605 research outputs found

    Standardization of references using Hidden Markov Model

    Full text link
    In general, technical papers are augmented with a list of bibliographic citations to support the arguments and the merits of the approach presented. Each and every citation is made up of parts like author, journal, volume, book etc. Extracting the parts of the citation from a written document and properly separating into its parts is the problem that is being addressed in this thesis; We use an Information Extraction (IE) technique based on Hidden Markov Model (HMM) to solve this problem. This solution consists of the design of an HMM, the training of the HMM with tagged data, and an implementation of Forward Chaining algorithm for extraction of citation parts. Our test on a collection of 150 citations has recall and precision of 0.8 and 0.81 respectively

    Balancing Rigor and Relevance in IS Research: Strategies, Tactics, and Recommendations

    Get PDF
    With the advent of the digital economy, firms are increasingly relying on information technologies for shaping their business strategies, organization capabilities, structures, and processes, and relationships with their business partners. Disruptions in the traditional means of competition and the use of information technologies for creating new business strategies and customer relationships imply that tremendous uncertainty exists about the best means for utilizing IT to shape effective managerial practice. Therefore, a considerable opportunity exists for IS academics to contribute to, and shape, IT management practice. Yet, the history of prior contributions by IS researchers toward being relevant to practice has been questioned by several prominent researchers (see the March, 1999 issue of MIS Quarterly for a variety of commentaries). While IS researchers have been acknowledged to have improved the rigor of their research, the grades for contributions to practice have been uneven. However, several IS researchers have adopted research strategies and philosophies that balance rigor and relevance in their research programs. Such research often starts with issues that are grounded in the domain of contemporary management practice or out of an anticipation of the future IT-shaped management practice. Such research also brings rigor to bear in the form of connections with theory, application of scientific and proven research methodologies, and creative application of the scientific methodology in analysis and interpretation of the findings. Finally, such researchers collaborate with practicing managers in developing interpretations of their findings and in developing guidelines that are likely to be valued by IS managers and applied in practice. Few researchers have succeeded in shaping their careers and research programs that balance rigor and relevance. Designing and executing such research programs is challenging. Few scholars acknowledge the challenges in balancing attention to the two, or, more importantly, share strategies and tactics for shaping such research projects. This panel brings together a group of researchers from North America and Europe who have significant experience in practice-oriented research and have made valuable contributions to both IS practice and academic journals out of their research. The panelists will address the following questions: 1. What are the challenges in balancing rigor and relevance? 2. What is the researchers’ personal philosophy and motivation for balancing rigor and relevance? 3. What strategies and tactics have they adopted? 4. What lessons have been learned through their experiences in balancing rigor and relevance

    Organizational Competencies for Managing Investments in Visionary Applications of Information Technology

    Get PDF
    Despite the noted potential of information technology (IT) for enhancing organizational effectiveness (Boynton and Victor 1991; Venkatraman 1991), few fm-ns seem to have achieved consistent success in deploying IT in ways that fundamentally alter industry practices or existing work processes associated with value chain activities and customer interactions (McKenney 1995). Prior IS research has focused attention on the impacts and organizational drivers associated with strategic applications of IT (Sabherwal and King 1995). The main objective of such applications is the seizing of competitive advantage in the marketplace. The focus of this researchisuponapplicationsoflTthatarebroaderinorganizationalscope: whiletheirultimategoalmightbetheattainmentofmarket advantages, their immediate focus might be on the enhancement of business competence with respect to managerial decision-making, customer service, manufacturing management, or launching of a variety of value-added products and services. In order to distinguish such strategic applications of IT, we term them as visionary applications of IT. We consider them to be different from strategic applicationsoflTintworespects: (i)whilevisionaryapplicationsareaimedattheaugmentationofbusinesscompetencies,strategic applications are often targeted on exploiting market or competitive advantage opportunities and (ii) visionary applications are usually driven by the visionary insight of a senior business executive and exhibit an enterprise-wide flavor in their implementation scope, whereas strategic applications often arise in business units and are restricted to a specific market or business in their implementation scope

    Creating Business Value Through Information Technology: The Effects of Chief Information Officer and Top Management Team Characteristics

    Get PDF
    In this research, we examined the effects of (1) business-related and strategic IT-related knowledge of the chief information officer (CIO) and the top management team (TMT) and (2) engagements between the CIO and members of the top management team on firms’ success in using information technology (IT) to support their business strategies and value-chain activities. Using a cross-sectional field study of 169 companies, our research found that CIOs with high strategic IT and business-related knowledge enjoyed significantly greater participation in top management teams. Further, CIO’s strategic IT and business knowledge and their participation in top management teams influenced their firms’ extent of IT deployment in business strategies and value-chain activities. The strength of these relationships was most prominent where firms viewed information technology’s role as fundamentally transforming their business processes or industry structure. Further, interestingly, we found no direct impact of the top management team’s IT knowledge or reporting relationship of the CIO with the CEO on the firms’ extent of IT deployment

    The Effects of Knowledge Embeddedness on the Diffusion of Case Technologies within Organizations

    Get PDF
    Systems development in organizations is well recognized as a knowledge-intensive effort. Since the relevant application domain knowledge is thinly spread across an organization, the acquisition, sharing, and integration of knowledge are significant activities during the development process. Advocates of computer-aided software engineering tools (CASE) claim that these tools offer a potentially valuable feature/\u27or facilitating such knowledge integration and management activities: the central repository\u27, which is a location for storing, retrieving, and maintaining a variety of applications development information. Yet, the effects of the CASE repository on the diffusion of the technology have received limited attention in prior research. This study exmnines whether the embedding ofapplications developmentknowledge withintheCASErepositoryinfluencesthediffusionoftheCASE technologyacross apphcations projects in organizations. We develop a consmmt called knowledge embeddedness, which refers to the extent to which relevant applications development knowledge is systematically populated within the CASE repository. Based on data gathered from 168 organizations, through a large-sample survey of CASE user groups, we found strong support for the relationship between kalowledge embeddedness and diffusion of CASE technology. These results have interesting implications for future research and practice

    How CIOs Can Enable Governance of Value Nets

    Get PDF
    Value nets are the architecture of sourcing agreements and alliances that firms implement to gain complementary resources and capabilities from other firms. They are a source of innovation, growth, and competitive success. However, governing value nets is challenging, and the IT support needed to enable them depends on the governance mode a firm chooses. Based on case studies of three Fortune 100 firms, we define three governance modes—prescriptive, evaluative, and collaborative. Prescriptive governance specifies partners\u27 activities and retains decisions rights. It is effectively supported by dashboards that monitor the status of partners\u27 activities, alerts that surface exceptions and errors, business rules that automate activities and handling of errors, and extended enterprise architectures that protect intellectual property. Evaluative governance delegates decision rights to partners for operational execution and assesses their capabilities through periodic evaluations. It is effectively supported by loosely coupled processes that provide partners with limited autonomy, periodic reporting of performance on service level agreements, and data and process mining directed at improving partners\u27 capabilities. Collaborative governance promotes peer-to-peer collaboration with value net partners. It is supported by metadata architectures that control repositories of information and process resources, by consistent business rules to coordinate processes, by monitoring of the total costs of the relationship, and by business intelligence for predictive monitoring. CIOs and senior IT executives can apply these findings to choose an appropriate governance mode and enable it with appropriate IT applications and processes
    • …
    corecore