopt e-procurement systems? Using logistic regression to empirically test a conceptual model, "IEEE Transactions on Engineering Management", Vol. 55, No. 1, pp 120-133.

Starbuck, W.H. (1976) Organizations and their environments, Chicago, Rand McNally.

Teo, H.H., Wei, K.K. and Benbasat, I. (2003) Predicting intention to adopt interorganizational linkages: An institutional perspective, "MIS Quarterly", Vol. 27, No. 1, pp 19-49.

Teo, T.S.H., Ranganathan, C. and Dhaliwal, J. (2006) Key dimensions of inhibitors for the deployment of web-based business-to-business electronic commerce, "IEEE Transactions on Engineering Management", Vol. 53, No. 3, pp 395-411.

Thompson, J.D. (1967) Organizations in action, New York, McGraw-Hill.

Thong, J.Y.L. (1999) An integrated model of information systems adoption in small businesses, "Journal of Management Information Systems", Vol. 15, No. 4, pp. 187-214.

Tornatzky, L. and Fleischer, M. (1990) The process of technology innovation, Lexington, MA, Lexington Books.

Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003) User acceptance of information technology: Toward a unified view, "MIS Quarterly", Vol. 27, No. 3, pp. 425-478.

Wade, M. (2009) Resource-based view of the firm [online]. http://www.fsc.yorku.ca/york/istheory/wiki/index.php/Resource-based_view_of_the_firm [Accessed 10/03/2010]

Wang, Y.M., Wang, Y.S. and Yang, Y.F. (2010) Understanding the determinants of RFID adoption in the manufacturing industry, "Technological Forecasting and Social Change", Vol. 77, pp. 803-815.

Zhu, K., Dong, S.T., Xu, S.X. and Kraemer, K.L. (2006a) Innovation diffusion in global contexts: Determinants of post-adoption digital transformation of european companies, "European Journal of Information Systems", Vol. 15, No. 6, pp 601-616.

Zhu, K., Kraemer, K. and Xu, S. (2003) Electronic business adoption by european firms: A cross-country assessment of the facilitators and inhibitors, "European Journal of Information Systems", Vol. 12, No. 4, pp 251-268.

Zhu, K. and Kraemer, K.L. (2005) Post-adoption variations in usage and value of e-business by organizations: Cross-country evidence from the retail industry, "Information Systems Research, Vol. 16, No. 1, pp 61-84.

Zhu, K., Kraemer, K.L. and Xu, S. (2006b), The process of innovation assimilation by firms in different countries: A technology diffusion perspective on e-business, "Management Science", Vol. 52, No. 10, pp 1557-1576.

Tiago Oliveira and Maria Fraga Martins

ISEGI, Universidade Nova de Lisboa, Lisbon, Portugal

[email protected]

You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer

Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer

Copyright Academic Conferences International Limited Jan 2011

Today, information technology (IT) is universally regarded as an essential tool in enhancing the competitiveness of the economy of a country. There is consensus that IT has significant effects on the productivity of firms. These effects will only be realized if, and when, IT are widely spread and used. It is essential to understand the determinants of IT adoption. Consequently it is necessary to know the theoretical models. There are few reviews in the literature about the comparison of IT adoption models at the individual level, and to the best of our knowledge there are even fewer at the firm level. This review will fill this gap. In this study, we review theories for adoption models at the firm level used in information systems literature and discuss two prominent models: diffusion on innovation (DOI) theory, and the technology, organization, and environment (TOE) framework. The DOI found that individual characteristics, internal characteristics of organizational structure, and external characteristics of the organization are important antecedents to organizational innovativeness. The TOE framework identifies three aspects of an enterprise's context that influence the process by which it adopts and implements a technological innovation: technological context, organizational context, and environmental context. We made a thorough analysis of the TOE framework, analysing the studies that used only this theory and the studies that combine the TOE framework with other theories such as: DOI, institutional theory, and the Iacovou, Benbasat, and Dexter model. The institutional theory helps us to understand the factors that influence the adoption of interorganizational systems (IOSs); it postulates that mimetic, coercive, and normative institutional pressures existing in an institutionalized environment may influence the organization's predisposition toward an IT-based interorganizational system. The Iacovou, Benbasat, and Dexter model, analyses IOSs characteristics that influence firms to adopt IT innovations. It is based on three contexts: perceived benefits, organizational readiness, and external pressure. The analysis of these models takes into account the empirical literature, and the difference between independent and dependent variables. The paper also makes recommendations for future research. [PUBLICATION ABSTRACT]

Suggested sources

  • About ProQuest
  • Terms of Use
  • Privacy Policy
  • Cookie Policy

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Information Technology Investments: A Literature Review

Profile image of Ra'ed Masa'deh

While researchers have encouraged further examination on the causal links between Information Technology (IT) investments and a firm’s performance, results of empirical studies have been varied. This is to a certain extent due to the exclusion of IT-business partnership (also known as IT-business strategic alignment). Indeed, strategic alignment has emerged as one of the most important concern facing business and IT executives all over the world (Raymond and Croteau, 2009, Johnson and Lederer, 2010). Therefore, the purpose of this paper is to provide a detailed literature review that both academics and practitioners can use in order to understand the resources required to realize the potential values of their IT investments. This is achieved by providing a review of the IT and IT-business literature on a firm’s business performance. It is hoped that the article will spark helpful discussion on the merits of continuous examination of IT investments.

Related Papers

sciepub.com SciEP

Information technology (IT) investment and aligning methodologies require thorough understanding of analyses on different parallel present values and strong internal rates of return. E-commerce has given a new dimension to IT investing that elevates the role of strong IT performance as a driver of corporate strategy. Stakeholders concerned with maximizing IT return on investment (ROI) recognize the importance of central, comprehensive information resources to effective strategic business planning. Alignment of corporate and IT strategies is now a vital element of business success. To empirically support this conclusion, this study measures the relationship between strategic alignment of IT investment returns and corporate performance. A Descriptive research design using survey methodology was employed. The study included analyses of variable values involving stakeholders in banks, such as new customers and employees. A Simple Percentage Method, chi-square tests, Tables and weighted average were used to analyze data of at least five (5) banks in Ajman Emirates of UAE to determine the degree of alignment and its impact on the two strategic dimensions. A binary logistic regression analysis using Chan's STROIS model incorporated with Venkatraman's STROBE model was proposed to collect survey data and determine the extent of the strategic alignment. The research results provide empirical evidence that supports the hypothesis that closer alignment between corporate and IT strategies leads to increased IT ROI and improved corporate performance. This relationship holds true for all firms regardless of strategic intent for IT. The study also shows a positive correlation between early adoption of newly emergent technologies and business competitive advantage which leads to positive conclusions that strategic competition is imperative towards corporate performances.

literature review on information technology

Information & Management

Journal of Computer Science

Ronald Silalahi

Fernando José B Laurindo

Journal of Management Information Systems

Rajiv Sabherwal

Hamidreza Alipour

Ra'ed Masa'deh

Although researchers have encouraged further exploration on the causal links between Information Technology (IT) investments and a firm’s competitive advantage, outcomes of empirical studies have been non-conclusive. This is to a certain extent owing to the omission of IT-business strategic partnership (also known as strategic alignment). Indeed, strategic alignment has emerged as one of the most important issue facing business and IT executives all over the world. Importance aside, what is not clear is how to achieve and sustain this harmony relating business and IT. Therefore, scholars have continuously called for research that addresses the antecedent factors that lead to the alignment. In addition, some scholars have called for further adjustments to the concept of alignment by applying new theoretical approaches which have not been explored in the field of information systems (IS). Therefore, the purpose of this paper is to provide a detailed roadmap in which practitioners can use to understand the resources required to realize the potential values of their IT investments. This could be achieved by presenting further insight to the factors that could lead to strategic alignment; and investigating the relationships among strategic alignment antecedents, strategic alignment and competitive advantage.

Aurora Sánchez-Ortiz

David J Williamson

IT and business strategy alignment (IT&BSA) has been studied by scholars and attempted by prac-titioners for more than 15 years. Success has remained surprisingly elusive. If it is indeed possible to align a rapidly changing resource with a rapidly moving target, the potential for business benefit from alignment is tremendous. However, without some changes in current paradigms and assump-tions, alignment may be an unachievable state. This systems approach, qualitative paper analyzes 47 IT&BSA studies from 1990 through 2005. It assesses research approaches, methods, strategies, and techniques, and summarizes the key organizational, IT, and alignment concepts and topics using content analysis and semiotics. It then synthesizes the underlying trends in research and top-ics to determine how the field has changed in the last 15 years. Findings include a predominance of the systems approach in IT&BSA research. Both empirical and conceptual research strategies are common. Three dominant schools of thought pervade the study period. Strategic alignment maturi-ty has appeared in the literature relatively consistently since 1993. The balanced scorecard emerged in the late 1990s and is still under consideration. Shared domain knowledge, terminology, and vision is a more recent concept. These larger trends in IT&BSA research have also been sup-plemented by other smaller changes in concepts and topics. The study shows that IT and business strategy alignment is an elusive, if not impossible goal. Implications for practitioners include the need to continually reevaluate the strategic alignment and integration of these critical functions. Implications for researchers include the need for a unifying paradigm or model for future research. Keywords: Information Technology, Strategic Alignment, Research Methods

Hosea A. Ofe

This thesis examines the challenges and strategies to IT-Business alignment from the perspective of IT managers. The increasing importance of Information technology (IT) to organizations in areas such as joint research and development (R&D), Open innovation, and the ever-changing business environment means that organizations need to reassess their IT and business strategies so as to remain competitive. This implies that organizations in general and business and IT professionals in particular would have to work together more often than before in strategic planning. This is not easy because these professionals with diverse viewpoints may understand IT and business quite differently. Using a qualitative research design in the form of semi-structure interviews with open-ended questions, findings indicate that communication, partnership, governance, and skills are major challenges and strategies to alignment. This study contributes to ongoing research in IT-Business alignment by indicating that challenges to aligning business and IT strategies such as communication should not be narrowly thought of to exist just between IT and business professionals, it is equally a main concern among IT professionals.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Proceedings of the Third International Symposium, SEUSL: 6-7 July 2013, Oluvil, Sri Lanka 1

Ilmudeen Aboobucker

Journal of Business & Management

Behrad Zahedi

MWAIS 2009 Proceedings

Michele Gribbins

Mostafa Nejati

Communications of the Association for Information Systems

Lecture Notes in Business Information Processing

carmine grasso

salah baina

Romanian Economic and Business Review

Kozeta Sevrani

Hannu Kivijärvi , Tomi Dahlberg

International Journal of Research -GRANTHAALAYAH

Alberto Luiz Albertin

Sa Computer Journal

Irwin Brown

Ignitia Motjolopane

Anabel Hernández mendoza

Mahmoud Maqableh

Soleil Farah

Alea Fairchild

Herman Shah Anuar

IAEME Publication

Encyclopedia of Information Science and Technology

Petros Theodorou

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • Our Promise
  • Our Achievements
  • Our Mission
  • Proposal Writing
  • System Development
  • Paper Writing
  • Paper Publish
  • Synopsis Writing
  • Thesis Writing
  • Assignments
  • Survey Paper
  • Conference Paper
  • Journal Paper
  • Empirical Paper
  • Journal Support
  • Literature Review Topics in Information Technology

A literature review is an interesting and crucial work and it is important to select an appropriate topic to approach effectively. To conduct the literature review work in the domain of Information technology (IT), we list out various suitable literature review  topics that satisfy different research areas and are relevant to basic concepts as well as latest patterns:  

  • Artificial Intelligence and Machine Learning
  • Ethical Considerations in the Development and Application of AI
  • Machine Learning Techniques in Predictive Analytics: A Comparative Review
  • The Role of Deep Learning in Image and Speech Recognition Technologies
  • Networking and Telecommunications
  • 5G Technology: Opportunities, Challenges, and the Future of Mobile Communications
  • Wireless Network Security Protocols: A Comparative Review
  • The Evolution of SDN (Software-Defined Networking) and Its Role in Modern Networks
  • Cloud Computing
  • Cloud Computing Models: A Comparative Study of IaaS, PaaS, and SaaS
  • Challenges and Solutions in Cloud Data Security and Privacy
  • The Adoption of Cloud Computing in Healthcare: Benefits and Barriers
  • Cybersecurity and Privacy
  • Evolving Cyber Threats in the IoT Ecosystem: A Review
  • The Impact of Blockchain Technology on Cybersecurity and Privacy
  • Privacy Concerns and Data Protection Strategies in Big Data Analytics
  • Internet of Things (IoT)
  • IoT in Smart Cities: Applications, Challenges, and Future Directions
  • Security and Privacy Challenges in IoT Devices and Their Mitigation Strategies
  • The Role of IoT in Enhancing Agricultural Practices and Outcomes
  • Data Science and Big Data Analytics
  • Big Data Analytics in Retail: Techniques and Case Studies
  • The Role of Data Science in Personalized Medicine: Opportunities and Challenges
  • Data Visualization Techniques and Tools: A Review for Effective Data Communication
  • Software Development Methodologies
  • Agile vs. Waterfall: A Review of Software Development Methodologies
  • The Rise of DevOps: Principles, Practices, and Impacts on Software Development
  • Microservices Architecture: Challenges and Best Practices in the Modern Software Development Landscape
  • Blockchain Technology
  • Blockchain Beyond Cryptocurrencies: Applications in Supply Chain Management
  • Smart Contracts: Potential, Limitations, and Future Directions
  • Blockchain for Enhancing Transparency and Trust in E-Government Services
  • Human-Computer Interaction (HCI)
  • User Experience (UX) Design Principles for Mobile Applications: A Review
  • The Impact of Virtual Reality (VR) on Education and Training: A Literature Review
  • Accessibility in Web Design: A Review of Guidelines and Best Practices
  • Emerging Technologies
  • Quantum Computing: Principles, Progress, and Potential IT Applications
  • Exploring the Potential of Augmented Reality (AR) in Marketing and Consumer Engagement
  • Generative AI in Creative Industries: Opportunities, Ethics, and Future Trends

How to write Review paper for Information Technology Research?

Writing a review paper is considered as an effective work that provides a chance to find gaps in existing studies, examine and describe the latest condition of the research, and recommend possible regions for further exploration process. To carry out this work for Information Technology Research, we offer well-formatted procedures below that support you efficiently:

  • Choose the Topic Wisely
  • Relevance: It is significant to choose a topic that is related to the domain of IT and the latest trends. You should think about various aspects such as regions that require more in-depth research, current discussions, or evolving technologies.
  • Scope: Initially, determine whether you intend to target a very particular area or explore a wide range of research areas. So, to maintain concentration throughout the process, describe the range of your review clearly.
  • Conduct a Thorough Literature Search
  • Database Search: To identify specific and related conference papers, articles, and books, utilize reputable educational databases such as ACM Digital Library, ScienceDirect, IEEE Xplore, and Google Scholar.
  • Keywords: For carrying out an extensive search, a collection of key-terms relevant to the chosen topic have to be created.
  • Inclusion Criteria: On the basis of several factors like date of publication, technical approaches, and importance, create particular principles for deciding which materials to encompass in the review.
  • Read and Evaluate the Literature
  • Summarize Key Findings: It is essential to outline all the major methodologies and discoveries of every material while conducting the reading process.
  • Critical Evaluation: Relevant to the specific research domain, explore important discussions, research patterns, and directions. In the previous studies, the challenges, dedications, and methodologies must be assessed thoroughly.
  • Organize the Review
  • Themes or Chronology: By determining which approach is more suitable for the selected topic, arrange the relevant literature chronologically, theoretically, or thematically.
  • Structure: Some major sections like introduction, body (that includes topics or significant concepts), and a conclusion are generally encompassed in review papers. By comparing, differentiating, and integrating the discoveries, describe the literature studies in the body of the review paper.
  • Writing the Review
  • Introduction: This section should include the introduction of the topic, description of its significance, and demonstration of the review’s goals. Any important themes and keywords relevant to your review have to be specified.
  • Current State of Research: Based on the chosen topic, the latest conditions of the research like conceptual procedures and main discoveries must be explained.
  • Methodologies: By mentioning any efficiencies and shortcomings, describe the methodologies that are utilized in the specific domain.
  • Gaps and Debates: The current discussions, contradictory results, or any research gaps in the studies have to be emphasized.
  • Conclusion: In this phase, the major perceptions that you acquired from previous studies must be outlined. You should describe your discovery’s impacts for the particular domain. For further exploration process, recommend potential regions.
  • Cite the Sources
  • It is crucial to make sure whether each cited material in your review is specified in the reference phase at the end of the review paper. Across the entire paper, you must utilize a coherent citation style such as IEEE, APA.
  • Revise and Edit
  • Feedback: From experts or professionals, who have knowledge based on your topic, try to obtain suggestions.
  • Clarity and Cohesion: You should confirm whether all your discussions are integrated in a consistent and explicit manner and your review is orderly arranged.
  • Proofreading: For identifying any formatting problems, typographical, and grammar mistakes, proofread your review thoroughly.

Information Technology Literature Review Ideas

If you are looking for the best Information Technology Literature Review Ideas and writing services then phdservices.org will be your best option. We create custom literature ideas and writing services as per your specifications you can work with some of the leading writers in IT sector. Quality assurance and on time delivery with high esteemed writers your paper will be carried out.

  • Data mining and event playback on networked information simulation system
  • Application of web data mining and data warehouse in e-commerce
  • A data mining strategy for inductive data clustering: a synergy between self-organising neural networks and K-means clustering techniques
  • A Novel Approach to the Similarity Analysis of Multivariate Time Series and Its Application in Hydrological Data Mining
  • Design of anomaly packet detection framework by data mining algorithm for network flow
  • Functions and Ways of Computer Information Technology in Optimizing Library Operation and Management Considering Massive Data Mining
  • Using k-Interactive Measure in Optimization-Based Data Mining
  • A syllabus on data mining and machine learning with applications to cybersecurity
  • Research on Analytical Methods of Electric Load Based on Data Mining
  • The Research of Data Mining Based on Extension Sets
  • Automatic selection and evaluation on data mining algorithms
  • An intelligent framework (O-SS-E) for data mining, knowledge discovery and business intelligence
  • Design and actualization of SOA-based data mining system
  • Design of Digital Museum Narrative Space Based on Perceptual Experience Data Mining and Computer Vision
  • Research on Data Mining Modeling Technology of Charging Fault Characteristics Based on BP Neural Network
  • Some techniques and applications in data mining
  • Data Mining And Analysis For Predicting Electrical Energy Consumption
  • A Framework of Multi-Agent Professional Search Engine Based on Rough Set and Data Mining
  • Data mining techniques for microarray datasets
  • Construction and Application of Bayesian Network Model for Spatial Data Mining

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

The Challenges and Opportunities of Smart Cities Infrastructure

  • Original Research
  • Published: 17 July 2024
  • Volume 5 , article number  713 , ( 2024 )

Cite this article

literature review on information technology

  • Amer Abuali 1 ,
  • Wejdan Alharthi 1 ,
  • Mariam Althbyani 1 ,
  • Fahad Ghabban   ORCID: orcid.org/0000-0003-3158-6131 1 ,
  • Omair Ameerbakhsh 1 ,
  • Ibrahim Alfadli 1 ,
  • Ashwaq Hasen Al-Shehri 1 &
  • Najmah Adel Fallatah 1  

Information communications technology (ICT) refers to the technology used for communication and managing information must be utilized to enhance the environment, economics, mobility, and governance, among other facets of urban life, in order to create smart cities. However this progress is frequently accompanied by a number of challenges and unfavorable outcomes. This study aims to uncover ICT difficulties related to smart city infrastructure through an extensive literature review. In addition, a survey was carried out among Saudi nationals to find out what they thought about, anticipated, and worried about in terms of smart city concepts and features. The study also looked at a literature checklist of ICT problems, which included dangers to information security, incompatibilities across systems, privacy concerns, and deficiencies in digital capabilities. Based on the findings it appears that privacy breaches and information security concerns are the most important issues. This is explained by heightened susceptibility and potential, cyberattacks and a pervasive ignorance of the protection of personal data. Because of the anticipated high costs and difficulties with adaption and utilization, the public is concerned about incompatibility between systems and services. Furthermore, older individuals and those with lesser educational achievement have different digital skills.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

literature review on information technology

Data Availability

Data will be available on request.

Alawadhi S, Aldama-Nalda A, Chourabi H, Gil-Garcia JR, Leung S, Mellouli S, Nam T, Pardo TA, Scholl HJ, Walker S. Building understanding of smart city initiatives. In: International Conference on Electronic Government. Berlin: Springer; 2012. p. 40–53.

Ismagilova E, Hughes L, Dwivedi YK, Raman KR. Smart cities: advances in research—an information systems perspective. Int J Inf Manag. 2019;47:88–100.

Article   Google Scholar  

Giffinger R, Fertner C, Kramar H, Meijers E. City-ranking of European medium-sized cities. Cent Reg Sci Vienna UT. 2007;9:1–12.

Google Scholar  

Sallam A, Almohammedi AA, Gaid AS, Shihab YA, Sadeq M, Abdulaziz SE, Abduasalam S, Abdulhaleem Y, Shepelev V. Performance evaluation of fog-computing based on IoT healthcare application. In: Proceedings of the 2021 international conference of technology, science and administration (ICTSA), Taiz, Yemen, 22–24 March. 2021; p. 1–6.

Balfaqih H, Yunus B. Supply chain performance in electronics manufacturing industry. In: Applied mechanics and materials, vol. 554. Stafa-Zurich: Trans Tech Publications Ltd.; 2014. p. 633–37.

Mittereder M. Smart City Index: Vienna and London Lead the Worldwide Ranking. Roland Berger. 2019. https://www.rolandberger.com/en/Media/Smart-City-Index-Vienna-and-London-lead-the-worldwide-ranking.html . Accessed on 1 May 2022.

Siemens. 2016. http://www.siemens.com.sa/pool/about/Smart_cities_Saudi_Arabia_study.pdf . Accessed 1 May 2022.

Golubchikov O, Thornbush M. Artificial intelligence and robotics in smart city strategies and planned smart development. Smart Cities. 2020;3:56.

Edwards L. Privacy, security and data protection in smart cities: a critical EU law perspective. Eur Data Prot Law Rev. 2016;2:28.

Townsend AM. Smart cities: big data, civic hackers, and the quest for a New Utopia. New York: WW Norton & Company; 2013.

House of Commons. Digital Skills Crisis: Second Report of Session 2016–17. 2016. https://www.publications.parliament.uk/pa/cm201617/cmselect/cmsctech/270/270.pdf . Accessed 23 Feb 2022.

Caragliu A, Del Bo C, Nijkamp P. Smart cities in Europe. London: Routledge; 2013. p. 185–207.

Gebru K, Casetti C, Chiasserini CF, Giaccone, P. IoT-based mobility tracking for smart city applications. In: Proceedings of the 2020 European conference on networks and communications (EuCNC), Dubrovnik, Croatia, 15–18 June 2020; p. 326–30.

Chon Y, Talipov E, Shin H, Cha H. Smart DC: mobility prediction-based adaptive duty cycling for everyday location monitoring. IEEE Trans Mob Comput. 2013;13:512–25.

Silva BN, Khan M, Han K. Integration of Big Data analytics embedded smart city architecture with RESTful web of things for efficient service provision and energy management. Future Gener Comput Syst. 2020;107:975–87.

Lee I. Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet. 2020;12:157.

Shin SY, Kim D, Chun SA. Digital divide in advanced smart city innovations. Sustainability. 2021;13(7):4076.

Hawash B, Mokhtar UA, Yusof ZM, Mukred M, Gaid AS. Factors affecting Internet of Things (IoT) adoption in the Yemeni oil and gas sector. In: Proceedings of the 2021 international conference of technology, science and administration (ICTSA), Taiz, Yemen, 22–24 March 2021; p. 1–7.

Brutti A, De Sabbata P, Frascella A, Gessa N, Ianniello R, Novelli C, Ponti G. Smart city platform specification: a modular approach to achieve interoperability in smart cities. In: Cicirelli F, Guerrieri A, Mastroianni C, Spezzano G, Vinci A, editors. The internet of things for smart urban ecosystems. Cham: Springer; 2019. p. 25–50.

Chapter   Google Scholar  

D’Amico G, L’Abbate P, Liao W, Yigitcanlar T, Ioppolo G. Understanding sensor cities: insights from technology giant company driven smart urbanism practices. Sensors. 2020;20:4391.

Download references

Acknowledgements

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of education in Saudi Arabia.

Author information

Authors and affiliations.

College of Computer Science and Engineering, Information System Department, Taibah University, Medina, Saudi Arabia

Amer Abuali, Wejdan Alharthi, Mariam Althbyani, Fahad Ghabban, Omair Ameerbakhsh, Ibrahim Alfadli, Ashwaq Hasen Al-Shehri & Najmah Adel Fallatah

You can also search for this author in PubMed   Google Scholar

Contributions

A.A has designed and the study and lead the project. While, W.A has conducted the literature review, and helped in the result interpretation. In addition, MA, and F.G have supervised the work and validated the idea, and made the Acquisition of the financial support for the project leading to this publication. Moreover, O.A.B, and I.A have helped in analyzing the related works and providing the first paper draft. Furthermore, A.H.A, and N.A.F have helped in the study design, analyzing the related works. All the authors have reviewed and approved the final paper version.

Corresponding author

Correspondence to Fahad Ghabban .

Ethics declarations

Conflict of interest.

The authors declare no conflict of interest.

Informed Consent

All participants involved in this study provided informed consent prior to their participation. They were informed about the purpose of the research, the procedures involved, potential risks and benefits, and their rights as participants. Participants were assured of the confidentiality of their responses and were informed that their participation was voluntary, with the option to withdraw at any time without penalty. Written consent was obtained from participants before their inclusion in the study.

Research Involving Human and/or Animals

Only human.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The smart city concept uses information and communication technologies to improve the quality of life by facilitating more efficient and sustainable management of cities. This questionnaire aims to understand residents' perceptions and concerns regarding the smart city concept and its services. The questionnaire includes three main parts as presented and takes approximately 10 minutes to complete. The first part consists of four questions related to demographic characteristics, including gender, age group, educational level, and current city. The second part includes 10 questions covering participants’ perceptions and interests about the concept of the smart city, its services, and their use of these services. The third part addresses four challenges associated with smart city infrastructure, including information security risks, privacy violations, incompatibilities between different systems, and digital skills gaps identified through the literature review. There are three sub sections for each potential challenges : (1) the potential causes, (2) the severity of the impacts , (3) proposed solutions.

Section 1: Demographic information

What is your sex?

What is your age range?

What is your education level?

Master or higher

What is your current city?

Section 2: Smart City Concept and Services.

How well do you know the concept of smart cities?

I have no knowledge 

Very little 

Some knowledge 

Mention an example of any smart city project you know? Optional question

Smart cities aim to improve the quality of life using communications and information technologies. In your opinion, what are the positives? You can choose multiple answers.

Improved infrastructure: Smart cities use advanced technologies that improve transportation systems, energy networks, and waste management, which leads to reduced resource consumption and lower costs.

Effective transportation: Intelligent transportation systems integrate data and smart sensors to improve traffic flow and reduce congestion.

Improving safety and security: Smart cities use advanced monitoring systems, smart lighting, and emergency response mechanisms to enhance public safety.

Improving the quality of life: Smart cities focus on improving the quality of life of residents by providing smart health care systems, effective public services, and digital communication, which leads to improved access to basic services and increased comfort.

What are your concerns regarding the concept of smart cities? You can choose multiple answers?

Personal data privacy.

Lack of advanced technical skills.

Information security (such as cyber attacks, system collapse).

There are no fears.

how would you rate your participation and involvement in Saudi smart cities initiative?

i have no idea about it .

I heard but am not interested about it.

I am very interested but not involved

I participated in public forums about the initiative 

what is the type of smart city services that you think are more useful and fulfill population needs?

services that bring more stable and safer life

services that contribute to my relationship with other people

services that are conducive to my personal development,self -esteem and self actualization?

how you usually feel when you use e-services such as online mapping, navigation systems? 1 always 5 never

Do you read the disclaimers/conditions when you use a new device or application?

Yes, sometimes

Yes, always

will you stop using a device or installing an application Bea cause you do not accept the disclaimers/conditions?

what is the personal information that you will not give when you use a device or an application?

(a)Location tracking .

(b)Email address .

Phone number .

(d)Social media accounts .

Section 3: Potential challenges associated with smart cities:

1 (Likelihood of possible causes):

Please rate the likelihood of these causes from 1 (very low) to 5 (very high):

Challenge

Possible causes

Occurrence likelihood

1 2 3 4 5

Information Security

Weak security and encryption

 

Errors in systems design

Cyber attacks

Difficult to ensure end to end security due to large and interdependent systems with many stakeholders involved

Limited security sponsorship and management support

Human errors and negligent staff

Privacy

Data of user used without prior consent or notification

 

Lack of user knowledge and awareness about data Protect

 

There are no strict regulations to protect user data

 

Compatibility and integration

Incompatible formats and data standards

 

Independent development and non-integrated services and operations

 

Difficult to handle with a large number of stakeholders

 

Technology skills

Unavailability of digital services and Internet access

 

Lack of services quality

 

Care for people with special needs Not as required

 

Lack of training programs for citizens

 

2 The impact of these challenges

Please rate the severity of each impact from 1 (very low) to 5 (very high)

Challenge

Impact

Severity

1 2 3 4 5

Information Security

System failure and inability to respond

 

Failure to maintain users' confidential information

 

Privacy

Citizen tracking, Information exposure, or impersonation

 

Risking lose users' trust

 

Compatibility and integration

Wasting resources and not exploiting them properly

 

The efficiency of smart cities is not as required

 

Dissatisfaction of citizens

 

Technology skills

Social inequality among citizens

 

The effectiveness of smart cities is not as required

 

3 The effectiveness of some proposed solutions)

Please rate the effectiveness of these solutions from 1 (very low) to 5 (very high):

Challenge

Solution

Effectiveness

1 2 3 4 5

Information security

Take more preventive measures such as frequent backups, software updates, antivirus software

 

Developing very specific standards for managing ICT services.

 

Improving security awareness and availability safeguards

 

Implement the cybersecurity strategy in the best way

 

Privacy

Setting standards for how published data could be collected and used

 

Training and awareness programs to raise users' awareness about maintaining privacy

 

A regulation for data sharing, and giving the user full control over his own data

 

Compatibility and integration

Improving cooperation between different relevant stakeholders

 

Develop an integration plan for all systems and data in the design stage

 

Technology skills

Appropriate pricing for Internet services and smart devices

 

Providing technical education and training

 

Improving public services and promoting information literacy

 

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Abuali, A., Alharthi, W., Althbyani, M. et al. The Challenges and Opportunities of Smart Cities Infrastructure. SN COMPUT. SCI. 5 , 713 (2024). https://doi.org/10.1007/s42979-024-03033-7

Download citation

Received : 12 March 2024

Accepted : 03 June 2024

Published : 17 July 2024

DOI : https://doi.org/10.1007/s42979-024-03033-7

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • ICT challenges
  • Information insecurity
  • Compatibility
  • Technology skills

Advertisement

  • Find a journal
  • Publish with us
  • Track your research

DigitalCommons@University of Nebraska - Lincoln

  • < Previous Article
  • Next Article >

Home > Libraries > Library Philosophy and Practice - Electronic Journal > 4978

Libraries at University of Nebraska-Lincoln

Library Philosophy and Practice (e-journal)

Library Philosophy and Practice (e-journal)

A systematic literature review : the influence of information technology and organizational learning on performance.

Merlin Apriliyanti , UIN Sunan Ampel Surabaya Follow Ilham M , Airlangga University of Surabaya Indonesia Follow Dian Ekowati , Airlangga University of Surabaya Indonesia Follow Tanti Handriana , Airlangga University of Surabaya Indonesia Follow

Date of this Version

Winter 1-9-2021

Document Type

This studi is to discuss the information technology enabler is a strategic asset in creating competitive advantage. The contribution of information technology investment to company performance does not appear immediately, but is independent in supporting business activities.

This Study is to discuss about literature review of Information technology enabler is a strategic asset in creating competitive advantage. The contribution of information technology investment to company performance does not appear immediately, but is independent in supporting business activities. The ability and mastery of information technology is not necessarily effective in contributing to company performance. Organizational learning plays a role in mediating the relationship between Information Technology enablers and company performance. This study aims to conduct a systematic literature review of research in the field of Information Technology Enabler and learning organization and performance with data from all international research publications. This study uses the Systematic Literature Review method and the research data using the Services Analyze Search Results from Scopus and the VOSviewer application. The data obtained in this study amounted to 113 academic documents published from 1994 to 2020 globally. The results showed that the most productive institutions and individual researchers at the global level in the publication of Enabler Information Technology and Leraning Organization and Performance with the most researchers were Huo, B. and Lobo, S.R. and Samaranayake, P. with 2 documents. Then the most publications occurred in 2020 with 20 documents, the most documents by country from the Enabler Information Technology and Leraning Organization and Performance Studies were the United Kingdom and the United State with 18 documents. The results of the systematic literature review can be concluded that there is a significant effect of information technology enablers and organizational learning on organizational performance.

Since February 25, 2021

Included in

Business Administration, Management, and Operations Commons , Business Analytics Commons , Business and Corporate Communications Commons , Management Information Systems Commons , Management Sciences and Quantitative Methods Commons , Performance Management Commons , Technology and Innovation Commons

Advanced Search

Search Help

  • Notify me via email or RSS
  • Library Philosophy and Practice - Electronic Journal Website
  • Copyright Statement
  • Instructions for Authors
  • Advice for Contributors
  • Collections
  • Disciplines

Author Corner

  • Submission Guidelines
  • Guide to Submitting
  • Submit your paper or article
  • Libraries Website
  • Library Philosophy and Practice Editorial Board

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

jpm-logo

Article Menu

literature review on information technology

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Bioinformatics in neonatal/pediatric medicine—a literature review.

literature review on information technology

Share and Cite

Rallis, D.; Baltogianni, M.; Kapetaniou, K.; Kosmeri, C.; Giapros, V. Bioinformatics in Neonatal/Pediatric Medicine—A Literature Review. J. Pers. Med. 2024 , 14 , 767. https://doi.org/10.3390/jpm14070767

Rallis D, Baltogianni M, Kapetaniou K, Kosmeri C, Giapros V. Bioinformatics in Neonatal/Pediatric Medicine—A Literature Review. Journal of Personalized Medicine . 2024; 14(7):767. https://doi.org/10.3390/jpm14070767

Rallis, Dimitrios, Maria Baltogianni, Konstantina Kapetaniou, Chrysoula Kosmeri, and Vasileios Giapros. 2024. "Bioinformatics in Neonatal/Pediatric Medicine—A Literature Review" Journal of Personalized Medicine 14, no. 7: 767. https://doi.org/10.3390/jpm14070767

Article Metrics

Further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

ACM Digital Library home

  • Advanced Search

Artificial intelligence techniques in financial trading: : A systematic literature review

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options, recommendations, neural networks, financial trading and the efficient markets hypothesis.

The efficient markets hypothesis asserts that the price of an asset reflects all of the information that can be obtained from past prices of the asset. A direct corollary of this hypothesis is that stock prices follow a random walk, and that any profits ...

Artificial Intelligence in Financial Markets: Cutting Edge Applications for Risk Management, Portfolio Optimization and Economics

Information, published in.

Elsevier Science Inc.

United States

Publication History

Author tags.

  • Financial trading
  • Artificial intelligence
  • Financial technology
  • Review-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

IMAGES

  1. (PDF) A systematic literature review on Information Technology and

    literature review on information technology

  2. 📗 Literature Review on Information Technology in Business. Free Essay

    literature review on information technology

  3. (PDF) The Impact of Technology On Teaching and Learning In Higher

    literature review on information technology

  4. Use of Information Technology on Performance-2

    literature review on information technology

  5. (PDF) Literature Review of Information Technology Adoption Models at

    literature review on information technology

  6. (PDF) Information Technology Research in the Academy

    literature review on information technology

VIDEO

  1. Information Technology Essay writing in English..Short Essay on Technology Information in 150 words

  2. Systematic Literature Review, Part 2: How

  3. Systematic Literature Review- Part 1, What and Why

  4. Lesson 2, Topic Selection

  5. what is information technology

  6. LITERATURE REVIEW- Introduction and Methodology | THE SERIES

COMMENTS

  1. (PDF) Literature Review of Information Technology Adoption Models at

    In this study, we review theories for adoption models at the firm level used in inform ation systems (IS) literature and discuss two prom inent m odels, presented in Section 2. The two models ...

  2. Information technology adoption: a review of the literature and

    In the information systems (IS) domain, technology adoption has been one of the most extensively researched areas. Although in the last decade various models had been introduced to address the acceptance or rejection of information systems, there is still a lack of existing studies regarding a comprehensive review and classification of researches in this area. The main objective of this study ...

  3. The role of IT in organizational innovation

    The most recent review on the role of information technology in organizational innovation focused on literature published prior to 2010 (Kohli and Melville, 2019). Cross-theoretic knowledge integration is essential in advancing theory development (Rivard, 2020, Rivard, 2014). We offer a synthesis of the core theoretical discourses in extant ...

  4. The role of information technology in the organization: a review, model

    This paper reviews and extends recent scholarly and popular literature to provide a broad overview of how information technology (IT) impacts organizational characteristics and outcomes. ... impacts organizational characteristics and outcomes. First, based on a review of the literature, we describe two of the principal performance enhancing ...

  5. Technology Trust 2021 literature reviews

    One implication of Li et al.'s (2020) work is that AI-supported, ontology-based searches may effectively prevent some of the screening burden through better precision. Overall, the two screening steps are therefore among the most time-consuming activities of the literature review process (Carver et al., 2013).

  6. Literature review: Understanding information systems strategy in the

    The Chen et al. (2010) study identified three different conceptions of IT/IS strategy prevailing in the literature: (1) "the use of IT to support business strategy", (2) "the master plan of the IS function", and (3) "the shared view of the IS role within the organization". The first conception looks upon IT/IS strategy as instrumental and as an "extended arm" of business strategy.

  7. Making the most of information technology & systems usage: A literature

    This detailed literature review has considered a relatively large quantity (152 total) of scholarly empirical publications, conference proceedings, books and popular market reports published over the last 15 years, i.e., from January 2000 to December 2014, in the field of human continuous usage behavior and in the context of information technology/systems.

  8. [PDF] Literature Review of Information Technology Adoption Models at

    This study reviews theories for adoption models at the firm level used in information systems literature and discusses two prominent models: diffusion on innovation (DOI) theory, and the technology, organization, and environment (TOE) framework. : Today, information technology (IT) is universally regarded as an essential tool in enhancing the competitiveness of the economy of a country. There ...

  9. Literature Review of Information Technology

    This review will fill this gap. In this study, we review theories for adoption models at the firm level used in information systems literature and discuss two prominent models: diffusion on innovation (DOI) theory, and the technology, organization, and environment (TOE) framework.

  10. PDF Introduction to the Special Issue: The Literature Review in Information

    The first motivation for this special issue was to challenge the prevailing orthodoxy in information systems research, the "narrative synthesis" of previous literature, conducted by verbally describing past studies (King & He, 2005). Usually, the voice of the researcher in a narrative review is absent and an objective stance is adopted.

  11. PDF ICT in Education: A Critical Literature Review and Its Implications

    ABSTRACT. This review summarizes the relevant research on the use of information and communication technology (ICT) in education. Specifically, it reviews studies that have touched upon the merits of ICT integration in schools, barriers or challenges encountered in the use of ICT, factors influencing successful ICT integration, in-service and ...

  12. (PDF) Literature Review of Information Technology Adoption Models at

    Literature Review of Information Technology Adoption Models at Firm Level Tiago Oliveira and Maria Fraga Martins ISEGI, Universidade Nova de Lisboa, Lisbon, Portugal [email protected] [email protected] Abstract: Today, information technology (IT) is universally regarded as an essential tool in enhancing the competitiveness of the economy ...

  13. PDF The Academic Discipline of Information Technology: A Systematic

    The findings of this research align with the four elements of the discipline suggested by Said et al. (2021). Their framework suggests four in-dependent components for the discipline of information technology: People, Information, Technol-ogy of the time, and the solutions or needs that connect them.

  14. A Systematic Literature Review : The Influence of Information

    This Study is to discuss about literature review of Information technology enabler is a strategic asset in creating competitive advantage. The contribution of information technology investment to company performance does not appear immediately, but is independent in supporting business activities.

  15. Information Technology Investments: A Literature Review

    View PDF. 1356 Business Transformation through Innovation and Knowledge Management: An Academic Perspective Information Technology Investments: A Literature Review Rifat O. Shannak, Associate Professor of MIS, Chairman of Department of MIS, Faculty of Business, University of Jordan, ,11942 Amman, Jordan, [email protected], Ra'ed (Moh'd ...

  16. DigitalCommons@University of Nebraska

    ABSTRACT. This study aims to conduct a systematic literature review of research in the field of Information Technology Capital and Performance with data from all international research publications. The data obtained in this study amounted to 113 academic documents published from 1994 to 2020 globally.

  17. The economic impacts of information and communication technologies in

    Recognizing the pivotal role of information and communication technologies (ICTs) in generating economic benefits within the tourism and hospitality industry, this research aimed to develop a compr...

  18. Literature Review Making the most of information technology & systems

    Previous literature reviews on information technology & systems usage. A difference is observed between and among the terms 'review,' 'literature review' and 'meta-analysis'. As explained by Frohberg, Göth, and Schwabe (2009), a review is broader than a literature review but less empirical than a meta-analysis.

  19. "A Systematic Literature Review : Information Technology Capital and Pe

    This study aims to conduct a systematic literature review of research in the field of Information Technology Capital and Performance with data from all international research publications. The data obtained in this study amounted to 113 academic documents published from 1994 to 2020 globally. Research has discussed a lot about the causal relationship between information technology capital and ...

  20. PDF The Role of the Discipline of Information Technology: A Systematic

    This publication leverages a systematic literature review to identify factors that classify existing higher education programs within the discipline of in-formation technology. Research in this area can act as a catalyst to increase relevance of IT related programs as well as graduation rates in technology and engineering.

  21. Literature Review Topics in Information Technology

    A literature review is an interesting and crucial work and it is important to select an appropriate topic to approach effectively. To conduct the literature review work in the domain of Information technology (IT), we list out various suitable literature review topics that satisfy different research areas and are relevant to basic concepts as well as latest patterns:

  22. PDF Literature Review on the Use of Technology and Information ...

    literature. Factors in Technology Use, Information Systems and AIS Implementation Literature shows that organizational characteristics have an impact on the implementation of any information system or accounting information system (Thong, 1999). Thong in his work also added the competition in the market and information intensity in the sector as an

  23. The Challenges and Opportunities of Smart Cities Infrastructure

    Information communications technology (ICT) refers to the technology used for communication and managing information must be utilized to enhance the environment, economics, mobility, and governance, among other facets of urban life, in order to create smart cities. ... Based on the current literature review on Associated Information and ...

  24. A Systematic Literature Review : The Influence of Information

    This Study is to discuss about literature review of Information technology enabler is a strategic asset in creating competitive advantage. The contribution of information technology investment to company performance does not appear immediately, but is independent in supporting business activities. The ability and mastery of information technology is not necessarily effective in contributing to ...

  25. Information Technology and Productivity: A Review of the Literature

    In principle, multifactor productivity is a better measure INFORMATION TECHNOLOGY AND PRODUCTIVITY 183 0 of a firm or industry's efficiency because it adjusts for shifts among inputs, such as substituting capital equipment for labor. However, the data needed to calculate multifactor productivity are more complex.

  26. Bioinformatics in Neonatal/Pediatric Medicine—A Literature Review

    Bioinformatics is a scientific field that uses computer technology to gather, store, analyze, and share biological data and information. DNA sequences of genes or entire genomes, protein amino acid sequences, nucleic acid, and protein-nucleic acid complex structures are examples of traditional bioinformatics data. Moreover, proteomics, the distribution of proteins in cells, interactomics ...

  27. Artificial intelligence techniques in financial trading: : A systematic

    Artificial Intelligence (AI) approaches have been increasingly used in financial markets as technology advances. In this research paper, we conduct a Systematic Literature Review (SLR) that studies financial trading approaches through AI techniques. It reviews 143 research articles that implemented AI techniques in financial trading markets.

  28. Full article: A literature review on construction project success

    This literature review emphasizes the importance of stakeholder-responsive success criteria and appropriate evaluation techniques for the construction industry. ... Goshu Gebremikael Beshah is a doctoral candidate in construction technology and management at Addis Ababa Science and Technology University and a holder of a Master of Construction ...