909 resultados para Indigenous Knowledge Systems
Resumo:
The problem of information overload on Facebook is exacerbating as users expand their networks. Growing quantity and increasingly poor quality of information on the Newsfeed may interfere with the hedonic experience of users resulting in frustration and dissatisfaction. In the long run, such developments threaten to undermine sustainability of the platform. To address these issues, our study adopts a grounded theory approach to explore the phenomenon of information overload on Facebook. We investigate main sources of information overload, identify strategies users adopt to deal with it as well as possible consequences. In-depth analysis of the phenomenon allows us to uncover individual peculiarities for identification of relevant information. Based on them we provide valuable recommendations for network providers.
Resumo:
Der Einsatz von Open Source Software kann das IT-Budget schonen, wenn man richtig vorgeht. Viel wichtiger sind aber strategische Vorteile wie die digitale Nachhaltigkeit oder die Unabhängigkeit von Herstellern, die sich durch den konsequenten Einsatz von Open Source ergeben.
Resumo:
Popularity of Online Social Networks has been recently overshadowed by the privacy problems they pose. Users are getting increasingly vigilant concerning information they disclose and are strongly opposing the use of their information for commercial purposes. Nevertheless, as long as the network is offered to users for free, providers have little choice but to generate revenue through personalized advertising to remain financially viable. Our study empirically investigates the ways out of this deadlock. Using conjoint analysis we find that privacy is indeed important for users. We identify three groups of users with different utility patterns: Unconcerned Socializers, Control-conscious Socializers and Privacy-concerned. Our results provide relevant insights into how network providers can capitalize on different user preferences by specifically addressing the needs of distinct groups in the form of various premium accounts. Overall, our study is the first attempt to assess the value of privacy in monetary terms in this context.
Resumo:
Despite the astounding success of the fast fashion retailers, the management practices leading to these results have not been subject to extensive research so far. Given this background, we analyze the impact of information sharing and vertical integration on the performance of 51 German apparel companies. We find that the positive impact of vertical integration is mediated by information sharing, i.e. that the ability to improve the information flow is a key success factor of vertically integrated apparel supply chains. Thus, the success of an expansion strategy based on vertical integration critically depends on effective ways to share logistical information.
Resumo:
Despite the considerable amount of self-disclosure in Online Social Networks (OSN), the motivation behind this phenomenon is still little understood. Building on the Privacy Calculus theory, this study fills this gap by taking a closer look at the factors behind individual self-disclosure decisions. In a Structural Equation Model with 237 subjects we find Perceived Enjoyment and Privacy Concerns to be significant determinants of information revelation. We confirm that the privacy concerns of OSN users are primarily determined by the perceived likelihood of a privacy violation and much less by the expected damage. These insights provide a solid basis for OSN providers and policy-makers in their effort to ensure healthy disclosure levels that are based on objective rationale rather than subjective misconceptions.
Resumo:
Despite a broad range of collaboration tools already available, enterprises continue to look for ways to improve internal and external communication. Microblogging is such a new communication channel with some considerable potential to improve intra-firm transparency and knowledge sharing. However, the adoption of such social software presents certain challenges to enterprises. Based on the results of four focus group sessions, we identified several new constructs to play an important role in the microblogging adoption decision. Examples include privacy concerns, communication benefits, perceptions regarding signal-to-noise ratio, as well codification effort. Integrating these findings with common views on technology acceptance, we formulate a model to predict the adoption of a microblogging system in the workspace. Our findings serve as an important guideline for managers seeking to realize the potential of microblogging in their company.
Resumo:
This work contributes to the ongoing debate on the productivity paradox by considering CIOs’ perceptions of IT business value. Applying regression analysis to data from an international survey, we study how the adoption of certain types of enterprise software affects the CIOs’ perception of the impact of IT on the firm’s business activities and vice versa. Other potentially important factors such as country, sector and size of the firms are also taken into account. Our results indicate a more significant support for the impact of perceived IT benefits on adoption of enterprise software than vice versa. CIOs based in the US perceive IT benefits more strongly than their German counterparts. Furthermore, certain types of enterprise software seem to be more prevalent in the US.
Resumo:
Despite their enormous success the motivation behind user participation in Online Social Networks is still little understood. This study explores a variety of possible incentives and provides an empirical evaluation of their subjective relevance. The analysis is based on survey data from 129 test subjects. Using Structural Equation Modeling, we identified that the satisfaction of the needs for belongingness and the esteem needs through self-presentation together with peer pressure are the main drivers of participation. The analysis of a sub-sample of active users pointed out the satisfaction of the cognitive needs as an additional participation determinant. Based on these findings, recommendations for online social network providers are made.
Resumo:
The automotive industry is confronted with increasing competition, leading to higher cost pressures and the demand to optimize production processes and value chains. Here the RFID technology promises to improve a range of processes in logistics and manufacturing. Despite its promising potential in the automotive industry, RFID has not yet made a decisive step from pilots to real-life implementations in the supply chain. Building on existing models of technology adoption, we analyze RFID adoption dynamics in the automotive industry. Building on existing IOS adoption models tailored to RFID specifics and based on ten semi-structured interviews with OEMs and suppliers, we evaluate main drivers of RFID adoption in the automotive industry. Our key findings are that the use of a coercive approach by the OEM could be redundant because of the market-driven RFID adoption among many suppliers. Furthermore, suppliers implementing RFID can now gain an early mover competitive advantage by developing higher trust in their relationship with the OEM as well as accumulating unique expertise in this area.
Resumo:
Even though RFID technology is currently gaining importance mainly in logistics, usage areas, such as shopping or after-sales enhancements beyond the supply chain are envisioned. Yet, while RFID hits the street it is questioned if it may undermine one’s privacy while providing few customer benefits. Meeting this criticism this paper investigates RFID-enabled information services and the drivers of their usefulness for consumers. The article claims that the more risk one associates with a product the more benefit from RFID-enabled information services is perceived. We show empirically that the nature of product risk provides a useful framework to decide on the types of RFID information services a marketer should offer to create RFID usefulness perceptions and increase technology acceptance.
Resumo:
In einer Kamerabrillenstudie werden die sozialen und materiellen Umwelten von Jugendlichen, die in Erziehungsheimen für verhaltensauffällige und sozial beeinträchtigte Kinder und Jugendliche leben, untersucht und mit einer Kontrastgruppe nicht verhaltensauffälliger, zuhause lebender Jugendlichen verglichen. Die Ergebnisse deuten darauf hin, dass Heimjugendliche über einen eingeschränkten Streifraum verfügen, weniger mit Peers interagieren und mehr Aggression ausgesetzt sind. Für den Erfolg der Heimerziehung ist es zentral, Peers nicht unbeaufsichtigt zu lassen, weil durch eine negative Peerbeeinflussung der Erfolg der Intervention geschwächt wird.
Resumo:
Für Beherbergungsbetriebe ist E-Mail ein wichtiges Kommunikationsmedium im elektronischen Kanal geworden. Die Bedeutung von E-Mails für die Kundenkommunikation zieht die Forderung nach einem systematischen und professionellen E-Mail-Management nach sich. Derzeit tut sich die Mehrzahl der Betriebe schwer, den damit verbundenen hohen Anspruch einzulösen. Zwar werden grundlegende Anforderungen bezüglich des Antwortverhaltens mehrheitlich erfüllt, jedoch kann die Qualität der Antworten hinsichtlich Inhalt und Form in vielen Fällen nur bedingt überzeugen. Angesichts dieser Problemlage mag es überraschen, dass die Unterstützung durch Informationssysteme in diesem Zusammenhang bis jetzt keine besondere Rolle spielt. In vielen Fällen erfolgt das E-Mail-Management mithilfe des generellen E-Mail-Programms Outlook von Microsoft. Die häufig eingesetzten branchenspezifischen Property-Management-Systeme (PMS) decken die geforderten Funktionalitäten bestenfalls teilweise ab. Spezifische Informationssysteme zur Unterstützung des E-Mail-Managements - sogenannte E-Mail-Response-Management-Systeme (ERMS) - könnten bei der Entschärfung der manifesten Probleme sehr nützlich sein. Die systemtechnische Unterstützung durch ERMS wird von Praktikern jedoch mit einiger Skepsis bedacht und nur teilweise als praktisch umsetzbar und nützlich eingeschätzt.
Resumo:
Because of the unknown usage scenarios, designing the elementary services of a service-oriented architecture (SOA), which form the basis for later composition, is rather difficult. Various design guide lines have been proposed by academia, tool vendors and consulting companies, but they differ in the rigor of validation and are often biased toward some technology. For that reason a multiple-case study was conducted in five large organizations that successfully introduced SOA in their daily business. The observed approaches are contrasted with the findings from a literature review to derive some recommendations for SOA service design.