122 research outputs found

    Learning for professional competence in an IS context

    Get PDF

    Tomorrow is Another Day: Information Systems Governance

    Get PDF
    In many organizations, the Chief Information Officer is considered to preside over a separate function, providing a service to the business. Discussions about governance are confined to properties of this service, e.g. through a service level agreement. Members of the CIO’s staff are often seen as technical experts possessing esoteric skills desired but not understood by other staff. Many researchers have observed a need for businesses to avoid such fragmentation to reap the full benefits of investment in ICT’s. However, this research is itself often fragmented – focusing sometimes on software, sometimes on architectures. This paper argues that IS governance should form an integral part of strategic business management. We advocate a shift of perspective in management of IS, from leadership to facilitation. People at all levels require empowerment and support to develop their own IS ‘capability’; to make the best use of available technologies and information in context. There is evidence to show that input from a wider community within organizations can lead to an improved realization of value from information technology. The paper will discuss methods which can provide appropriate support for individuals to achieve this

    Systems Analysis: Exploring the Spectrum of Diversity

    Get PDF
    Complex problem spaces, such as those addressed by knowledge management or systems analysis projects, call for complex methods of inquiry. A phenomenon in contextual analysis means that there is a need to go beyond consensus and recognized ‘best practice’. As part of a complex method, for contextual analysis, inter-analysis may be conducted, in which individuals explore one another’s perspectives by discussing individually-created narratives. The purpose is not to seek consensus, but to focus on diversity in viewpoints among participants. In this paper, the authors present an approach in which multiple modelling of problem experiences can bring about shifts of perspectives, create new insights and help deepened understandings to emerge. Techniques are presented that support participants to keep an overview of diversity of in-depth inquiries, while not suffocating under information overload due to the large number of narratives. Participants identify clusters of similar/dissimilar narratives in order to limit the number, but not the range of alternative perspectives. The techniques presented are formally described to promote development of decision support systems

    KP-LAB Knowledge Practices Laboratory -- Specification of end-user applications

    Get PDF
    deliverablesThe present deliverable provides a high-level view on the new specifications of end user applications defined in the WPII during the M37-M46 period of the KP-Lab project. This is the last in the series of four deliverables that cover all the tools developed in the project, the previous ones being D6.1, D6.4 and D6.6. This deliverable presents specifications for the new functionalities for supporting the dedicated research studies defined in the latest revision of the KP-Lab research strategy. The tools addressed are: the analytic tools (Data export, Time-line-based analyser, Visual analyser), Clipboard, Search, Versioning of uploadable content items, Visual Model Editor (VME) and Visual Modeling Language Editor (VMLE). The main part of the deliverable provides the summary of tool specifications and the description of the Knowledge Practices Environment architecture, as well as an overview of the revised technical design process, of the tools’ relationship with the research studies, and of the driving objectives and the high-level requirements relevant for the present specifications. The full specifications of tools are provided in the annexes 1-9

    On the complexity of collaborative cyber crime investigations

    Get PDF
    Peter M. Bednar, Vasilios Katos and Cheryl Hennell consider the various issues relating to investigating cyber crimes, and suggests a methodology that might prove to be helpful in dealing with such complex criminal investigations
    corecore