44 research outputs found

    Using Audio-Logs for Analyzing the Development of a Common Operational Picture in Multi-agency Emergency Response

    Get PDF
    Multi-agency emergency response requires effective communication and collaboration for building and maintaining a common operational picture. Full-scale exercises are shown to be effective for learning, and for training the collaborative skills needed. This paper presents a methodology for analysis of real-time communication for building the common operational picture, using audio-logs. The analysis of the audio-logs provides insights for both practitioners and researchers in the emergency management domain concerning the dynamics of inter-agency collaboration and information exchanges when responding to emergencies. Coding and categorizing of audio-log-based information exchanges among multi-agency stakeholders were applied based on a full-scale emergency exercise on multiple terror actions. The results show that the methodology can contribute to analyze the development of a common operational picture, supplementing existing methods for evaluation of full-scale emergency exercises and real events

    Using Audio-Logs for Analyzing the Development of a Common Operational Picture in Multi-agency Emergency Response

    Get PDF
    Multi-agency emergency response requires effective communication and collaboration for building and maintaining a common operational picture. Full-scale exercises are shown to be effective for learning, and for training the collaborative skills needed. This paper presents a methodology for analysis of real-time communication for building the common operational picture, using audio-logs. The analysis of the audio-logs provides insights for both practitioners and researchers in the emergency management domain concerning the dynamics of inter-agency collaboration and information exchanges when responding to emergencies. Coding and categorizing of audio-log-based information exchanges among multi-agency stakeholders were applied based on a full-scale emergency exercise on multiple terror actions. The results show that the methodology can contribute to analyze the development of a common operational picture, supplementing existing methods for evaluation of full-scale emergency exercises and real events.publishedVersio

    Assessing Rigour Criteria in Information Systems Research – The Example of Case Study Research Methodology

    Get PDF
    Research in information systems (IS) calls for increased validity of research findings through a rigorous research process. This research investigates the approach of researchers to suggested rigour criteria. Drawing upon existing literature on case study research methodology, we identify a set of criteria for establishing the rigour of a case study research. A coding scheme is developed based on these criteria. Our overarching proposition is that a rigorous research process should specify most of the identified criteria. Applying the content analysis approach, we conducted a systematic literature review of case studies published in the basket-of-eight journals in IS to ascertain researchers’ approach towards stipulated rigor criteria. Our result and observation indicate that although researchers prioritise rigour in the conduct of their research, there is an increasing rate of idiosyncratic research practices in addition to dearth of guidelines for analysing qualitative data in information systems research

    In Search of Mechanisms. Conducting a Critical Realist Data Analysis

    Get PDF
    Critical realism has emerged as an alternative to positivist and interpretive research during the past decade. Yet, the number of empirical studies based on this perspective has so far been limited. This indicates a need for a more explicit method for critical realist data analysis. To address this, we extend former research on critical realist methodology by presenting a framework for identifying and understanding causal structures in critical realist studies, termed mechanisms. The framework consists of steps involved in identifying structural components of a mechanism, how these components interact to produce to an outcome, and contextual influences on this outcome. We illustrate the application of the framework through an example of the identification of IS innovation mechanisms in a case study in the airline industry. Overall, we argue that the mechanism approach can improve empirical studies in the IS field, by providing ontological depth, creative thinking and more precise explanations

    EXPLAINING THE INFLUENCE OF WORKAROUNDS ON EFFECTIVE USE – THE CASE OF A SUPPLY CHAIN MANAGEMENT SYSTEM

    Get PDF
    The stage of post-adoption of an enterprise system (ES) implementation has been in the focus of recent information systems research. However, a thorough understanding of how users effectively use an enterprise system to complete their tasks is still missing. Prior research has implied that adaptive use is of great importance to facilitate effective use of a system. We investigate adaptive use solutions, which are outside the original system. This behavior is known as workaround. We conduct an interpretive case study to investigate the impact of workarounds and explain why workarounds can lead to an advance in effective use of a standard ES. We expand the theory of effective use with an explanation why workarounds can improve transparent interaction, representation fidelity and informed action via alleviating users’ issues with the surface structure and the faithfulness in representations of an implemented standard ES

    What Every Information Systems (IS) Researcher Should Know About IS History (ISH) Research

    Get PDF
    Growing attention has recently been devoted to studying information systems by utilizing research approaches from History. IS history has come to stay in the arsenal of IS research methodologies. Our team of academics from both history and information systems recognize and discuss what is good historical research and contribute into this very scientific discourse. The underlying methodological issues raised in this article must be understood by all IS historians. The major contribution is a set of practical recommendations for effectively conducting Information Systems History (ISH) research following the methodology of General History. This endeavor helps IS researchers present their scientific works in such a manner that also historians working outside of the IS field would accept those studies as scientifically acceptable, relevant, and in this manner the IS field would become more visible also outside of the field itself

    Information quality life cycle in secondary use of EHR data

    Get PDF
    The paper argues that existing research on information quality (IQ) mainly focuses on the primary use of electronic health record (EHR) data, whereas IQ in secondary use of EHR data needs further deliberation. The current view of IQ in a healthcare context is static. It assumes that once the EHR system generates the infor- mation product, individual users may act on the information based on their subjective perception of its quality. However, this view ignores the complexities of secondary use of EHR data, in which users are actively involved in (re)generating and communicating the information product. Thus, IQ does not remain static but keeps on transforming through active engagement and interpersonal communication. To contribute to this debate, we conducted a qualitative case study in a Norwegian healthcare context by employing an IQ life cycle model. In conclusion, we enhanced the existing IQ model by (1) adding interpersonal communication, (2) showing the interrelations of the IQ dimensions, and (3) integrating the mechanisms of the transformation process for IQ in secondary use of EHR data. In doing so, we unfold the dynamics of IQ in the secondary use of EHR data.publishedVersio

    It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups

    Get PDF
    An organization’s ability to successfully manage information security incidents is determined by the actions of its employees, as well as the actions of various groups of employees within its organizational boundaries. To date, information security research has primarily focused on individual-level phenomena and has not yet explored group-level phenomena such as how employee groups recognize and respond to security incidents in a way that is consistent with the organization’s security goals and objectives. The current study addresses this gap, thereby answering the research call for group-level security research perspectives. The present study explores how employee groups formulate their collective security efficacy, which influences how group members recognize and respond to information security incidents. Using a case study of a large healthcare research organization (HRO), we analyze two security incidents, a malware attack, and a physical security breach, to identify a unique set of ecological and social properties of employee groups that are salient to their collective security efficacy

    Enterprise architecture operationalization and institutional pluralism: The case of the Norwegian Hospital sector

    Get PDF
    Enterprise architecture (EA) is a systematic way of designing, planning, and implementing process and technology changes to address the complexity of information system (IS) landscapes. EA is operationalized when architecture visions move towards realization through concrete projects. We report a case study on the dynamics of operationalizing EA in the Norwegian hospital sector by exploring different EA project trajectories. Our empirical context is an institutionally pluralistic setting where multiple logics coexist. We show that the distinct logic of EA is added to the institutional context and we find that tensions among existing medical, technical, and managerial logics and EA principles and assumptions emerge. We contribute to the under‐researched topic of EA operationalization by suggesting a model that demonstrates how the meeting of multiple institutional logics can lead to varying degrees of differentiation or even disassociation from EA visions during decision‐taking in projects. Furthermore, we advance extant research on IS projects' implementation in institutionally pluralistic settings by providing an empirical account of actors' interactions and project leadership arrangements that contribute to the persistence of coexisting logics in a dynamic equilibrium.publishedVersio

    Value-Added Model (VAM) Component of Teacher Evaluation and Job Satisfaction, Efficacy, and Retention: Perspectives of Secondary Teachers of Historically Low-Scoring Students and Recommendations for Alternative Student Performance Measurements

    Get PDF
    This qualitative study aimed to research the perspectives of four teachers who teach low-scoring populations of students traditionally. The research questions focused on job satisfaction, self-efficacy, and retention in education about Value-Added Model scores in their evaluations. The secondary purpose was for the teachers to recommend authentic assessment of student growth which is weighted 33% of teacher evaluations. I conducted a series of three open-ended interviews with each of the four participants. The interviews were designed to allow rich data to be collected. The significant findings have been discovered using the constant comparative method. The analysis revealed that the teacher’s perceptions of VAM scores were not in their control, nor did the teachers understand how the score is calculated; however, it was a stress point in the teaching environment. The recommendations for alternative measurement of student achievement had a common thread of a baseline assessment and a learning gain assessment of the students the teachers directly taught. The emerging themes concluded that the evaluating administrator had more impact on job satisfaction and self-efficacy than VAM scores. The research questions drove the study, and the analysis discovered trends and emerging themes
    corecore