98 resultados para 080600 INFORMATION SYSTEMS

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The advent of the World Wide Web (WWW) and the emergence of Internet commerce have given rise to the web as a medium of information exchange. In recent years, the phenomenon has affected the realm of transaction processing systems, as organizations are moving from designing web pages for marketing purposes, to web-based applications that support business-to-business (WEB) and business-to-consumer (B2C) interactions, integrated with databases and other back-end systems (Isakowitz, Bieber et al., 1998). Furthermore, web-enabled applications are increasingly being used to facilitate transactions even between various business units within a single enterprise. Examples of some of the more popular web-enabled applications in use today include airline reservation systems, internet banking, student enrollment systems in universities, and Human Resource (HR) and payroll systems. The prime motive behind the adoption of web-enabled applications are productivity gains due to reduced processing time, decrease in the usage of paper-based documentation and conventional modes of communication (such as letters, fax, or telephone), and improved quality of services to clients. Indeed, web-based solutions are commonly referred to as customer-centric (Li, 2000), which means that they provide user interfaces that do not necessitate high level of computer proficiency. Thus, organizations implement such systems to streamline routine transactions and gain strategic benefits in the process (Nambisan & Wang, 1999), though the latter are to be expected in the long-term. Notwithstanding the benefits of web technology adoption, the web has ample share of challenges for initiators and developers. Many of these challenges are associated with the unique nature of web-enabled applications. Research in the area of web-enabled information systems has revealed several differences with traditional applications. These differences exist with regards to system development methodology, stakeholder involvement, tasks, and technology (Nazareth, 1998). According to Fraternali (1999), web applications are commonly developed using an evolutionary prototyping approach, whereby the simplified version of the application is deployed as a pilot first, in order to gather user feedback. Thus, web-enabled applications typically undergo continuous refinement and evolution (Ginige, 1998; Nazareth, 1998; Siau, 1998; Standing, 2001). Prototype-based development also leads web-enabled information systems to have much shorter development life cycles, but which, unlike traditional applications, are regrettably developed in a rather adhoc fashion (Carstensen & Vogelsang, 2001). However, the principal difference between the two kinds of applications lies in the broad and diverse group of stakeholders associated with web-based information systems (Gordijn, Akkermans, et al., 2000; Russo, 2000; Earl & Khan, 2001; Carter, 2002; Hasselbring, 2002; Standing, 2002; Stevens & Timbrell, 2002). Stakeholders, or organizational members participating in a common business process (Freeman, 1984), vary in their computer competency, business knowledge, language and culture. This diversity is capable of causing conflict between different stakeholder groups with regards to the establishment of system requirements (Pouloudi & Whitley, 1997; Stevens & Timbrell, 2002). Since, web-based systems transcend organizational, departmental, and even national boundaries, the issue of culture poses a significant challenge to the web systems’ initiators and developers (Miles & Snow, 1992; Kumar & van Dissel, 1996; Pouloudi & Whitley, 1996; Li & Williams, 1999).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter overviews the existing methods of requirements analysis as prescribed by some of the best-known web-development methods. It also discusses the pre-eminent importance of stakeholder analysis, identification of stakeholder views and concerns, and the processes governing elicitation of web systems requirements. The chapter finally derives a model of concern-driven requirements evolution from several case studies undertaken in the area of web-enabled employee service systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Use of geographical information systems (GIS) in inland fisheries has hitherto been essentially restricted to site evaluation for aquaculture development and assessment of limnological changes in time and space in individual water bodies. The present GIS study was conducted on the land-use pattern of the catchments of nine reservoirs in Sri Lanka, for which detailed fishery data, viz. yield, fishing intensity, landing size of major constituent species, together with selected limnological data such as conductivity and chlorophyll-a, were available. Potential statistical relationships (linear, curvilinear, exponential and second-order polynomial) of fish yield (FY, in kg ha−1 yr−1) to different land-use patterns, such as forest cover (FC, in km2) and shrub-land (SL, in km2), either singly, or in combination, and/or the ratio of each land type to reservoir area (RA in km2) and reservoir capacity (RC in km3), were explored. Highly significant relationships were evident between FY to the ratio of SL and/or FC+SL to RA and/or RC. Similarly, the above land-use types to RA and RC ratios were significantly related to limnological features of the reservoirs. The relationships of FY to various parameters obtained in this study were much better correlated than those relationships of FY to limnological and biological parameters used in yield prediction in tropical and temperate lacustrine waters previously.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Eucalyptus crenulata is a rare species known from only two populations. The Buxton Silver Gum Reserve was set aside in 1978 for the conservation of the species, but this objective may be compromised by changes in the integrity of the landscape immediately surrounding the Reserve. A time sequence of aerial photos and Geographic Information Systems technology has been used to identify patterns of landscape change, and aid in determining appropriate management strategies to minimize negative impacts caused by landscape fragmentation and habitat exposure

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Geographic Information Systems (GIS) can be used to objectively measure features of the built environment that may influence adults’ physical activity, which is an important determinant of chronic disease. We describe how a previously developed index of walkability was operationalised in an Australian context, using available spatial data. The index was used to generate a stratified sampling frame for the selection of households from 32 communities for the PLACE (Physical Activity in Localities and Community Environments) study. GIS data have the potential to be used to construct measures of environmental attributes and to develop indices of walkability for cities, regions or local communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IS professionals are primarily concerned with the development of a project to meet the goals of a client. Unfortunately, IS professional do not always pay close attention to the contract or to its management and are often unaware of the legal implications of the contracts to which they are assenting. Legal advice can be sought during pre-contractual processes to help ensure that the contract meets the expectations of all the parties. If the project does not meet stakeholder’s expectations, thus causing a contract to come into dispute, lawyers may be called in to review the contract and to seek a settlement. This paper reports an exploratory study of the differences in perceptions of IS development contracts that exist between IS professionals and legal practitioners.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Universities are increasingly turning to ‘fashionable’ education programs to attract bright, high-quality students to both under-graduate and post-graduate degree programs. Traditional offerings in technology areas, such as Information Systems and Information Technology are being augmented by newer, more marketable degrees in areas such as eCommerce/eBusiness. This paper analyses the eCommerce/eBusiness and Information Systems (IS) / Information Technology (IT) academic programs in Australian and New Zealand universities on the basis of Kotler and Fox's service offering model of educational institutions; and considers what differences exist between these two apparently similar areas of academic endeavour. Finally we look at the trends of academic program delivery in the e-age and question whether universities need to take a more consumer-product approach to the issue of attracting appropriate students.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Outsourcing of Information Technology (IT) services which are central to business strategy may be risky. Managers have made the outsourcing decision both to concentrate financially on the core competencies and to rid themselves of a troublesome and cost inefficient department. More recent research has, however, cast doubt on the promises of huge savings. In this paper, we consider the likelihood that outsourcing may lead to the loss of organisational knowledge - that organisations outsourcing their total Information Systems operations may also have lost irreplaceable tacit, cross-functional knowledge which subsisted within the minds of the professional systems analysts. The findings of our research revealed that expert systems analysts possess a unique organisational understanding and draw on this knowledge to operate efficiently in their environment. We present a model that will allow future researchers to build on our findings and examine whether outsourcing can lead to a loss of organisational memory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information Systems have been used for many years to analyze problems and compare options in a managed environment. The introduction of computer and information security systems into such an environment is a typical example of a situation to which an Information Systems approach can be applied. In this paper, we examine the issues peculiar to implementation of security in a healthcare environment, looking specifically at one such specially designed system, SIM-ETHICS, which takes a participational approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Delivered information systems are an integral part of many organisations’ information technology infrastructure. Their dynamic nature creates new challenges, not the least of which is the need to measure the quality/effectiveness of these systems. Given the size of investment in these systems, it would be invaluable for business to formulate a fresh, simple, easy to administer, multi-dimensional instrument capable of measuring the quality of delivered information systems or applications. Such an instrument would provide a practical and efficient means to pinpoint areas that key stakeholders, ranging from end-users to managers, perceive as requiring attention. In this paper, we report on the development of one such instrument. This instrument addresses key areas of performance and uses multiple statements to enhance stakeholders’ understanding of these areas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper argues that the nature of IS research that deals with indigenous culture must be informed as much by context as it is by culture models, which has been the focus of such research in the past. This is considered important because it better reflects the meaning of the data collected for the researcher. To appreciate the importance of context this papers also argues that research subjects from designated individualist societies will inform the researcher in different ways from those subjects located in collectivist societies. To illustrate the practical implications of this argument the paper reports three separate case studies in IS research where the researchers reflect on the impact that a collectivist view has had on the research findings. The paper suggests that (1) similar ethnicity and appearance are significant in gaining the trust of subjects in a collectivist society; that is the researcher is part of the in-group as they belong to the same culture or ethnic group; that (2) who introduced the researcher to the subject is significant in that trust is best reflected when a member of the group/collective plays an important role in the research process itself; and that (3) an ability to (a) communicate in the natural language and (b) understand the implicit body language and (c) cultural codes is important in gaining significant and more meaningful research outcomes. This is enabled via the implicit meanings embedded in members of the collectivist society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses how interpersonal conflict between IS developers and clients can disrupt IS projects.  It is suggested how potential problems can be avoided by getting the 'soft' factors right which can lead to improvements in information systems development (ISD) processes.  However little is being done in most organisations to review success from this perspective.  Measurement of ISD quality tends to favour the product rather than the human drivers that influence the development of the product.  Several ideas are put forward that can be used to resolve conflict and tp better involve stakeholders in the ISD process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like murder or rape, fraud can inflict significant damage at organizational or individual level.

Fraud is a concept that seems to have an obvious meaning until we try to define it. As fraud exists in many different guises, and it is necessary to carefully define what it is and to tailor policies and initiatives accordingly.

Developing a definition of fraud is an early step of a prevention program. In order to be involved in the protection function, people at all levels of an organization must be knowledgeable about fraud. In this paper, we discuss the risk of fraud from an information systems perspective, explain what fraud is and present a range of definitions of fraud and computer fraud. We argue that without clearly defining fraud, organizations will not be able to share information that has the same meaning to everyone, to agree on how to measure the problem, and to know the extent of the problem, in order to decide how much and where to deploy resources to effectively solve it.