255 research outputs found
Monitoring Remote Employees at FinPro
In response to the coronavirus disease of 2019 (COVID-19) pandemic, governments across the world have issued containment and mitigation restrictions to hinder the disease from spreading. To sustain operations and ensure continuity, businesses moved to remote working for their employees. To better hold work-from-home (WFH) employees accountable, employers have begun to use monitoring software, including emotion recognition software, to track employee productivity, their compliance with information security policy, and so on. This paper presents a teaching case based on a fictitious company inspired by the actual experiences of employees working at a global financial services provider. Educators worldwide in information systems or business courses can use the teaching case at the undergraduate or graduate level. The case introduces students to Financial Professional Services (âFinProâ), a fictitious American firm that makes the decision to monitor remote employees. It implements both software that records and controls end user activity and emotion recognition software. The teaching case overviews artificial intelligence and emotion recognition software and provides an opportunity for students to examine employersâ and employeesâ different perspectives regarding monitoring
Three-body encounters in the Galactic centre: the origin of the hypervelocity star SDSS J090745.0+024507
Hills (1988) predicted that runaway stars could be accelerated to velocities
larger than 1000 km/s by dynamical encounters with the supermassive black hole
(SMBH) in the Galactic center. The recently discovered hypervelocity star SDSS
J090745.0+024507 (hereafter HVS) is escaping the Galaxy at high speed and could
be the first object in this class. With the measured radial velocity and the
estimated distance to the HVS, we trace back its trajectory in the Galactic
potential. Assuming it was ejected from the center, we find that a 2
mas/yr proper motion is necessary for the star to have come within a few
parsecs of the SMBH. We perform three-body scattering experiments to constrain
the progenitor encounter which accelerated the HVS. As proposed by Yu &
Tremaine (2003), we consider the tidal disruption of binary systems by the SMBH
and the encounter between a star and a binary black hole, as well as an
alternative scenario involving intermediate mass black holes. We find that the
tidal disruption of a stellar binary ejects stars with a larger velocity
compared to the encounter between a single star and a binary black hole, but
has a somewhat smaller ejection rate due to the greater availability of single
stars.Comment: 6 pages, 7 figures, 1 table, accepted for publication in MNRA
MEET THE EDITORS
The âMeet the Editorsâ panel session provides attendees with an opportunity to meet journal editors or representatives, from the Senior Scholars\u27 Basket of Eight Journals and leading international IS journals, who share key points about the journals. The panel targets active researchers interested in learning about possible publication opportunities. The perspectives provided are intended to assist researchers targeting the journals for publication consideration. Attendees benefit by asking questions about manuscript preparation, submission requirements, the review process, responding to peer reviewersâ comments, and preparing the final article
Peer Reviewer Non-performance: The Need to Replenish the âCommonsâ
Journal editors have observed a greater occurrence of reviewers agreeing to peer review but never completing reviews. It seems that the information systems (IS) field increasingly needs more reviewers. In this paper, I consider the reasons why researchers agree to peer review and the professional and ethical conduct of reviewers who agree to review but never do so. Finally, I make suggestions to motivate reviewers to replenish the âcommonsâ
The Impact of Employee Organizational Commitment on Compliance with Information Security Policy
The purpose of this research is to investigate the relationship of multiple dimensions of employees\u27 organizational commitment to their organization with information security policy (ISP) compliance. We draw upon the three-component model of commitment which considers commitment as a multidimensional construct comprised of affective commitment, continuance commitment, and normative commitment. While previous research has examined the impact of organizational commitment on ISP compliance, the multiple dimensions of organizational commitment have not been addressed, to our knowledge. We also include six organizational drivers, identified in previous research, which impact organizational commitment. This study will provide implications for practice by determining intrinsically driven commitment that influences employees to comply with ISP, enabling managers to identify ways to motivate employees to engage in secure behaviors in compliance with ISP
Introducing a Draft Version of the Revised ACM/AIS Undergraduate IS Curriculum Recommendation
Group work encourages creative thinking and provides more efficient problem-solving approaches. The main problem identified in this paper is that students involved in systems analysis courses on tertiary level, struggle to apply theory to real-time situations and find it difficult to generate appropriate modelling solutions. The purpose of this study is to determine whether group work is an effective means to use in the teaching of a systems analysis course, and whether it will improve the effectiveness of how students acquire knowledge of the course content. The perceptions of both facilitators and second year Informatics students were recorded by means of interviews and questionnaires used respectively. It was found that group work positively contributes and adds immense value to the learning experience of students taking a systems analysis course
E-Government Website Awareness and Visitation Among the Techno-Disadvantaged
This study explores awareness and visitation of e-government websites among techno-disadvantaged citizens in the United States. Following up on on a community-based initiative, designed to stimulate computer literacy and access to information and communication technologies for residents and neighbors of an underserved public housing community, a survey of egovernment website awareness and visitation was undertaken. The results indicate that although nearly half of the respondents are neither aware of nor have visited e-government websites, the majority of respondents are partaking in egovernment services. The top categories of e-government website awareness and visitation are transportation, employment, recreation, and childrenâs services. The contribution of this research is to validate that benefits of e-government services can be brought to members and neighbors of a techno-disadvantaged community. We conclude by emphasizing the importance of the community-based initiative to foster awareness and visitation of e-government websites, thereby advancing egovernment inclusion
System Development from a Legal Perspective
This paper discusses the potential for legal liability when software malfunctions and causes financial loss or harm to the user. The focus is on the systems developer as opposed to the vendor, although the samelegal issues may apply to vendors as well. Various theories in the U.S. legal system may form the basis for legal action, on the part of the purchaser or ultimate user, based upon the characteristics of the individual case. The legal theories examined, for their application to malfunctioning software, are breach of contract and the tort theories of fraud and computer malpractice
- âŠ