85 research outputs found

    Human-to-Human Interaction: the Killer Application of Ubiquitous Computing

    Get PDF
    Twenty-five years past the Weiser\u2019s vision of Ubiquitous Computing, and there is not a clear understanding of what is or is not a pervasive system. Due to the loose boundaries of such paradigm, almost any kind of remotely ac-cessible networked system is classified as a pervasive system. We think that that is mainly due to the lack of killer applications that could make this vi-sion clearer. Actually, we think that the most promising killer application is already here, but we are so used to it that we do not see it, as a perfect fitting of the Weiser\u2019s vision: the Human-to-Human Interaction mediated by com-puters

    IT-adoption and the interaction of task, technology and individuals: a fit framework and a case study

    Get PDF
    BACKGROUND: Factors of IT adoption have largely been discussed in the literature. However, existing frameworks (such as TAM or TTF) are failing to include one important aspect, the interaction between user and task. METHOD: Based on a literature study and a case study, we developed the FITT framework to help analyse the socio-organisational-technical factors that influence IT adoption in a health care setting. RESULTS: Our FITT framework ("Fit between Individuals, Task and Technology") is based on the idea that IT adoption in a clinical environment depends on the fit between the attributes of the individual users (e.g. computer anxiety, motivation), attributes of the technology (e.g. usability, functionality, performance), and attributes of the clinical tasks and processes (e.g. organisation, task complexity). We used this framework in the retrospective analysis of a three-year case study, describing the adoption of a nursing documentation system in various departments in a German University Hospital. We will show how the FITT framework helped analyzing the process of IT adoption during an IT implementation: we were able to describe every found IT adoption problem with regard to the three fit dimensions, and any intervention on the fit can be described with regard to the three objects of the FITT framework (individual, task, technology). We also derive facilitators and barriers to IT adoption of clinical information systems. CONCLUSION: This work should support a better understanding of the reasons for IT adoption failures and therefore enable better prepared and more successful IT introduction projects. We will discuss, however, that from a more epistemological point of view, it may be difficult or even impossible to analyse the complex and interacting factors that predict success or failure of IT projects in a socio-technical environment

    Impact of internet of things (IoT) in disaster management: a task-technology fit perspective

    Get PDF
    YesDisaster management aims to mitigate the potential damage from the disasters, ensure immediate and suitable assistance to the victims, and attain effective and rapid recovery. These objectives require a planned and effective rescue operation post such disasters. Different types of information about the impact of the disaster are, hence, required for planning an effective and immediate relief operation. The IoT technology available today is quite mature and has the potential to be very useful in disaster situations. This paper analyzes the requirements for planning rescue operation for such natural disasters and proposes an IoT based solution to cater the identified requirements. The proposed solution is further validated using the task-technology fit (TTF) approach for analyzing the significance of the adoption of IoT technology for disaster management. Results from the exploratory study established the core dimensions of the task requirements and the TTF constructs. Results from the confirmatory factor analysis using PLS path modelling, further, suggest that both task requirements and IoT technology have significant impact on the IoT TTF in the disaster management scenario. This paper makes significant contributions in the development of appropriate constructs for modeling TTF for IoT Technology in the context of disaster management

    Panel: IS journals in which Europeans should publish more

    No full text
    Previous research has determined that women and men process information differently and have unique values. These findings are further confirmed in the context of online shopping where women are known to have diverse preferences from men related to website design, and different sentiments regarding website trust and security. Yet despite these known differences, relatively there is little research has examined gender and website design. Further, although online shoppers hail from all corners of the globe, no research has examined gender differences concerning website design in a multicultural sample. To fill this gap, the current investigation examined differences between men and women with a focus on trust, satisfaction, loyalty, and website design in eight countries. Results demonstrate significant differences between men and women on all variables tested. Further analyses of four of the countries in the sample (China, Canada, the United States, and Germany) are compared related to socio-cultural values for masculinity-femininity. As expected, countries more alike on this dimension exhibited more similarities in terms of gender comparisons. All hypotheses in the study are supported. Suggestions are made regarding avenues for future research
    • …
    corecore