首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Abstract.  Critical research in information systems is based on and inspired by ethics and morality. In order to support this proposition, this paper will suggest a way of classifying critical research that differs from definitions common IS research. According to the current definition, research is critical when it is motivated by the intention to change social realities and promote emancipation. Based on this critical intention, critical research is furthermore characterized by critical topics, critical theories, and critical methodologies. Using these criteria of critical research, the paper argues that critical research is ethical in nature. To support this view, the paper introduces the concepts of ethics and morality by analysing two traditions of moral philosophy, here called the 'German tradition' and the 'French tradition'. Using three examples of current critical research in information systems, the paper will show that ethics and morality strongly influence critical intention, topics and theories. Having thus established the ethical nature of critical research, the paper concludes by discussing the weaknesses of critical research from the point of view of ethics and morality.  相似文献   

2.
ABSTRACT

Information and communication technologies (ICTs) act as tools for social change and development; however, there is still limited empirical evidence that demonstrates this. An outcome and impact assessment based on a comprehensive (holistic) evaluation is deemed appropriate at a time when many ICT4D programs fail to effectively demonstrate their impact toward rural development and how that impact came about. The purpose of this research is to identify the components for an outcome and impact assessment framework that is based on a comprehensive approach to evaluation. The authors applied a theoretical approach using Weicks theorizing process to develop the framework. The theoretical approach analyzed existing outcome and impact assessment frameworks from different fields beyond ICT4D. The output of this research proposed five key outcome and impact themes, which are informed by preceding domains of evaluation, essential for the assessment of ICT4D programs. These themes include Strategic Value, Most Significant Change, Empowerment, Livelihoods and Sustainability.  相似文献   

3.
Global sourcing will continue to have a major impact on IS organizations. Fourteen “new” and traditional skills that IS organizations will need in tomorrow's global sourcing environment are highlighted.  相似文献   

4.
ABSTRACT

Global sourcing will continue to have a major impact on IS organizations. Fourteen “new” and traditional skills that IS organizations will need in tomorrow's global sourcing environment are highlighted.  相似文献   

5.
In this paper we investigate how data openness can be made possible in communal settings. We adopt a utility perspective that foregrounds the use value of data, conceptualizing them as “goods.” On the basis of this conceptualization we explore 2 key goods' attributes: subtractability and exclusion. Our theoretical basis is built upon concepts from the theory of the commons, power theorizing, and notions related to data and information. Empirically, we investigate openness in the genetics domain through a longitudinal study of the evolving communal infrastructure for data related to 2 genes influencing women's susceptibility to breast and ovarian cancer (BRCA1 and BRCA2). We follow the continuously shifting “topology” of the BRCA information infrastructure and trace the multiple repositories that are put in place and the different arrangements for data collection, curation/quality assurance, access, and control that are tried out. In our analysis, we illustrate the actors' strategies for curbing the subtractability and exclusion attributes of data. We then propose a theoretically informed and empirically grounded framework that can guide understanding and action taking to enable data openness.  相似文献   

6.
Theories used in the Information Systems (IS) field come in large majority from authors based in Western countries, a bias that holds for critical theories as well. Such a bias is made more problematic by the mandate of critical theory, which is meant exactly to illuminate the oppressive conditions of the status quo. Against this backdrop, this paper explores the subalternity theory approach – developed by the Subaltern Studies collective from the early 1980s – as an indigenous theory that, proposing a socially and geographically connotated narration of ‘history from below’, can play a major role in the effort to decolonise critical IS research. By positioning subaltern theory in the IS field, the paper offers an alternative to the Western hegemony of critical theories, exploring the potential of such an alternative to voice systematically silenced and marginalised perspectives.  相似文献   

7.
为同时保证无线传感器网络的覆盖与连通,探索连续渗流密度对网络覆盖与连通性的影响,设计了改进的吉尔伯特圆盘感知模型来研究传感器网络的连续渗流问题。该方法同时考虑了无线传感器网络节点的空间分布特征及信道传输特性,用等效半径与连续渗流填充因子的依赖关系,研究了信道随机性对网络连续渗流密度λc的影响。实验结果表明,信道随机性条件下,节点等效半径增大的衰落环境可增加网络的连通性,减小网络的连续渗流密度λc。  相似文献   

8.
This paper discusses the findings of a field study of experienced systems developers which investigated the use of systems development methodologies (SDMs) in practice. Among the main findings to emerge are the following. There is a wide difference between the formalized sequence of steps and stages prescribed by a methodology and the methodology-in-action uniquely enacted for each development project. Also, there is much evidence which suggests that developers omit certain aspects of methodologies not from a position of ignorance, but from the more pragmatic basis that certain aspects are not relevant to the development environment they face. Thus, methodologies are tailored to the needs of the prevailing development environment and, being documented in a single manual often, are framed at a higher level of granularity that specifies broad activities and objectives, rather than specifying in a very detailed fashion the exact manner in which development should take place. Additionally, the findings clarify the apparently contradictory position in the literature as to whether developer experience is positively or negatively correlated with methodology use. The study would suggest that experienced developers are likely to use methodologies, albeit ones which have been heavily customized to the exigencies of the particular situation.  相似文献   

9.
It has long been argued that organizations have struggled to achieve business benefits, and in particular sustainable competitive advantage, from their IT investments. In this paper we draw upon resource-based theory to explore how the effective deployment of IS capabilities might deliver sustainable improvements to an organization’s competitive positioning. In so doing, this research makes a significant departure from the enterprise-level orientation of prior studies, by focusing upon the role of IS capabilities in leveraging sustainable improvements to competitive positioning from individual IS initiatives. Based upon the responses to a quantitative and qualitative survey of practicing managers, it has been shown that an organization’s ability to leverage and sustain improvements in its competitive positioning, from IS initiatives, are directly dependent upon its ability to effectively apply an appropriate portfolio of IS capabilities. Moreover, it has been shown that sustainable improvements in competitive positioning are most likely in circumstances in which the successful outcome of an IS initiative is dependent upon ‘outside-in’ and ‘spanning’ capabilities, which are both lacking in transparency and difficult to replicate.  相似文献   

10.
The context of this article is the new technological environment and the struggle to use meaningful teaching practices in Norwegian schools. Students' critical reflections in two different technological learning environments in six upper secondary schools are compared. Three of these schools offer Internet-connected computers in special computer rooms outside ordinary classrooms, while the three other schools offer laptops to every student in class with a wireless connection to the Internet. The study relies on a quasi-experimental design. Data come from 719 student responses to a survey questionnaire and are analysed using multivariate regression. The findings are that critical reflection is enhanced in classrooms with laptops, controlling for students' motivation, self-efficacy, gender, grades and cultural background. On this basis, computers could have a significant potential for enhancing reflection and nourishing classroom discourse, knowledge development, and student empowerment. Motivation and self-efficacy have the strongest impact, while cultural capital has a minor effect on critical thinking. Students' grades seem to have no predictive power with respect to critical reflection. The results are discussed in relation to theories of Bildung , empowerment and democracy. Various implications for teaching are discussed.  相似文献   

11.
Since the 1980s, there has been a growing body of critical theory in information systems research. A central theoretical foundation of this research is Habermas' theory of communicative action, which focuses on implications of speech and proposes general normative standards for communication. Habermas also places particular emphasis on the importance of the public sphere in a democratic society, critiquing the role of the media and other actors in shaping public discourse. While there has been growing emphasis on critical discourse analysis (CDA), there has been limited effort to systematically apply Habermas' validity claims to empirical research. Moreover, while critical research in information systems has examined communication within the organizational context, public discourse on information technology has received little attention. The paper makes three primary contributions: (1) it responds to Habermas' call for empirical research to ground and extend his theory of communication in every day critical practice; (2) it proposes an approach to applying Habermas' theory of communication to CDA; and (3) it extends the reach of critical research in information systems beyond micro-level organizational concerns and opens up to critical reflection and debate on the impact of systematically distorted communication about technology in the public sphere.  相似文献   

12.
This paper evaluates the interplay between intentionality of stakeholders, organizational power and information systems (IS) implementation in the context of an European firm implementing an Enterprise Resource Planning system. We found that the implementation coincided with significant restructuring of power relations within the firm. We also found that the intentions of various stakeholders came to bear in terms of how organizational power got manifested. Our findings suggest a complex interplay between individual intentions and organizational power. Specifically, our study contributes to the literature by providing insights into the systemic nature of organizational power regarding IS implementations and how it relates to individual intentions.  相似文献   

13.
《Information & Management》2016,53(4):447-466
Information technology (IT) organizations use strategic IT benchmarking (SITBM) to revise IT strategies or perform internal marketing. Despite benchmarking's long tradition, many SITBM initiatives do not reveal the desired outcomes. The vast body of knowledge on benchmarking and IT management does not help overcome the challenges of successful SITBM. We therefore synthesize the existing research on IT management and benchmarking into a concept relationship map and derive future research avenues. We find that there is much literature on how to obtain SITBM results. However, research does not explain how these results are transformed into outcomes – essentially the problem many practitioners struggle with.  相似文献   

14.
《Information & Management》2016,53(6):683-697
Firms frequently adopt new information systems (IS). To better understand IS adoption, research has been focused on motives for an IS adoption. In this study, three legitimacy-based motives (coercive, mimetic, and normative pressure) are examined for their impact on two success determinants (i.e., project management approach and team competence) and the subsequent impact of the success determinants on IS adoption success. In a quantitative study of Australian firms, we found that coercive pressure and normative pressure influence the project management approach, whereas mimetic pressure influences team competence. Both the project management approach and team competence in turn influence IS adoption success.  相似文献   

15.
The objective of this research is to assess the impact of IT outsourcing on Information Systems’ success. We modeled the relationships among the extent of IT outsourcing, the ZOT (the Zone of Tolerance), and IS success. We justified our model using the expectancy–disconfirmation theory, the agency theory, and transaction cost economics, and we empirically tested it using structural equation modeling with responses from IS users. We found significant direct and indirect effects (through the service quality) of outsourcing on IS systems’ perceived usefulness and their users’ satisfaction. Whereas the extent of outsourcing is negatively related to the service quality and perceived usefulness, the ZOT-based IS service quality is positively related to the user satisfaction.  相似文献   

16.
This paper examines the Intergroup Coordination key process area (KPA) for theoretical significance and measurability. The Software Engineering Institute (SEI) has developed a framework called the Capability Maturity Model (CMM) which enables organizations to measure their “maturity” in doing software engineering. The CMM is not theoretically derived. It is, however, a result of years of anecdotal evidence collected from practitioners. This paper compares the Intergroup Coordination KPA to the body of literature on coordination and measures it using theoretically derived determinants. These determinants are then evaluated for possible relationships to productivity factors that indicate business process support. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

17.
The formulation and implementation of a digital transformation strategy (DTS) has become a key concern for many pre-digital organizations across traditional industries, but how such a strategy can be developed remains an open question. We used interpretive in-depth case study research to study how a European financial services provider has formulated and implemented a DTS. By focusing on the underlying processes and strategizing activities, we show that digital strategy making not only represents a break with the conventions of upfront strategic information systems (IS) planning, but reveals a new extreme of emergent strategy making. Specifically, we conclude that a DTS is continuously in the making, with no foreseeable end. By building on theory from IS strategizing and strategy-as-practice literature, we theorize an integrated process/activity model that characterizes DTS formulation and implementation in pre-digital organizations. Our model shows that the crafting of a DTS is a highly dynamic process involving iterating between learning and doing.  相似文献   

18.
Abstract. Electronic Data Interchange Systems (EDI) are increasingly being used by business firms to improve operations and customer service. One of the major motivations for business organizations using EDI is to gain a strategic advantage in the marketplace. Although EDI has been implemented by many organizations, unfortunately not all have gained the same level of expected advantage or envisioned benefits.
In this study we focus on the impact of EDI implementation commitment and implementation success on competitive advantage and firm performance. We study two categories of companies: companies that initiate the development of EDI and are known as hub companies and those that are their non-hub counterparts. Findings indicate that non-hub firms may not reap the same level of expected benefits resulting from EDI technology adoption and implementation as hub firms.  相似文献   

19.
Abstract.  Past research indicates that expectations play a crucial role in the final satisfaction of users of information systems (IS). This includes expectations regarding the skill levels exhibited by the providers of the IS services and products. Typically, the expectations are examined as gaps from perceived performance or as gaps from realistic expectations. The interaction of these gaps has not been thoroughly explored in past research, although recent theories anticipate both gaps are crucial in meeting the desires of the users. A matched pair sample of IS users and IS providers is used to collect data on expected skill levels and perceived delivery of the skills demanded. Gaps, both between these two stakeholder groups regarding expectations and within the user group regarding perceived delivery, are found to impact user satisfaction in a two-way analysis. The results indicate that expectations should be managed to higher levels and commonly understood across the user and provider groups.  相似文献   

20.
Since their early development, computers have had a profound impact on how we conduct modern scientific research. The disciplines of mathematics and operations research are perhaps the earliest to be dramatically transformed by information technology. However, over the years, computing technologies have provided many new opportunities for information processing, problem solving and knowledge creation. In this paper, we explore the potential of data mining technology for providing support for systematic theory testing based on Peirce's theory of abduction. We propose a data mining approach to abducting and evaluating hypotheses based on Peirce's scientific method. We believe that this approach could assist scientist to more efficiently explore alternative hypotheses for existing theories. We demonstrate our approach with empirical observations collected using instruments from the well known user performance area of information systems research.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号