2 resultados para Coordination, information, constraints, dyadic systems, team ball sports

em WestminsterResearch - UK


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper takes a sociotechnical viewpoint of knowledge management system (KMS) implementation in organizations considering issues such as stakeholder disenfranchisement, lack of communication, and the low involvement of key personnel in system design asking whether KMS designers could learn from applying sociotechnical principles to their systems. The paper discusses design elements drawn from the sociotechnical principles essential for the success of IS and makes recommendations to increase the success of KMS in organizations. It also provides guidelines derived from Clegg’s Principles (2000) for KMS designers to enhance their designs. Our data comes from the application of a plurality of analysis methods on a large comprehensive global survey conducted from 2007 to 2011 of 1034 participants from 76 countries. The survey covers a variety of organizations of all types and sizes from a comprehensive selection of economic sectors and industries. Our results showed that users were not satisfied with the information and knowledge systems that they were being offered. In addition to multiple technology and usability issues, there were human and organisational barriers that prevented the systems from being used to their full potential. We recommend that users of KMS are integrated into the design team so that these usability and other barriers can be addressed during the feasibility stage as well as the actual design and implementation phases.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Adequate user authentication is a persistent problem, particularly with mobile devices, which tend to be highly personal and at the fringes of an organisation's influence. Yet these devices are being used increasingly in various business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defence for a mobile device that falls into the hands of an unauthorised user. However, motivating users to enable simple password mechanisms and periodically update their authentication information is difficult at best. This paper examines some of the issues relating to the use of biometrics as a viable method of authentication on mobile wireless devices. It is also a critical analysis of some of the techniques currently employed and where appropriate, suggests novel hybrid ways in which they could be improved or modified. Both biometric technology and wireless setting based constraints that determine the feasibility and the performance of the authentication feature are specified. Some well known biometric technologies are briefly reviewed and their feasibility for wireless and mobile use is reviewed. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.