822 resultados para Consumerization of IT


Relevância:

90.00% 90.00%

Publicador:

Resumo:

A deeper understanding on two aspects of use of IT resources in organisations is important to ensure sustainable investment in these IT resources. The first is how to leverage the IT resources to attain its maximum value. We discussed this aspect of use of IT resources in part 1 of this series. This discussion suggested a complementary approach as a first stage of IT business value creation, and dynamic capabilities approach to secure sustainable IT-related business value from the IT resources. The second important aspect of IT business value is where to evaluate IT-related business value in the organisations value chains. This understanding is important for organisations to ensure appropriate accountability of the investment and management of IT resources. We address this issue in this second part of the two part series.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis is an ethical and empirical exploration of the late discovery of genetic origins in two contexts, adoption and sperm donor-assisted conception. This exploration has two interlinked strands of concern. The first is the identification of ‘late discovery’ as a significant issue of concern, deserving of recognition and acknowledgment. The second concerns the ethical implications of late discovery experiences for the welfare of the child. The apparently simple act of recognition of a phenomenon is a precondition to any analysis and critique of it. This is especially important when the phenomenon arises out of social practices that arouse significant debate in ethical and legal contexts. As the new reproductive technologies and some adoption practices remain highly contested, an ethical exploration of this long neglected experience has the potential to offer new insights and perspectives in a range of contexts. It provides an opportunity to revisit developmental debate on the relative merit or otherwise of biological versus social influences, from the perspective of those who have lived this dichotomy in practise. Their experiences are the human face of the effects arising from decisions taken by others to intentionally separate their biological and social worlds, an action which has then been compounded by family and institutional secrecy from birth. This has been accompanied by a failure to ensure that normative standards and values are upheld for them. Following discovery, these factors can be exacerbated by a lack of recognition and acknowledgement of their concerns by family, friends, community and institutions. Late discovery experiences offer valuable insights to inform discussions on the ethical meanings of child welfare, best interests, parental responsibility, duty of care and child identity rights in this and other contexts. They can strengthen understandings of what factors are necessary for a child to be able to live a reasonably happy or worthwhile life.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Information Technology (IT) education is in crisis. Enrolments have dropped by up to as much as 70% at some universities (Markoff, 2009). This coupled with traditionally high attrition and failure rates (Biggers et al, 2008) is resulting in the number of graduates nationwide being far lower than industry demand (Queensland Government SkillsInfo Report, 2009). This work reports on a radical redesign of the Bachelor of IT degree at QUT. The initial results are very promising with attrition in first year dropping from being one of the highest at QUT for an undergraduate degree to being one of the lowest. The redesign followed an action research model to reflect on issues and problems with the previous version of the degree and to introduce changes to attempt to rectify some of these problems. The resulting degree intends to produce "business savvy" graduates who are capable of using their IT knowledge and skills within cross-functional teams to solve complex problems.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis is concerned with understanding what it is like to live with a physical impairment in Taiwan. Constructionism was used as the epistemological stance to guide the study and Heideggerian interpretive phenomenology was used as the theoretical perspective. Information was gained through a series of in-depth interviews with seven Taiwanese adults with a physical impairment living in the community. They were recruited from Yunlin and Tainan Counties in Taiwan. Study participants were seen as research partners who had expertise in understanding disability, and the researcher was seen as a learner. Grounded theory principles were used to develop the theory "it is more than just the impairment" from the information provided by the participants. According to their descriptions of how they lived their lives, participants are grouped into three clusters. These are ‘fortress ladies’, ‘social networkers’ and ‘the mind man’. The grounded theory developed portrays their lives, providing a vivid picture of living a life with a physical impairment in Taiwan. The study’s findings contribute to three main areas. First, as an occupational therapist and with my growing understanding of disability learned from the study participants, I recognize the agency of people with an impairment and their expertise in disability. Thus, I argue the need for health professionals to build alliances with them, and suggest ways to achieve such a relationship. Second, I propose the developed conceptual framework is suitable for exploring lived experience in other research areas; I discuss the implications of the subtle interactions between impaired people’s body and mind; I also present three impressive lived experiences provided by study participants as exemplars of the findings, and these form the foundation for discussion. Finally, the development of "it is more than just the impairment" provides a basis from which to theorize disability in a more holistic way.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel statutory solution in relation to organizational protections of personal information. They require organizations which have suffered a breach of security involving personal information to notif'y those persons whose information may have been affected. These laws originated in the state based legislatures of the United States during the last decade and have subsequently garnered worldwide legislative interest. Despite their perceived utility, mandatory data breach notification laws have several conceptual and practical concems that limit the scope of their applicability, particularly in relation to existing information privacy law regimes. We outline these concerns, and in doing so, we contend that while mandatory data breach notification laws have many useful facets, their utility as an 'add-on' to enhance the failings of current information privacy law frameworks should not necessarily be taken for granted.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Many organisations, companies and libraries started to use participatory webs to extend their services and engage more users. However, some librarians are still hesitated to implement participatory webs in their libraries, particularly in developing countries. This paper explores the advantages and disadvantages of participatory webs focusing on collaborative tagging. This paper draws from the literature of published articles discussing topics but not limited to participatory webs, participatory libraries, collaborative tagging, folksonomy and taxonomy. The advantages of implementation of the participatory webs in the library outweigh the disadvantages of it. Participatory webs do not necessarily mean the death of information organisation but it can supplement and improves information organisation in the library. This paper may help to broaden knowledge of LIS professionals in the implementation of participatory webs in the library.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

A body of research in conversation analysis has identified a range of structurally-provided positions in which sources of trouble in talk-in-interaction can be addressed using repair. These practices are contained within what Schegloff (1992) calls the repair space. In this paper, I examine a rare instance in which a source of trouble is not resolved within the repair space and comes to be addressed outside of it. The practice by which this occurs is a post-completion account; that is, an account that is produced after the possible completion of the sequence containing a source of trouble. Unlike fourth position repair, the final repair position available within the repair space, this account is not made in preparation for a revised response to the trouble-source turn. Its more restrictive aim, rather, is to circumvent an ongoing difference between the parties involved. I argue that because the trouble is addressed in this manner, and in this particular position, the repair space can be considered as being limited to the sequence in which a source of trouble originates.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Michel Foucault: The unconscious of history and culture The French thinker, Michel Foucault (1926–84), is noted for his extensive and controversial forays into the historical disciplines. When his work first began to circulate in the 1950s and 1960s, historians did not quite know what to make of it and philosophers resented the appearance of what they saw as the importation of the tedium of concrete events into the pure untainted realm of ideas. If these responses to his work remain alive and well decades after Foucault's death, the uptake of his work has become far more complex. To restrict ourselves to the discipline of history here: if one very visible and vocal camp of historians remains deeply ambivalent about his work, this merely disguises the fact that a far larger contingent of historians of all kinds – not just those located in history departments – use his ideas quite unremarkably ...

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background: Evidence demonstrates self-management programs are an effective approach to assist patients with chronic diseases such as type 2 diabetes or cardiac conditions to modify their lifestyle for better managing their conditions. Using information technology (IT) has great potential to support self-management programs and assist patients to fulfill their goals in managing their conditions more efficiently and effectively. Examples of different types of technology used in self-management programs that have limited research support include: text messages, telephone followup, web-based programs, and other internet-assisted education. But little is known about the applicability and feasiability of different forms of technology for patients with chronic diseases such as those with type 2 diabetes and critical cardiac conditions. Furthermore, although there is some evidence of the benefits of using IT in supporting self-management programs, further research on the use of IT in such programs is recommended. Objective: To develop and pilot test an integrated Cardiac- Diabetes Self-Management Program (CDSMP) incorporating telephone and text-message follow-up. Methods: A pilot study using randomised controlled trial is conducted in the coronary care unit (CCU) in a Brisbane metropolitan hospital in Australia to collect data on patients with type 2 diabetes admitted to CCU. The main outcomes included self-efficacy levels, knowledge, and quality of life. Results: Initial results reveal that patients with diabetes admitted to the CCU in the experimental group did improve their self-efficacy, and knowledge levels. Acknowledgements: This Project is funded by QUT Early Career Researcher Research Grant

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Information Technology (IT) is successfully applied in a diverse range of fields. Though, the field of Medical Informatics is more than three decades old, it shows a very slow progress compared to many other fields in which the application of IT is growing rapidly. The spending on IT in health care is shooting up but the road to successful use of IT in health care has not been easy. This paper discusses about the barriers to the successful adoption of information technology in clinical environments and outlines the different approaches used by various countries and organisations to tackle the issues successfully. Investing financial and other resources to overcome the barriers for successful adoption of HIT is highly important to realise the dream of a future healthcare system with each customer having secure, private Electronic Health Record (EHR) that is available whenever and wherever needed, enabling the highest degree of coordinated medical care based on the latest medical knowledge and evidence. Arguably, the paper reviews barriers to HIT from organisations’ alignment in respect to the leadership; with their stated values when accepting or willingness to consider the HIT as a determinant factor on their decision-making processes. However, the review concludes that there are many aspects of the organisational accountability and readiness to agree to the technology implementation.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

One remaining difficulty in the Information Technology (IT) business value evaluation domain is the direct linkage between IT value and the underlying determinants of IT value or surrogates of IT value. This paper proposes a research that examines the interacting effects of the determinants of IT value, and their influences on IT value. The overarching research question is how those determinants interact with each other and affect the IT value at organizational value. To achieve this, this research embraces a multilevel, complex, and adaptive system view, where the IT value emerges from the interacting of underlying determinants. This research is theoretically grounded on three organizational theories – multilevel theory, complex adaptive systems theory, and adaptive structuration theory. By integrating those theoretical paradigms, this research proposes a conceptual model that focuses on the process where IT value is created from interactions of those determinants. To answer the research question, agent-based modeling technique is used in this research to build a computational representation based on the conceptual model. Computational experimentation will be conducted based on the computational representation. Validation procedures will be applied to consolidate the validity of this model. In the end, hypotheses will be tested using computational experimentation data.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

I believe that studies of men's gendered experiences of information systems are needed. In order to support this claim, I introduce the area of Masculinity Studies to Information Systems research and, using this, present an exploratory analysis of an internet dating website for gay men – Gaydar. The information system, which forms part of the Gaydar community, is shown to shape, and be shaped by the members as they accept and challenge aspects of it as related to their identities. In doing this, I show how the intertwined processes of information systems development and use contribute to the creation of diverse interpretations of masculinity within a group of men. In sum, my analysis highlights different kinds of men and different versions of masculinity that can sometimes be associated with different experiences of information systems. The implications of this work centre on the need to expand our knowledge of men's gendered experiences with information systems, to reflect upon processes of technology facilitated categorisation and to consider the influences that contribute to the roll out of particular software features along with the underlying rationales for market segmentation in the software and software-based services industries.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

With the increasing popularity and adoption of building information modeling (BIM), the amount of digital information available about a building is overwhelming. Enormous challenges remain however in identifying meaningful and required information from a complex BIM model to support a particular construction management (CM) task. Detailed specifications of information required by different construction domains and expressive and easy-to-use BIM reasoning mechanisms are seen as an important means in addressing these challenges. This paper analyzes some of the characteristics and requirements of component-specific construction knowledge in relation to the current work practice and BIM-based applications. It is argued that domain ontologies and information extraction approaches, such as queries could significantly bring much needed support for knowledge sharing and integration of information between design, construction and facility management.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Retaining customers is a relevant topic throughout all service industries. However, only limited attention has been directed towards studying the antecedents of subscription renewal in the context of operational cloud enterprise systems. Cloud services have historically been offered as subscription-based services with the (theoretical) possibility of seamless service cancellation, in contrast to classical IT-Outsourcing contracts or license-based software installations of on-premise enterprise systems. In this work, we investigate the central concept of subscription renewal by focusing on different facets of IS success and their relevance for distinct employee cohorts. Analyzing inter-cohort differences has strong practical implications, as it helps IT vendors to focus on specific IT-related factors when trying to retain customers. Therefore an empirical study was undertaken. The hypotheses were developed on an individual level and tested using survey responses of IT decision makers within companies which adopted cloud enterprise systems. Gathered data was then analyzed using PLS. The results show that subscription renewal intention of the strategic cohort is mainly based on perceived system quality, whereas information quality explains most of the variance of subscription renewal in the management cohort. Beneath the cloud enterprise systems specific contributions, the work adds to the theoretical body of research related to IS success and IS continuation, as well as stakeholder perspectives.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The detached housing scheme is a unique and exclusive segment of the residential property market in Malaysia. Generally, the product is expensive and for many Malaysians who can afford them, owning a detached house is a once in a lifetime opportunity. In spite of this, most of the owners failed to fully comprehend the specific need of this type of housing scheme, increasing the risk of it being a problematic undertaking. Unlike other types of pre-designed "mass housing" schemes, the detached housing scheme may be built specifically to cater the needs and demands of its owner. Therefore, owner participation during critical development stages is vital to guarantee the success of the development as a whole. In addition, due to its unique design the house would have to individually comply with the requirements and regulations of relevant authorities. Failure by the owner to recognise this will result in delays, penalties, disputes and ultimately cost overruns. These circumstances highlight the need for a research to guide the owner through participation during the critical development stages of a detached house. Therefore, this research aims to develop a guideline to improve owner participation for a successful detached house development in Malaysia. To achieve the aim, questionnaire surveys and semi-structured interviews were employed to collect the detached house owners' and consultants' & contractors' responses through their experiences in developing detached houses in Malaysia. Stratified and random sampling were utilised to gather information from both parties to represent Malaysian detached house participants. The questionnaire responses were analysed through the application of quantitative analysis such as descriptive analysis, factor analysis and structural equation modelling which were substantiated through qualitative analysis procedure such as content analysis. This research had identified that in order to produce a successful outcome detached house owners are required to participate during critical stages of the development. In the planning stage, the owner needs to provide proper specific input to the consultant regarding his/her expectations of the cost for the entire development, its detailed specification and general idea of the internal and external design of the detached house and its compound. In the contracting stage, the owner must make the appropriate choice of selecting the right contractor for the job. This decision may be taken after recommendations from the consultants or from the owner's personal contacts or experiences but it is not recommended for the owner to select a contractor primarily on the basis of the lowest bid. In the completion stage, the owner may need to attend a number of important site meetings to ensure that the progress of the works is according to what had been planned and the completion date is achievable. By having the owners undertake an active role during critical stages of the development, not only the quality and delivery of the development improved but also there is an increase in satisfaction to the owners themselves.