首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
IT outsourcing research has often been at the transaction level, focusing on the role of the characteristics of the IT activities as the antecedents of outsourcing decisions. The present study extends past research efforts examining the relationships between organizational level variables—in particular the business strategy—and the decision to outsource. Results show that prospectors and analyzers are more aggressive in their use of outsourcing for IT operations. However, no differences between the behaviour of the different strategic groups were found for maintenance activities, suggesting that these activities are too far from the core of the organization to be influenced by strategic profile.
Suzanne RivardEmail:
  相似文献   

2.
We examine the relationship between firms’ human resources (HR) practices and their information technology (IT) practices, focusing on the dichotomy between autonomy and control. We define facilitating HR practices as those that exhibit the following characteristics: worker autonomy, connectedness, learning, valuing individuals, trust, and flexibility in business processes. We then characterize facilitating IT practices, which are practices that facilitate employee collaboration, autonomy, and wider access to information. We contrast these categories of practice to traditional HR and monitoring IT, respectively. Drawing from theories of complementarities and configuration, we propose that alignment between HR and IT strategies originates at the level of individual practices. We consider the effects of this alignment on worker performance. We then ground our discussion in exploratory empirical and qualitative results.
M. S. KrishnanEmail:
  相似文献   

3.
A key consideration during investment decision making is the overall business value potential of an information technology (IT) solution. The complexity of the contemporary IT landscape is increasing. As information systems and technologies become more advanced and interconnected, they often impact multiple business processes in the organization. This in turn increases the complexity of IT investment decisions. This paper describes a decision framework for considering investments in information technologies that impact multiple business processes in the organization. The decision framework is illustrated via a case study of a small business that invested in mobile and wireless computing. The microcosm of the small business serves to illustrate some aspects of the business value derived from information technology investments that are often challenging to isolate in more complex organizational environments. The decision framework can support managers to analyze the overall business value returns arising from the ‘ripple effect’ of an IT investment on core and ancillary business processes. In the decision framework, the business value ripple effect is analyzed via a vertical dimension that emanates from core business processes to ancillary processes, and a horizontal dimension that extends over time.
Rens ScheepersEmail:
  相似文献   

4.
Recent innovations in utility computing, web services, and service-oriented architectures, combined with a growing array of IT skills, have improved firms’ ability to be more agile in responding to change. Using the resource-based view of the firm, prior research suggests that IT resources, in isolation, are unlikely to yield superior performance and so as firms try to boost their agility, the question becomes how to configure IT resources to prepare for, or react to, change. In this paper, we posit that managerial IT capabilities based on IT-business partnerships, strategic planning, and ex-post IT project analysis lead to the development of technical IT capabilities associated with a flexible IT infrastructure which in turn drives agility or a firm’s ability to react to change in its products and markets. Using data from matched surveys of IT and business executives in 241 firms, we find that managerial and technical capabilities affect agility. In further testing, we reveal that in a stable setting, technical IT capabilities are more important to agility than managerial IT capabilities, while in a dynamic setting, the opposite is true. Thus, for firms operating in volatile markets, effective models of managerial IT governance are essential for delivering superior agility or adaptiveness.
Paul Patrick TallonEmail:
  相似文献   

5.
The analysis of network effects in technology-based networks continues to be of significant managerial importance in e-commerce and traditional IS operations. Competitive strategy, economics and IS researchers share this interest, and have been exploring technology adoption, development and product launch contexts where understanding the issues is critical. This article examines settings involving countervailing and complementary network effects, which act as drivers of business value at several levels of analysis: the industry or market level, the firm or process level, the individual or product level, and the technology level. It leverages real options analysis for managerial decision-making under uncertainty across these contexts. We also identify a set of real options—compatibility, sponsorship and ownership option—which are unique to these settings, and which provide a template for managerial thinking and analysis when it is possible to delay an investment decision. We employ a hybrid jump-diffusion process to model countervailing and complementary network effects from the perspective of a user or a firm joining a network. We also do this from the perspective of a network developer. Our analysis shows that when countervailing and complementary network effects occur in the same network technology context, they give rise to real option value effects that may be used to control or modify the valuation trajectory of a network technology. The option value of waiting in these contexts jumps when the related business environment experiences shocks. Further, we find that the functional relationship between network value and the option value is not linear, and that taking into account a risk premium may not always result in a risk-neural investment. We also provide a managerial decision-making template through the different kinds of deferral options that we identify for this IT analysis context.
Ajay KumarEmail:
  相似文献   

6.
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the storage requirement. This research was supported by the USA National Science Foundation Grants CCR-0310974 and IIS-0546027.
Ling Qiu (Corresponding author)Email:
Yingjiu LiEmail:
Xintao WuEmail:
  相似文献   

7.
The Stanford Event Heap has been shown to provide appropriate support for constructing interactive workspace applications. Given this success it is natural to consider the Event Heap as a platform to support other classes of Ubiquitous Computing applications. In this paper we argue that the distributed, spontaneous nature of these applications places additional demands on the Event Heap that require extensions to both the engineering and API. Suitable extensions are described and their use to support a typical Ubicomp application is discussed.
Oliver Storz (Corresponding author)Email:
Adrian FridayEmail:
Nigel DaviesEmail:
  相似文献   

8.
The increasing adoption of Service Oriented Architecture (SOA) is allowing more and more companies to integrate themselves in interorganizational netchain environments wherein knowledge assets can be electronically shared with selected business partners. The dynamic nature of these environments implies a need for organizations to protect and monitor the flow of their valuable knowledge assets throughout the netchain if they hope to maintain their long-term competitive positions. In this paper, we propose an interorganizational knowledge-sharing security model that integrates the value chain reference model (VCOR), the federated enterprise reference architecture model (FERA), and multidimensional data warehouse technologies to allow for the proactive monitoring of shared knowledge assets across an SOA-based netchain. The proposed architecture is novel In that it supports dynamic policy revision through the automated detection of knowledge-sharing breaches within a netchain—a process whose viability is demonstrated using network flow theory and a series of simulations. Existing business intelligence infrastructures can be readily modified to support the proposed model, as multidimensional data warehousing has already been adopted in many organizations.
Michael GoulEmail:
  相似文献   

9.
Mobile communications beyond 3G will integrate different (but complementary) access technologies into a common platform to deliver value-added services and multimedia content in an optimum way. However, the numerous possible configurations of mobile networks complicated the dynamic deployment of mobile applications. Therefore, research is intensely seeking a service provisioning framework that is technology-independent, supports multiple wireless network technologies, and can interwork high-level service management tasks to network management operations. This paper presents an open value chain paradigm, a model for downloadable applications and a mediating platform for service provisioning in beyond 3G mobile settings. Furthermore, we introduce mechanisms that support a coupled interaction between service deployment and network configuration operations, focusing on the dynamic provisioning of QoS state to data path devices according to the requirements of dynamically downloadable mobile value-added services (VAS).
Vangelis GazisEmail:
  相似文献   

10.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed.
Timo Jokela (Corresponding author)Email:
Jussi KoivumaaEmail:
Jani PirkolaEmail:
Petri SalminenEmail:
Niina KantolaEmail:
  相似文献   

11.
Increased network speeds coupled with new services delivered via the Internet have increased the demand for intelligence and flexibility in network systems. This paper argues that both can be provided by new hardware platforms comprised of heterogeneous multi-core systems with specialized communication support. We present and evaluate an experimental network service platform that uses an emergent class of devices—network processors—as its communication support, coupled via a dedicated interconnect to a host processor acting as a computational core. A software infrastructure spanning both enables the dynamic creation of application-specific services on the network processor, mediated by middleware and controlled by kernel-level communication support. Experimental evaluations use a Pentium IV-based computational core coupled with an IXP 2400 network processor. The sample application services run on both include an image manipulation application and application-level multicasting.
Karsten SchwanEmail:
  相似文献   

12.
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathered regarding the speed and accuracy with which participants aimed and clicked on visual-tags using camera-phones. We found that participants’ attitudes to visual-tag-based applications were broadly positive, although they had several important reservations about camera-phone technology more generally. Data from our pointing-device task demonstrated that novice users were able to aim and click on visual-tags quickly (well under 3 s per pointing-device trial on average) and accurately (almost all meeting our defined speed/accuracy tradeoff of 6% error-rate). Based on our findings, design lessons for camera-phone and visual-tag applications are presented.
Eleanor Toye (Corresponding author)Email:
Richard SharpEmail:
Anil MadhavapeddyEmail:
David ScottEmail:
Eben UptonEmail:
Alan BlackwellEmail:
  相似文献   

13.
Connecting the family with awareness systems   总被引:1,自引:1,他引:0  
Awareness systems have attracted significant research interest for their potential to support interpersonal relationships. Investigations of awareness systems for the domestic environment have suggested that such systems can help individuals stay in touch with dear friends or family and provide affective benefits to their users. Our research provides empirical evidence to refine and substantiate such suggestions. We report our experience with designing and evaluating the ASTRA awareness system, for connecting households and mobile family members. We introduce the concept of connectedness and its measurement through the Affective Benefits and Costs of communication questionnaire (ABC-Q). We inform results that testify the benefits of sharing experiences at the moment they happen without interrupting potential receivers. Finally, we document the role that lightweight, picture-based communication can play in the range of communication media available.
Natalia Romero (Corresponding author)Email:
Panos MarkopoulosEmail:
Joy van BarenEmail:
Boris de RuyterEmail:
Wijnand IJsselsteijnEmail:
Babak FarshchianEmail:
  相似文献   

14.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process, we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
Julian Togelius (Corresponding author)Email:
Simon LucasEmail:
Ho Duc ThangEmail:
Jonathan M. GaribaldiEmail:
Tomoharu NakashimaEmail:
Chin Hiong TanEmail:
Itamar ElhananyEmail:
Shay BerantEmail:
Philip HingstonEmail:
Robert M. MacCallumEmail:
Thomas HaferlachEmail:
Aravind GowrisankarEmail:
Pete BurrowEmail:
  相似文献   

15.
Collaborative product commerce (CPC) solutions span software and services which permit individuals to share product data to improve the design, development, and management of products throughout the product development lifecycle. Drawing upon prior developments in adaptive structuration theory (AST) and media richness theory, I develop a theoretical framework to better understand the role of CPC in enabling collaboration in a product development environment. I study the impact of CPC on product design and development processes using a cross-sectional survey of 36 firms. The study reveals that CPC usage varies across different phases of the product development lifecycle. Preliminary results indicate that CPC has enabled firms to collaborate effectively with external stakeholders, which has resulted in tangible business benefits. I conclude by developing several research propositions which provide a roadmap for conducting future empirical research to measure the impact of CPC on product development, and highlight potential research topics that can be explored.
Indranil R. BardhanEmail:
  相似文献   

16.
Browser-based applications (BBAs), applications built on top of web browsers, dominate the world of Internet Applications today but are fundamentally flawed because the web browser is a weak platform for applications. Three characteristics of the browser—page orientation, statelessness, and limited computation—combine to produce a set of practical problems for BBA users. These problems include delays and discontinuities, confusion and errors, clumsy interfacing and limited functionality, printing problems, and filing difficulties. The paper analyzes these usability problems, providing numerous examples and tracing them back to underlying browser characteristics. The paper also examines the factors that make BBAs so popular despite their flaws. The paper concludes by considering directions for understanding the phenomenon better and for improving the current state of Internet Applications.
Mark S. SilverEmail:
  相似文献   

17.
Research on hybrid bionic systems (HBSs) is still in its infancy but promising results have already been achieved in laboratories. Experiments on humans and animals show that artificial devices can be controlled by neural signals. These results suggest that HBS technologies can be employed to restore sensorimotor functionalities in disabled and elderly people. At the same time, HBS research raises ethical concerns related to possible exogenous and endogenous limitations to human autonomy and freedom. The analysis of these concerns requires reflecting on the availability of scientific models accounting for key aspects of sensorimotor coordination and plastic adaptation mechanisms in the brain.
Pericle Salvini (Corresponding author)Email:
Edoardo DatteriEmail:
Cecilia LaschiEmail:
Paolo DarioEmail:
  相似文献   

18.
This paper provides a starting point for thinking beyond a research–practice divide and discusses possible new conceptualizations of intervention and the role of IT research in contemporary organizational settings. ‘IT research’ denotes a conglomerate of overlapping research conducted under the headings of Information Systems, Systems Development, Critical IS Research and Participatory Design. The paper applies this joint notion of IT research and the IT researcher to draw parallels across these niches of research regarding the question of intervention. Through an analysis of selected field study events, a prominent notion of intervention (as being active as opposed to being passive) is reworked in terms of intervention as circumstance, a circumstantial interplay of situated practices. In closing, subsequent possibilities for repositioning the IT researcher are discussed in terms of reflexivity, facilitation or being a trickster.
Dixi Louise StrandEmail: Phone: +45-72-185162Fax: +45-72-185001URL: www.itu.dk/people/dixih
  相似文献   

19.
The impact of agile practices on communication in software development   总被引:2,自引:1,他引:1  
Agile software development practices such as eXtreme Programming (XP) and SCRUM have increasingly been adopted to respond to the challenges of volatile business environments, where the markets and technologies evolve rapidly and present the unexpected. In spite of the encouraging results so far, little is known about how agile practices affect communication. This article presents the results from a study which examined the impact of XP and SCRUM practices on communication within software development teams and within the focal organization. The research was carried out as a case study in F-Secure where two agile software development projects were compared from the communication perspective. The goal of the study is to increase the understanding of communication in the context of agile software development: internally among the developers and project leaders and in the interface between the development team and stakeholders (i.e. customers, testers, other development teams). The study shows that agile practices improve both informal and formal communication. However, it further indicates that, in larger development situations involving multiple external stakeholders, a mismatch of adequate communication mechanisms can sometimes even hinder the communication. The study highlights the fact that hurdles and improvements in the communication process can both affect the feature requirements and task subtask dependencies as described in coordination theory. While the use of SCRUM and some XP practices facilitate team and organizational communication of the dependencies between product features and working tasks, the use of agile practices requires that the team and organization use also additional plan-driven practices to ensure the efficiency of external communication between all the actors of software development.
J. StillEmail:
  相似文献   

20.
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately addressed. In this article, we report on our work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others (e.g. friends, family, and colleagues). The objective of our work has been to better understand people’s attitudes and behaviors towards privacy as they interact with such an application, and to explore technologies that empower users to more effectively and efficiently specify their privacy preferences (or “policies”). These technologies include user interfaces for specifying rules and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present evaluations of these technologies in the context of one laboratory study and three field studies.
Norman Sadeh (Corresponding author)Email:
Jason HongEmail:
Lorrie CranorEmail:
Patrick KelleyEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号