首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
It has long been argued that organizations have struggled to achieve business benefits, and in particular sustainable competitive advantage, from their IT investments. In this paper we draw upon resource-based theory to explore how the effective deployment of IS capabilities might deliver sustainable improvements to an organization’s competitive positioning. In so doing, this research makes a significant departure from the enterprise-level orientation of prior studies, by focusing upon the role of IS capabilities in leveraging sustainable improvements to competitive positioning from individual IS initiatives. Based upon the responses to a quantitative and qualitative survey of practicing managers, it has been shown that an organization’s ability to leverage and sustain improvements in its competitive positioning, from IS initiatives, are directly dependent upon its ability to effectively apply an appropriate portfolio of IS capabilities. Moreover, it has been shown that sustainable improvements in competitive positioning are most likely in circumstances in which the successful outcome of an IS initiative is dependent upon ‘outside-in’ and ‘spanning’ capabilities, which are both lacking in transparency and difficult to replicate.  相似文献   

2.
A theory of application service provider (ASP) use from a client perspective   总被引:14,自引:1,他引:13  
Since the late 1990s, “application service providers” (ASPs) have offered telecommunication-based application services. ASP use can be considered a type of IS outsourcing as well as the creation of an inter-organizational system, such as is created for electronic data interchange (EDI). We developed a theory of ASP adoption and use from the client’s perspective based on analysis of primary and secondary data on ASP use and analysis of literature on IS outsourcing and EDI. We present a model and highlight similarities and differences between conventional IS outsourcing, ASP use, and EDI.  相似文献   

3.
Information systems (IS) facilitate organisations to increase responsiveness and reduce the costs of their supply chain. This paper seeks to make a contribution through exploring and visualising knowledge mapping from the perspective of IS investment evaluation. The evaluation of IS is regarded as a challenging and complex process, which becomes even more difficult with the increased complexity of IS. The intricacy of IS evaluation, however, is due to numerous interrelated factors (e.g. costs, benefits and risks) that have human or organisational dimensions. With this in mind, there appears to be an increasing need to assess investment decision-making processes, to better understand the often far-reaching implications associated with technology adoption and interrelated knowledge components (KC). Through the identification and extrapolation of key learning issues from the literature and empirical findings, organisations can better improve their business processes and thereby their effectiveness and efficiency, while preventing others from making costly oversights that may not necessarily be only financial. In seeking to enlighten the often obscure evaluation of IS investments, this paper attempts to inductively emphasise the dissemination of knowledge and learning through the application of a fuzzy Expert System (ES) based knowledge mapping technique (i.e. Fuzzy Cognitive Map [FCM]). The rationale for exploring knowledge and IS investment evaluation is that a knowledge map will materialise for others to exploit during their specific technology evaluation. This is realised through conceptualising the explicit and tacit investment drivers. Among the several findings drawn from this research, the key resulting knowledge mapping through FCM demonstrated the complex, multifaceted and emergent behaviour of causal relationships within the knowledge area. The principal relationships and knowledge within IS investment evaluation are illustrated as being determined by a blend of managerial and user perspectives.  相似文献   

4.
Previous studies have pointed out that computer games could improve students’ motivation to learn, but these studies have mostly targeted teachers or students in elementary and secondary education and are without user adoption models. Because business and management institutions in higher education have been increasingly using educational simulation games in recent years, factors influencing the continuing use of business simulation games by higher-education students are worth probing into. This research adopted the technology acceptance model, expectation confirmation theory, and agency theory as its theoretical base. Moreover, learning motivation and classroom climate from the perspective of learning, as well as perceived attractiveness and perceived playfulness from the perspective of playfulness and attractiveness were also added to the final research model. A total of 185 valid student respondents in Taiwan’s higher education who have used business simulation games in their classes participated in the survey. The results show that perceived playfulness and learning performance positively influence students’ satisfaction, which further influence the intention to use computer simulation games. Furthermore, perceived ease of use and perceived attraction play a critical role in determining perceived playfulness. Perceived ease of use was also positively influenced by perceived attraction. The research results on the students’ perspective provide a strong support for the teachers to adopt or continue using computer simulation games in classrooms. However, the agency theory failed to be sustained as a useful tool in motivating students’ learning activities, which is worthy of further research.  相似文献   

5.
There has been little research on assessment of learning management systems (LMS) within educational organizations as both a web-based learning system for e-learning and as a supportive tool for blended learning environments. This study proposes a conceptual e-learning assessment model, hexagonal e-learning assessment model (HELAM) suggesting a multi-dimensional approach for LMS evaluation via six dimensions: (1) system quality, (2) service quality, (3) content quality, (4) learner perspective, (5) instructor attitudes, and (6) supportive issues. A survey instrument based on HELAM has been developed and applied to 84 learners. This sample consists of students at both undergraduate and graduate levels who are users of a web-based learning management system, U-Link, at Brunel University, UK. The survey instrument has been tested for content validity, reliability, and criterion-based predictive validity. The analytical results strongly support the appropriateness of the proposed model in evaluating LMSs through learners’ satisfaction. The explanatory factor analysis showed that each of the six dimensions of the proposed model had a significant effect on the learners’ perceived satisfaction. Findings of this research will be valuable for both academics and practitioners of e-learning systems.  相似文献   

6.
Determining the contribution of information system (IS) projects is a difficult endeavour. This research presents a framework for evaluating and measuring IS project performance that seek to address this problem while moving away from the reliance on the traditional assessment method (time, cost, specifications). When IS projects fail or succeed is difficult to determine what conditions enabled the outcome. However, if we are to develop a higher level of IS project management competence we need frameworks that can help in assessing IS project outcomes while critically reflecting and learning from IS project management practices. The Project Performance Scorecard (PPS) recommended here is one framework that can help to advance our understanding IS project management and evaluation approaches. This framework integrates concepts from existing models of IS success, the Balanced Scorecard and project management practices. A case study approach is used to illustrate the use of the PPS, and offers insights into how it can be useful in assessing the performance of IS projects.
Corlane BarclayEmail:
  相似文献   

7.
The history of the human-centered system movement (Gill in AI Soc 10(2), 1996) tells us that information technology (referred to as IT below) has come to dominate our life-world or societal functions. Since from 1990s, its streaming influence could be called ‘abnormal.’ Since entering the twenty-first century, the IT system has been on automatic acceleration and has been spreading more and more rapidly to many facets of our lives. In many sectors, this ubiquitous streaming of IT is seen to be central to societal development, and in a Japanese sense, IT could be seen as a resource to realizing technologically a mature society. This trend of IT seems to be unstoppable. In this sense, IT dominance can be regarded as abnormal to the point that IT-centered information systems (referred to as IS below) fall far short of the deep appreciation of the complex and diverse life needs of people and societies, and this leads to the implementation of IT/IS from technological perspective, with a belief that everything, which we can do could be and should be, done now by IT/IS. However, as IT/IS have become to be embedded in many facets of societies and are influencing over our everyday life, we need to examine them not from the point of ‘capability’ but ‘allowability,’ in other words, not from the perspective of technology (cognition), but from the prospective of intuition and feeling of actual life (action). We term reality as seen in the narrow sense of cognition and actuality as seen in terms of action (Uchiyama in Theory and practice of actuality, Daito Bunka University, Tokyo, 2003). We draw a distinction between the two classes of ‘IT/IS’ systems, those which belong to the ‘reality’ and those which belong to the ‘actuality.’ To appreciate this distinction, we propose that this requires not only an understanding of the design of these IT systems but of the methodology of their use and their evaluation. To carry out the process of evaluation of IT/IS systems, we need to develop a new ‘appreciation’ methodology which enables us to rethink ‘IT/IS’ as ‘A system to use IT/IS.’ This idea is similar to the idea of Beck’s (World risk society theory (trans: Shimamura K), Chikuma Scholastic Collection (in Japanese), 2010) reflecting the modern. So, we propose a strict distinction between the two systems classes of ‘IT/IS’ which we call belonging to the ‘reality’ and ‘A system to use IT/IS’ which we call belonging to the ‘actuality.’ The methodology to deal with ‘actuality’ has not yet been developed, but Checkland and Poulter’s (Learning for action, Wiley, New York, 2006) soft systems methodology (referred to as SSM below) intends to deal with this kind of class of systems, that is, ‘human activity systems.’ He uses the key concept of ‘accommodation’ which means ‘to live with different individual world views based on sharing of actuality,’ and thus, he proposes to overcome the idea of consensus which is the agreement with the ‘reality’ level. In this paper, we adopt a methodology based on the SSM’s accommodation and not based on the consensus on the ‘reality’ level. By using such a methodological thinking, we reconsider the problem of evolving technologically a mature society which can be seen as a problem relevant to ‘A system using IT/IS’ rather than the problem of IT/IS itself. In doing so, we could draw some innovative orientations in the field of IT/IS which by traditional methodology could not be drawn. It is not certain whether our attempt could make a difference to the runaway of IT/IS. We illustrate this purpose by studying a workshop process which highlights that even participating experts of IT/IS themselves felt apprehensive about the more and more focus on the implementation of IT/IS solutions both in the present and the future. We believe that the first step toward this purpose is to explore the new orientation of IT/IS use. The aim of this first step is to make a difference to the ‘abnormal’ situation and hope to create a foothold for the reorientation of ‘A system to use IT/IS.’  相似文献   

8.
9.
The research literature has seen a number of studies aimed at understanding customer attitudes towards banking technologies, and thereby providing implications for developmental planning and marketing. However, even though banking technologies have a significant amount of information systems (IS) component to them, there is a paucity of research that considers them from the IS perspective. In this paper, we fill this gap by considering three constructs, namely usefulness, ease of use and usage, that are all rooted in the IS literature. We study user’s perceptions of these constructs, as well as the relationships among them, for both online and telephone banking.  相似文献   

10.
Secure multimedia delivery in modern and future networks is one of the most challenging problems towards the system integration of fourth generation (4G) networks. This integration means that different service and network providers will have to interoperate in order to offer their services to end users. This multidomain environment poses serious threats to the end user who has contract with, and trusts only a limited number of operators and service providers. One such threat is end users’ privacy on which we will focus in this paper. Probably the most promising protocol for multimedia session management is the Session Initiation Protocol (SIP), which is an application layer protocol and thus can operate on top of different lower layer technologies. SIP is quite popular and a lot of research has been conducted; however, it still has some security issues, one of which is related to privacy and more particularly the protection of user identities (IDs). In this paper we comment on the ID privacy issue of SIP and propose a framework called PrivaSIP that can protect either the caller's ID or both the caller's and the callee's IDs in multidomain environments. We present different implementations of our framework based on asymmetric and symmetric cryptography analyzing the pros and cons of each one of them. Furthermore, we provide performance measurements in order to estimate the performance penalty of our framework over standard SIP. The most significant advantage of our method is that it can assure user ID protection even when SIP messages are transmitted through untrusted SIP domains, while our results show that this can be achieved with no perceived delay by the end user.  相似文献   

11.
This paper surveys and demonstrates the power of non-strict evaluation in applications executed on distributed architectures. We present the design, implementation, and experimental evaluation of single assignment, incomplete data structures in a distributed memory architecture and Abstract Network Machine (ANM). Incremental Structures (IS), Incremental Structure Software Cache (ISSC), and Dynamic Incremental Structures (DIS) provide non-strict data access and fully asynchronous operations that make them highly suited for the exploitation of fine-grain parallelism in distributed memory systems. We focus on split-phase memory operations and non-strict information processing under a distributed address space to improve the overall system performance. A novel technique of optimization at the communication level is proposed and described. We use partial evaluation of local and remote memory accesses not only to remove much of the excess overhead of message passing, but also to reduce the number of messages when some information about the input or part of the input is known. We show that split-phase transactions of IS, together with the ability of deferring reads, allow partial evaluation of distributed programs without losing determinacy. Our experimental evaluation indicates that commodity PC clusters with both IS and a caching mechanism, ISSC, are more robust. The system can deliver speedup for both regular and irregular applications. We also show that partial evaluation of memory accesses decreases the traffic in the interconnection network and improves the performance of MPI IS and MPI ISSC applications.  相似文献   

12.
User evaluation of the quality of an information system (IS) and its service is often a major factor in the performance evaluation of the IS staff. While views of users are critical, user evaluation may be incomplete and prompt inappropriate decisions regarding the delivery of the IS service. Three hundred and sixty degree evaluation techniques strive to avoid unjustified actions by eliciting feedback from multiple stakeholders to calibrate expectations more effectively and set the most appropriate future goals. Evidence from a survey of 193 IS users and IS staff members clarified the helpfulness of the principles in 360° feedback with regard to IS staff performance.  相似文献   

13.
The fuzzy weighted average is widely used to solve hierarchical evaluation problems, including fuzzy consideration for the operations of scoring, weighting and aggregating. Previous works considered the fuzziness of score and weight, and used the additive function to aggregate these weighted scores. This study considers the aggregation operator also as a fuzzy variable, and uses a generalized means function to fuzzify the aggregation operator within a fuzzy weighted average. In practice, the proposed model not only considers both the relative important of the criteria and its achieved performance, but also conveys the influence of the DM’s (Decision Maker’s) evaluation attitude. Thus the proposed model can flexibly reflect any DM’s evaluation attitude, such as open, neutral or rigorous. Thereby, the proposed model can make an objective evaluation that approaches a real decision making situation, and thus has the potential to be a useful management tool for improved resolution of fuzzy hierarchical evaluation problems.  相似文献   

14.
Two typical but different patterns of information system (IS) outsourcing are considered to be the most effective approaches in supply-chain management. These are conventional outsourcing and quasi-outsourcing. The latter is more generally adopted in large-scale organizations in Japan. In order to design an effective strategy, we will identify the factors which will have an important impact on the performance of IS outsourcing. In this article, we review the relevant literature on IS outsourcing, and propose four hypotheses. We test these four hypotheses by logistic regression analysis based on our original questionnaire survey of Japanese companies in order to find the relationship between IS outsourcing and its determinants. Finally, the implications of this study are discussed. Therefore, this article provides an empirical perspective to identify the determinants of conventional outsourcing versus quasi-outsourcing in Japan.  相似文献   

15.
Though blogs and wikis have been used to support knowledge management and e-learning, existing blogs and wikis cannot support different types of knowledge and adaptive learning. A case in point, types of knowledge vary greatly in category and viewpoints. Additionally, adaptive learning is crucial to improving one’s learning performance. This study aims to design a semantic bliki system to tackle such issues. To support various types of knowledge, this study has developed a new social software called “bliki” that combines the advantages of blogs and wikis. This bliki system also applies Semantic Web technology to organize an ontology and a variety of knowledge types. To aid adaptive learning, a function called “Book” is provided to enable learners to arrange personalized learning goals and paths. The learning contents and their sequences and difficulty levels can be specified according to learners’ metacognitive knowledge and collaborative activities. An experiment is conducted to evaluate this system and the experimental results show that this system is able to comprehend various types of knowledge and to improve learners’ learning performance.  相似文献   

16.
The Delay-/Disruption-Tolerant Networking Architecture calls for new design principles that will govern data transmission and retransmission scheduling over challenged environments. In that context, novel routing, transport and application layer algorithms have to be established in order to achieve efficient and reliable communication between DTN-nodes.In this study, we focus on the evolution of the terrestrial Internet into the Interplanetary or Space Internet and propose adoption of the Deep-Space Transport Protocol (DS-TP) as the transport layer scheme of choice for the space networking protocol stack. We present DS-TP’s basic design principles and we evaluate its performance both theoretically and experimentally. We verify that practice conforms with theory and observe great performance boost, in terms of file delivery time between DTN-nodes, in case of DS-TP. In particular, the gain of DS-TP against conventional proposals for deep-space communications increases with the link error rate; under conditions DS-TP can improve the performance of the transport layer protocol by a factor of two (i.e., DS-TP can become two times faster than conventional protocols).  相似文献   

17.
18.
IS researchers have normally assumed that satisfaction is the key factor influencing IS customers’ reuse of services; however, a focus on customer satisfaction does not always guarantee customer retention. We synthesized customer satisfaction and dissatisfaction models from prior service quality research to provide a comprehensive model predicting the behavioral intentions of customers to reuse IS services. Five research hypotheses were empirically tested by using a field study of 263 users of an IS service department. Our findings placed IS service quality in a causal network leading to IS service reuse and highlighted the relative importance that service quality value played in predicting behavioral intention to reuse the service.  相似文献   

19.
Quantitative design is crucial to ICT and it is therefore important to integrate performance modelling techniques into support environments that facilitate the correct construction of computer systems. We consider Performance Modelling Interchange Formats (PMIFs), which allow models to be specified in a uniform way and ported to a number of tools that solve them. We focus on extending the class of models describable in a PMIF that can be solved analytically – specifically, yielding a product-form solution for their equilibrium state probabilities. We use an extension of an established theorem, called the ‘reversed compound agent theorem’ (RCAT) as the basis of the analytical modelling tool into which the extended PMIF feeds models. We describe the RCAT methodology in practical terms, how it is integrated into an extended PMIF, and illustrate our methodology with three examples.  相似文献   

20.
Contemporary information systems (IS) organizations need mechanisms to cope with both the complexity that is created by rapid technological change and escalating business demands, and the resulting uncertainty engendered in organizational operations and policies. The IS function will not be in a position to manage such changes effectively unless it undergoes a fundamental restructuring towards becoming a ‘learning’ organization. This paper presents a framework that identifies the core drivers than an IS organization can proactively influence as it attempts to become learning-oriented. The framework identifies three essential components: (1) the learning context that defines various dimensions for measuring organizational and individual performance; (2) procedures and management initiatives that will facilitate individual learning to improve such performance; and (3) norms and culture that are established by the leadership to encourage learning. Using a case study methodology, the actions taken by one specific IS organization in its attempts to infuse learning capabilities among its members are examined. The conceptual framework for examining what it takes to be a learning IS organization and the detailed documented experiences of one specific organization may provide valuable insights to other IS organizations in their efforts to become more adaptive and responsive to change.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号