146,513 research outputs found

    Research Agenda for Studying Open Source II: View Through the Lens of Referent Discipline Theories

    Get PDF
    In a companion paper [Niederman et al., 2006] we presented a multi-level research agenda for studying information systems using open source software. This paper examines open source in terms of MIS and referent discipline theories that are the base needed for rigorous study of the research agenda

    Information Systems Skills Differences between High-Wage and Low-Wage Regions: Implications for Global Sourcing

    Get PDF
    Developing Information Systems (IS) skills for a company’s workforce has always been challenging, but global sourcing growth has caused the determination of needed IS skills to be more complex. The increased use of outsourcing to an IS service provider and from high-wage regions to low-wage regions has affected what IS skills are required globally and how to distribute the workforce to meet these needs. To understand what skills are needed in locations that seek and those that provide outsourcing, we surveyed IS service provider managers in global locations. Results from 126 reporting units provide empirical evidence that provider units in low-wage regions value technical skills more than those in high-wage regions. Despite the emphasis on commodity skills in low-wage areas, high- and low-wage providers value project management skills. Low-wage regions note global and virtual teamwork more than high-wage regions do. The mix of skills and the variation by region have implications for domestic and offshore sourcing. Service providers can vary their staffing models in global regions which has consequences for recruiting, corporate training, and curriculum

    “This is the way ‘I’ create my passwords ...":does the endowment effect deter people from changing the way they create their passwords?

    Get PDF
    The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to ownership of physical artifacts. If computer users also "own", and are attached to, their personal security routines, such feelings could conceivably activate the same endowment effect. This would, in turn, lead to their over-estimating the \value" of their existing routines, in terms of the protection they afford, and the risks they mitigate. They might well, as a consequence, not countenance any efforts to persuade them to adopt a more secure routine, because their comparison of pre-existing and proposed new routine is skewed by the activation of the endowment effect.In this paper, we report on an investigation into the possibility that the endowment effect activates when people adopt personal password creation routines. We did indeed find evidence that the endowment effect is likely to be triggered in this context. This constitutes one explanation for the failure of many security awareness drives to improve password strength. We conclude by suggesting directions for future research to confirm our findings, and to investigate the activation of the effect for other security routines

    Big data in higher education: an action research on managing student engagement with business intelligence

    Get PDF
    This research aims to explore the value of Big Data in student engagement management. It presents an action research on applying BI in a UK higher education institution that has developed and implemented a student engagement tracking system (SES) for better student engagement management. The SES collects data from various sources, including RFID tracking devices across many locations in the campus and student online activities. This public funded research project has enhanced the current SES with BI solutions and raised awareness on the value of the Big Data in improving student experience. The action research concerns with the organizational wide development and deployment of Intelligent Student Engagement System involving a diverse range of stakeholders. The activities undertaken to date have revealed interesting findings and implications for advancing our understanding and research in leveraging the benefit of the Big Data in Higher Education from a socio-technical perspective

    A Research Agenda for Studying Open Source I: A Multi-Level Framework

    Get PDF
    This paper presents a research agenda for studying information systems using open source software A multi-level research model is developed at five discrete levels of analysis: (1) the artifact; (2) the individual; (3) the team, project, and community; (4) the organization; and (5) society. Each level is discussed in terms of key issues within the level. Examples are based on prior research. In a companion paper, [Niederman, et al 2006], we view the agenda through the lens of referent discipline theories

    Control, Process Facilitation, and Requirements Change in Offshore Requirements Analysis: The Provider Perspective

    Get PDF
    Process, technology, and project factors have been increasingly driving organizations to offshore early software development phases, such as requirements analysis. This emerging trend necessitates greater control and process facilitation between client and vendor sites. The effectiveness of control and facilitation has, however, not been examined within the context of requirements analysis and change. In this study, we examine the role of control and facilitation in managing changing requirements and on success of requirements gathering in the Indian offshore software development environment. Firms found that control by client-site coordinators had a positive impact on requirements analysis success while vender site-coordinators did not have similar influence. Process facilitation by client site-coordinators affected requirements phase success indirectly through control. The study concludes with recommendations for research and practice

    Evidence Issues in Domestic Violence Civil Cases

    Get PDF
    This article is intended to assist practitioners in anticipating and responding to some of the evidentiary challenges in civil cases in which relief is sought for the victims of domestic violence. First, expert testimony is often necessary to dispel common myths about battered women and to educate judges and juries about the dynamics of domestic violence. Recent case law, however, has limited the admissibility of non-scientific expert testimony and may make it difficult for practitioners to use experts in their cases. In addition, particular evidentiary issues arise when victims are pursuing both criminal and civil remedies against the batterer. This article will explore the ways in which evidence issues may benefit and inhibit civil actions arising from the domestic violence. Finally, we will discuss the difficulties in using prior bad acts evidence. Because batterers tend to engage in repeated acts of abuse, evidence of prior acts may be particularly relevant in proving the extent of harm and predicting the likelihood of future abuse. Traditional principles of evidence law, however, often prohibit the admission of other crimes, wrongs and acts

    Intelligent student engagement management : applying business intelligence in higher education

    Get PDF
    Advances in emerging ICT have enabled organisations to develop innovative ways to intelligently collect data that may not be possible before. However, this leads to the explosion of data and unprecedented challenges in making strategic and effective use of available data. This research-in-progress paper presents an action research focusing on applying business intelligence (BI) in a UK higher education institution that has developed a student engagement tracking system (SES) for student engagement management. The current system serves merely as a data collection and processing system, which needs significant enhancement for better decision support. This action research aims to enhance the current SETS with BI solutions and explore its strategic use. The research attempts to follow socio-technical approach in its effort to make the BI application a success. Progress and experience so far has revealed interesting findings on advancing our understanding and research in organisation-wide BI for better decision-making

    Linking business analytics to decision making effectiveness: a path model analysis

    Get PDF
    While business analytics is being increasingly used to gain data-driven insights to support decision making, little research exists regarding the mechanism through which business analytics can be used to improve decision-making effectiveness (DME) at the organizational level. Drawing on the information processing view and contingency theory, this paper develops a research model linking business analytics to organizational DME. The research model is tested using structural equation modeling based on 740 responses collected from U.K. businesses. The key findings demonstrate that business analytics, through the mediation of a data-driven environment, positively influences information processing capability, which in turn has a positive effect on DME. The findings also demonstrate that the paths from business analytics to DME have no statistical differences between large and medium companies, but some differences between manufacturing and professional service industries. Our findings contribute to the business analytics literature by providing useful insights into business analytics applications and the facilitation of data-driven decision making. They also contribute to manager's knowledge and understanding by demonstrating how business analytics should be implemented to improve DM
    corecore