J. Ellis Blanton
University of South Florida
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by J. Ellis Blanton.
Management Information Systems Quarterly | 1992
J. Ellis Blanton; Hugh J. Watson; Janette Moody
The role of information technology (IT) has changed from being merely a tool for processing transactions to a weapon that can affect an organizations competitive position. Because of this change, previous organizational structures for IT groups ma no longer be adequate. Organizational theorists have shown that the appropriate structure is influenced by the organizations external environment and strategy. The study contributes toward a better understanding of IT organization by exploring the relationship between the organizational structure of IT groups and the effectiveness of IT support in two companies with similar IT environments. Specifically, the study uses: (1) qualitative analysis to examine IT organizational structure in two very similar companies; (2) quantitative analysis to determine which company has more effective IT support; and (3) an expert panel to identify those difference sin IT organizational structure that appear to facilitate effective IT support. Several propositions from these findings are presented and discussed.
European Journal of Information Systems | 2010
Tim Klaus; J. Ellis Blanton
User resistance is an important issue in the implementation of enterprise systems (ES). However, despite a large body of user acceptance literature, there is far less literature addressing user resistance. This study seeks to better understand the development of user resistance. Information is obtained and triangulated in this study from a focus group and semi-structured user interviews from three organizations. Through the lens of the psychological contract employees have with their organization, user resistance is investigated. Twelve determinants were found that upset the psychological contract and affect the level of user resistance. These determinants have been classified into four key categories which expand on previous literature: individual, system, organizational, and process issues. The relationships among these concepts and both the theoretical and practical contributions of this study are discussed.
Journal of Management Information Systems | 1998
Janette Moody; J. Ellis Blanton; Paul H. Cheney
The interview has long been a part of the system professionals repertoire of elicitation techniques, used extensively in both requirements analysis and knowledge acquisition. Unfortunately, although interviewing is a widely recommended elicitation technique, the literature offers little in the way of theoretically grounded support or advice on exactly how the interview should be conducted and what format should be used.This paper reports the findings of a study that compared the efficiency and effectiveness of the cognitive interview with the standard information requirements interview in an experiment using reference librarians as interviewees. The cognitive interview was found to be both more effective and more efficient than standard interviewing techniques in eliciting episodic knowledge from reference librarians. Use of the cognitive interview resulted in a richer recall, in terms of both breadth and depth, of details relevant to the task domain.
Journal of Computer Information Systems | 2016
Cynthia LeRouge; Sandra K. Newton; J. Ellis Blanton
Information systems (IS) workers need an appropriate skill set to effectively exploit technology innovations. Social constructivist theory would indicate that some aspect of a systems analysts job evolution is attributable to the nature of both their perceptions of importance for various job skills and preferences toward using their professional job skills. Self-report survey data gathered from 124 systems analysts reveal analysts collectively recognize all skill dimensions explored have some degree of importance to their role. Systems analysts seem to perceive their role as a socio-technical function and desire this functional duality as they rank interpersonal skills and system development skills significantly higher than political skills and knowledge, technology skills, and business task knowledge for both preferences to use and perceptions of importance. Results show differences exist in perceptions and preferences among the sexes and age groups studied. Findings will add to the existing body of IS human resources research, and provide job development and career planning.
Journal of Information Technology | 2010
Tim Klaus; Stephen C. Wingreen; J. Ellis Blanton
This paper is an initial investigation into types of user resistance and the management strategy expectations of users in a mandatory adoption setting. Despite its relationship to adoption, relatively little is known about user resistance. User resistance is investigated in the Enterprise System (ES) environment because the complexity and richness of ES leads users to manifest a large range of resistant behaviors and beliefs. Using Concourse Theory and Q-methodology, ES users are interviewed followed by the development of a Q-sort questionnaire, which was distributed to ES users. The results reveal eight user groups and address the management strategies preferred by each group. The results have implications for both research in the field of user resistance and adoption, and practitioners involved in system implementation.
acm sigcpr sigmis conference on computer personnel research | 2007
Tim Klaus; Stephen C. Wingreen; J. Ellis Blanton
This paper is an initial investigation of the management strategies best suited to address user resistance. Despite its relationship to adoption, little is known about user resistance. User resistance is investigated in the enterprise systems (ES) environment because the complexity and richness of ES leads users to manifest the full range of resistant behaviors and beliefs. The Q-methodology revealed eight naturally-existing types of ES resistance and the management strategies preferred by each respective group. The results have implications for both research in the field of user resistance and adoption, and practitioners involved in system implementation.
ACM Sigcpr Computer Personnel | 1998
J. Ellis Blanton; Thomas Schambach; Kenneth J. Trimmer
Design and development of effective information technology (IT) based systems depends upon a staff of competent information technology professionals (ITPs). Due to the rapid pace of technological innovation, diverging application of IT, and changing role responsibilities of ITPs, it is becoming increasingly difficult for ITPs to maintain up-to-date professional competency.Although not extensively examined in IT research, professional obsolescence threats have been acknowledged and evaluated in referent research. Psychologists studying the engineering discipline have suggested individual characteristics, nature of work, and organizational climate as being important determinants of obsolescence.The purpose of this study was to evaluate the relationships between individual personality differences and manageable work context factors and the degree of professional competency, or conversely obsolescence of ITPs. Structural equation modeling was employed in evaluating the direct-effects model of professional competency. The study used questionnaires to obtain 161 usable self-report responses from systems analysts. The results suggest that individual personality differences and factors of the work environment do effect professional competency levels. Overall, the research model accounted for 44% of the variance in ITP competency.
acm sigcpr sigmis conference on computer personnel research | 2005
Stephen C. Wingreen; J. Ellis Blanton; Sandra K. Newton; Madeline Ann Domino
The Q-methodology was employed to address the managerial problem of deciding which of the firms personnel development resources should be aimed at which personnel, or groups of personnel, through the various venues of development that are available to the firm for the development of its IT workforce. The procedure identified six interpretable groups of IT professionals that seem to be associated with the development priorities of the IT management, analytical, development & programming, and operations functions. Opportunities are identified for both future research and the practical application of the Q-methodology, its associated instrumentation, and analytical procedure as a managerial decision tool in the context of the internal development of the firms IT personnel to meet the firms goals.
special interest group on computer personnel research annual conference | 2000
Kenneth J. Trimmer; Rosann Webb Collins; Richard P. Will; J. Ellis Blanton
Successful information systems development (ISD) is a perennial concern of both practitioners and researchers. As the scope of ISD expands to provide enterprise-wide and web-based systems, the set of individuals in ISD includes many whose responsibilities and experiences cross organizational functions. The involvement of this diverse set of individuals in ISD can lead to increased levels of conflict within the development group. However, not all conflict is detrimental to organizational tasks. This paper presents conflict and the resulting conflict resolution as a facet of team development. Conflict can take two general forms. The first form of conflict, interpersonal, has a negative or dysfunctional impact on group tasks and relations, and can lead to turnoever. The second form, task conflict, has a positive impact on group tasks. The need for ISD teams to recognize different types of conflict and successfully resolve them is presented within the context of an overall model of team and systems development.
Information & Management | 1992
Gilbert W. Joseph; J. Ellis Blanton
Abstract Computer infectors (such as logic bombs, worms, and viruses) represent a growing concern among information system (IS) professionals. Infectors may be introduced to systems intentionally by employees or by an unknown assailant under the guise of a Trojan horse or through more direct infection means. This paper identifies the organizational and technical aspects of a total infector control program. Since eradication and recovery controls cannot guarantee total damage removal, the primary objective of an infector control program is generally identified as preventing an infection. However, whether an organization should properly emphasize prevention/ detection or recovery depends on the organizations appraisal of infector threats and risks.