Journal of Systems and Information Technology
Công bố khoa học tiêu biểu
* Dữ liệu chỉ mang tính chất tham khảo
The purpose of this paper is to describe and explain the case of a major knowledge transfer project conducted over seven years within a region of the UK.
As part of this project a large survey is conducted on an annual basis which aims to track eBusiness adoption amongst small and medium‐sized enterprises (SMEs) in the region and the effects of such adoption upon regional development.
The paper presents findings from this longitudinal study and discusses these findings in terms of conceptions of eBusiness and the importance of developing more sophisticated instruments for assessing eBusiness maturity amongst SMEs. From the research there is clear evidence of the role of eBusiness adoption as a driver of regional development. The benefits from the initial Opportunity Wales programme are still materializing several years after the completion of the first three years of the seven year project.
This is a study of one region in Europe. Further regional cases are required to support the findings.
The findings should help regional planners and national governments assess the value of eBusiness initiatives.
This paper describes the case of a programme funded by the European Union involved with the transfer of eBusiness knowledge to SMEs conducted over the period April 2001 to September 2007 within a major region of the UK. The scope of the research project and its longitudinal nature make the study original.
This paper has two purposes. The first purpose is to study how groups and members of an organization use collaborative technology in accomplishing their everyday work. The second purpose is to study how interpretive researchers can use an ethnographic research approach, called the strip resolution process (SRP), to make explicit the process by which they achieve their interpretation, rather than provide just their interpretation leaving the process as a black box.
Interpretive case study using interviews, observation, participant‐observation, and study of documents.
For IS researchers, a key finding is that the SRP facilitates both an understanding of research phenomena from the members’ perspective and a means of explaining how that understanding was achieved. For IS practitioners, a key finding is that organizational work practices and reward structures should be “co‐designed” with the collaborative technology's functionalities to accomplish organizational objectives.
This study used ethnographically informed approaches, including the SRP, to collect and interpret data. However, the duration spent at the organizational site, 25 days spread over eight months, would not qualify this study as an ethnography based on the recommended duration of 12 months of sustained fieldwork.
This study's findings have two implications for IS practice. The first implication is that practitioners planning to deploy collaborative technology in an organization should not focus primarily, or even mainly, on the technology's functionalities. Instead, they should pay most attention to the organization's work practices and reward structures. Work practices and reward structures should be “co‐designed” with the technology's functionalities to accomplish organizational objectives. The second implication is that the SRP could help close the “understanding gap” between IS practitioners and system stakeholders. Hence, a practitioner can use the SRP as a supplement to any systems development methodology for analyzing system requirements.
The value of this paper for IS interpretive researchers is that it explains and illustrates how an ethnographic research approach called the SRP can be used by a researcher to understand research phenomena from the members’ perspective, test and validate his interpretation, and reveal
Mothers, especially working mothers, take an active role in many activities. They manage the family’s daily lives. They take care of children. They work or study. And they also strive to take care of themselves. Working mothers are normally overloaded with all kinds of tasks ‐ almost on a daily basis, year after year. Although there are many many kinds of useful information and services available over the Internet that could be a big help to mothers, working mothers or mothers with children around them at home are often so occupied that they cannot afford the luxury of sitting in front of a computer to access those services. So, what kind of services could help to make their lives a bit easier? Readily accessible mobile services over the wireless network seem to be exactly what they need. But what mobile e‐services do working mothers need? What is the specific added value offered by such services? These form the issues that we will address in this paper.
If IS educators are to provide their students with an understanding of the overall context in which they will develop professional careers, they must have good information about graduates’ employment destinations and their workforce experiences. That information is difficult to obtain from standard data collections. This paper explores the early job experiences of IS graduates using survey and interview data. While the graduates have a strong IS professional orientation and experience friendly work environments, their expectations of access to interesting work, career advice and opportunities for advancement appear to outstrip their experience in the workplace.
The purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address social media security risks more effectively.
This paper begins by reviewing the disparate discussions in literature on social media security risks and mitigation techniques. Based on an extensive review, some key insights were identified and summarized to help organizations more effectively address social media security risks.
Many organizations do not have effective social media security policy in place and are unsure of how to develop effective social media security strategies to mitigate social media security risks. This paper provides guidance to organizations to mitigate social media security risks that may threaten the organizations.
The paper consolidates the fragmented discussion in literature and provides an in‐depth review of social media security risks and mitigation techniques. Practical insights are identified and summarized from an extensive literature review. Sharing these insights has the potential to encourage more discussion on best practices for reducing the risks of social media to organizations.
The purpose of this paper is to develop an innovative information hiding algorithm.
The proposed algorithm is based on image histogram statistics. Cumulative‐peak histogram regions are utilized to hide multiple bits of the secret message by performing histogram bin substitution. The embedding capacity, otherwise known as payload, and peak signal to noise ratio (PSNR), as well as security, are the main metrics used to evaluate the performance of the proposed algorithm.
According to the obtained results, the proposed algorithm shows high embedding capacity and security at comparable PSNR compared with existing hiding information techniques.
The simplicity, security, random distribution of embedding pixels, and on‐demand high capacity are the key advantages of the proposed approach.
Requirements engineering is a crucial phase in software development. Software development in a virtual domain adds another dimension to the process of requirements engineering. There has been growing interest in virtual teams, and more specifically in virtual software development. While structured software development methods are the obvious first choice for project managers to ensure a virtual software development team remains on track, the social and cultural aspects of requirements engineering cannot be ignored. These social aspects are especially important across different cultures, and have been shown to affect the success of an information system. The discussion in this paper is centred around the requirements engineering processes of a virtual team in a Thai Software House. This paper explains the issues and challenges of requirements engineering in a virtual domain from a social and cultural perspective. Project managers need to encourage a balance between structured methods and social aspects in requirements engineering for virtual team members. Cultural and social aspects influence the relationship between the virtual team and the client.
Mobile technology research focuses on supporting the individual mobile worker. CCSW research has primarily focused on supporting distributed, but fixed‐site workers. This research bridges both research foci by expanding to include mobile, anytime, anyplace support. The VLab (Virtual laboratory) provides anytime, anyplace process support for mobile software development teams. A longitudinal evaluation of group interactions in multiple extant teams establishes a baseline that helps to identify process support requirements. This baseline can be used to judge the effect of introducing process support technology that addresses specific context variables in group interactions.
- 1
- 2
- 3
- 4