26,821 research outputs found
Empirical Evidence Justifying the Adoption of a Model-Based Approach in the Course Web Applications Development
With the ever-increasing role of business people in software development there is a growing need for business schools to offer courses in e-business and e-commerce applications development. This paper presents the results of a student survey evaluating the applications development skills acquired by business students exposed to two different approaches to teaching the course E-business applications development. The first group was taught using a model-based approach, while the second one was taught using a traditional code-based approach. In the model-based approach the environment model of evaluation was used to introduce the basic programming constructs. The UML Web Modeler profile and statecharts were employed to abstract from the intricacies and the distributed nature of Webbased information systems. A major constituent of this approach was the development of a system model. The underlying assumption was that adopting a model-based approach would enhance students' ability to think and reason formally about, develop rigorously, and program better E-business applications. The contention was that learners would perceive coding as yet another view in the system model. It was believed that having defined the components ' interfaces, students would be bound to experience fewer difficulties when writing the code. In the code-based approach students are exposed to Web programming without being required to develop a system model
Recommended from our members
Information systems and healthcare XXIV: Factors affecting the EAI adoption in the healthcare sector
Recent developments in the field of integration technologies like Enterprise Application Integration (EAI) have emerged to support organizations towards improving the quality of services and reducing integration costs. Despite the importance of EAI, there is limited empirical research reported on its adoption in the healthcare sector. Khoumbati et al. [2006] developed a model for the evaluation of EAI in healthcare organizations. In doing so, the causal interrelationship of EAI adoption factors was identified by using fuzzy cognitive mapping. This paper is a progression of previous work in the area and seeks to contribute by validating the model through a different case environment. Thus, this paper contributes by deriving and proposing the MAESTRO model for EAI adoption. MAESTRO identifies a set of factors that influence EAI adoption and it is evaluated through a real-life case study. It provides an understanding of the EAI adoption process through its grounding on empirical data. In doing so, the MAESTRO model supports the management of healthcare organizations during the decision-making process for EAI adoption
Modeling inertia causatives:validating in the password manager adoption context
Cyber criminals are benefiting from the fact that people do not take the required precautions to protect their devices and communications. It is the equivalent of leaving their home’s front door unlocked and unguarded, something no one would do. Many efforts are made by governments and other bodies to raise awareness, but this often seems to fall on deaf ears. People seem to resist changing their existing cyber security practices: they demonstrate inertia. Here, we propose a model and instrument for investigating the factors that contribute towards this phenomenon
Recommended from our members
Proceedings ICPW'07: 2nd International Conference on the Pragmatic Web, 22-23 Oct. 2007, Tilburg: NL
Proceedings ICPW'07: 2nd International Conference on the Pragmatic Web, 22-23 Oct. 2007, Tilburg: N
Exploring ERP-enabled Technology Adoption: A Real Options Perspective
For decades, practitioners and scholars have focused on achieving optimal values in and benefits from enterprise resource planning (ERP) systems. Given that scholars have identified ERP systems as having option-like characteristics such as the capacity to create an information technology (IT) platform that enables the adoption of subsequent function-specific applications, we face a need to explore the linkage between post-ERP systems implementation and subsequent ERP-enabled technology adoption. We used real options theory to explore the underlying relationship between the initial ERP system implementation and subsequent technology adoptions. We surveyed 519 IT executives in the United States and found that the level of technology uncertainty, managerial flexibility, and formal real option analysis in ERP adoption decisions influenced the organizational relative advantage of subsequent non-ERP technologies. Our results also reveal that the level of uncertainty had a negative relationship with ERP-enabled technology adoption, while formal real option analysis in ERP adoption decisions positively influenced ERP-enabled adoption
Extending the IS-Impact model into the higher education sector
The study addresses known limitations of what may be the most important dependent variable in Information Systems (IS) research; IS-Success or IS-Impact. The study is expected to force a deeper understanding of the broad notions of IS success and impact. The aims of the research are to: (1) enhance the robustness and minimize limitations of the IS-Impact model, and (2) introduce and operationalise a more rigorously validated IS Impact measurement model to Universities, as a reliable model for evaluating different Administrative Systems. In extending and further generalizing the IS-Impact model, the study will address contemporary validation issues
Reviewing and extending the five-user assumption: A grounded procedure for interaction evaluation
" © ACM, 2013. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Transactions on Computer-Human Interaction (TOCHI), {VOL 20, ISS 5, (November 2013)} http://doi.acm.org/10.1145/2506210 "The debate concerning how many participants represents a sufficient number for interaction testing is
well-established and long-running, with prominent contributions arguing that five users provide a good
benchmark when seeking to discover interaction problems. We argue that adoption of five users in this
context is often done with little understanding of the basis for, or implications of, the decision. We present
an analysis of relevant research to clarify the meaning of the five-user assumption and to examine the
way in which the original research that suggested it has been applied. This includes its blind adoption and
application in some studies, and complaints about its inadequacies in others. We argue that the five-user
assumption is often misunderstood, not only in the field of Human-Computer Interaction, but also in fields
such as medical device design, or in business and information applications. The analysis that we present
allows us to define a systematic approach for monitoring the sample discovery likelihood, in formative and
summative evaluations, and for gathering information in order to make critical decisions during the
interaction testing, while respecting the aim of the evaluation and allotted budget. This approach – which
we call the ‘Grounded Procedure’ – is introduced and its value argued.The MATCH programme (EPSRC Grants: EP/F063822/1 EP/G012393/1
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
- …