91 research outputs found

    A GROUNDED STUDY OF INFORMATION SYSTEMS IN ANAESTHESIA

    Get PDF
    This paper presents an exploratory study of the appropriation of information systems (AIS) in anaesthesia. Using a grounded theory approach, we identify three key concepts and the basic social process of appropriation to construct a theoretical model that explains why certain systems are chosen, what technologies are considered and how they are appropriated. This study attempts to offer theoretical contributions to the field of anaesthesia and represents the first grounded theory investigation with an IS perspective conducted in this area

    Defining and Conceptualizing Actionable Insight: A Conceptual Framework for Decision-centric Analytics

    Get PDF
    Despite actionable insight being widely recognized as the outcome of data analytics, there is a lack of a systematic and commonly-agreed definition for the term. More importantly, existing definitions are generally too abstract for informing the design of data analytics systems. This study proposes a definition of actionable insight as a multi-component concept comprising analytic insight, synergic insight, and prognostic insights. This definition is informed by a conceptual framework, which also can be used to systematically understand actionable insight, both at the concept-level and component-level. Each component is explained from the analytical, cognitive, and computational perspectives and relevant design considerations are suggested. We hope this study could be a rudimentary step toward the realization of decision-centric data analytics that can deliver the promised actionable insight

    Maintaing Software Maintainability: Controlling the Rate of Software Deterioration

    Get PDF

    Timing of Software Replacement

    Get PDF
    Analogous to the replacement of an old machine, such as a car, replacing an aged software may contain its escalating cost of maintenance. Prior research has assumed that increasing maintenance cost is due to the deterioration of the system maintainability. However, cost of maintenance depends also on the number of incoming maintenance requests. While software maintainability is determined by its complexity and development environment, number of maintenance requests is affected by the business environment. This distinction is significant in analyzing economic uadeoffs in software maintenance because replacement improves system maintainability but will not affect the number of inalntenance requests. Unlike replacement of hardware, rewriting software takes an extended length of :&ne. Thus, the old software muststillbemaintainedbeforethenewsoftwareisready. Wedevelopaneconomicmodelthatconsiders the number of maintenance requests and the rewriting period explicitly. The model is an extension of Gode, Barua, and Mukhopadhyay (1990), which assumes a constant number of maintenance requests and instantaneous replacement. Our model allows us to draw some additional p o k y implications about software maintenance arid replacement. For instance, we show that in certain situations delaying a system replacement can be more cost effective when the user environment changes more rapidly, conuary to our intuition. Moreover, it is shown that rewriting should begin earlier when the instantaneous replacement assumption is relaxed

    The Information Systems Academic Discipline in Singapore

    Get PDF
    The global downturn in demand for IT skills has not left Singapore unscathed. While the demand for information systems graduates has not been as adversely affected as that for traditional computer science ones, there appears to be a drop in the entry quality of students seeking to do information systems degrees. While there appears to be some turnaround on the horizon, to better prepare for the future it is timely to examine the current state of IS as a discipline in Singapore and understand what might be the driving forces that shape it. Using Whitley\u27s theory of scientific change as a theoretical framework [1984a, 1984b], this case study seeks to explore the degree of professionalization and the maturity of IS as a discipline in Singapore through analysis of data gathered from in-depth interviews and secondary data sources. It is found that of the four constructs proposed by Whitley for determining if a discipline is a mature, distinct scientific one, the IS discipline in Singapore clearly satisfies three: the discipline has a high level of professionalization, strong scientific reputation, and well-established research competence and skills. While the IS researchers agree that the discipline has a common vocabulary with which to communicate with one another, they also agree that it is not unknown to the researchers outside the discipline and thus, in this aspect, the discipline only satisfies part of the fourth construct in Whitley\u27s theory

    Enterprise Systems Success: A Measurement Model

    Get PDF
    This paper presents a validated measurement model and instrument for assessing enterprise systems success from multiple perspectives. The final validated study model employs 27 measures of the four dimensions: information quality, system quality, individual impact, and organizational impact. The model is empirically tested with survey data gathered from 27 public sector organizations that implemented SAP R/3 in the late 1990s. The study consists of an exploratory inventory survey (model building) to identify the salient success dimensions and measures, followed by a confirmatory weights survey, for testing model validity (model testing). Test results demonstrate the discriminant validity of the four dimensions, as well as their convergence on a single higher-order phenomenon: enterprise systems success (ESS). Criterion validity testing further demonstrates the additivity of the four dimensions of success, and the completeness of the resultant over- arching, second-order measure of ESS

    Susceptibility to Social Engineering in Social Networking Sites: The Case of Facebook

    Get PDF
    Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment

    Understanding And Measuring Information Security Culture

    Get PDF
    The purpose of the current paper was to develop a measurement of information security culture. Our literature analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. Eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, and training. These factors were confirmed formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model. We were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture

    Re-conceptualizing Information System Success: The IS-Impact Measurement Model

    Get PDF
    This paper re-conceptualizes ¡°information system success¡± as a formative, multidimensional index. Such a validated and widely accepted index would facilitate cumulative research on the impacts of IS, while at the same time provide a benchmark for organizations to track their IS performance. The proposed IS-Impact measurement model represents the stream of net benefits from an Information System (IS), to date and anticipated, as perceived by all key user groups. Model measures are formulated to be robust, economical, and simple, yielding results that are comparable across diverse systems and contexts, and from multiple user perspectives. The model includes four dimensions in two halves. The ¡°impact¡± half measures benefits to date, or Individual- and Organizational Impact; the ¡°quality¡± half uses System Quality and Information Quality as proxies for probable future impacts. Study findings evidence the necessity, additivity, and completeness of these four dimensions. The validation study involved three separate surveys, including exploratory and confirmatory phases preceded by an identification survey. Content analysis of 485 qualitative impacts cited by 137 respondents from across 27 Australian Government Agencies that implemented SAP Financials in the late 90s, identified salient dimensions and measures. The resultant a-priori model (¡°pool¡± of 37 measures) was operationalized in the subsequent specification survey, yielding 310 responses across the same 27 agencies. The confirmation survey, employing 27 validated measures from the specification survey, was next conducted in a large university that had implemented ORACLE Financials. Confirmatory analysis of the 153 responses provides further strong evidence of model validity
    corecore