8 research outputs found

    Fears and Triggers: A Conceptual Study of Vendor-Supplied Maintenance and Maintenance Deferral of Standard Package Software

    Get PDF
    Enterprises rely more on Information Systems (IS) and software than ever before. However the issue of maintaining a vendor-supplied IS, in particular standard packaged software, has been poorly represented within academic literature. This paper presents a conceptual study that synthesises the current state of research concerning the deferral or execution of vendor-supplied maintenance by the purchasing organisation. Based on a systematic review process that adopts the purchaser’s viewpoint, a series of fears and triggers emerge and are captured from the literature. Fears are articulated as reasons for the purchasing organisation deferring the installation of vendor-supplied maintenance, whereas triggers are events that upset the equilibrium of the purchasing organisation’s IS or software and require the installation of the vendor-supplied maintenance to proceed. Although prevalent in literature, fears and triggers have not previously been recognised as an area of focus for academic research

    A Conceptual Investigation of Maintenance Deferral and Implementation: Foundation for a Maintenance Lifecycle Model

    Get PDF
    Despite the fact that society and organizations rely heavily on Information Systems (IS) and software, the maintenance of vendor-supplied IS, in particular standard package software has gained little attention within the academic literature. This paper presents a conceptual study of the current state of research concerning the reasons for deferral and performance of vendor-supplied maintenance by the purchasing organization. These reasons have so far neither been investigated together nor from that perspective. Based on a systematic literature review and taking the purchaser’s viewpoint, reasons for maintenance deferral and performance are identified from the literature. They build the groundwork and foundation for a Maintenance Lifecycle and Process Model that provides a starting point to research vendor-supplied maintenance from the customer’s point of view

    If it ain’t broke, don’t fix it : An Abductive and Contextual Exploration of Maintenance Deferral

    Get PDF
    Objective: To create academic insights into how organisations approach and manage the maintenance of vendor-supplied information systems software. Approach: Three iterations of the Peircean Abduction methodology lead to the identification, conceptualisation, and application of new knowledge in vendor-supplied Information Systems (IS) maintenance deferral by means of undertaking a qualitative multiple-case study. The research goals are achieved through the appropriation and application of theories from Peircean Abduction and Systemic Functional Linguistics. Research questions: The following abductive statement is created through the application of the Peircean Abduction methodology: The surprising observation, “some organisations, having invested in a vendor-supplied IS software solution, defer the implementation of vendor-supplied maintenance”, is made; However, if “the existence of deterrents to maintenance, requiring a trigger event before the implementation of maintenance” were true, then “maintenance deferral” would be a matter of course. Hence there is a reason to suspect that “the existence of both deterrents, and of triggers” is true. From this abductive statement, three research questions are deduced. The first research question investigates the existence, characteristics and influence of deterrents; the second question investigates the existence, characteristics and influence of triggers. As a consequence of this approach, the final question provides a general understanding of IS maintenance deferral. Methodology: Following the implementation of a systematic literature review methodology, six themes are identified: 1. an acknowledgement that problems exist when considering vendor-supplied software maintenance; 2. deterrents as a driver in behaviour; 3. the occurrence of tipping-points which require vendor-supplied maintenance to be undertaken; 4. the consequences of deferral; 5. the value of maintenance; and 6. the formalisation of a maintenance lifecycle. Taking the insights arising from the systematic literature review, a multiple-case study following the pragmatic framework is constructed from data collected interviewing twelve participants across a diverse set of ten organisations. An abductive approach to this research topic creates opportunities for a comprehensive, well-grounded exploratory contribution to a scarcely investigated research domain. Major findings: The translation of Peircean abduction to an interpretative context generates a rich and substantive contribution to theory and practice. The existence of both deterrents and triggers are strongly supported, leading to the conclusion that maintenance deferral is a matter of course. The development of a new abductive and Systemic Functional Linguistic model enhances the knowledge of maintenance deferral and allows refinement of historical IS maintenance models. Finally, the application of Systems Thinking situates insights from the application of their mode within their respective organisational environments

    “Be a Pattern for the World”: The Development of a Dark Patterns Detection Tool to Prevent Online User Loss

    Get PDF
    Dark Patterns are designed to trick users into sharing more information or spending more money than they had intended to do, by configuring online interactions to confuse or add pressure to the users. They are highly varied in their form, and are therefore difficult to classify and detect. Therefore, this research is designed to develop a framework for the automated detection of potential instances of web-based dark patterns, and from there to develop a software tool that will provide a highly useful defensive tool that helps detect and highlight these patterns

    Minding the Gap: Computing Ethics and the Political Economy of Big Tech

    Get PDF
    In 1988 Michael Mahoney wrote that “[w]hat is truly revolutionary about the computer will become clear only when computing acquires a proper history, one that ties it to other technologies and thus uncovers the precedents that make its innovations significant” (Mahoney, 1988). Today, over thirty years after this quote was written, we are living right in the middle of the information age and computing technology is constantly transforming modern living in revolutionary ways and in such a high degree that is giving rise to many ethical considerations, dilemmas, and social disruption. To explore the myriad of issues associated with the ethical challenges of computers using the lens of political economy it is important to explore the history and development of computer technology

    Technical Debt is an Ethical Issue

    Get PDF
    We introduce the problem of technical debt, with particular focus on critical infrastructure, and put forward our view that this is a digital ethics issue. We propose that the software engineering process must adapt its current notion of technical debt – focusing on technical costs – to include the potential cost to society if the technical debt is not addressed, and the cost of analysing, modelling and understanding this ethical debt. Finally, we provide an overview of the development of educational material – based on a collection of technical debt case studies - in order to teach about technical debt and its ethical implication

    Proceedings of the ETHICOMP 2022: Effectiveness of ICT ethics - How do we help solve ethical problems in the field of ICT?

    Get PDF
    This Ethicomp is again organized in exceptional times. Two previous ones were forced to turn to online conferences because of Covid-pandemic but it was decided that this one would be the physical one or cancelled as the need for real encounters and discussion between people are essential part of doing philosophy. We need possibility to meet people face to face and even part of the presentation were held distance–because of insurmountable problems of arriving by some authors– we manage to have real, physical conference, even the number of participants was smaller than previous conferences.The need of Ethicomp is underlined by the way world nowadays is portrayed for us. The truthfulness and argumentation seem to be replaced by lies, strategic games, hate and disrespect of humanity in personal, societal and even global communication. EThicomp is many times referred as community and therefore it is important that we as community do protect what Ethicomp stands for. We need to seek for goodness and be able to give argumentation what that goodness is. This lead us towards Habermass communicative action and Discourse ethics which encourages open and respectful discourse between people (see eg.Habermass 1984;1987;1996). However, this does not mean that we need to accept everything and everybody. We need to defend truthfulness, equality and demand those from others too. There are situations when some people should be removed from discussions if they neglect the demand for discourse. Because by giving voice for claims that have no respect for argumentation, lacks the respect of human dignity or are not ready for mutual understanding (or at least aiming to see possibility for it) we cannot have meaningful communication. This is visible in communication of all levels today and it should not be accepted, but resisted. It is duty of us all.</p

    Risks of neglecting infrastructure

    No full text
    corecore