Synthesizing User Centered and Designer Centered IS Development Approaches Using General Systems TheoryInformation Systems Frontiers - Tập 3 - Trang 107-121 - 2001
Edward J. Garrity
This paper uses general systems theory to provide an expanded view of
information systems in organizations. Three general viewpoints and corresponding
approaches to information systems development are identified. The designer
centered or American approach to information systems development is based on a
“functionalist” perspective of information systems and a problem solving
orientation. The user ... hiện toàn bộ
Tools for Healthcare Data Lake Infrastructure BenchmarkingInformation Systems Frontiers - - Trang 1-22 - 2024
Tommaso Dolci, Lorenzo Amata, Carlo Manco, Fabio Azzalini, Marco Gribaudo, Letizia Tanca
Vast amounts of medical data are generated every day, and constitute a crucial
asset to improve therapy outcomes, medical treatments and healthcare costs. Data
lakes are a valuable solution for the management and analysis of such a variety
and abundance of data, yet to date there is no data lake architecture
specifically designed for the healthcare domain. Moreover, benchmarking the
underlying inf... hiện toàn bộ
Data Sensitivity and Domain Specificity in Reuse of Machine Learning ApplicationsInformation Systems Frontiers - - Trang 1-8 - 2023
Corinna Rutschi, Nicholas Berente, Frederick Nwanganga
Data sensitivity and domain specificity challenges arise in reuse of machine
learning applications. We identify four types of machine learning applications
based on different reuse strategies: generic, distinctive, selective, and
exclusive. We conclude with lessons for developing and deploying machine
learning applications.
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated RegretInformation Systems Frontiers - Tập 25 - Trang 897-916 - 2022
Obi M. Ogbanufe, Corey Baham
Authentication plays an important role in securing our systems but is threatened
by increasingly sophisticated account hacking and account take over. Several
security services have been developed, including multi-factor authentication
(MFA) designed to cope with online account authentication. It remains unknown
how users perceive and evaluate secure authentication for online account threats
and co... hiện toàn bộ
The Role of Statistics in IS/IT: Practical Gains from Mined DataInformation Systems Frontiers - Tập 1 - Trang 259-266 - 1999
Edward J. Dudewicz, Zaven A. Karian
Data mining has, in the past, tended to use simplistic statistical methods (or
even none at all). In this paper we show by example how cutting edge (but easy
to use and comprehend) statistical methods can yield substantial gains in data
mining. The role of statistics in IS/IT (information systems and information
technology) in general can be substantial, yielding more nearly optimal
performance of... hiện toàn bộ
Agent-Based Knowledge Analysis Framework in Disaster ManagementInformation Systems Frontiers - Tập 20 - Trang 783-802 - 2017
Dedi Iskandar Inan, Ghassan Beydoun, Simon Opper
Disaster Management (DM) is a complex set of interrelated activities. The
activities are often knowledge-intensive and time sensitive. Timely sharing of
the required knowledge is critical for DM. For recurring disasters (e.g.
floods), developed countries tend to have dedicated document repositories of
Disaster Management Plans (DISPLANs) that can be accessed as needs arise.
However, accessing the ... hiện toàn bộ