9,755 research outputs found

    Social Protocols for Agile Virtual Teams, in

    Get PDF
    Abstract. Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model

    Intangible trust requirements - how to fill the requirements trust "gap"?

    Get PDF
    Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements

    Advanced Cyberinfrastructure for Science, Engineering, and Public Policy

    Full text link
    Progress in many domains increasingly benefits from our ability to view the systems through a computational lens, i.e., using computational abstractions of the domains; and our ability to acquire, share, integrate, and analyze disparate types of data. These advances would not be possible without the advanced data and computational cyberinfrastructure and tools for data capture, integration, analysis, modeling, and simulation. However, despite, and perhaps because of, advances in "big data" technologies for data acquisition, management and analytics, the other largely manual, and labor-intensive aspects of the decision making process, e.g., formulating questions, designing studies, organizing, curating, connecting, correlating and integrating crossdomain data, drawing inferences and interpreting results, have become the rate-limiting steps to progress. Advancing the capability and capacity for evidence-based improvements in science, engineering, and public policy requires support for (1) computational abstractions of the relevant domains coupled with computational methods and tools for their analysis, synthesis, simulation, visualization, sharing, and integration; (2) cognitive tools that leverage and extend the reach of human intellect, and partner with humans on all aspects of the activity; (3) nimble and trustworthy data cyber-infrastructures that connect, manage a variety of instruments, multiple interrelated data types and associated metadata, data representations, processes, protocols and workflows; and enforce applicable security and data access and use policies; and (4) organizational and social structures and processes for collaborative and coordinated activity across disciplinary and institutional boundaries.Comment: A Computing Community Consortium (CCC) white paper, 9 pages. arXiv admin note: text overlap with arXiv:1604.0200

    Agile Professional Virtual Community Inheritance via Adaptation of Social Protocols

    Full text link
    Support for human-to-human interactions over a network is still insufficient, particularly for professional virtual communities (PVC). Among other limitations, adaptation and learning-by-experience capabilities of humans are not taken into account in existing models for collaboration processes in PVC. This paper presents a model for adaptive human collaboration. A key element of this model is the use of negotiation for adaptation of social protocols modelling processes. A second contribution is the proposition of various adaptation propagation strategies as means for continuous management of the PVC inheritance.Comment: 15 pages, 3 figure

    Execution: the Critical “What’s Next?” in Strategic Human Resource Management

    Get PDF
    The Human Resource Planning Society’s 1999 State of the Art/Practice (SOTA/P) study was conducted by a virtual team of researchers who interviewed and surveyed 232 human resource and line executives, consultants, and academics worldwide. Looking three to five years ahead, the study probed four basic topics: (1) major emerging trends in external environments, (2) essential organizational capabilities, (3) critical people issues, and (4) the evolving role of the human resource function. This article briefly reports some of the study’s major findings, along with an implied action agenda – the “gotta do’s for the leading edge. Cutting through the complexity, the general tone is one of urgency emanating from the intersection of several underlying themes: the increasing fierceness of competition, the rapid and unrelenting pace of change, the imperatives of marketplace and thus organizational agility, and the corresponding need to buck prevailing trends by attracting and, especially, retaining and capturing the commitment of world-class talent. While it all adds up to a golden opportunity for human resource functions, there is a clear need to get to get on with it – to get better, faster, and smarter – or run the risk of being left in the proverbial dust. Execute or be executed

    Managing Risk Areas in Software Development Offshoring: A CMMI Level 5 Case

    Get PDF
    Software companies are increasingly offshoring development to countries with high expertise at lower cost. Offshoring involves particular risk areas that, if ignored, increase the likelihood of failure. However, the offshoring client’s maturity level may influence the management of these risk areas. Against this backdrop, we present an interpretive case study on how managers perceive and mitigate the risk areas in software development offshoring with a mature capability maturity model integration (CMMI) level 5 software company as the client. We found that managers perceived and mitigated most of the offshoring risk areas in accordance with the findings of previous research. However, the risk area of task distribution was a notable exception. In this case, managers perceived high task uncertainty, equivocality, and coupling across sites as risk mitigation rather than risk taking. The paper discusses how and why managers perceived and mitigated the risk areas in this way and the implications for theory and practice in software development offshoring

    Assessing the Impact of the COVID-19 Pandemic on Project Management Methodologies

    Get PDF
    This research paper explores the impact of COVID-19 and the shift to remote work on project management practices across multiple industries. Through interviews with project managers, the study finds that companies with pre-existing remote work policies were better equipped to handle the transition to remote work. In contrast, companies without pre-existing policies faced increased challenges in communication, team morale, and workload management. The study also highlights the struggle to maintain work-life balance, the importance of communication, and the need to address technical difficulties. Project managers emphasized the importance of accountability and maintaining productivity during remote work. Overall, the study finds a positive shift in the collective outlook on remote work, with employees expressing a strong preference to continue working remotely even after the pandemic. The study emphasizes the evolving role of project managers in adopting a holistic approach to resolving interpersonal and managerial issues within teams during remote work
    • …
    corecore