44 research outputs found

    Evaluating cost taxonomies for information systems management

    Get PDF
    The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much of their effort on the benefits achievable from the adoption of new technology, as it is often not in the interest of key stakeholders to spend too much time considering the wider cost and risk implications of enterprise-wide technology adoptions. In identifying a void in the literature, the authors of the paper present a critical analysis of IS-cost taxonomies. In doing so, the authors establish that such cost taxonomies tend to be esoteric and difficult to operationalize, as they lack specifics in detail. Therefore, in developing a deeper understanding of IS-related costs, the authors position the need to identify, control and reduce IS-related costs within the information systems evaluation domain, through culminating and then synthesizing the literature into a frame of reference that supports the evaluation of information systems through a deeper understanding of IS-cost taxonomies. The paper then concludes by emphasizing that the total costs associated with IS-adoption can only be determined after having considered the multi-faceted dimensions of information system investments

    Champagne training on a beer budget

    Get PDF
    [Abstract]: When confronted by rapidly escalating costs for End User Computing (EUC) training and support, the Gold Coast City Council (GCCC) - the local government authority for Australia’s premier tourist destination - took a proactive stance by adopting a low-cost strategy. This strategy has now been in place for about six years and, as shown in this case study, is reaping rewards in terms of productivity increases and technology diffusion. After identifying an appropriate theoretical perspective for the study, this paper describes the EUC training approach taken at GCCC, and investigates its impact on the productivity of the 1500 person workforce. Both the trainees and the trainers were surveyed to evaluate fully this low-cost strategy. Related social issues of empowering the stakeholders are examined and recommendations are made to ensure that this approach will continue to provide champagne training on a beer budget

    Sociotechnical systems as applied to knowledge work

    Get PDF
    This study examines the logic behind choosing variances and the design of forums during the planning of deliberations in non-routine work environments using a Sociotechnical System design approach. This study was accomplished through review and comparison of literature on sociotechnical applications of non-routine, knowledge work environments. The traditional sociotechnical application applied to factory settings with linear and routine work tasks analyzes unit operations within an open system, identifying technical variances that contribute to problems and social roles that control the variances. A new sociotechnical approach has been developed for systems involved in non-routine, knowledge work environments. This approach focuses on deliberations formed around topics, establishes variances that lead to poor deliberations, designs forums that minimize variances and gives control of variances to discretionary coalitions. These results generally support that variances contributing to poor deliberations are well established and that organizations need only identify the key variances that contribute to problems in their system. Organizations need to understand how the key variances affect the development of knowledge and how forums can be designed to enhance deliberations. This study places specific focus on the design of information technology forums that enhance knowledge developmenthttp://www.archive.org/details/sociotechnicalsy00oswaLieutenant, United States NavyApproved for public release; distribution is unlimited

    Enterprise applications: taking the open source option seriously

    Get PDF
    Free and Open Source Software (FOSS) is becoming more popular. Nevertheless most CIOs wouldn’t even consider this option for their enterprise information technology needs. We found that the three main concerns about FOSS have to do with legal issues, costs and support. We propose an initial framework to look at FOSS in a balanced, unbiased and systematic manner that can be used for evaluation of specific scenarios from very small companies to large ones.The past and the future of information systems: 1976-2006 and beyondRed de Universidades con Carreras en Informática (RedUNCI

    Spartan Daily, April 3, 1970

    Get PDF
    Volume 57, Issue 92https://scholarworks.sjsu.edu/spartandaily/5314/thumbnail.jp

    CARE AND THE CONSTRUCTION OF HACKER IDENTITIES, COMMUNITIES, AND SOCIETY

    Get PDF
    Thesis (Ph.D.) - Indiana University, Informatics and Computing, 2016Recent scholarship in Human-Computer Interaction, science and technology studies, and design research has focused on hacker communities as sites of innovation and entrepreneurship, novel forms of education, and the democratization of technological production. However, hacking practices are more than new technical practices; they are also political, value-laden, and ideological practices. The significances of these underlying commitments is less understood not only in academic research, but also within the communities themselves, which tend to profess a libertarian ethos often articulated as apolitical. In this dissertation, I investigate how the process of developing a hacker identity within a hacker community is influenced not only by technical skill, but also by care and community maintenance practices. By studying their projects, community interactions, and social policies, I explore how the broader hackerspace movement unintentionally but systematically excludes broader participation. I leverage several qualitative methods to create a well-rounded account of the hacker identity development process, including: an interview study of hackers’ projects; a 19-month ethnography in a hackerspace; and an analysis of the most-discussed issues on the international hackerspaces.org Discuss listserv. I analyzed these data through a lens informed by care ethics, foregrounding the interdependent, nurturing relationships hackers develop, and explicating the duties to care that are felt and acted on—but rarely discussed—in these spaces. I present results suggesting that developing a hacker identity can be a vulnerable process, and is both supported and made difficult by the social environment in these communities. While critical to a hackerspace’s success, care and maintenance practices are often overshadowed by rhetoric of self-empowerment and independence. As a result, it becomes difficult for women and minorities to join and fit in, despite members’ best intentions. These results have implications for research on hackerspaces, for hackerspaces themselves, and for analyses of care in such communities

    Network Computer Technology. Phase I: Viability and Promise within NASA's Desktop Computing Environment

    Get PDF
    Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture

    Predictive and Prescriptive Analytics in Business Decision Making: Needs and Concerns

    Full text link
    Business users make data-informed decisions by understanding the relationships between their data and business outcomes, typically tracked by key performance indicators (KPIs). To this end, they evaluate different decision scenarios, often using what-if analyses, which can benefit from predictive and prescriptive analytics (PPA). However, incorporating PPA into data analysis systems in a way that is easy to use and understand by business users can be challenging. Numerous studies have examined how data analysts use simple predictive analytics. However, there is little systematic understanding and empirical data on business users' analysis practices for decision-making and the effectiveness of various PPA affordances in facilitating their analysis. To address this gap, we conduct a study with 22 business users to better understand their workflows and elicit feedback on the effectiveness of four example PPA functionalities in business data analysis. We find that business users can't depend on data analysts for their data analysis due to four reasons: the limited availability of data analysts in enterprises, the inefficiency of communicating with data analysts, the business pressure to make quick decisions, and the importance of incorporating domain knowledge, which data analysts often lack. We also find that business users rely on interactive manual analysis using spreadsheet-like applications, which makes coping with large, live, and complex datasets difficult. While business users don't use PPA directly, their data analysis needs suggest that they can benefit from it. We also find that PPA functionalities can increase business users' decision-making speed and confidence. Additionally, our results suggest that they need help in PPA-driven analysis for preparing datasets, understanding the risk factors of recommendations, and incorporating their domain knowledge.Comment: Submitted to EuroVis'2

    Enterprise applications: taking the open source option seriously

    Get PDF
    Free and Open Source Software (FOSS) is becoming more popular. Nevertheless most CIOs wouldn’t even consider this option for their enterprise information technology needs. We found that the three main concerns about FOSS have to do with legal issues, costs and support. We propose an initial framework to look at FOSS in a balanced, unbiased and systematic manner that can be used for evaluation of specific scenarios from very small companies to large ones.The past and the future of information systems: 1976-2006 and beyondRed de Universidades con Carreras en Informática (RedUNCI

    SCALED APPROACH TO OPEN SOURCING DEPARTMENT OF THE NAVY PRODUCED SOFTWARE

    Get PDF
    The Department of Defense (DoD) must continue to develop, sustain, and update its software-based capabilities. For the Department of the Navy (DoN), the life cycle costs of software continue to grow; over time, developing code will not be cost effective. An alternative to developing code is to further integrate open source software (OSS) into DoN programs. OSS is software that grants users the ability to view, use, and change the software source code. The use of OSS has been extensively researched, as addressed in the MITRE Corporation’s study on free and open source software (FOSS) in the DoD, completed in 2003. Despite favorable reports and published DoD policy, and the widespread successful use of OSS in current software, program managers are reluctant to fully integrate OSS into the DoN due to concerns with legal requirements, cybersecurity, total expenses, and the ability to implement and control OSS on classified systems while adhering to security regulations. This study utilized a quantitative, scaled approach to determine the risks and benefits to open sourcing for all DoN software. Several OSS case studies were examined. This research concluded that while OSS has been tested and proven cost-effective in certain areas of the DoN, it may not be the most efficient solution for all DoN projects. Therefore, the DoN should consider further implementation of OSS in security, software development, infrastructure support, and for program lifecycle cost reductions.DoN Secretariat Historianhttp://archive.org/details/scaledapproachto1094560404Captain, United States Marine CorpsCaptain, United States Marine CorpsApproved for public release; distribution is unlimited
    corecore