48 research outputs found
Collegial Mentorship
Mentoring is typically thought of as a top-down process, but it can also be based on collegial mentorship. This article describes an example of peer-to-peer mentoring that helped advance research in the field in field of information systems
Recommended from our members
A Collaborative Project Management Approach and a Framework for Its Supporting Systems
The project management (PM) paradigm has changed during the past decade due to the globalization of business and advancement of information technology (IT). Increasingly, projects involve members from different geographical locations more than at any other time in history. Traditional PM methods may be inadequate to manage distributed projects, and new information systems are needed to support distributed PM. This article provides the rationale for a collaborative PM approach to manage distributed projects and proposes a conceptual framework for the collaborative PM software development. The objective is to present a collaborative PM framework that can guide further research and development in this challenging area
Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship
Although users often express strong positive intentions to follow security policies, these positive intentions fail to consistently translate to behavior. In a security setting, the inconsistency between intentions and behavior—termed the intention-behavior gap—is particularly troublesome, as a single failure to enact positive security intentions may make a system vulnerable. We address a need in security compliance literature to better understand the intention-behavior gap by explaining how an omnipresent competing intention—the user’s desire to minimize required effort—negatively moderates the relationship between positive intentions and actual security behavior. Moreover, we posit that this moderating effect is not accounted for in extant theories used to explain behavioral information security, introducing an opportunity to broadly impact information security research to more consistently predict behavior. In three experiments, we found that high levels of required effort negatively moderated users’ intentions to follow security policies. Controlling for this moderating effect substantially increased the explained variance in security policy compliance. The results suggest that security researchers should be cognizant of the existence of competing intentions, such as the desire to minimize required effort, which may moderate the security intention-behavior relationship. Otherwise, such competing intentions may cause unexpected inconsistencies between users’ intentions to behave securely and their actual security behavior
SUPPORTING JOINT APPLICATION DEVELOPMENT (JAD) WITH ELECTRONIC MEETING SYSTEMS: A FIELD STUDY
One of the more common approaches to involving users in the system development process is called JAE) (Joint Application DevelopmenO. The JAD approach is based on highly structured, facilitated meetings and, as such, has the potential to be supported by Electronic Meeting Systems (EMS). A multiple-site field study was conducted in which JAD meetings - both traditional and electronic - were observed. Some differences between JAD and JAD supported by EMS were found. The quality of group member participation was more equal in supported JAD meetings, but supported JAD meetings lacked the session discipline of traditional JAD, Further, conflict resolution (closure) emphasized in traditional JAD was not achieved m several electronic sessions. Overall session management activities - the responsibility of the facilitator for integration of the session with other life cycle activities - was weaker in JAD supported by EMS
Towards a Personalized Assistance in Distributed Group Facilitation
With the advancement of group decision support systems (GDSS), facilitation has been regarded as one of the most important means in enhancing the outcome of group decisions. Many researchers have spent great efforts in creating useful methodologies and techniques to better support group facilitation. However, most of the research in the current literature deals more with facilitation targeted at a group-level than an individual level. With the increasingly available personalization techniques found in e-commerce, personalized facilitation seems to be a natural direction in group system facilitation research to deal with the needs of individual members for the overall gain of the group. In this paper, we address the needs for personalized facilitation in the context of the “EasyWinWin” framework in software requirements analysis by proposing a conceptual framework of personalized facilitation, developing a system architecture towards personalized facilitation and identifying key functions for a personalized facilitation system