812 resultados para Computer integrated manufacturing systems
Resumo:
In order to analyze software systems, it is necessary to model them. Static software models are commonly imported by parsing source code and related data. Unfortunately, building custom parsers for most programming languages is a non-trivial endeavour. This poses a major bottleneck for analyzing software systems programmed in languages for which importers do not already exist. Luckily, initial software models do not require detailed parsers, so it is possible to start analysis with a coarse-grained importer, which is then gradually refined. In this paper we propose an approach to "agile modeling" that exploits island grammars to extract initial coarse-grained models, parser combinators to enable gradual refinement of model importers, and various heuristics to recognize language structure, keywords and other language artifacts.
Resumo:
On online social networks such as Facebook, massive self-disclosure by users has attracted the attention of industry players and policymakers worldwide. Despite the impressive scope of this phenomenon, very little is understood about what motivates users to disclose personal information. Integrating focus group results into a theoretical privacy calculus framework, we develop and empirically test a Structural Equation Model of self-disclosure with 259 subjects. We find that users are primarily motivated to disclose information because of the convenience of maintaining and developing relationships and platform enjoyment. Countervailing these benefits, privacy risks represent a critical barrier to information disclosure. However, users’ perception of risk can be mitigated by their trust in the network provider and availability of control options. Based on these findings, we offer recommendations for network providers.
Resumo:
Maintaining a loyal customer base is challenging for “Deal of the Day” (DoD) platforms. DoD providers market and sell deals on products and services, yet it is the merchants who ultimately deliver those to consumers. Low entry and switching costs drive competition in this market. However, research on the determinants of user loyalty in the DoD context is limited. This study uses Grounded Theory and Structural Equation Modeling to explore the phenomenon of DoD platform loyalty. Particularly, monetary benefits, signal-to-noise ratio, perceived risk, and service friendliness during a merchant encounter emerge as powerful determinants of loyalty in this novel context.
Resumo:
Social Networking Sites (SNSs) have become extremely popular around the world. They rely on user-generated content to offer engaging experience to its members. Cultural differences may influence the motivation of users to create and share content on SNS. This study adopts the privacy calculus perspective to examine the role of culture in individual self-disclosure decisions. The authors use structural equation modeling and multi-group analysis to investigate this dynamics. The findings reveal the importance of cultural dimensions of individualism and uncertainty avoidance in the cognitive processes of SNS users.
Resumo:
The publication record is a key component of a successful academic career in IS. Despite its importance, its definition - especially for junior researchers―remains unclear. Is it better to have one A-publication or three Bpublications? Does being the third author on an A-publication carry more weight than being the first author on a Bpublication? Is it better to publish with as few co-authors as possible to demonstrate ability for independent work or is publishing with others a sign of good teamwork and academic excellence? Faced with these uncertainties, young researchers increasingly question the choices they make regarding their publication strategy. If unaddressed, these issues are bound to interfere with the quality of the IS research and scholars’ job satisfaction. This article raises these concerns associated with a publication strategy for junior researchers and reports the views voiced by five academics at a panel session at the European Conference on Information Systems 2012. In particular, the following topics are discussed: quantity vs. quality, value of the first authorship, the “optimal” number of authors, and the issues of co-authorship with an academic supervisor.
Resumo:
Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we find that (i) Organizational Threats and (ii) Social Threats stemming from the user environment constitute two underlying dimensions of the construct “Privacy Concerns in Online Social Networks”. Using a Structural Equation Model, we examine the impact of the identified dimensions of concern on the Amount, Honesty, and Conscious Control of individual self-disclosure on these sites. We find that users tend to reduce the Amount of information disclosed as a response to their concerns regarding Organizational Threats. Additionally, users become more conscious about the information they reveal as a result of Social Threats. Network providers may want to develop specific mechanisms to alleviate identified user concerns and thereby ensure network sustainability.
Resumo:
The Business and Information Technologies (BIT) project strives to reveal new insights into how modern IT impacts organizational structures and business practices using empirical methods. Due to its international scope, it allows for inter-country comparison of empirical results. Germany — represented by the European School of Management and Technologies (ESMT) and the Institute of Information Systems at Humboldt-Universität zu Berlin — joined the BIT project in 2006. This report presents the result of the first survey conducted in Germany during November–December 2006. The key results are as follows: • The most widely adopted technologies and systems in Germany are websites, wireless hardware and software, groupware/productivity tools, and enterprise resource planning (ERP) systems. The biggest potential for growth exists for collaboration and portal tools, content management systems, business process modelling, and business intelligence applications. A number of technological solutions have not yet been adopted by many organizations but also bear some potential, in particular identity management solutions, Radio Frequency Identification (RFID), biometrics, and third-party authentication and verification. • IT security remains on the top of the agenda for most enterprises: budget spending was increasing in the last 3 years. • The workplace and work requirements are changing. IT is used to monitor employees' performance in Germany, but less heavily compared to the United States (Karmarkar and Mangal, 2007).1 The demand for IT skills is increasing at all corporate levels. Executives are asking for more and better structured information and this, in turn, triggers the appearance of new decision-making tools and online technologies on the market. • The internal organization of companies in Germany is underway: organizations are becoming flatter, even though the trend is not as pronounced as in the United States (Karmarkar and Mangal, 2007), and the geographical scope of their operations is increasing. Modern IT plays an important role in enabling this development, e.g. telecommuting, teleconferencing, and other web-based collaboration formats are becoming increasingly popular in the corporate context. • The degree to which outsourcing is being pursued is quite limited with little change expected. IT services, payroll, and market research are the most widely outsourced business functions. This corresponds to the results from other countries. • Up to now, the adoption of e-business technologies has had a rather limited effect on marketing functions. Companies tend to extract synergies from traditional printed media and on-line advertising. • The adoption of e-business has not had a major impact on marketing capabilities and strategy yet. Traditional methods of customer segmentation are still dominating. The corporate identity of most organizations does not change significantly when going online. • Online sales channel are mainly viewed as a complement to the traditional distribution means. • Technology adoption has caused production and organizational costs to decrease. However, the costs of technology acquisition and maintenance as well as consultancy and internal communication costs have increased.
Resumo:
A publication record provides evidence of research productivity and is critical for junior scholars starting their careers in academia. Publication attributes, such as level of the publication outlet, order and number of authors, are typically used to evaluate its quality. However, time spent on a publication is a limited commodity, and researchers face significant trade-offs when deciding which publications they should concentrate on. To better understand the choices made, conjoint analysis with 241 junior IS scholars was conducted. We find that when “quality vs. number of authors” and “quality vs. time” trade-offs are considered, quality is prioritized. However, the emphasis on quality is less pronounced when “rank as an author” is at stake. Especially Ph.D. students tend to choose first authorship when dealing with “quality vs. rank as an author” trade-off. Our findings provide intriguing insights into how publication attributes weigh against each other when research collaboration decisions are made.
Resumo:
The wealth of social information presented on Facebook is astound-ing. While these affordances allow users to keep up-to-date, they also produce a basis for social comparison and envy on an unprecedented scale. Even though envy may endanger users’ life satisfaction and lead to platform avoidance, no study exists uncovering this dynamics. To close this gap, we build on responses of 584 Facebook users collected as part of two independent studies. In study 1, we explore the scale, scope, and nature of envy incidents triggered by Face-book. In study 2, the role of envy feelings is examined as a mediator between intensity of passive following on Facebook and users’ life satisfaction. Con-firming full mediation, we demonstrate that passive following exacerbates envy feelings, which decrease life satisfaction. From a provider’s perspective, our findings signal that users frequently perceive Facebook as a stressful environ-ment, which may, in the long-run, endanger platform sustainability.