共查询到20条相似文献,搜索用时 9 毫秒
1.
This paper deals with the problematic of development methodologies for organisational information systems and especially with their application to business systems. Historically, information systems development methodologies tend to fail, because either they take the organisational purposefulness for granted, or they do not analyse it thoroughly. This paper's position is that the analysis, and the definition or redefinition of the systemic purpose are regarded as the utmost expression of the system's purposefulness. This is to be achieved by ensuring the participation of all the stakeholders who affect, or are affected by, a particular business system's operations. The nature of participation, defined as a process of the stakeholders' perceptual exchanges, is deemed to be problematic in itself, due to the influence exerted upon it by organisational power, coercion and false consciousness. The paper highlights the philosophical reasons for the failures of information systems development methodologies, and provides a conceptual solution to this problematic as well as a strategy for the development of intrinsically motivated organisational information systems. The intrinsically motivated information systems methodology outlined here (BSPA) is intended to yield organisational information systems that demonstrably improve co-ordination of organisational activities, by enabling the development and maintenance of a single/multifaceted view of purpose throughout organisations. 相似文献
2.
3.
Wu Shunxiang Li Maoqing Department of Automation Xiamen University Fujian China Liu Sifeng School of Economics Management Nanjing Univ. of Aeronautics & Astronautics Nanjing China 《International Journal of Industrial Ergonomics》2007,(1)
In this paper, a method of data pre-processing in grey information systems was proposed to deal with grey information. The binning technique was introduced to smooth noisy data used for grey relative analysis. It constructed the function of grey relative coefficient for each null value and filled up the null value with the solution of the function. It also can be used to detect noisy data. This method is an application of Grey System Theory in data pre-processing. It has great significance in filling up null values and detecting noisy data in the “poor”information database. 相似文献
4.
5.
This paper shows an environment which supports the development of multi-thread dialogue interactive systems.The environment includes several tools and run-time support programs for the design and implementation of the user interface of an interactive system.First,methods of user interface specification with Elementary Nets are discussed.Then,the syntax of a user interface specification language based on Elementary Nets and the pre-compiler for the language as well as a graphic editor for Elementary Nets construction are described.Finally,an example is given to illustrate the design process of a user interface. 相似文献
6.
Abstract The existence of uncontrollable state variables is shown to be necessary for a system to be teleogenic, capable of generating its own goals. Since human beings and other living organisms are manifestly teleogenic, the behavioristic paradigm is fundamentally flawed. A triadic theory of human development, in which heredity and environment are joined by a self-determined component consisting of the evolving uncontrollable state variables, is outlined. The behavior of a simple teleoid under two different modes of development is described. 相似文献
7.
Journal hijacking, which refers to the attempted brand takeover of a journal by a third party, is a nascent threat confronting the information systems (IS) community, as evidenced by cybercriminals having established an online presence, masquerading as the Scandinavian Journal of Information Systems (SJIS). The SJIS hijacking damages the journal's reputation, leads to payment and publication scams, involves identity theft among unsuspecting IS researchers, and results in tarnished author reputations. Beyond SJIS, journal hijacking presents a threat, not only to the IS community, but also to science and academic integrity in general if researchers and readers cannot distinguish between fake publications by hijacked journals and real publications by legitimate journals. In this opinion article, we relate the story of the SJIS hijacking from the victims' perspectives. We describe its many aspects, draw attention to the key factors that contribute to the problem, and offer our perspectives on different response strategies in the absence of simple solutions. We hope to create awareness about the problem and stimulate a discussion in the IS community, not least in the face of digital innovations, such as ChatGPT and other artificial intelligence technologies that may inadvertently support paper mills and the production of fake research results. 相似文献
8.
Yangqing Zhu 《通讯和计算机》2006,3(3):35-39,56
The Internet-based network information system brings a series of security problems, such as the ability of fault tolerance, the ability of disaster tolerance, the ability of secret communication, secret data storage, clients' authentication and so on. In this paper, we study the integrated security of network information system from hardware architecture, data encryption, authentication, firewall and application. 相似文献
9.
John R. Vacca 《Information Systems Management》2013,30(2):50-56
Once the information center has been successfully established, its services can be expanded and its number of users increased. This article describes how the information center can provide users with an increasingly wide range of support services and offers guidelines on their controlled implementation. 相似文献
10.
《计算机与应用化学》1995,(2)
TheIssuesofInformationModeling¥YuzuruFujiwara(InstituteofElectronicsandinformationScience,TheUniversityofTsukuba)Abstract:Con... 相似文献
11.
《Computer Methods in Applied Mechanics and Engineering》1987,61(3):359-369
In this note we present results of an accuracy analysis of a recent characteristic-based Galerkin method suited for advection-dominated problems. The analysis shows that the numerical propagation characteristics of the explicit time-stepping scheme which uses linear basis functions for spatial discretization are superior to those of the related classical Lax-Wendroff method and the implicit Crank-Nicolson scheme. The model is subjected to three analytical test problems which embrace many essential realistic features of environmental and coastal hydrodynamic applications: pure advection of a steep Gaussian profile, dispersion of a continuous source in an oscillating flow, and long-wave propagation with bottom frictional dissipation in a rectangular channel. The numerical results demonstrate that the accuracy achieved with the present scheme is excellent and comparable to that of a characteristic-based finite difference scheme which uses Hermitian cubic interpolating polynomials. The results reported herein suggest strongly further use and testing of this robust model in engineering practice. 相似文献
12.
In a recent series of papers, Goldberg [G1, G2] and Sun and Yuan [SY] studied the L 2-stability of a well-known family of finite difference approximations for the initial-value problem associated with the multispace-dimensional parabolic system $$\frac{{\partial {\text{u(x,}}\;t{\text{)}}}}{{\partial t}} = \sum\limits_{1 \leqslant {\kern 1pt} p{\kern 1pt} \leqslant {\kern 1pt} q{\kern 1pt} \leqslant {\kern 1pt} {\kern 1pt} s} {A_{pq} \frac{{\partial ^2 {\text{u(x,}}\;t{\text{)}}}}{{\partial x_p \partial x_q }}} + \sum\limits_{1 \leqslant {\kern 1pt} p{\kern 1pt} \leqslant {\kern 1pt} s} {B_p \frac{{\partial {\text{u(x,}}\;t{\text{)}}}}{{\partial x_p }} + C{\text{u(x,}}\;t{\text{)}}} $$ where A pq ,B p and C are constant matrices, A pq being Hermitian. In the present paper we discuss these earlier results and complete the underlying theory by answering four open questions. 相似文献
13.
Fault-tolerant Control Systems—An Introductory Overview 总被引:15,自引:1,他引:15
This paper presents an introductory overview on the development of fault-tolerant control systems. For this reason, the paper is written in a tutorial fashion to summarize some of the important results in this subject area deliberately without going into details in any of them. However, key references are provided from which interested readers can obtain more detailed information on a particular subject. It is necessary to mention that, throughout this paper, no efforts were made to provide an exhaustive coverage on the subject matter. In fact, it is far from it. The paper merely represents the view and experience of its author. It can very well be that some important issues or topics were left out unintentionally. If that is the case, the author sincerely apologizes in advance.After a brief account of fault-tolerant control systems, particularly on the original motivations, andthe concept of redundancies, the paper reviews the development of fault-tolerant control systems with highlights to several important issues from a historical perspective. The general approaches to fault-tolerant control has been divided into passive, active, and hybrid approaches. The analysis techniques for active fault-tolerant control systems are also discussed. Practical applications of fault-tolerant control are highlighted from a practical and industrial perspective. Finally, some critical issues in this area are discussed as open problems for future research/development in this emerging field. 相似文献
14.
15.
16.
Modern organizations and even nations are increasingly dependent on information systems (IS) security, and their economic prosperity is strongly linked to innovation. Do these two important issues also relate one to another, and how? Can some lessons be learned that are important not only to security professionals but also to organizational and other important systems managing decision makers? Assuming that the answer is yes, how can we deploy innovation techniques to further improve IS security? Because this interdisciplinary area has not been addressed so far, this article presents one of the first attempts to address it on the basis of statistically relevant data on a national and international scale. It provides experimental results that imply some important statistical interdependencies that call for further study and also identifies systemic limitations, including those that exist on the European Union scale, that should be addressed to enable progress in this area. 相似文献
17.
Yogesh K. Dwivedi Banita Lal Navonil Mustafee Michael D. Williams 《Information Systems Frontiers》2009,11(1):87-102
This article analyses the first 10 years of research published in the Information Systems Frontiers (ISF) from 1999 to 2008. The analysis of the published material includes examining variables such as most productive authors, citation
analysis, universities associated with the most publications, geographic diversity, authors’ backgrounds and research methods.
The keyword analysis suggests that ISF research has evolved from establishing concepts and domain of information systems (IS), technology and management to contemporary
issues such as outsourcing, web services and security. The analysis presented in this paper has identified intellectually
significant studies that have contributed to the development and accumulation of intellectual wealth of ISF. The analysis has also identified authors published in other journals whose work largely shaped and guided the researchers
published in ISF. This research has implications for researchers, journal editors, and research institutions.
Yogesh K. Dwivedi is a Lecturer in Information Systems at the School of Business and Economics, Swansea University, Wales, UK. He obtained his PhD entitled ‘Investigating consumer adoption, usage and impact of broadband: UK households’ and MSc in Information Systems from the School of Information Systems, Computing and Mathematics, Brunel University, UK. His doctoral research has been awarded the ‘Highly Commended Award’ by the European Foundation for Management and Development (EFMD) and Emerald Group Publishing Ltd. His research focuses on the adoption and diffusion of Information and Communication Technology (ICT) in organisations and society. As well as having presented at leading IS conferences such as ECIS and AMCIS, he has co-authored several papers which have appeared (or will be appearing) in international referred journals such as Communications of the ACM, Information Systems Journal, European Journal of Information Systems, Information Systems Frontiers, Journal of Operational Research Society, Journal of Computer Information Systems, Industrial Management & Data Systems and Electronic Government, An International Journal. He has authored a book on ‘Consumer Adoption and Use of Broadband’ and also co-edited a ‘Handbook of Research on Global Diffusion of Broadband Data Transmission’. He is Senior Editor of DATABASE for Advances in Information Systems, Assistant Editor of Transforming Government: People, Process and Policy and member of the editorial board/review board of several journals including Journal of Enterprise Information Management, Journal of Computer Information Systems, Electronic Government, An International Journal as well as being a guest/issue co-editor of the DATABASE for Advances in Information Systems, Government Information Quarterly, Information Systems Frontiers, Journal of Enterprise Information Management, Journal of Electronic Commerce Research and Electronic Government, An International Journal. He is a member of the Association of Information Systems (AIS), IFIP WG8.6 and the Global Institute of Flexible Systems Management, New Delhi. He can be reached at ykdwivedi@gmail.com. Banita Lal is a lecturer in the Nottingham Business School, Nottingham Trent University, UK. She obtained her Ph.D. and M.Sc. in Information Systems from the School of Information Systems, Computing and Mathematics, Brunel University. Her research interests involve examining the individual and organizational adoption and usage of ICTs and technology-enabled alternative forms of working. She has published several research papers in internationally refereed journals such as Industrial Management and Data Systems, Information Systems Frontiers, Electronic Government, International Journal of Mobile Communications, and Transforming Government: People, Process and Policy, and has presented several papers at several international conferences. She can be reached at banita.la.@ntu.ac.uk Navonil Mustafee is a research fellow in Warwick Business School. His research interests are in parallel and distributed simulation, grid computing and health care simulation. He completed his PhD in Information Systems and Computing Brunel University in 2007. He is a member of the drafting group of the COTS Simulation Package Interoperability Product Development Group (CSPI-PDG) under the Simulation Interoperability Standards Organization. He can be reached at navonil.mustafee@gmail.com Michael D. Williams is a Professor in the School of Business and Economics at Swansea University in the UK. He holds a BSc from the CNAA, an MEd from the University of Cambridge, and a PhD from the University of Sheffield. He is a member of the British Computer Society and is registered as a Chartered Engineer. Prior to entering academia Professor Williams spent 12 years developing and implementing ICT systems in both public and private sectors in a variety of domains including finance, telecommunications, manufacturing, and local government, and since entering academia, has acted as consultant for both public and private organizations. He is the author of numerous fully refereed and invited papers within the ICT domain, has editorial board membership of a number of academic journals, and has obtained external research funding from sources including the European Union, the Nuffield Foundation, and the Welsh Assembly Government. He can be reached at m.d.williams@swansea.ac.uk 相似文献
Michael D. WilliamsEmail: |
Yogesh K. Dwivedi is a Lecturer in Information Systems at the School of Business and Economics, Swansea University, Wales, UK. He obtained his PhD entitled ‘Investigating consumer adoption, usage and impact of broadband: UK households’ and MSc in Information Systems from the School of Information Systems, Computing and Mathematics, Brunel University, UK. His doctoral research has been awarded the ‘Highly Commended Award’ by the European Foundation for Management and Development (EFMD) and Emerald Group Publishing Ltd. His research focuses on the adoption and diffusion of Information and Communication Technology (ICT) in organisations and society. As well as having presented at leading IS conferences such as ECIS and AMCIS, he has co-authored several papers which have appeared (or will be appearing) in international referred journals such as Communications of the ACM, Information Systems Journal, European Journal of Information Systems, Information Systems Frontiers, Journal of Operational Research Society, Journal of Computer Information Systems, Industrial Management & Data Systems and Electronic Government, An International Journal. He has authored a book on ‘Consumer Adoption and Use of Broadband’ and also co-edited a ‘Handbook of Research on Global Diffusion of Broadband Data Transmission’. He is Senior Editor of DATABASE for Advances in Information Systems, Assistant Editor of Transforming Government: People, Process and Policy and member of the editorial board/review board of several journals including Journal of Enterprise Information Management, Journal of Computer Information Systems, Electronic Government, An International Journal as well as being a guest/issue co-editor of the DATABASE for Advances in Information Systems, Government Information Quarterly, Information Systems Frontiers, Journal of Enterprise Information Management, Journal of Electronic Commerce Research and Electronic Government, An International Journal. He is a member of the Association of Information Systems (AIS), IFIP WG8.6 and the Global Institute of Flexible Systems Management, New Delhi. He can be reached at ykdwivedi@gmail.com. Banita Lal is a lecturer in the Nottingham Business School, Nottingham Trent University, UK. She obtained her Ph.D. and M.Sc. in Information Systems from the School of Information Systems, Computing and Mathematics, Brunel University. Her research interests involve examining the individual and organizational adoption and usage of ICTs and technology-enabled alternative forms of working. She has published several research papers in internationally refereed journals such as Industrial Management and Data Systems, Information Systems Frontiers, Electronic Government, International Journal of Mobile Communications, and Transforming Government: People, Process and Policy, and has presented several papers at several international conferences. She can be reached at banita.la.@ntu.ac.uk Navonil Mustafee is a research fellow in Warwick Business School. His research interests are in parallel and distributed simulation, grid computing and health care simulation. He completed his PhD in Information Systems and Computing Brunel University in 2007. He is a member of the drafting group of the COTS Simulation Package Interoperability Product Development Group (CSPI-PDG) under the Simulation Interoperability Standards Organization. He can be reached at navonil.mustafee@gmail.com Michael D. Williams is a Professor in the School of Business and Economics at Swansea University in the UK. He holds a BSc from the CNAA, an MEd from the University of Cambridge, and a PhD from the University of Sheffield. He is a member of the British Computer Society and is registered as a Chartered Engineer. Prior to entering academia Professor Williams spent 12 years developing and implementing ICT systems in both public and private sectors in a variety of domains including finance, telecommunications, manufacturing, and local government, and since entering academia, has acted as consultant for both public and private organizations. He is the author of numerous fully refereed and invited papers within the ICT domain, has editorial board membership of a number of academic journals, and has obtained external research funding from sources including the European Union, the Nuffield Foundation, and the Welsh Assembly Government. He can be reached at m.d.williams@swansea.ac.uk 相似文献
18.
Pouyan Esmaeilzadeh 《Information Systems Management》2019,36(1):57-77
Health Information Exchanges (HIEs) help various organizations to use aggregated clinical data for research purposes. Consumers may concern that private companies could access their personal information and such information could be misused for other purposes. This study attempts to extend the application of privacy calculus theory in the HIE domain by developing a model centered on the perceived benefits, perceived risks, their dimensions and antecedents to predict consumers’ opt-in intention toward HIE use for research purposes. 相似文献
19.
To determine the maximum separation between events for nonrepetitive systems with max and linear constraints, there are the
“iterative tightening from above” (ITA) approach and the “iterative tightening from below” (ITB) approach. Since such systems
can be formulated as systems constrained by min–max inequalities, this paper gives an algorithm named MMIMaxSep for solving min–max inequalities. The algorithm is a generalization and a mathematically elegant reformulation of Yen et
al.’s MaxSeparation algorithm which uses the ITB approach. Our numerical experiments indicate that MMIMaxSep is very efficient. Moreover, MMIMaxSep has a unique advantage of being able to directly handle tree-represented min–max functions, and its complexity is closely
related to the complexity of computing cycle time of min–max functions.
相似文献
Yiping ChengEmail: |
20.
Backsourcing is motivated by opportunities arising from changes in the business situation, redefinition of the character of outsourced service declining in quality or due to the discovery of flaws in the contract. The situation of backsourcing clearly has major implications for an organization in terms of monetary investments, IS infrastructure and changes in employee requirements during and after the process. The paper considers a detailed analysis of two case studies of backsourcing reported from JP Morgan Chase (USA) and Sainsbury (UK). A major contribution of the paper is to identify important strategies to be followed in backsourcing projects to ensure efficient knowledge re-integration. 相似文献