100,697 research outputs found
The Secret to Successful User Communities: An Analysis of Computer Associates’ User Groups
This paper provides the first large scale study that examines the impact of both individual- and group-specific factors on the benefits users obtain from their user communities. By empirically analysing 924 survey responses from individuals in 161 Computer Associates' user groups, this paper aims to identify the determinants of successful user communities. To measure success, the amount of time individual members save through having access to their user networks is used. As firms can significantly profit from successful user communities, this study proposes four key implications of the empirical results for the management of user communities
The Secret to Successful User Communities: An Analysis of Computer Associates’ User Groups
This paper provides the first large scale study that examines the impact of both individual- and group-specific factors on the benefits users obtain from their user communities. By empirically analysing 924 survey responses from individuals in 161 Computer Associates' user groups, this paper aims to identify the determinants of successful user communities. To measure success, the amount of time individual members save through having access to their user networks is used. As firms can significantly profit from successful user communities, this study proposes four key implications of the empirical results for the management of user communities.Managing User Communities; Collective Action; Information Sharing
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Outlaw Community Innovations
Recent studies of outlaw communities provide qualitative evidence of their existence and the organisation of the underlying innovation processes. We provide descriptive results from a large scale survey of two online outlaw communities focussing on Microsoft's XBox. In line with previous findings, we identify two types of participants in outlaw communities - user innovators and adopters. Based on 2,256 responses, we find that users modify their XBox mainly to be able to increase the set of available functions of their XBox. Users are also motivated to modify their XBox for the sake of having fun and to conduct pirate behaviour. Finally, the results from our survey suggest that user innovators are largely intrinsically motivated by fun and the intellectual stimulation of writing code for homebrew software
Recommended from our members
A literature review of the use of Web 2.0 tools in Higher Education
This review focuses on the use of Web 2.0 tools in Higher Education. It provides a synthesis of the research literature in the field and a series of illustrative examples of how these tools are being used in learning and teaching. It draws out the perceived benefits that these new technologies appear to offer, and highlights some of the challenges and issues surrounding their use. The review forms the basis for a HE Academy funded project, ‘Peals in the Cloud’, which is exploring how Web 2.0 tools can be used to support evidence-based practices in learning and teaching. The project has also produced two in-depth case studies, which are reported elsewhere (Galley et al., 2010, Alevizou et al., 2010). The case studies focus on evaluation of a recently developed site for learning and teaching, Cloudworks, which harnesses Web 2.0 functionality to facilitate the sharing and discussion of educational practice. The case studies aim to explore to what extent the Web 2.0 affordances of the site are successfully promoting the sharing of ideas, as well as scholarly reflections, on learning and teaching
Recommended from our members
Police Knowledge Exchange: Full Report 2018
[Executive Summary]
This report was commissioned to explore the enablers and barriers to sharing within and between police forces and between police forces and partners, including the public. This was completed from an interdisciplinary review of international literature covering sharing, knowledge exchange, learning and organisational learning. The literature broke down into four main factors; who, why, what and how. An introduction to the literature is presented with ‘Who’ is sharing which considers both personal identity and different institutional issues. The ‘Why’ literature covers issues of cultural and community motivators and barriers. The ‘What’ segment reviews concepts of data, information and knowledge and related legislative issues. Finally, the ‘how’ section spans face to face sharing approaches to technologies that produce both enablers and barriers. A series of 42 in-depth interviews and focus groups were completed and combined with 47 survey responses . The aim of the interviews, focus groups and survey was to show perceptions and beliefs around knowledge sharing from a small sample across policing in order to complement the findings from the literature review.
The survey was adapted from a standardised questionnaire (Biggs, 1987). The Biggs questionnaire focused on what motivated students to learn and how they approached their learning. Our adapted survey looked at what motivated police to share, and how they approached sharing. The responses showed a trend, across the police, towards a motivation for sharing to develop a deeper understanding of issues. However, the approaches and the strategies they used to share with others, which were primarily driven by achieving and surface approaches (to get promoted and get the job done). According to Biggs (1987) this could leave them discontented as they never progress to a deeper understanding of issues. Scaffolding sharing within the police through processes that are clearly defined, effective and valued could help to overcome these issues.
Within the interviews and focus group findings a similar structured approach to sharing was adopted. Within the ‘who’ section some key aspects around personal relationships, reciprocity and reputation were identified. The ‘why’ the police share was one of the largest discussion points. Not only was there a deep motivation to solve key policing issues there was an approach of reciprocity. Police sharing was deeply motivated to support ‘good practice’ in the prevention and detection of crime. However, a sharing barrier was identified in the parity of value given to different types of knowledge for example between professional judgement and research evidence knowledge. Sharing was achieved when there were reciprocal benefits, in particular with personal networks or face to face sharing which was noted as ‘safe’. Again, this was inhibited by misunderstandings around the ‘risks’ of sharing, frequently attributed to data protection legislation; producing cautious reactions and as an avoidance tactic to save time and effort sharing. However, a divide was noted between technical users and those who avoided any online systems for sharing; often due to poorly designed systems and a lack of confidence in how to use systems. The police culture was identified as being risk-adverse, and competitive due to multiple factors, a lack of supported time to share, Her Majesty’s Inspectorate of Constabulary (HMIC) reviews and promotion criteria. The result was perceived to be a poor cultural ability to learn from mistakes and a likelihood to repeat errors.
A set of strategic recommendations are given and include the use of a sharing authorised professional practice for HMIC reviews, sharing networks and training. A further set of operational recommendations are given such as; sharing impact cases for evidence based practice, data sharing officers and evaluating mechanisms for sharing.
This full report is supported by the Police Knowledge Exchange Summary Report 2018 which gives an overview of the findings and recommendations
Recommended from our members
Is there a role for Information and Communications Technologies in rural schools and their communities?
Web 2.0 technologies for learning: the current landscape – opportunities, challenges and tensions
This is the first report from research commissioned by Becta into Web 2.0 technologies for learning at Key Stages 3 and 4. This report describes findings from an additional literature review of the then current landscape concerning learner use of Web 2.0 technologies and the implications for teachers, schools, local authorities and policy makers
- …