首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
Abstract. CASE research to date has been dominated by positivistic enquiry; particularly tool building, surveys and normative writings. In contrast, there is a growing community of IS researchers developing models of IS practice that highlight the complex relationship between context and process that has to be mastered in order to develop viable information systems. This paper bridges the gap between the two bodies of knowledge by presenting a phenomenological study of CASE tool usage in a large UK manufacturing company over a four year period which shows that organizational context, tool features and usage are inextricably linked. The lessons arising from the work are presented and grounded in interpretive IS theory. The results of the work are clearly in accord with this theory, thus, showing the importance of interpretive CASE research, as a complement to positivist thinking, in bringing to light the human and organizational issues which strongly influence systems development practice  相似文献   

2.
    
Internet security risks, the leading security threats confronting today's organizations, often result from employees' non‐compliance with the internet use policy (IUP). Extant studies on compliance with security policies have largely ignored the impact of intrinsic motivation on employees' compliance intention. This paper proposes a theoretical model that integrates an intrinsic self‐regulatory approach with an extrinsic sanction‐based command‐and‐control approach to examine employees' IUP compliance intention. The self‐regulatory approach centers on the effect of organizational justice and personal ethical objections against internet abuses. The results of this study suggest that the self‐regulatory approach is more effective than the sanction‐based command‐and‐control approach. Based on the self‐regulatory approach, organizational justice not only influences IUP compliance intention directly but also indirectly through fostering ethical objections against internet abuses. This research provides empirical evidence of two additional effective levers for enhancing security policy compliance: organizational justice and personal ethics.  相似文献   

3.
    
Over the past decade, there has been increasing interest in the use of grounded theory in information systems research. Grounded theory is a qualitative research method that seeks to develop theory that is grounded in data systematically gathered and analysed. The purpose of this paper is to suggest guidelines for grounded theory studies in information systems. Our guidelines are based on a framework for theorizing in grounded theory studies that focuses on conceptualization and theory scope. Our hope is that the guidelines will help to raise the quality and aspirations of grounded theory studies in information systems.  相似文献   

4.
    
Information systems (IS) support in organizations has undergone dramatic changes over the years. IS professionals in the support function have become an important knowledge source to colleagues who seek assistance with their IS usage. Our understanding of IS professionals' customer‐oriented behaviours is limited, however. Focusing on IS post‐implementation support and drawing upon organizational citizenship behaviour (OCB) theory, this paper seeks to understand IS professionals' citizenship behaviours in supporting colleagues. Our analysis of 630 support tasks performed by IS professionals with regard to two systems at three periods reveals five types of customer‐oriented OCB: anticipation, education, justification, personalization‐technology and personalization‐business. Our results also show different associations between four contextual factors of IS support (i.e. system, user, task and problem) and the OCBs. In instances of user deficiency, more personalization‐business and anticipation OCBs were observed across all the four problem domains (functionality, data, workflow and role). By contrast, in instances of system deficiency, more personalization‐technology OCBs were observed among the two problem domains of data and functionality. Moreover, the occurrence of OCBs revealed a temporal pattern such that personalization‐business OCBs are more pronounced in early post‐implementation periods whereas anticipation OCBs and personalization‐technology OCBs become more dominant later. The categorization scheme of the customer‐oriented OCB, the OCB dynamics and the patterns between OCB types and the contextual factors advance our understanding of the evolving and challenging work of organizational IS support. Our findings extend the OCB literature on customer orientation and enrich the limited studies on knowledge‐intensive IS support work. Practical implications of the findings on IS management and policies are discussed.  相似文献   

5.
    
As information technology (IT) success is both essential and elusive, researchers and practitioners are faced with an ongoing challenge to determine what IT capabilities should be developed to ensure IT success. Drawing on the paradox and ambidexterity theory, we highlight paradoxes in IT success and propose that firms manage these paradoxes by developing an IT ambidexterity capability. We hypothesize that IT ambidexterity capability enhances IT success, and that uncertain environments strengthen this relationship. Our hypotheses find support in a sample of 292 British high-tech firms. This research contributes to conceptualize paradoxes in IT success and advances the theory for a more comprehensive understanding of the impacts of IT ambidexterity capability.  相似文献   

6.
    
Abstract.  This paper presents the findings of an empirical study investigating the nature of the process of information systems development. These findings are used to identify systems development approach, which extends understanding of the information systems development process beyond the levels of methodology and technical expertise. The term approach expresses the rich, varied, and complex ways in which professionals deal with development situations. The term transcends methodological components – which can be combined, tailored, or omitted altogether. Within approach, a framework for method choice, a key diagnostic scheme, and the use of a central repository reveal the significant background activity that goes into developing information systems. It is suggested that the information systems development process ultimately involves a professional using an approach to intervene in a problematic situation for developing the organization's information and, if needed, other systems. This understanding has implications for examining the field's ineffectiveness in relation to the approach adopted – rather than the methodology used.  相似文献   

7.
Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Many vendors apply loyalty systems to collect customer-specific data that may be exploited for many reasons, e.g., price discrimination and direct marketing. As a consequence, beside some potential benefits of a loyalty system, customers may also fear an invasion of privacy, and thus often refuse to participate in such programs. Thus, a vendor may have problems to turn privacy sensitive people into loyal customers using a typical loyalty system. In this paper, we present two variants of a privacy-friendly loyalty system to be used by online vendors for issuing loyalty points. The systems prevent vendors from exploiting data for the creation of customer profiles by providing unconditional unlinkability of loyalty points with regard to purchases. We propose a simple token-based approach and a counter-based approach which is much more efficient while preserving the privacy and security properties. Furthermore, the counter-based loyalty system prevents pooling of loyalty points which were issued to distinct customers. Matthias Enzmann received his diploma in computer science from the Technical University of Darmstadt, Germany, in 1999. In 1996, he started working with the TKT institute of GMD - German National Research Centre for Information Technology GmbH which in 2001 became Fraunhofer Institute for Secure Telecooperation due to the merger of GMD and Fraunhofer Gesellschaft. Since 1999 he holds the position of a regular researcher at Fraunhofer SIT. Currently, his research interests focus on privacy protection in electronic business processes, agent based mediation, and pseudonym systems. Markus Schneider received his diploma in electrical engineering with specialization on communications engineering. Afterwards, he started to work in the area of information and communication security and received his Doctor degree in electrical engineering. Currently, he is with the Fraunhofer Institute for Secure Telecooperation (SIT) in Darmstadt, Germany. His research interests include the development and application of security technologies in communications, and security and privacy issues in electronic business processes.  相似文献   

8.
简要回顾了计算机支持协同工作(Computer Supported Collaborative Work,CSCW)环境下感知、隐私的理论研究情况,总结了感知和隐私的平衡对用户体验产生的重要影响,并对CSCW系统中影响感知与隐私达到平衡的人的行为、物理环境、社会机制三种因素进行了分析,从信息控制、感知反馈、模糊过滤和逐步渐进四个方面归纳了实现平衡的技术手段,进而对CSCW系统中感知与隐私平衡研究的前景做出了展望。  相似文献   

9.
Abstract. One can expect that the fit, match or congruence between an information system and its organizational context will be of increasing importance as information systems become more and more integral parts of organizations. Existing IS research has largely neglected the theoretical analysis of the concept 'fit', however, even though it has been widely used in a 'pre-theoretical' sense. The analysis of the concept of 'organizational fit of an information system' put forward in this article is essentially based on the recent analysis of 'fit' in contingency theory, suggesting three interpretations for the concept: a selection approach, an interaction approach and a systems approach. A review of the IS literature on the organizational fit of information systems indicates a lack of any cumulative tradition in existing empirical contingency research into information systems and dominance of the selection approach. Because of the two limitations, this paper regards any definite assessment of the potential prospects of contingency research into information systems as overhasty and proposes a framework for future research into the situation dependence and organizational fit of information systems which integrates contingency research into information systems, contingency research into IS impacts and contingency research into the IS adoption (development/implementation) process.  相似文献   

10.
    
The purpose of the paper is to provide a comprehensive privacy model for identifying the privacy risks of an enterprise based on its privacy requirements. A risk-based methodology for automated privacy control selection against identified privacy requirements is also proposed. The privacy model has been designed using first order logic and it is semi-formal in nature. Privacy risks are defined using the proposed formalism in terms of privacy properties. Algorithm for assessing privacy risk considering the actual information infrastructure of the enterprise is proposed. Based on the risk assessment, appropriate privacy controls should be selected from a control database. An algorithm for the same is also proposed. This methodology is easy to implement and can be used by any mid or large-scale enterprise for privacy control implementation. The effectiveness of our proposed approach is shown using a case study. From the literature review, it has emerged that there is a dearth of comprehensive privacy models that can identify the privacy requirements emanating from different sources and can eventually help the enterprise to implement privacy controls as per privacy requirements. The proposed model attempts to address this research gap by helping an enterprise to identify the specific privacy requirements and automatically select privacy controls from an appropriate knowledge base. Privacy requirements can be customized as per the needs of the enterprise.  相似文献   

11.
针对无线体域网中存在的隐私保护问题, 对其研究背景、研究意义以及研究现状进行综述, 从数据信息隐私保护和环境信息隐私保护两个角度对现有的研究成果进行了分类阐述, 介绍了攻击模型和安全目标, 说明每一类的关键实现技术, 并总结、分析和比较了各技术间的主要优缺点, 同时根据每一类的应用需求分别提出未来可能的发展趋势和研究方向。  相似文献   

12.
保护电力消费者的数据和隐私对于智能电网来说是至关重要的。纵观全球,目前的智能电网往往趋于关注隐私安全的需要,隐私仅仅作为智能电网的一个特性存在。为了填补隐私保护在智能电网中的空白,同时帮助智能电网工程师分析隐私威胁、选择合适的策略即隐私保护技术最后达到解决智能电网系统开发阶段的隐私问题的目的,描述了相应的方法框架和指导规则,对现有的隐私保护技术进行了详细的总结,讨论了其应用的环境,并阐述了隐私实施过程中面对的潜在挑战。  相似文献   

13.
14.
    
Differential privacy enables sensitive data to be analyzed in a privacy-preserving manner. In this paper, we focus on the online setting where each analyst is assigned a privacy budget and queries the data interactively. However, existing differentially private data analytics systems such as PINQ process each query independently, which may cause an unnecessary waste of the privacy budget. Motivated by this, we present a satisfiability modulo theories (SMT)-based query tracking approach to reduce the privacy budget usage. In brief, our approach automatically locates past queries that access disjoint parts of the dataset with respect to the current query to save the privacy cost using the SMT solving techniques. To improve efficiency, we further propose an optimization based on explicitly specified column ranges to facilitate the search process. We have implemented a prototype of our approach with Z3, and conducted several sets of experiments. The results show our approach can save a considerable amount of the privacy budget and each query can be tracked efficiently within milliseconds.  相似文献   

15.
This study examines the factors that contribute to context-based, or situational, privacy concerns drawing upon the theoretic lens of attribution theory. We posit that situational privacy concerns develop through individuals’ causal explanations of prior privacy incidents in addition to their trait-like, or dispositional, privacy concerns. Analysis of data from 156 participants confirms the significance of the relationships between a number of antecedent constructs and situational privacy concerns. The hypotheses developed to test these relationships were all supported through partial least squares, as were the psychometric properties of the scales used. The results further our understanding of context-based privacy concerns, particularly the mechanics of attribution in blaming, and holding online service providers responsible for privacy transgressions. Insights into situational privacy concerns help online service providers handle and ameliorate these concerns.  相似文献   

16.
  总被引:1,自引:1,他引:0  
Abstract.  Although e-business is a familiar part of the organizational landscape, its implementation remains a problem for large traditional organizations. This paper argues that the pervasiveness of e-business calls for the adoption of an organizational change perspective to study its implementation. Using structuration theory, the paper analyzes a detailed case study of the implementation of a major e-business initiative in a traditional automotive manufacturer. It shows how a combination of structural contradictions and unexpected consequences derailed the initiative.  相似文献   

17.
This doctoral study was initiated to explore the relative importance of organizational issues in software process improvement. It is based on a pilot case study, a multiple case study of twelve organizations, and a quantitative survey among 120 software organizations. The findings from the investigations suggest that the key to successful learning is a continuous and simultaneous dialectic interplay between the knowledge that the organization has established over time, and the knowing of the organization's members in their respective contexts. Also, the findings indicate that success depends critically on six organizational factors. Finally, the findings show that there are important differences between small and large software organizations, specifically in the ways in which they react to unstable and changing stimulus situations.  相似文献   

18.
提出了一种基于信息混淆的社会网络隐私保护机制,其原理在于对整个社会网络里的隐私信息进行混淆,而非加密,使得需要保护的隐私信息以环形结构在社会网络里扩散开来。该机制以非集中化的方式工作,由用户之间的相互协作来保护用户的隐私信息。以"人人网"为平台,利用Firefox的扩展开发功能实现了该隐私保护的核心机制,证明了其可行性与可用性。该机制能够保证多方面的利益:要求隐私保护的主体用户、广告商、经过授权的用户及第三方应用。  相似文献   

19.
本文从马斯洛"需要理论"的角度来认清艺术设计和艺术的主要区别,从而明确艺术设计和艺术各自的任务和研究内容,这有助于我们在设计学习和设计实践中更好的把握设计的发展方向,形成完整的设计理念,更好的完成设计任务。  相似文献   

20.
Governments are often the largest collectors of data within their jurisdiction, and often that data collection and storage is financially supported with public taxes. How governments manage and make available that information when requested by non-government parties varies by country. As the data-sharing world finds new and multi-platform ways to network, variations in legal access to government-held information create both opportunities and challenges. In this article, recent research is reviewed on problems faced by legal systems trying to navigate conflicts between individual privacy, public access and national state security.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号