4,184 research outputs found

    Models and their Foundational Framework

    Get PDF
    The term model is mainly used in two meanings which are considered to be different: a model of a problem domain as a conceptualisation; a model of a set of formulas as an interpretation in which every formula within this set is true. A general theory of models has not yet been developed. H. Stachowiak proposes a phenomenal approach and ‘defines’ models by their properties of mapping, truncation and pragmatics. Meanwhile, a notion of the model has been developed. At the same time, it seems that there are rather different understandings of model in sciences and especially Mathematical Logics. Sciences treat models as reflections of origins. Mathematical logics considers models as an instantiation in which a set of statements is valid. So, mathematical model theory is often considered to be a completely different approach to modelling. We realise however that mathematical model theory is only a specific kind of modelling. We show that the treatment of models in logics and in sciences can be embedded into a more general framework. So, the theory of models is based on a separation of concern or orientation

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.

    Collaboration and Coordination in Process-Centered Software Development Environments

    Get PDF

    Early aspects: aspect-oriented requirements engineering and architecture design

    Get PDF
    This paper reports on the third Early Aspects: Aspect-Oriented Requirements Engineering and Architecture Design Workshop, which has been held in Lancaster, UK, on March 21, 2004. The workshop included a presentation session and working sessions in which the particular topics on early aspects were discussed. The primary goal of the workshop was to focus on challenges to defining methodical software development processes for aspects from early on in the software life cycle and explore the potential of proposed methods and techniques to scale up to industrial applications

    Affordances and Information Systems Research: Taking Stock and Moving Forward

    Get PDF
    The term affordance appears with increasing frequency in the Information Systems (IS) literature. Nevertheless, those who study information technologies/information systems (IT/IS) via the affordance lens often have different views about its origin, meaning, and appropriate application in IS research. In turn, not spelling out the related assumptions and boundaries inherent in these diverse views may have hindered a wider and more cumulative adoption of the affordance lens in IS research. This paper offers a potential solution by (1) synthesizing the ecological psychology literature to suggest five key modules of the affordance concept relevant to IS research and (2) taking stock of IS research that has employed the affordance concept and classifying it according to its focus on three key affordance elements: IT artifact, user, and context. Finally, this paper presents a set of challenges, opportunities, and recommendations regarding how IS researchers can advance affordance-based research in the field

    Understanding Behavioral Sources of Process Variation Following Enterprise System Deployment

    Get PDF
    This paper extends the current understanding of the time-sensitivity of intent and usage following large-scale IT implementation. Our study focuses on perceived system misfit with organizational processes in tandem with the availability of system circumvention opportunities. Case study comparisons and controlled experiments are used to support the theoretical unpacking of organizational and technical contingencies and their relationship to shifts in user intentions and variation in work-processing tactics over time. Findings suggest that managers and users may retain strong intentions to circumvent systems in the presence of perceived task-technology misfit. The perceived ease with which this circumvention is attainable factors significantly into the timeframe within which it is attempted, and subsequently impacts the onset of deviation from prescribed practice and anticipated dynamics

    An Affordance-based Approach for Assessing Effective Use of Health Management Information Systems in Low-Resources Context

    Get PDF
    Assessing effective use of health Management information systems (HMIS) in low-resource settings is critical to improving public health. However, mainstreaming information systems into daily practice can be challenging in dynamic, isolated settings where technology adoption is often not a priority. It is essential to design tools that address user needs and are deemed useful. In this paper, we propose a generic framework that applies effective use theory and affordance actualization theory to assess how HMIS are used efficiently in organizations and identify areas operational vulnerabilities. The proposed study uses a mixed-methods approach to data collection and analysis. This framework contributes to the information systems utilization literature by providing a method for contextualizing the assessment of effective utilization by giving relevance to specific information management tasks. From a practical perspective, it aims to guide information systems practitioners in low-resource environments in strengthening their digital organizational information systems

    Media Presence and Inner Presence: The Sense of Presence in Virtual Reality Technologies

    Get PDF
    Abstract. Presence is widely accepted as the key concept to be considered in any research involving human interaction with Virtual Reality (VR). Since its original description, the concept of presence has developed over the past decade to be considered by many researchers as the essence of any experience in a virtual environment. The VR generating systems comprise two main parts: a technological component and a psychological experience. The different relevance given to them produced two different but coexisting visions of presence: the rationalist and the psychological/ecological points of view. The rationalist point of view considers a VR system as a collection of specific machines with the necessity of the inclusion \ud of the concept of presence. The researchers agreeing with this approach describe the sense of presence as a function of the experience of a given medium (Media Presence). The main result of this approach is the definition of presence as the perceptual illusion of non-mediation produced by means of the disappearance of the medium from the conscious attention of the subject. At the other extreme, there \ud is the psychological or ecological perspective (Inner Presence). Specifically, this perspective considers presence as a neuropsychological phenomenon, evolved from the interplay of our biological and cultural inheritance, whose goal is the control of the human activity. \ud Given its key role and the rate at which new approaches to understanding and examining presence are appearing, this chapter draws together current research on presence to provide an up to date overview of the most widely accepted approaches to its understanding and measurement
    • 

    corecore