Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where J. Ellis Blanton is active.

Publication


Featured researches published by J. Ellis Blanton.


Management Information Systems Quarterly | 1992

Toward a better understanding of information technology organization: a comparative case study

J. Ellis Blanton; Hugh J. Watson; Janette Moody

The role of information technology (IT) has changed from being merely a tool for processing transactions to a weapon that can affect an organizations competitive position. Because of this change, previous organizational structures for IT groups ma no longer be adequate. Organizational theorists have shown that the appropriate structure is influenced by the organizations external environment and strategy. The study contributes toward a better understanding of IT organization by exploring the relationship between the organizational structure of IT groups and the effectiveness of IT support in two companies with similar IT environments. Specifically, the study uses: (1) qualitative analysis to examine IT organizational structure in two very similar companies; (2) quantitative analysis to determine which company has more effective IT support; and (3) an expert panel to identify those difference sin IT organizational structure that appear to facilitate effective IT support. Several propositions from these findings are presented and discussed.


European Journal of Information Systems | 2010

User resistance determinants and the psychological contract in enterprise system implementations

Tim Klaus; J. Ellis Blanton

User resistance is an important issue in the implementation of enterprise systems (ES). However, despite a large body of user acceptance literature, there is far less literature addressing user resistance. This study seeks to better understand the development of user resistance. Information is obtained and triangulated in this study from a focus group and semi-structured user interviews from three organizations. Through the lens of the psychological contract employees have with their organization, user resistance is investigated. Twelve determinants were found that upset the psychological contract and affect the level of user resistance. These determinants have been classified into four key categories which expand on previous literature: individual, system, organizational, and process issues. The relationships among these concepts and both the theoretical and practical contributions of this study are discussed.


Journal of Management Information Systems | 1998

A theoretically grounded approach to assist memory recall during information requirements determination

Janette Moody; J. Ellis Blanton; Paul H. Cheney

The interview has long been a part of the system professionals repertoire of elicitation techniques, used extensively in both requirements analysis and knowledge acquisition. Unfortunately, although interviewing is a widely recommended elicitation technique, the literature offers little in the way of theoretically grounded support or advice on exactly how the interview should be conducted and what format should be used.This paper reports the findings of a study that compared the efficiency and effectiveness of the cognitive interview with the standard information requirements interview in an experiment using reference librarians as interviewees. The cognitive interview was found to be both more effective and more efficient than standard interviewing techniques in eliciting episodic knowledge from reference librarians. Use of the cognitive interview resulted in a richer recall, in terms of both breadth and depth, of details relevant to the task domain.


Journal of Computer Information Systems | 2016

Exploring the Systems Analyst Skill Set: Perceptions, Preferences, Age, and Gender

Cynthia LeRouge; Sandra K. Newton; J. Ellis Blanton

Information systems (IS) workers need an appropriate skill set to effectively exploit technology innovations. Social constructivist theory would indicate that some aspect of a systems analysts job evolution is attributable to the nature of both their perceptions of importance for various job skills and preferences toward using their professional job skills. Self-report survey data gathered from 124 systems analysts reveal analysts collectively recognize all skill dimensions explored have some degree of importance to their role. Systems analysts seem to perceive their role as a socio-technical function and desire this functional duality as they rank interpersonal skills and system development skills significantly higher than political skills and knowledge, technology skills, and business task knowledge for both preferences to use and perceptions of importance. Results show differences exist in perceptions and preferences among the sexes and age groups studied. Findings will add to the existing body of IS human resources research, and provide job development and career planning.


Journal of Information Technology | 2010

Resistant groups in enterprise system implementations: a Q-methodology examination

Tim Klaus; Stephen C. Wingreen; J. Ellis Blanton

This paper is an initial investigation into types of user resistance and the management strategy expectations of users in a mandatory adoption setting. Despite its relationship to adoption, relatively little is known about user resistance. User resistance is investigated in the Enterprise System (ES) environment because the complexity and richness of ES leads users to manifest a large range of resistant behaviors and beliefs. Using Concourse Theory and Q-methodology, ES users are interviewed followed by the development of a Q-sort questionnaire, which was distributed to ES users. The results reveal eight user groups and address the management strategies preferred by each group. The results have implications for both research in the field of user resistance and adoption, and practitioners involved in system implementation.


acm sigcpr sigmis conference on computer personnel research | 2007

Examining user resistance and management strategies in enterprise system implementations

Tim Klaus; Stephen C. Wingreen; J. Ellis Blanton

This paper is an initial investigation of the management strategies best suited to address user resistance. Despite its relationship to adoption, little is known about user resistance. User resistance is investigated in the enterprise systems (ES) environment because the complexity and richness of ES leads users to manifest the full range of resistant behaviors and beliefs. The Q-methodology revealed eight naturally-existing types of ES resistance and the management strategies preferred by each respective group. The results have implications for both research in the field of user resistance and adoption, and practitioners involved in system implementation.


ACM Sigcpr Computer Personnel | 1998

Factors affecting professional competence of information technology professionals

J. Ellis Blanton; Thomas Schambach; Kenneth J. Trimmer

Design and development of effective information technology (IT) based systems depends upon a staff of competent information technology professionals (ITPs). Due to the rapid pace of technological innovation, diverging application of IT, and changing role responsibilities of ITPs, it is becoming increasingly difficult for ITPs to maintain up-to-date professional competency.Although not extensively examined in IT research, professional obsolescence threats have been acknowledged and evaluated in referent research. Psychologists studying the engineering discipline have suggested individual characteristics, nature of work, and organizational climate as being important determinants of obsolescence.The purpose of this study was to evaluate the relationships between individual personality differences and manageable work context factors and the degree of professional competency, or conversely obsolescence of ITPs. Structural equation modeling was employed in evaluating the direct-effects model of professional competency. The study used questionnaires to obtain 161 usable self-report responses from systems analysts. The results suggest that individual personality differences and factors of the work environment do effect professional competency levels. Overall, the research model accounted for 44% of the variance in ITP competency.


acm sigcpr sigmis conference on computer personnel research | 2005

Assessing the IT training and development climate: an application of the Q-methodology

Stephen C. Wingreen; J. Ellis Blanton; Sandra K. Newton; Madeline Ann Domino

The Q-methodology was employed to address the managerial problem of deciding which of the firms personnel development resources should be aimed at which personnel, or groups of personnel, through the various venues of development that are available to the firm for the development of its IT workforce. The procedure identified six interpretable groups of IT professionals that seem to be associated with the development priorities of the IT management, analytical, development & programming, and operations functions. Opportunities are identified for both future research and the practical application of the Q-methodology, its associated instrumentation, and analytical procedure as a managerial decision tool in the context of the internal development of the firms IT personnel to meet the firms goals.


special interest group on computer personnel research annual conference | 2000

Information systems development: can there be “good” conflict?

Kenneth J. Trimmer; Rosann Webb Collins; Richard P. Will; J. Ellis Blanton

Successful information systems development (ISD) is a perennial concern of both practitioners and researchers. As the scope of ISD expands to provide enterprise-wide and web-based systems, the set of individuals in ISD includes many whose responsibilities and experiences cross organizational functions. The involvement of this diverse set of individuals in ISD can lead to increased levels of conflict within the development group. However, not all conflict is detrimental to organizational tasks. This paper presents conflict and the resulting conflict resolution as a facet of team development. Conflict can take two general forms. The first form of conflict, interpersonal, has a negative or dysfunctional impact on group tasks and relations, and can lead to turnoever. The second form, task conflict, has a positive impact on group tasks. The need for ISD teams to recognize different types of conflict and successfully resolve them is presented within the context of an overall model of team and systems development.


Information & Management | 1992

Computer infectors: prevention, detection, and recovery

Gilbert W. Joseph; J. Ellis Blanton

Abstract Computer infectors (such as logic bombs, worms, and viruses) represent a growing concern among information system (IS) professionals. Infectors may be introduced to systems intentionally by employees or by an unknown assailant under the guise of a Trojan horse or through more direct infection means. This paper identifies the organizational and technical aspects of a total infector control program. Since eradication and recovery controls cannot guarantee total damage removal, the primary objective of an infector control program is generally identified as preventing an infection. However, whether an organization should properly emphasize prevention/ detection or recovery depends on the organizations appraisal of infector threats and risks.

Collaboration


Dive into the J. Ellis Blanton's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kenneth J. Trimmer

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard P. Will

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge