共查询到20条相似文献,搜索用时 15 毫秒
1.
《Information & Management》1987,13(2):95-101
Organizations which have used computers for a number of years are well acquainted with the software maintenance problem and the new-application development backlog. The first exists because computer programs require various types of changes throughout their life. The second has been created because so many systems development staff have to be assigned to software maintenance, and because many computer users have recognized the value of additional computer applications in their organization.It is believed that the concept of end-user computing has been used to relieve the new application development backlog in many organizations. In some, information centers have been implemented partly to support the development of computer applications by end-users. A survey was conducted to determine to what extent the information center approach is being used. Over one-half of the responding organizations reported their use. The survey included an identification of the functions provided by information centers to end-users and the responsibilities of both information center consultants and end-users. Recommendations are presented. 相似文献
2.
3.
P.J.S. Bruwer 《Information & Management》1984,7(2):63-67
This article presents a model of the success of computer-based information systems. We hypothesize that the following variables influence the success of the system: involvement of managers in computerization projects: higher-level managerial support; the technical quality of the system; personal factors; the attitude of managers towards EDP personnel and the attitude of managers towards the computerized system. The research finds that the manager's attitudes to computerization are related to all but the last two.Certain classes of variables are difficult to relate to the success of the system (for example, personal factors). If the evidence for the model is considered strong enough to warrant action, the organization should concentrate on several key variables: high quality of the system; good management support, and good training and management involvement.The results of our research should provide better understanding of the variables associated with the success of a computer-based system. 相似文献
4.
《Computers and Standards》1982,1(1):35-48
Standardization in Information Systems profits from the existence of an overall modell or design which enables the standard-designers to see the context in which the individual efforts are progressing. Such a model is proposed by the authors who suggest that ISO organize its work in conformance to this framework. 相似文献
5.
《Computer Networks (1976)》1982,6(5):331-343
Standardization in Information Systems profits from the existence of an overall model or design which enables the standard-designers to see the context in which the individual efforts are progressing. Such a model is proposed by the authors who suggest that ISO1 organize its work in conformance to this framework. 相似文献
6.
7.
Auvo Finne 《Software Quality Journal》2011,19(4):663-688
All models of information system (IS) quality postulate two constructs, namely ‘quality’ and ‘model’. These concepts are seldom explicitly discussed and defined in connection with IS. Together, they constitute an information system quality meta-model. Compared to lower level models, a meta-model is likely to be more applicable in a wider variety of contexts. This article aims, firstly, to validate and develop further an initial IS quality meta-model that emerged from two previous studies. Secondly, it is an account of a real quality modeling process, in connection with the development of an Education Management Information System (EMIS) in Tanzania, and one that can be referenced by other researchers. This case is used to discover how the meta-model can be used as part of system development process, with a view to instantiating system- and attribute-specific quality models. The study supports the general validity of a two-part and three-level quality meta-model. It further suggests that quality is by its nature relative and that the essence of quality is embodied in relationships between the information system and its context. The meta-model functions well as a safeguard that can prevent developers from neglecting important aspects of quality design. In addition, it generates relevant questions for future research. 相似文献
8.
The current landscape of the information systems research literature concerned with developing countries is surveyed by examining a range of research articles published from 2000 onward. These are discussed in terms of the key challenges addressed, including the role of technology, and the methodological and theoretical approaches used. Prospects for future research are discussed, based on a conceptual view as to how to study information and communication technologies (ICTs) in developing countries, to classify existing work, identify gaps, and suggest future opportunities. The authors contribute to the important debate on how ICTs in general, and information systems research in particular, can make a positive difference in the developing countries. © 2006 Wiley Periodicals, Inc. 相似文献
9.
Sajda Qureshi 《Information Technology for Development》2013,19(3):189-192
Abstract Computer‐based information systems should be conceptualised as social systems in which technology is only one of the dimensions. This broader perspective on information systems offers opportunities for a deeper understanding of their development and use. The social systems approach is illustrated in the paper by two research projects in the UK on the evaluation of information systems and information systems strategy formulation. The relevance of the UK research to a developing country context is discussed and it is argued that methodologies which aim to provide an understanding of the organisational, social and political context are highly suitable for organisations in developing countries. Some implications are drawn for research, education and practice related to information systems in developing countries. 相似文献
10.
《Behaviour & Information Technology》2012,31(7):668-680
This paper proposes an extended model of technology acceptance to understand potential users’ acceptance of online banking information systems (OBIS). The proposed model integrates key constructs from information systems and e-commerce acceptance research streams into the theoretical frame of the technology acceptance model. The model was tested on a sample of 353 Internet banking users in Pakistan. Using structural equation modelling with Analysis of Moment Structures software, data analysis showed considerable support for the extended hypothesised model. The results suggested that, in order of importance: perceived usefulness (PU), perceived ease of use (PEOU) and trust explained 45.7% of the variance in intended acceptance behaviour. Trust and technological self-efficacy (TSE) predicted 28.1% of the variance in PU. While in PEOU 21.8% of the variance was predicted by TSE, accessibility and terminology clarity. This study produced valuable insights into the factors that influence acceptance of OBIS by intended users and offers new ideas in understanding the acceptance of technology, especially in developing countries. 相似文献
11.
Environmental concerns, stricter legislation and inflated energy costs, together yield energy efficiency as an important pillar for virtually every industrial sector. Mindful of this challenge, ISs can act as enablers of energy-based management and intelligent decision support. Based on empirical evidence through two case studies combined with the design of a system prototype, this paper identifies those major functionalities that suffice to characterize an IS as ‘energy-aware’ in manufacturing. The functionalities are classified into two broad categories: (a) energy monitoring and (b) energy-aware analytics and are then combined into a high-level architecture. As a prerequisite for deploying such functionalities, this research presents also an approach integrating energy and operational information flows. Beyond that, the technologies that support the real-time and large-scale handling of energy data are provided. Our effort scales up to introduce a generic framework of a case-independent energy-aware IS. 相似文献
12.
From a survey of 201 people concerned with information-system design, estimates for 83 systems indicate that on average 30—35, per cent of operational software is devoted to the user-system interface (USI). In the design of USI software, survey responses indicate that improvements are needed in requirements definition, design documentation and design guidelines. 相似文献
13.
《Behaviour & Information Technology》2012,31(3):195-203
Abstract From a survey of 201 people concerned with information-system design, estimates for 83 systems indicate that on average 30—35, per cent of operational software is devoted to the user-system interface (USI). In the design of USI software, survey responses indicate that improvements are needed in requirements definition, design documentation and design guidelines. 相似文献
14.
Privacy is considered as the individual's right of informational self-determination. Whereas previous approaches to security in information systems focus mainly on military needs, our personal model of data has deliberately been designed to support privacy. In the model, all individuals, users as well as data subjects, are represented by encapsulated objects. The data part of an object corresponds to the knowledge of the individual (about him/her and his/her relationship to other persons), the operation part corresponds to the possible actions of the individual. A person holds two independently distributed kinds of rights: it is acquainted with other persons, and possesses authorities on roles.Acquaintances can be dynamically granted and revoked; authorities are statically received during creation according to class membership; combined rights can be made temporarily available. The privacy policy confines a person to its acquaintances by query modification and refuses evaluation of expressions if the person cannot exhibit appropriate authorities. While the model is basically object oriented we can conveniently describe an application by non first normal form tuples and relations; the data manipulation language is high level and relational. An expression is evaluated in three stages: navigation in the set of surrogates of persons, asking for knowledge, and finally normalization, prime value processing and output preparation. A prototype implementation of selected parts of the model is based on a kernel concept. 相似文献
15.
16.
《Information & Management》2005,42(6):877-899
Several studies of eCommerce in developing countries have emphasized the influence of contextual impediments related to economic, technological, legal, and financial infrastructure as major determinants of eCommerce adoption. Despite operating under such constraints, some organizations in developing countries are pursuing the eCommerce agenda while others are not. However, our understanding of what drives eCommerce among businesses in developing countries is limited by the absence of rigorous research that covers issues beyond contextual imperatives. This paper discusses a holistic and theoretically constructed model that identifies the relevant contextual and organizational factors that might affect eCommerce adoption in developing countries. It provides a research-ready instrument whose properties were validated in a survey of 150 businesses from South Africa. The instrument can be used as a decision tool to locate, measure, and manage some of the risk of adopting eCommerce. Implications of the study are outlined; they indicate a need to consider eCommerce, micro, meso, and macro issues in understanding the adoption of eCommerce in developing countries. 相似文献
17.
Carol L. Hoover 《Annals of Software Engineering》1998,6(1-4):253-279
Software is pervasive: it exists in many different types of applications and involves a variety of computer technologies. Representative applications that exemplify this diversity include aircraft control, video conferencing, Internet commerce, and computer-based tutors. There is a corresponding increase in demand for technical professionals with advanced software engineering skills and with expertise in developing specific applications or in applying specific technologies. A graduate curriculum that enables the student to acquire application-specific or technology-specific knowledge and skills while studying software engineering can help to supply this demand. Some graduate programs include electives that the student can use to specialize in technology-specific areas. Few programs offer students a systematic way to integrate their software engineering education with their development of application-specific knowledge and skills. This article discusses the TAP-D model for incorporating specialization tracks into a software engineering curriculum. The author discusses how this model was applied to the development of the Real-Time Specialization Track in the Master of Software Engineering Program at Carnegie Mellon University. 相似文献
18.
FAIEZ GARGOURI CHARLES FRANC¸OIS DUCATEAU FAOUZI BOUFARE`S 《Journal of Intelligent Manufacturing》1997,8(1):31-39
With the proliferation of object-oriented methods for information systems design, and the terminology used by each one, an intermediate step is indispensable in the transition between the design and the different implementation environments. Regardless of any method, this step aims at the unification of all concepts in a generic model called MGCO2. 相似文献
19.
The technology acceptance model (TAM) has been used in much of the research into technology diffusion conducted in the United States and other developed Western countries. There is, however, no empirical evidence that information-technology acceptance models established in developed countries can apply equally well to less-developed countries without some modification to account for the different context. This article questions the appropriateness of the traditional TAM model for the study of e-commerce in a developing country. It discusses the literature and presents the preliminary results of an investigation into the penetration of Internet banking in Jordan, a strategic developing country of the Middle East. The research results are used to suggest and evaluate modifications to the TAM to make it more relevant for research on technological acceptance in less-developed and developing countries. © 2005 Wiley Periodicals, Inc. 相似文献
20.