26,821 research outputs found

    Empirical Evidence Justifying the Adoption of a Model-Based Approach in the Course Web Applications Development

    Get PDF
    With the ever-increasing role of business people in software development there is a growing need for business schools to offer courses in e-business and e-commerce applications development. This paper presents the results of a student survey evaluating the applications development skills acquired by business students exposed to two different approaches to teaching the course E-business applications development. The first group was taught using a model-based approach, while the second one was taught using a traditional code-based approach. In the model-based approach the environment model of evaluation was used to introduce the basic programming constructs. The UML Web Modeler profile and statecharts were employed to abstract from the intricacies and the distributed nature of Webbased information systems. A major constituent of this approach was the development of a system model. The underlying assumption was that adopting a model-based approach would enhance students' ability to think and reason formally about, develop rigorously, and program better E-business applications. The contention was that learners would perceive coding as yet another view in the system model. It was believed that having defined the components ' interfaces, students would be bound to experience fewer difficulties when writing the code. In the code-based approach students are exposed to Web programming without being required to develop a system model

    Modeling inertia causatives:validating in the password manager adoption context

    Get PDF
    Cyber criminals are benefiting from the fact that people do not take the required precautions to protect their devices and communications. It is the equivalent of leaving their home’s front door unlocked and unguarded, something no one would do. Many efforts are made by governments and other bodies to raise awareness, but this often seems to fall on deaf ears. People seem to resist changing their existing cyber security practices: they demonstrate inertia. Here, we propose a model and instrument for investigating the factors that contribute towards this phenomenon

    Exploring ERP-enabled Technology Adoption: A Real Options Perspective

    Get PDF
    For decades, practitioners and scholars have focused on achieving optimal values in and benefits from enterprise resource planning (ERP) systems. Given that scholars have identified ERP systems as having option-like characteristics such as the capacity to create an information technology (IT) platform that enables the adoption of subsequent function-specific applications, we face a need to explore the linkage between post-ERP systems implementation and subsequent ERP-enabled technology adoption. We used real options theory to explore the underlying relationship between the initial ERP system implementation and subsequent technology adoptions. We surveyed 519 IT executives in the United States and found that the level of technology uncertainty, managerial flexibility, and formal real option analysis in ERP adoption decisions influenced the organizational relative advantage of subsequent non-ERP technologies. Our results also reveal that the level of uncertainty had a negative relationship with ERP-enabled technology adoption, while formal real option analysis in ERP adoption decisions positively influenced ERP-enabled adoption

    Extending the IS-Impact model into the higher education sector

    Get PDF
    The study addresses known limitations of what may be the most important dependent variable in Information Systems (IS) research; IS-Success or IS-Impact. The study is expected to force a deeper understanding of the broad notions of IS success and impact. The aims of the research are to: (1) enhance the robustness and minimize limitations of the IS-Impact model, and (2) introduce and operationalise a more rigorously validated IS Impact measurement model to Universities, as a reliable model for evaluating different Administrative Systems. In extending and further generalizing the IS-Impact model, the study will address contemporary validation issues

    Reviewing and extending the five-user assumption: A grounded procedure for interaction evaluation

    Get PDF
    " © ACM, 2013. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Transactions on Computer-Human Interaction (TOCHI), {VOL 20, ISS 5, (November 2013)} http://doi.acm.org/10.1145/2506210 "The debate concerning how many participants represents a sufficient number for interaction testing is well-established and long-running, with prominent contributions arguing that five users provide a good benchmark when seeking to discover interaction problems. We argue that adoption of five users in this context is often done with little understanding of the basis for, or implications of, the decision. We present an analysis of relevant research to clarify the meaning of the five-user assumption and to examine the way in which the original research that suggested it has been applied. This includes its blind adoption and application in some studies, and complaints about its inadequacies in others. We argue that the five-user assumption is often misunderstood, not only in the field of Human-Computer Interaction, but also in fields such as medical device design, or in business and information applications. The analysis that we present allows us to define a systematic approach for monitoring the sample discovery likelihood, in formative and summative evaluations, and for gathering information in order to make critical decisions during the interaction testing, while respecting the aim of the evaluation and allotted budget. This approach – which we call the ‘Grounded Procedure’ – is introduced and its value argued.The MATCH programme (EPSRC Grants: EP/F063822/1 EP/G012393/1

    ALT-C 2010 - Conference Introduction and Abstracts

    Get PDF

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
    corecore