652,491 research outputs found

    A Profile of Information Systems Research Published in Information & Management

    Get PDF
    Information & Management (I&M) has been consistently regarded as one of the top academic journals in information systems (IS). In a spirit of introspection, this article profiles research published in I&M: we identified the most productive authors and universities associated with most research publications in I&M during the past 13 years (1992–2005). Based on a more detailed analysis of publications during the past 7 years, we determined the subject areas most often investigated and the research methodologies most often employed. Finally, we identified best practices by way of reporting the topics and methodologies used by the highly published authors. Our results indicate that while IS research is clearly dominated by US based universities, international researchers are beginning to make inroads. Furthermore, while the survey methodology is still dominant, interest in utilizing other methodologies is on the rise. Our findings should have implications for researchers, journal editors, universities, and research institutions

    An Analysis Of The Determinants Of MIS Faculty Salary Offers

    Get PDF
    Much research has been published related to compensation in academic fields such as finance, accounting and economics; however, little attention has been paid to Management Information Systems (MIS).  Conspicuously absent from the literature are in-depth studies of faculty compensation and its relationship to research productivity for MIS faculty.  This study examines compensation, rank, and publication data collected from the Association for Information Systems (AIS) 2003-2004, 2004-2005 and 2005-2006 MIS Salary Surveys.  MIS faculty who were newly employed or changed positions filled out the online survey at the AIS Web site on a self-selected basis.  The relationships between compensation and its possible determinants such as research productivity and institutional teaching load are reported as well as analyzed.  We find that compensation is significantly correlated with professors’ profiles as well as with the school profile at which the professor received a job offer

    SPEM 2.0 extension for pervasive information systems

    Get PDF
    Pervasive computing is a research field of computing technology that aims to achieve a new computing paradigm. In this paradigm, the physical environment has a high degree of pervasiveness and availability of computers and other information technology (IT) devices, usually with communication capabilities. Pervasive Information Systems (PIS), composed by these kinds of devices, bring issues that challenge software development for them. Model-Driven Development (MDD), strongly focusing and relying on models, has the potential to allow: the use of concepts closer to the domain and the reduction of semantic gaps; higher automation and lower dependency to technological changes; higher capture of expert knowledge and reuse; an overall increased productivity. Along with the focus and use of models, software development processes are fundamental to efficient development efforts of successful software systems. For the description of processes, Software & Systems Process Engineering Meta-Model Specification (SPEM) is the current standard specification published by the Object Management Group (OMG). This paper presents an extension to SPEM (version 2.0) Base Plug-In Profile that includes stereotypes needed to support a suitable structural process organization for MDD approaches aiming to develop software for PIS. A case study is provided to evaluate the applicability of the extension

    Intelligent techniques using molecular data analysis in leukaemia: an opportunity for personalized medicine support system

    Get PDF
    The use of intelligent techniques in medicine has brought a ray of hope in terms of treating leukaemia patients. Personalized treatment uses patient’s genetic profile to select a mode of treatment. This process makes use of molecular technology and machine learning, to determine the most suitable approach to treating a leukaemia patient. Until now, no reviews have been published from a computational perspective concerning the development of personalized medicine intelligent techniques for leukaemia patients using molecular data analysis. This review studies the published empirical research on personalized medicine in leukaemia and synthesizes findings across studies related to intelligence techniques in leukaemia, with specific attention to particular categories of these studies to help identify opportunities for further research into personalized medicine support systems in chronic myeloid leukaemia. A systematic search was carried out to identify studies using intelligence techniques in leukaemia and to categorize these studies based on leukaemia type and also the task, data source, and purpose of the studies. Most studies used molecular data analysis for personalized medicine, but future advancement for leukaemia patients requires molecular models that use advanced machine-learning methods to automate decision-making in treatment management to deliver supportive medical information to the patient in clinical practice.Haneen Banjar, David Adelson, Fred Brown, and Naeem Chaudhr

    The Design and Development of an Integrated Researcher Profile System at Texas A&M to Enrich Scholarly Identity of Faculty.

    Get PDF
    Researcher profile systems (RPS) are web-based tools to discover and use research and scholarly information about people and resources. These systems serve as knowledge management systems for the research enterprise as they connect institution-level/enterprise systems, national research networks, publicly available research data (e.g., grants and publications), and restricted/proprietary data by harvesting information from disparate sources into compiled expertise profiles for faculty, investigators, scholars, clinicians, community partners, and facilities. RPS tools facilitate the development of new collaborations and team science to address new or existing research challenges through the rapid discovery and recommendation of researchers, expertise, and resources. In addition, data harvested into an RPS is accessible for broad repurposing, especially if available as linked open data (RDF triples). Thus RPS can enhance research support activities by providing data for customized, up-to-date web pages, CV/biosketch generation, and data tables for grant proposals as well as serve the needs of an academic organization. In 2014, the library started experimenting with VIVO, an open source, semantic researcher profile system available through Duraspace. VIVO is an open source semantic web application originally developed and implemented at Cornell. When installed and populated with researcher interests, activities, and accomplishments, it enables the discovery of research and scholarship across disciplines at that institution and beyond. VIVO supports browsing and a search function that returns faceted results for rapid retrieval of desired information. Content in any local VIVO installation may be maintained manually, brought into VIVO in automated ways from local systems of record, such as HR, grants, course, and faculty activity databases, or from database providers such as publication aggregators and funding agencies. As our project continued, we worked on integrating several other tools to create a more useful and compelling system that meets the needs of a range of campus stakeholders. Our integrated system includes: VIVO: aggregator of faculty profiles supporting the discovery of expertise and the reuse of profile data. PLUMX: Plum Analytics is a tool that provides insight into scholarly reputation. Plum™ Analytics measures metrics for individual research artifacts and aggregates the data labs, departments and other meaningful groups. The tool collects impact metrics in 5 major categories: usage, captures, mentions, social media, and citations. Plum Analytics tracks more than 20 different types of artifacts, including journal articles, books, videos, presentations, conference proceedings, datasets, source code, cases, and more. ORCIDs: a third-party, not for profit organization that provides a platform for the assignment of unique researchers ID numbers. The primary purpose of ORCID is to provide an authoritative way to differentiate authors with similar names and to unify works by the same author published under different names (e.g., maiden and married names, transliterated names. Publication and Data Repositories: OAKTrust, TDL data repository, PubMed, etc. Symplectic Elements: Third-party support for faculty profile data harvesting. This presentation will cover the use cases identified at Texas A&M, the technical development of our integrated researcher profile system, and our process in working with the Texas A&M community

    Parental and Individual Correlates of Work Ethic in Young People in Albania

    Get PDF
    The purpose of this study was to investigate the work ethic strength, dimensions, and correlates in young people in Albania. The review of the available research concluded that, regardless of the attention that youth-related topics have received in the last decade, there was a considerable gap in the understanding of the state and correlates of the work ethic in this group. Using the Multidimensional Work Ethic Profile – Short Form, the work ethic strength and dimensions were explored in an Albanian sample of (N = 501) 18 to 24 years old, otherwise known as Generation Z. Data were collected via an instrument, published, and disseminated online through social media ads. The profile of participants was mainly urban and highly educated. The study found that work ethic of this sample of young Albanians was strong. Using as a conceptual framework the Bronfenbrenner’s systems theory, the association of microsystem correlates with work ethic was explored. Parental work ethic and support, the presence of a role model in the young person’s life, living in the rural areas and having completed secondary education, were significantly associated with the strength of youth work ethic. This study provides originality and value in filling in the gaps of knowledge around youth work ethic in Albania. It provides information on the relationship of work ethic with other factors and attempts to offer a predictive model of work ethic. The findings have theoretical and practical implications around programs addressing parental influence in young people, educational, human resources and management practices accommodating young people in the education system and the job market. The study discusses these implications as well as the limitations and future research directions of interest for the topic

    Profiling research published in the journal of enterprise information management (JEIM)

    Get PDF
    Purpose – The purpose of this paper is to analyse research published in the Journal of Enterprise Information Management (JEIM) in the last ten years (1999 to 2008). Design/methodology/approach – Employing a profiling approach, the analysis of the 381 JEIM publications includes examining variables such as the most active authors, geographic diversity, authors' backgrounds, co-author analysis, research methods and keyword analysis. Findings – All the finding are in relation to the period of analysis (1999 to 2008). (a) Research categorised under descriptive, theoretical and conceptual methods is the most dominant research approach followed by JEIM authors. This is followed by case study research. (b) The largest proportion of contributions came from researchers and practitioners with an information systems background, followed by those with a background in business and computer science and IT. (c) The keyword analysis suggests that ‘information systems’, ‘electronic commerce’, ‘internet’, ‘logistics’, ‘supply chain management’, ‘decision making’, ‘small to medium-sized enterprises’, ‘information management’, ‘outsourcing’, and ‘modelling’ were the most frequently investigated keywords. (d) The paper presents and discusses the findings obtained from the citation analysis that determines the impact of the research published in the JEIM. Originality/value – The primary value of this paper lies in extending the understanding of the evolution and patterns of IS research. This has been achieved by analysing and synthesising existing JEIM publications

    Profiling a decade of information systems frontiers’ research

    Get PDF
    This article analyses the first ten years of research published in the Information Systems Frontiers (ISF) from 1999 to 2008. The analysis of the published material includes examining variables such as most productive authors, citation analysis, universities associated with the most publications, geographic diversity, authors’ backgrounds and research methods. The keyword analysis suggests that ISF research has evolved from establishing concepts and domain of information systems (IS), technology and management to contemporary issues such as outsourcing, web services and security. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of ISF. The analysis has also identified authors published in other journals whose work largely shaped and guided the researchers published in ISF. This research has implications for researchers, journal editors, and research institutions

    An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment

    Get PDF
    This thesis performs an investigation into issues concerning the broad area ofIdentity and Access Management, with a focus on open environments. Through literature research the issues of privacy, anonymity and access control are identified. The issue of privacy is an inherent problem due to the nature of the digital network environment. Information can be duplicated and modified regardless of the wishes and intentions ofthe owner of that information unless proper measures are taken to secure the environment. Once information is published or divulged on the network, there is very little way of controlling the subsequent usage of that information. To address this issue a model for privacy is presented that follows the user centric paradigm of meta-identity. The lack of anonymity, where security measures can be thwarted through the observation of the environment, is a concern for users and systems. By an attacker observing the communication channel and monitoring the interactions between users and systems over a long enough period of time, it is possible to infer knowledge about the users and systems. This knowledge is used to build an identity profile of potential victims to be used in subsequent attacks. To address the problem, mechanisms for providing an acceptable level of anonymity while maintaining adequate accountability (from a legal standpoint) are explored. In terms of access control, the inherent weakness of single factor authentication mechanisms is discussed. The typical mechanism is the user-name and password pair, which provides a single point of failure. By increasing the factors used in authentication, the amount of work required to compromise the system increases non-linearly. Within an open network, several aspects hinder wide scale adoption and use of multi-factor authentication schemes, such as token management and the impact on usability. The framework is developed from a Utopian point of view, with the aim of being applicable to many situations as opposed to a single specific domain. The framework incorporates multi-factor authentication over multiple paths using mobile phones and GSM networks, and explores the usefulness of such an approach. The models are in tum analysed, providing a discussion into the assumptions made and the problems faced by each model.Adobe Acrobat Pro 9.5.1Adobe Acrobat 9.51 Paper Capture Plug-i
    corecore