5,840 research outputs found

    Profiling a decade of information systems frontiers’ research

    Get PDF
    This article analyses the first ten years of research published in the Information Systems Frontiers (ISF) from 1999 to 2008. The analysis of the published material includes examining variables such as most productive authors, citation analysis, universities associated with the most publications, geographic diversity, authors’ backgrounds and research methods. The keyword analysis suggests that ISF research has evolved from establishing concepts and domain of information systems (IS), technology and management to contemporary issues such as outsourcing, web services and security. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of ISF. The analysis has also identified authors published in other journals whose work largely shaped and guided the researchers published in ISF. This research has implications for researchers, journal editors, and research institutions

    Special Issue on Wireless Sensor and Actuator Networks

    Get PDF
    ( First paragraph) WIRELESS Sensor Networks (WSNs), in their various shapes and forms, have greatly facilitated and enhanced the automated, remote, and intelligent monitoring of a large variety of physical systems. These networks consist of a large number of typically small devices, each incorporating sensing, processing, and wireless communications capabilities. Their use has penetrated a plethora of application domains from industrial and building automation, to environmental, wildlife, and health monitoring

    Persuasive Technology: Introduction to the Special Section

    Get PDF
    Whether we want it or not, information systems and technologies always have an effect on our behavior. Moreover, there are situations in which the goal of an information system is to influence end-users’ behaviors. This special section of Communications of the AIS is devoted to persuasive technology, i.e., interactive computing systems designed to change people’s attitudes or behaviors. The guest editorial introduces the topic to CAIS readers and provides both conceptual tools for obtaining a deeper understanding about persuasive technology and practical applications to demonstrate its potential for research and development in the future

    Profiling research published in the journal of enterprise information management (JEIM)

    Get PDF
    Purpose – The purpose of this paper is to analyse research published in the Journal of Enterprise Information Management (JEIM) in the last ten years (1999 to 2008). Design/methodology/approach – Employing a profiling approach, the analysis of the 381 JEIM publications includes examining variables such as the most active authors, geographic diversity, authors' backgrounds, co-author analysis, research methods and keyword analysis. Findings – All the finding are in relation to the period of analysis (1999 to 2008). (a) Research categorised under descriptive, theoretical and conceptual methods is the most dominant research approach followed by JEIM authors. This is followed by case study research. (b) The largest proportion of contributions came from researchers and practitioners with an information systems background, followed by those with a background in business and computer science and IT. (c) The keyword analysis suggests that ‘information systems’, ‘electronic commerce’, ‘internet’, ‘logistics’, ‘supply chain management’, ‘decision making’, ‘small to medium-sized enterprises’, ‘information management’, ‘outsourcing’, and ‘modelling’ were the most frequently investigated keywords. (d) The paper presents and discusses the findings obtained from the citation analysis that determines the impact of the research published in the JEIM. Originality/value – The primary value of this paper lies in extending the understanding of the evolution and patterns of IS research. This has been achieved by analysing and synthesising existing JEIM publications

    Tracking engineering education research and development: contributions from bibliometric analysis

    Get PDF
    In recent years, bibliometric analysis of publications has been receiving growing attention in engineering education research as an approach that can bring a number of benefits. In this paper two such forms, taxonomical analysis and citation analysis, are applied to papers from the first 2011 number of IEEE Transactions on Education (21 papers) and from the two 2011 numbers of the ASEE-published Advances in Engineering Education (22 papers). In the former approach, seven taxonomical dimensions are used to characterize the papers and in the second the references cited in the 43 papers were studied so as to analyze how the researchers were informed by previous studies. The results suggest that the silo effect identified by Wankat for disciplinary engineering education journals in 2009 was still apparent in the IEEE Transactions on Education in 2011. The Advances in Engineering Education papers show a wide range of cited references, including reference disciplines outside of engineering education, and this suggests that research published there is likely to be informed by a broad range of previous studies which may be interpreted as a sign of a growing maturity of engineering education as a research discipline

    Executive Doctorate Programs and the Role of the Information Systems Discipline

    Get PDF
    Over the last few years, a new genre of doctoral programs has emerged. These programs are partly aimed at bridging the gap between academic research and practice. Although these programs tend to be interdisciplinary in nature in terms of content and research methods, several of the programs have significant IS discipline connections. The goal of this panel session is to share experiences from these executive doctoral programs and the lessons learned. We also want to explore the interesting phenomenon of IS scholars being tapped to launch, manage, and teach in these programs in a disproportionately high level as a reflection of the IS discipline’s interdisciplinary nature

    Guest Editorial Part 2: Emerging Issues for Secure Knowledge Management—Results of a Delphi Study

    Get PDF
    Secure Knowledge Management (SKM) is one of the emerging areas in both knowledge management and information system disciplines. SKM refers to the management of knowledge while adhering to principles of security and privacy. This study identifies key issues on SKM and draws a consensus among domain experts on the key issues. This study is an attempt to accelerate further research and development in the SKM field. In this study, the authors conducted a three-round Delphi study, identifying 21 issues in the SKM area, along with their importance and urgency ratings. Analyses show that participating experts achieved a higher level of consensus on the importance and urgency of the issue as the rounds progressed. The findings will allow both practitioners and researchers to focus and prioritize research needs in the SKM area. The paper also discusses some future-research directions
    • 

    corecore