971 resultados para DBD lamp


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to determine whether an existing organizational knowledge management framework could be utilized in an inter-organizational domain. We selected the threefold KM framework developed by Holsapple and Joshi (2000; 2002). This framework has been well tested and provides clearly defined elements to examine the influences on knowledge management and knowledge sharing in an organizational context. We report the results of testing the framework in three inter-organizational case studies and propose some adaptations to the managerial influences for inter-organizational analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Feral Information Systems (FIS) is any technological artefact (e.g. spreadsheets) that end users employ instead of the mandated Enterprise System (ES). ES proponents suggest that the installation of an ES will boost productivity. However, Production Possibility Frontier theory provides insights as to why the introduction of an ES may instead suppress an end user's productivity. Structuration Theory offers insights that explain how certain end users may have access to powerful resources. Rather than submitting to the ES, the end user can employ FIS to block or circumvent aspects of the ES. Further, the concept of life chances helps explain why individuals may or may not develop the core skills required to construct an alternate to the ES, the FIS. In relation to the ES usage, an end user may adopt one of four Modes of Operation, namely: Submit, Dismiss, Hidden, or Defiant.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper is a discussion of research on the co-alignment of enterprise resource planning (ERP) systems capabilities and global business information requirements for improved performance. It is based on Structural Equation Modelling (SEM) analysis to establish that if these two constructs (ERP systems capabilities and global business information requirements) are co-aligned, improved global business performance is achieved. Research undertaken in this paper is based on a survey of global businesses that have implemented ERP systems. It extends the extant IT/IS alignment theories to ERP/Global business information requirements alignment. It makes an important contribution to the global business management information literature, by identifying and validating a set of important global business information requirements. This research also makes a novel contribution to the ERP systems literature by establishing a set of ERP systems capabilities that are useful for managing global business information requirements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information quality is a complex problem. Issues relating to information quality are strongly embedded in the context of the operations of information systems. Information quality issues, therefore, have qualitative as well as quantitative underpinnings, which affect on the various dimensions of information quality. In order to improve information quality, it is essential to assess its various dimensions. This assessment provides the gaps that work as the building blocks for improving quality of information. However, assessing information quality dimensions is extremely intricate because each dimension depends upon other dimensions, which makes it difficult to objectively assess these dimensions. This research utilizes a product perspective of information and applies Six-Sigma methodology to assess information quality. It describes a case study of a Korean manufacturing organization where analytical hierarchy process and quality function deployment was utilized to determine the mutual relationships of information quality dimensions and critical to information quality factors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information Systems can play an important role in ensuring and improving the quality of education provided. However, lack of acceptance of these information systems and resistance of technology innovations by the end users limit the expected benefits of the system. This research attempts to identify the key determinants for the acceptance of the Unit Guide Information Systems (UGIS) in the Australian higher education sector. The technology acceptance model (TAM), social cognitive theory (SCT) and model of PC utilization (MPCU) are combined to provide a new framework for this analysis. Results of the study are consistent with the technology acceptance factors for explaining the behavioural intention of the academics. The study also shows the effects of application specific self-efficacy, application specific anxiety and social influence on the acceptance of UGIS. Implications of the results are discussed within the context of unit guides and curriculum mapping.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Surveys are mostly challenged by response rates. Among the various types of survey research, web-based (internet-based/electronic/online) surveys are commonly used for data collection for a geographically diverse population. In surveys with high/low response rates, non-response bias can be a major concern. While it is not always possible to measure the actual bias due to non-response there are different approaches and techniques that help to identify reasons of non-response bias. The aims of this paper are twofold. (1) To provide an appropriate, interesting and important non-response bias case study for future web-based surveys that will provide guidance to other Information Systems researchers. The case-study concerns an online-survey to evaluate a technology acceptance model for Unit Guide Information systems (UGIS). (2) To discuss how nonresponse bias in a web-based technology acceptance study of an information system (UGIS in this case) can be contained and managed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As specific parts of a theory are refined over time, the aggregated set of variables and associations of multiple theory instances provide the identity of a theory domain. This research applies a meta-theoretical analysis to the problem of theory identity and the core-periphery distinction. The theoretico-empirical network for quantitative publications over a 20 year span of two top Information Systems journals is analysed and visualized to illustrate these aspects of theory. The analysis provides insight into the density of research in specific theory domains, the verisimilitude and explanatory ubiquity of core versus peripheral postulates, and suggests opportunities for increasing explanatory depth and integration in select theory domains.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous studies on residential energy end use behavior reported significant reduction in energy end use of 7% to 24% when feedback is used to modify behavior in an energy efficient manner. However, most feedback systems investigated in previous studies have not benefited from advanced information systems (IS). IS can shape energy efficiency behavior by providing real-time feedback on energy consumption, cost and environmental impact. Such systems represent a new and less-researched subfield of energy informatics. This paper provides a conceptual framework for showing the potential use of IS to modify residential energy use behavior towards better energy efficiency. The framework builds on research in residential energy end use, in particular energy end use behavioral model. It provides conceptual inputs for a blue-print to develop a residential energy management information system (REMIS) and also highlights the use of new information and communications technologies (ICT) that had not been widely used, setting the grounds for further research in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resistance is normally characterized as a set of behaviours located in and belonging to change recipients. Such behaviours are seen to thwart the legitimate aims of both change strategists and the change agents who implement systems and the associated organisational change on the strategists' behalf. However, results from our case study research indicate that resistance can be a property not only of change recipients’ behaviour, but also of change agents and change strategists. The resistance behaviours identified included the failure to follow a prescribed corporate method and template, a refusal to help or listen, a refusal to fix known problems, the display of an adversarial, confrontational, and/or condescending attitude, subversiveness, a poor work ethic, and a refusal to meet requests. This paper argues for a revised conceptualization of resistance as a behaviour that can be demonstrated by any IT project stakeholders, that cannot be divorced from considerations of power in the IT project context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers GSD projects as designed artefacts, and proposes the application of an Extended Axiomatic Design theory to reduce their complexity in order to increase the probability of project success. Using an upper bound estimation of the Kolmogorov complexity of the so-called ‘design matrix’ (as a proxy of Information Content as a complexity measure) we demonstrate on two hypothetical examples how good and bad designs of GSD planning compare in terms of complexity. We also demonstrate how to measure and calculate the ‘structural’ complexity of GSD projects and show that by satisfying all design axioms this ‘structural’ complexity could be minimised.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study seeks to develop a comprehensive model of consumer acceptance in the context of Smart Mobile Device (SMDs). This paper proposes an adaptation of the Technology Acceptance Model (TAM) and the Unified Theory of Acceptance and Use of Technology (UTAUT2) model that can be employed to explain and predict the acceptance of SMDs. Also included in the model are a number of external and new moderating variables that can be used to explain user intentions and subsequent usage behaviour. The model holds that Activity-based Usage and Device Characteristics are posited to moderate the impact of the constructs empirically validated in the UTAUT2 model. Through an important cluster of antecedents the proposed model aims to enhance our understanding of consumer motivations for using SMDs and aid efforts to promote the adoption and diffusion of these devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

ELearning suffers from the lack of face-to-face interaction and can deprive learners from the benefits of social interaction and comparison. In this paper we present the results of a study conducted for the impact of social comparison. The study was conducted by collecting students’ engagement with an eLearning tool, the attendance, and grades scored by students at specific milestones and presented these metrics to students as feedback using Kiviat charts. The charts were complemented with appropriate recommendations to allow them to adapt their study strategy and behaviour. The study spanned over 4 semesters (2 with and 2 without the Kiviats) and the results were analysed using paired T tests to test the pre and post results on topics covered by the eLearning tool. Survey questionnaires were also administered at the end for qualitative analysis. The results indicated that the Kiviat feedback with recommendation had positive impact on learning outcomes and attitudes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Researchers and practitioners are starting to realize that it is unlikely that the full advantage of Electronic Content Management Systems (ECMS) can be realized unless both the technology capabilities and organisational context are taken into consideration. This study explores ECMS use in Replication, Diversification, Unification and Coordination type of organisations. A framework of ECMS-use is proposed suggesting different ways of using ECMS to support diverse organisational needs. Following a qualitative case study research approach, interviews were conducted with IT and business managers and ECMS users from each of the four types of organisations. Results suggest that, depending on the organisation’s business needs, ECMS use in organisations can be categorized as 1) Minimal-use, 2) Standard Adoption-use, 3) Customized-use or 4) Leveraged-use. Findings suggest that managers can gain more realistic benefits from ECMS use by understanding why and how different types of ECMS-use can support the way in which their businesses operate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The usability of applications designed and developed for mobile devices integral user experience, particularly for current touch-screen mobile devices. This conceptual paper provides a profile of the ways in which mobile device usability evaluation methods are being adapted to better reflect technological. With an increasing capacity for greater user interactivity through a range of tasks and in a variety of contexts, the importance and impact of mobile device context-of-use components is of particular interest to researchers. This requires a need for a shift in evaluation method paradigms with a particular focus on methods involving the user, as part of the overall development process. Having a better understanding of the context-of-use may contribute to improvements in mobile device usability and the overall user experience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cloud computing is an emerging evolutionary computing model that provides highly scalable services over highspeed Internet on a pay-as-usage model. However, cloud-based solutions still have not been widely deployed in some sensitive areas, such as banking and healthcare. The lack of widespread development is related to users’ concern that their confidential data or privacy would leak out in the cloud’s outsourced environment. To address this problem, we propose a novel active data-centric framework to ultimately improve the transparency and accountability of actual usage of the users’ data in cloud. Our data-centric framework emphasizes “active” feature which packages the raw data with active properties that enforce data usage with active defending and protection capability. To achieve the active scheme, we devise the Triggerable Data File Structure (TDFS). Moreover, we employ the zero-knowledge proof scheme to verify the request’s identification without revealing any vital information. Our experimental outcomes demonstrate the efficiency, dependability, and scalability of our framework.