468 research outputs found

    ELECTRONIC INFORMATION SHARING IN LOCAL GOVERNMENT: THE DECISION-MAKING PROCESS

    Get PDF
    Recently local authorities have been placed under enormous pressure due to problems arising from poor decision-making in relation to the sharing of personal information. While in some circumstances the incompetence of agency employees is identified as the cause, in other circumstances organisational failure, implicitly driven by inter-organisational distrust, is to blame for inappropriate decisions taken with regards to sharing information. Sometimes implicit policies and regulations set by policy makers are blamed, while at other times, explicit rules of confidentiality and data-protection acts are accused. During the last decades, several Local Government Authorities (LGAs) in the United Kingdom have started to employ Inter-Organisational Information Systems (IOIS) to support information sharing and networked collaboration within their departments in order to meet a diverse range of citizen needs including housing services, social care services, education services, etc. However, reaching this level of cross-agency collaboration is not easy and requires additional time and effort by individuals and agencies involved. Therefore, this paper proposes and validates a novel conceptual framework that can be used as a tool for decision-making while sharing information electronically. The framework consists of four main levels: (a) investigation and presentation of factors influencing Electronic Information Sharing (EIS) in LGAs based on external environment, organisational capacity, technology environment, EIS characteristics, and inter-departmental environment, (b) investigation and presentation of the processes that an LGA department should carry out to decide whether to share information with another department, (c) mapping of the influential factors on the participation phases, and (d) prioritisation of the factors influencing EIS in LGAs in different decision-making phases

    PUBLICATION STRATEGY FOR JUNIOR RESEARCHERS: QUANTITY VS. QUALITY, THE FIRST AUTHORSHIP AND THE OPTIMAL NUMBER OF AUTHORS

    Get PDF
    A good publication record is one of the most important prerequisites of a successful academic career in IS. Despite the weight hiring and promotion committees place on it, the definition of a \u27good publication record\u27 especially for junior researchers remains unclear. Indeed, is it better to have one A-publication or three B-publications? Does being the third author on an A-publication have a bigger weight than being the first author on a B-publication? Should one strive to publish with as few co-authors as possible to demonstrate that one is capable of independent work\u27 Facing these ambiguities, young researchers are increasingly asking themselves about the choices they make with regard to their publication strategy. Equally, academic mentors have a strong interest in correctly setting incentives of their young protégés. If unaddressed, uncertainty regarding these issues is bound to interfere with the quality of the IS research and scholars\u27 job and life satisfaction. This panel proposal aims to offer a forum for discussion and clarification on these problematic issues. Specifically, the following topics will be raised: quantity vs. quality, value of the first authorship and optimal number of authors

    A NEUROSECURITY PERSPECTIVE ON THE FORMATION OF INFORMATION SECURITY AWARENESS – PROPOSING A MULTI-METHOD APPROACH

    Get PDF
    In today’s digital age, in which all kinds of information can be accessed electronically at all times, organizations are under continuous pressure of keeping their information systems (IS) secure. To protect IS and information assets from insider threats, information security awareness (ISA) has been established as a crucial factor in influencing employees’ behaviour that is supportive or disruptive of IS security. But yet to date, there is still a lack of in-depth and structured understanding of the factors influencing ISA. In this research-in-progress paper, we conduct a literature review to categorize determinants of ISA into four levels of origin (individual, organizational, social-environmental, and application-specific) and identify topics that are promising for future research. We then present our planned study as an example to pursue our recommendations. In the IS security context of phishing, we aim to uncover the extent to which non-IS professionals are able to develop an eye for technical aspects of IS security and pay higher visual attention to security and fraud indicators of web browsers and e-mails after being subject to different organizational awareness-raising activities. Among a survey and literature analysis, the multi-method approach uses the objective data collection instrument of eye tracking. We expect to contribute into the nascent area of neurosecurity research by offering new insights on the effectiveness of organizational means to increase employees’ ISA

    Trends in lung cancer incidence by age, sex and histology from 2012 to 2025 in Catalonia (Spain)

    Get PDF
    Lung cancer remains one the most common cancers in Europe and ranks frst in terms of cancer mortality in both sexes. Incidence rates vary by region and depend above all on the prevalence of tobacco consumption. In this study we describe recent trends in lung cancer incidence by sex, age and histological type in Catalonia and project changes according to histology by 2025. Bayesian age period-cohort models were used to predict trends in lung cancer incidence according to histological type from 2012 to 2025, using data from the population-based Catalan cancer registries. Data suggest a decrease in the absolute number of new cases in men under the age of 70 years and an increase in women aged 60 years or older. Adenocarcinoma was the most common type in both sexes, while squamous cell carcinoma and small cell carcinoma were decreasing signifcantly among men. In both sexes, the incident cases increased by 16% for patients over 70 years. Increases in adenocarcinoma and rising incidence in elderly patients suggest the need to prioritize strategies based on multidisciplinary teams, which should include geriatric specialist

    Why Are Electronic Invoice Processes Risky? - Empirical Analysis and Discussion of Risk Factors

    Get PDF
    Electronic invoice processes are characterized by various software solutions, legal uncertainty, heter-ogeneous demands, lack of know how, and information system infrastructure incompatibilities. Due to this complexity and the uncertainty that companies face, a holistic map of risk factors of e-invoice processes is required. Companies must be conscious not only about potential opportunities but also about potential risks before they change their business processes and their information systems’ archi-tecture. Potential risk factors are identified theoretically and empirically evaluated with a quantitative expert survey that investigates risk probabilities and potential losses associated with these factors. The empirical analysis reveals that the investigated factors are valid and reliable. After conducting an ex-plorative factor analysis, 37 statistically significant risk factors are grouped into ten risk dimensions: process organization, standard, environment, project management, strategy, acceptance, system, pro-cess execution, security, and change management

    A Delimitation of Data Sovereignty from Digital and Technological Sovereignty

    Get PDF
    Digital technology significantly impacts our everyday social lives and how we conduct business. This development results in an abundance of new data generated by people and organizations. Subsequently, future technological instruments must ensure data sovereignty that empowers individuals to maintain control over their data. However, data sovereignty is still blurry and conceptually overlaps with similar terminologies, such as digital and technological sovereignty. From an Information Systems (IS) point of view, delimiting data sovereignty from digital and technological sovereignty is crucial, creating a uniform understanding, especially for data ecosystems. Our study contributes to sharpening data sovereignty with a systematic literature review of 81 articles. It concludes that data sovereignty mainly drives IS activities by protecting data assets on individual and organizational levels. In contrast, digital sovereignty is shaped by digital expertise and interoperability, while technological sovereignty is the broadest concept with regulations and relations on an international level

    A Review of Information Systems Research on Online Social Networks

    Get PDF
    Over the last decade, online social networks have evolved into a global mainstream medium with increasing social, organizational, and economic impact. This paper provides a structured overview of Information Systems research on this outstanding techno-social phenomenon of the 21st century via a structured literature review. Based on our search in information systems journals and conference proceedings that resulted in 510 papers, we carve out and assess the knowledge and the research fields that have been predominantly addressed and impacted by the information systems research community so far. Moreover, we identify research gaps that future research should address. We analyze how the academic discussion on online social networks developed in the information systems literature over time, which publication outlets are most receptive to research on online social networks, which research areas have already been covered by information systems research on online social networks, and what potential future research areas exist that have not been covered by information systems research yet. We hope that our results will stimulate and guide future research in this field

    TOWARDS A TAXONOMY OF DIGITAL WORK

    Get PDF
    Despite the increasing importance of digitization for economy and society, there is few structuring of the very heterogenous kinds of digital work. Representatives from business, politics and science need a basis for the development of strategies to encounter the challenges that result from this digitization. We aim at delivering a contribution to that basis by systematically investigating what different types of digital work exist and by developing a taxonomy. As a first important step towards this goal, we inves-tigate in this paper what digital work tools exist since such tools are a major constituent element of digital work. Using a hybrid approach including both a deductive conceptual-to-empirical and an in-ductive empirical-to-conceptual procedure, we create an artifact that gives business leaders an over-view of existing digital work tools as a basis for strategic decisions and at the same time provides re-searchers with stimuli for future investigations in the dynamic domain of digital work
    • …
    corecore