Information Technology Kreiner, Glen E., Article Review

S. (2007). the Impact of Technostress on Role Stress and Productivity. Journal of Management

Information Systems 24(1): 301 -- 328.

The researchers collected data from two public sector organizations in the United States. The researchers mail out 264 questionnaires to the employees of these organizations and 233 were returned to the researchers. The researchers did not explain how the two organizations were initially chosen. It is possible that this initial choice was convenience based.

The researchers used exploratory factor analysis (EFA) to identify a five-factor structure that represented the underlying components of techno stress. De Coster (1988) posits that EFA, traditionally, has been used to explore the possible underlying factor structure of a set of observed variables without imposing a preconceived structure on the outcome.

Confirmatory factor analysis (CFA) used to validate the factor structure of a set of observed variables. CFA provides the researcher with the ability confirm the hypothesis that "a relationship between observed variables and their underlying latent constructs exists." So that the initial set of factors identified by EFA are then confirmed to be theoretically connected, to the concept by CFA.

This article makes several important contributions to the literature in the field by identifying different dimensions of techostress thus adding to the...

...

It also demonstrates that technostress inversely affects productivity, thus clearly presenting an area for manipulation to increase productivity in organizations. Finally, the determination that there is a relationship between technostress and role stress provides a new vista of inquiry for researchers in the organizational arena.
The authors noted that the high response rate was because of upper management support; I wondered whether this support also filtered into the responses themselves. So that employees answered as they felt they should. The article however provided a very useful connection between technological work and the attendant stresses. It would be appealing to have a sociological approach to the issue that considers how power influences the underlying stress of the employee.

Sources Used in Documents:

References

DeCoster, J. (1998). Overview of Factor Analysis. Retrieved from http://www.stat-

help.com/notes.html

Kreiner, Glen E., Hollensbe, Elaine C., & Sheep Matthew L. (2009). Balancing Borders and bridges: Negotiating the work-home interface via boundary work tactics. Academy of Management Journal 52, 4:704 -- 730.

Tarafdar Monideepa, Tu, Qiang, Bhanus, S., Ragu-Nathan, & Ragu-Nathan T.S.(2007). the


Cite this Document:

"Information Technology Kreiner Glen E " (2011, January 30) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/information-technology-kreiner-glen-e-5200

"Information Technology Kreiner Glen E " 30 January 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/information-technology-kreiner-glen-e-5200>

"Information Technology Kreiner Glen E ", 30 January 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/information-technology-kreiner-glen-e-5200

Related Documents

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

Information Technology (IT) is a broad-based term that includes a combination of the acquisition, processing, storage and dissemination of information in a computing or telecommunications platform. In terms of a scientific discipline, it is relatively new, appearing in a 1958 article in the Harvard Business Review in which the authors said, "this new technology does not yet have a single established name. We shall call it information technology (IT)" (Dunn,

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

In the nursing field, there is becoming a concept such as the digital divide among nurses. Even though many nurses are familiar with the Internet and access it on a daily basis, there are some nurses who are familiar with other emerging technologies as it pertains to nursing and there are some nurses who feel that navigating the Internet is the only technology they need to know (Lupianez-Villanueva et