Now showing 1 - 5 of 5
  • Publication
    Influence of Shadow IT on Innovation in Organizations
    (RTU Press, 2016-10-07) ;
    Silic, Dario
    ;
    Oblakovic, Goran
    Shadow IT is relatively new and emerging phenomenon which is bringing number of concerns and risks to the organizational security. Past literature has mostly explored the “negative” effects of the Shadow IT phenomenon, including, for example, the security aspect where Shadow systems are said to undermine the official systems and endanger organizational data flows. However, the question of how Shadow IT can contribute to leverage user’s innovation has not been adequately addressed. We used three methods to understand if Shadow IT can be an important source of innovation for firms: 1) Single case study with international firm that adopted Shadow IT; 2) Interviews with 15 IT executives and 3) Focus group using twitter as enabling tool to interact with 65 IT professionals. We offer a new perspective on how Shadow IT practices can leverage user’s innovation. The study offers novel insights on the role of Shadow users in the organizational innovation process and how they contribute to new innovations by using Shadow IT. Not only this user led innovation through Shadow IT brings positive outcomes for the employee, but it also reveals the path to follow for organizations to increase their innovation capabilities.
    Type:
    Journal:
    Issue:
  • Publication
    Email: from hero to zero - the beginning of the end?
    (Palgrave Macmillan, 2015-11-01) ; ;
    Silic, Dario
    In 2011, the CEO of Atos, Thierry Breton, announced an unprecedented move for the company. The global information services giant would become a ‘zero’ email company with the objective of eradicating internal email use and replacing it with blueKiwi – enterprise social network software. This case serves to teach the challenges and key lessons behind the social collaboration transformation in a large organization where 76,000 employees switched to a new mode of collaboration. The approach of how to become a zero email company is detailed, highlighting the importance of the first-order and second-order change. The case helps to understand what it takes to shift organizational culture and employee mindset, as well as what challenges and barriers need to be overcome to make such an important step on a large organizational scale.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 2
  • Publication
    Taxonomy of technological risks of open source software in the enterprise adoption context
    (Emerald, 2015-10-15) ; ;
    Silic, Dario
    Purpose - The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy. Design/methodology/approach - The authors conducted an extensive literature review followed by expert interviews and applied the method for taxonomy development. Findings - This research has identified an integrative OSS risk taxonomy composed of 8 categories with 51 risk items. Originality/value - This taxonomy is a very useful tool for practitioners during the decision-making process when evaluating, assessing and calculating risks related to OSS adoption. Moreover, researchers can use it as a starting point for future studies to better understand the OSS phenomenon.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 12
  • Publication
    Atos - Towards Zero Email Company
    (Association for Information Systems, 2015-05-28) ; ;
    Silic, Dario
    In 2011, the CEO of Atos, Thierry Breton, announced an unprecedented move for Atos. The global information services giant become a "zero" email company with the objective of eradicating internal e-mail use and replacing it with blueKiwi - enterprise social network software. This case serves to teach the challenges and key lessons behind the social collaboration transformation in a large organisation where 76,000 employees switched to a new mode of collaboration. The approach of how to become a "zero" email company is detailed, highlighting the importance of the first-order and second-order change. The case helps to understand what it takes to shift organisational culture and employee mindset, as well as what challenges and barriers need to be overcome to make such an important step on a large organisational scale.
  • Publication
    Health Belief Model and Organizational Employee Computer Abuse
    (Springer, 2018) ;
    Njavro, Mato
    ;
    Silic, Dario
    ;
    Oblakovic, Goran
    ;
    Nah, Fiona Fui-Hoon
    ;
    Xiao, Bo Sophia
    This study is set out to examine the determinants that drive preventive/protective as well as abusive behaviors among employees in the context of information security by extending the health belief model - a model set out to explain and predict healthy behaviors in human beings. A field experiment, accompanied by online surveys in two financial organizations in the US and India is conducted, measuring employees’ actual security behaviors. We identified factors (perceived susceptibility, perceived barriers, and self-efficacy) that have the largest effect on employee’s security behaviors. We offer several theoretical contributions and implications for practice.