Synthesizing User Centered and Designer Centered IS Development Approaches Using General Systems TheoryInformation Systems Frontiers - Tập 3 - Trang 107-121 - 2001
Edward J. Garrity
This paper uses general systems theory to provide an expanded view of information systems in organizations. Three general viewpoints and corresponding approaches to information systems development are identified. The designer centered or American approach to information systems development is based on a “functionalist” perspective of information systems and a problem solving orientation. The user ...... hiện toàn bộ
Tools for Healthcare Data Lake Infrastructure BenchmarkingInformation Systems Frontiers - - Trang 1-22 - 2024
Tommaso Dolci, Lorenzo Amata, Carlo Manco, Fabio Azzalini, Marco Gribaudo, Letizia Tanca
Vast amounts of medical data are generated every day, and constitute a crucial asset to improve therapy outcomes, medical treatments and healthcare costs. Data lakes are a valuable solution for the management and analysis of such a variety and abundance of data, yet to date there is no data lake architecture specifically designed for the healthcare domain. Moreover, benchmarking the underlying inf...... hiện toàn bộ
Data Sensitivity and Domain Specificity in Reuse of Machine Learning ApplicationsInformation Systems Frontiers - - Trang 1-8 - 2023
Corinna Rutschi, Nicholas Berente, Frederick Nwanganga
Data sensitivity and domain specificity challenges arise in reuse of machine learning applications. We identify four types of machine learning applications based on different reuse strategies: generic, distinctive, selective, and exclusive. We conclude with lessons for developing and deploying machine learning applications.
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated RegretInformation Systems Frontiers - Tập 25 - Trang 897-916 - 2022
Obi M. Ogbanufe, Corey Baham
Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multi-factor authentication (MFA) designed to cope with online account authentication. It remains unknown how users perceive and evaluate secure authentication for online account threats and co...... hiện toàn bộ
The Role of Statistics in IS/IT: Practical Gains from Mined DataInformation Systems Frontiers - Tập 1 - Trang 259-266 - 1999
Edward J. Dudewicz, Zaven A. Karian
Data mining has, in the past, tended to use simplistic statistical methods (or even none at all). In this paper we show by example how cutting edge (but easy to use and comprehend) statistical methods can yield substantial gains in data mining. The role of statistics in IS/IT (information systems and information technology) in general can be substantial, yielding more nearly optimal performance of...... hiện toàn bộ
Agent-Based Knowledge Analysis Framework in Disaster ManagementInformation Systems Frontiers - Tập 20 - Trang 783-802 - 2017
Dedi Iskandar Inan, Ghassan Beydoun, Simon Opper
Disaster Management (DM) is a complex set of interrelated activities. The activities are often knowledge-intensive and time sensitive. Timely sharing of the required knowledge is critical for DM. For recurring disasters (e.g. floods), developed countries tend to have dedicated document repositories of Disaster Management Plans (DISPLANs) that can be accessed as needs arise. However, accessing the ...... hiện toàn bộ