37,894 research outputs found
Developing a Methodology for Designing Routine Information Systems Based on the Situational Theory of Action
Information systems are part of purposeful socio-technical systems and consequently theories of action may help in understanding them. Current systems analysis and design methodologies seem to have been influenced only by one particular theory of action, which asserts that action results from deliberation upon an abstract representation of the world. Many disciplines have discussed an alternative ‘situational’ theory of action. There is no design methodology that fully supports designing systems reflecting the situational theory of action. The aim of this paper is to describe the motivation for, and progress to date of research-in-progress developing a design methodology based on concepts from the situational theory of action. This methodology for designing situational information systems is being iteratively refined using a combination of case studies and action research. This project is significant because many information systems fail in pressured routine environments where we would argue that the situational theory of action provides a better description of purposeful activity
Recommended from our members
Theory of deferred action: Agent-based simulation model for designing complex adaptive systems
Deferred action is the axiom that agents act in emergent organisation to achieve predetermined goals. Enabling deferred action in designed artificial complex adaptive systems like business organisations and IS is problematical. Emergence is an intractable problem for designers because it cannot be predicted. We develop proof-of-concept, conceptual proto-agent model, of emergent organisation and emergent IS to understand better design principles to enable deferred action as a mechanism for coping with emergence in artefacts. We focus on understanding the effect of emergence when designing artificial complex adaptive systems by developing an exploratory proto-agent model and evaluate its suitability for implementation as agent-based simulation
Designing as Construction of Representations: A Dynamic Viewpoint in Cognitive Design Research
This article presents a cognitively oriented viewpoint on design. It focuses
on cognitive, dynamic aspects of real design, i.e., the actual cognitive
activity implemented by designers during their work on professional design
projects. Rather than conceiving de-signing as problem solving - Simon's
symbolic information processing (SIP) approach - or as a reflective practice or
some other form of situated activity - the situativity (SIT) approach - we
consider that, from a cognitive viewpoint, designing is most appropriately
characterised as a construction of representations. After a critical discussion
of the SIP and SIT approaches to design, we present our view-point. This
presentation concerns the evolving nature of representations regarding levels
of abstraction and degrees of precision, the function of external
representations, and specific qualities of representation in collective design.
Designing is described at three levels: the organisation of the activity, its
strategies, and its design-representation construction activities (different
ways to generate, trans-form, and evaluate representations). Even if we adopt a
"generic design" stance, we claim that design can take different forms
depending on the nature of the artefact, and we propose some candidates for
dimensions that allow a distinction to be made between these forms of design.
We discuss the potential specificity of HCI design, and the lack of cognitive
design research occupied with the quality of design. We close our discussion of
representational structures and activities by an outline of some directions
regarding their functional linkages
Towards a Configurative Publication Schema for Design Science Research
Design science research (DSR) has matured and gained acceptance as an appropriate information systems research method. Despite the increasing number of DSR publications there is still no common sense and no comprehensive guidance how to present DSR in scientific literature. Therefore, this paper investigates the potential of a configurative DSR publication schema by means of a reference model allowing the deduction of concrete publication schemas. These schemas provide more detailed advice depending on the particular research context, such as the intended artifact type, the evaluation method, or the knowledge contribution type. By identifying configuration parameters (through an investigation of 13 DSR meta-analysis papers) and common configurations (through a meta-analysis of 52 DSR journal publications) we lay the foundations for a configurative reference model which can be adapted to provide detailed guidance in concrete DSR publication situations for both authors and reviewers. A detailed example sketches the future artifact
Alcohol, assault and licensed premises in inner-city areas
This report contains eight linked feasibility studies conducted in Cairns during 2010. These exploratory studies examine the complex challenges of compiling and sharing information about incidents of person-to-person violence in a late night entertainment precinct (LNEP). The challenges were methodological as well as logistical and ethical. The studies look at how information can be usefully shared, while preserving the confidentiality of those involved. They also examine how information can be compiled from routinely collected sources with little or no additional resources, and then shared by the agencies that are providing and using the information.Although the studies are linked, they are also stand-alone and so can be published in peer-reviewed literature. Some have already been published, or are ‘in press’ or have been submitted for review. Others require the NDLERF board’s permission to be published as they include data related more directly to policing, or they include information provided by police.The studies are incorporated into the document under section headings. In each section, they are introduced and then presented in their final draft form. The final published form of each paper, however, is likely to be different from the draft because of journal and reviewer requirements. The content, results and implications of each study are discussed in summaries included in each section.Funded by the National Drug Law Enforcement Research Fund, an initiative of the National Drug StrategyAlan R Clough (PhD) School of Public Health, Tropical Medicine and Rehabilitation Sciences James Cook UniversityCharmaine S Hayes-Jonkers (BPsy, BSocSci (Hon1)) James Cook University, Cairns.Edward S Pointing (BPsych) James Cook University, Cairns
Lessons learned: structuring knowledge codification and abstraction to provide meaningful information for learning
Purpose – To increase the spread and reuse of lessons learned (LLs), the purpose of this paper is to develop
a standardised information structure to facilitate concise capture of the critical elements needed to engage
secondary learners and help them apply lessons to their contexts.
Design/methodology/approach – Three workshops with industry practitioners, an analysis of over 60
actual lessons from private and public sector organisations and seven practitioner interviews provided
evidence of actual practice. Design science was used to develop a repeatable/consistent information model of
LL content/structure. Workshop analysis and theory provided the coding template. Situation theory and
normative analysis were used to define the knowledge and rule logic to standardise fields.
Findings – Comparing evidence from practice against theoretical prescriptions in the literature highlighted
important enhancements to the standard LL model. These were a consistent/concise rule and context
structure, appropriate emotional language, reuse and control criteria to ensure lessons were transferrable and
reusable in new situations.
Research limitations/implications – Findings are based on a limited sample. Long-term benefits of
standardisation and use need further research. A larger sample/longitudinal usage study is planned.
Practical implications – The implementation of the LL structure was well-received in one government
user site and other industry user sites are pending. Practitioners validated the design logic for improving
capture and reuse of lessons to render themeasily translatable to a new learner’s context.
Originality/value – The new LL structure is uniquely grounded in user needs, developed from existing
best practice and is an original application of normative and situation theory to provide consistent rule logic
for context/content structure
Activity Theory Analysis of Heart Failure Self-Care
The management of chronic health conditions such as heart failure is a complex process emerging from the activity of a network of individuals and artifacts. This article presents an Activity Theory-based secondary analysis of data from a geriatric heart failure management study. Twenty-one patients' interviews and clinic visit observations were analyzed to uncover eight configurations of roles and activities involving patients, clinicians, and others in the sociotechnical network. For each configuration or activity pattern, we identify points of tension and propose guidelines for developing interventions for future computer-supported healthcare systems
A principled approach to the measurement of situation awareness in commercial aviation
The issue of how to support situation awareness among crews of modern commercial aircraft is becoming especially important with the introduction of automation in the form of sophisticated flight management computers and expert systems designed to assist the crew. In this paper, cognitive theories are discussed that have relevance for the definition and measurement of situation awareness. These theories suggest that comprehension of the flow of events is an active process that is limited by the modularity of attention and memory constraints, but can be enhanced by expert knowledge and strategies. Three implications of this perspective for assessing and improving situation awareness are considered: (1) Scenario variations are proposed that tax awareness by placing demands on attention; (2) Experimental tasks and probes are described for assessing the cognitive processes that underlie situation awareness; and (3) The use of computer-based human performance models to augment the measures of situation awareness derived from performance data is explored. Finally, two potential example applications of the proposed assessment techniques are described, one concerning spatial awareness using wide field of view displays and the other emphasizing fault management in aircraft systems
From Common Operational Picture to Common Situational Understanding : A Framework for Information Sharing in Multi-Organizational Emergency Management
Complex emergencies such as natural disasters are increasing in frequency and scope, in all regions of the world. These emergencies have devastating impacts on people, property, and the environment. Responding to these events and reducing their impact requires that emergency management organizations (EMOs) collaborate in their operations.
Complex emergencies require extraordinary efforts from EMOs and often should be handled beyond ordinary routines and structures. Such operations involving multiple stakeholders are typically characterized by inadequate information sharing, decision-making problems, limited situational awareness (SA), and lack of common situational understanding. Despite a high volume of research on these challenges, evaluations from complex disasters and large-scale exercises document that there are still several unsolved issues related to information sharing and the development of common situational understanding. Examples here include fulfillment of heterogeneous information needs, employment of different communication tools and processes with limited interoperability, and information overload resulting from a lack of mechanisms for filtering irrelevant information. Multi-organizational emergency management is an established area of research focusing on how to successfully collaborate and share information for developing common situational understanding. However, the level of complexity and situational dependencies between the involved EMOs create challenges for researchers.
An important element for efficient collaboration and information sharing is building and maintaining a common operational picture (COP). Sharing important information is a key element in emergency management involving several EMOs, and both static and dynamic information must be accessible to perform tasks effectively during emergency response. To be proactive and mitigate the emergency impacts requires up-to-date information, both factual information via the COP and the ability to share interpretations and implications through using a communication system for rapid verbal negotiation.
The overall research objective is to investigate how stakeholders perceive and develop SA and COP, and to explore and understand key requirements for stakeholders to develop a common situational understanding in complex multi-organizational emergency management.publishedVersio
Cyber-crime Science = Crime Science + Information Security
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions
- …