1,109 research outputs found

    Realizing Shared Services - A Punctuated Process Analysis of a Public IT Department

    Get PDF
    IT services are increasingly being offered via a shared service model. This model promises the benefits of centralization and consolidation, as well as an increased customer satisfaction. Adopting shared services is not easy as it necessitates a major organizational change, with few documented exemplars to guide managers. This research explores a public IT unit’s realization of shared services with the intent to improve the transparency of its value proposition to their stakeholders. An ethnographic field study enabled in-situ data collection over a 24-month period. We analyzed the resulting, rich process data using the Punctuated Socio-Technical IS Change (PSIC) model. This resulted in several contributions: an explanatory account of shared services realization, an empirically grounded punctuated process model with seventeen critical incidents, and twelve key lessons for practitioners. Several extensions to extant process research methods are developed. These contributions combine to form a detailed and nuanced understanding of the process of realizing IT shared services at a large public university over a multi-year period

    Service-Oriented Framework for Developing Interoperable e-Health Systems in a Low-Income Country

    Get PDF
    e-Health solutions in low-income countries are fragmented, address institution-specific needs, and do little to address the strategic need for inter-institutional exchange of health data. Although various e-health interoperability frameworks exist, contextual factors often hinder their effective adoption in low-income countries. This underlines the need to investigate such factors and to use findings to adapt existing e-health interoperability models. Following a design science approach, this research involved conducting an exploratory survey among 90 medical and Information Technology personnel from 67 health facilities in Uganda. Findings were used to derive requirements for e-health interoperability, and to orchestrate elements of a service oriented framework for developing interoperable e-health systems in a low-income country (SOFIEH). A service-oriented approach yields reusable, flexible, robust, and interoperable services that support communication through well-defined interfaces. SOFIEH was evaluated using structured walkthroughs, and findings indicate that it scored well regarding applicability, usability, and understandability

    Seeing the full picture: the case for extending security ceremony analysis

    Get PDF
    The concept of the security ceremony was introduced a few years ago to complement the concept of the security protocol with everything about the context in which a protocol is run. In particular, such context involves the human executors of a protocol. When including human actors, human protocols become the focus, hence the concept of the security ceremony can be seen as part of the domain of socio-technical studies. This paper addresses the problem of ceremony analysis lacking the full view of human protocols. This paper categorises existing security ceremony analysis work and illustrates how the ceremony picture could be extended to support a more comprehensive analysis. The paper explores recent weaknesses found on the Amazon\u27s web interface to illustrate different approaches to the analysis of the full ceremony picture

    Measuring Tasks, Time, and Priorities: A Study of an Alternative School Leader in Action

    Get PDF
    This study explored whether conventional means to evaluate principal instructional leadership were appropriate in alternative school settings. The mixed methods research included shadowing an alternative school principal over two days during the fall semester, 2011. Data was collected using the Vanderbilt Assessment of Education in Leadership\u27s (VAL-ED) Time Task Analysis ToolTM checklist supplemented by naturalistic observations and ongoing explanations by the principal. Leader activities were categorized within three major categories: instructional, management, and personal. Additional activity descriptions were based on instrument subcategories, multiple cycles of coding, and analytic memoing. Conclusions indicated that the VAL-ED instrument failed to accurately define the range of entrepreneurial and outreach activities this alternative principal undertook. The checklist was insensitive to the degree to which the principal multitasked, combining management with instructional duties. The observations provided important clues to principal function, suggesting a more nuanced evaluation useful in nontraditional settings

    Software Development Life Cycles and Methodologies:Fixing the old and adopting the new

    Get PDF
    Information Systems as a discipline has generated thousands of research papers yet practice still suffers from poor-quality applications. This research evaluates the current state of application development, finding practice wanting in a number of areas. Changes recommended to fix historical shortcomings include improved management attention to risk management, testing, and detailed work practices. In addition, for industry\u27s move to services orientation, recommended changes include development of usable interfaces and a view of applications as embedded in the larger business services in which they function. These business services relate to both services provided to parent-organization customers as well as services provided by the information technology organization to its constituents. Because of this shift toward service orientation, more emphasis on usability, applications, testing, and improvement of underlying process quality are needed. The shift to services can be facilitated by adopting tenets of IT service management and user-centered design and by attending to service delivery during application development
    • …
    corecore