1,993 research outputs found

    Training During SDM Implementation

    Get PDF
    Drucker (1988) suggests that new organizational structures result from the dynamic integration of corporate planning, systems analysis and design, and system development. This integration is not possible without a comprehensive system development methodology (SDM) that meets the organization\u27s needs. Today, a SDM can only be successful with a training program that prepares systems personnel to use automated tools within the life cycle phases and tasks of a system development methodology. This relationship between CASE and a SDM make methodology training for CASE users and development staff a key ingredient to a successful CASE implementation. McClure (1992) suggests the following formula for a successful CASE implementation: tools + trained people + methodology. In today\u27s information systems environment, a SDM comprises an overall strategy for computer-based information system development that includes a flexible framework to indicate the sequence of development along with the techniques used to accomplish each task. Automated tools aid the system development process may also be considered part of the methodolog

    The Voice Effect” in Groups

    Get PDF
    This study looks at how collaborative technology, proximity choices, and group size can affect voicing in groups. Results of the study, involving two experiments with 550 participants, show that collaborative technology can improve an individual’s desire to voice, instrumental motives to voice, non-instrumental motives to voice, and the opportunity to voice in face-to-face groups. The results also show that the use of collaborative technology can lesson individual voice losses as groups increase in size especially in distributed environments. These findings have important implications in group interactions using technology

    Decisison Useful Financial Reporting Information Characteristics: An Empirical Validation of the Proposed FASB/IASB International Accounting Model

    Get PDF
    As part of a future international accounting standard, the USA Financial Accounting Standards Board and UK International Accounting Standards Board recently updated their description of the financial reporting information characteristics that determine its decision usefulness for end users. Yet the relationships inherent in the description have not been empirically validated. If invalid, the description may globally misguide future professional information efforts for a multitude of business users and decisions. A causal model is created of decision-useful financial reporting information characteristics from the description, then evaluated using partial least squares and survey data from business information users as defined by the international standard. The model significantly predicted user perceptions of key information constructs (Decision Usefulness [76%], Relevance [62%], and Faithful Representativeness [57%]; R2 values, p\u3c0.01). However, theoretically and practically important constructs (Verifiability, Completeness, Faithful Representativeness) did not significantly contribute to the model

    Gametocyte carriage in Plasmodium falciparum-infected travellers.

    Get PDF
    BACKGROUND: Gametocytes are the sexual stage of Plasmodium parasites. The determinants of gametocyte carriage have been studied extensively in endemic areas, but have rarely been explored in travellers with malaria. The incidence of gametocytaemia, and factors associated with gametocyte emergence in adult travellers with Plasmodium falciparum malaria was investigated at the Hospital for Tropical Diseases in London. METHODS: Clinical, parasitological and demographic data for all patients presenting with P. falciparum malaria between January 2001 and December 2011 were extracted from a prospective database. These data were supplemented by manual searches of laboratory records and patient case notes. RESULTS: Seven hundred and seventy three adult patients with laboratory-confirmed P. falciparum malaria were identified. Four hundred and sixty five (60%) were born in a country where malaria is endemic. Patients presented to hospital a median of four days into their illness. The median maximum parasite count was 0.4%. One hundred and ninety six patients (25%) had gametocytes; 94 (12%) on admission, and 102 (13%) developing during treatment. Gametocytaemia on admission was associated with anaemia and a lower maximum parasitaemia. Patients with gametocytes at presentation were less likely to have thrombocytopenia or severe malaria. Patients who developed gametocytes during treatment were more likely to have had parasitaemia of long duration, a high maximum parasitaemia and to have had severe malaria. There was no apparent association between the appearance of gametocytes and treatment regimen. CONCLUSIONS: The development of gametocytaemia in travellers with P. falciparum is associated with factors similar to those reported among populations in endemic areas. These data suggest that acquired immunity to malaria is not the only determinant of patterns of gametocyte carriage among patients with the disease

    Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation

    Get PDF
    Usability flaws found in the later stages of the software development process can be extremely costly to resolve. Accordingly, usability evaluation (UE) is an important, albeit usually expensive, part of development. We report on how the inexpensive UE method of heuristic evaluation (HE) can benefit from collaborative software (CSW), implicit coordination, and principles from collaboration engineering. In our study, 439 novice participants were trained in HE methods and then performed HE. Our results show that traditional nominal HE groups can experience implicit coordination through the collaborative software features of group memory and group awareness. One of the key results is that CSW groups had less duplication of effort than traditional nominal groups; these differences were magnified as group size increased from three to six members. Furthermore, because they coordinated less, traditional nominal groups performed more work in the overall process of HE. We attribute the reduction in duplication for CSW-supported groups to the implicit coordination available to them; CSW-supported groups could see violations input by other group members, but could not directly discuss the violations. These findings not only show the power of implicit coordination in groups, but should dramatically change how HE is conducted. These results may also extend to other evaluation tasks, such as software inspection and usability assessment tasks

    Inquiring Decision Systems: A Churchmanian Approach to Ethical Decision Making

    Get PDF
    Many business organizations seem to be doing everything but making ethical organizational decisions these days. In stark contrast, social enterprises are organizations that operate as businesses but are altruistic, humanitarian, and seek the goal of creating social value in effective, efficient and ethical ways. This paper applies principles of social enterprises to develop a multi-perspective framework for ethical business decision-making within a philosophical context provided by C. West Churchman’s inquiring systems in organizations

    How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse

    Get PDF
    We use Fairness Theory to help explain why sometimes security policy sometimes backfire and increase security violations. Explanation adequacy—a key component of Fairness Theory—is expected to increase employees’ trust in their organization. This trust should decrease internal computer abuse incidents following the implementation of security changes. The results of our analysis provide support for Fairness Theory as applied to our context of computer abuse. First, the simple act of giving employees advance notification for future information security changes positively influences employees’ perceptions of organizational communication efforts. The adequacy of these explanations is also buoyed by SETA programs. Second, explanation adequacy and SETA programs work in unison to foster organizational trust. Finally, organizational trust significantly decreases internal computer abuse incidents. Our findings show how organizational communication can influence the overall effectiveness of information security changes among employees and how organizations can avoid becoming victim to their own efforts

    Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example

    Get PDF
    Formative modeling of latent constructs has produced great interest and discussion among scholars in recent years. However, confusion exists surrounding researchers’ ability to validate these models, especially with covariance-based structural equation modeling (CB-SEM) techniques. With this paper, we help to clarify these issues and explain how formatively modeled constructs can be assessed rigorously by researchers using CB-SEM capabilities. In particular, we explain and provide an applied example of a mixed-modeling technique termed multiple indicators and multiple causes (MIMIC) models. Using this approach, researchers can assess formatively modeled constructs as the final, distal dependent variable in CB-SEM structural models—something previously impossible because of CB-SEM’s mathematical identification rules. Moreover, we assert that researchers can use MIMIC models to assess the content validity of a set of formative indicators quantitatively—something considered conventionally only from a qualitative standpoint. The research example we use in this manuscript involving protection-motivated behaviors (PMBs) details the entire process of MIMIC modeling and provides a set of detailed guidelines for researchers to follow when developing new constructs modeled as MIMIC structures

    Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective

    Get PDF
    Many healthcare providers in the US are seeking increased efficiency and effectiveness by rapidly adopting information technology (IT) solutions such as electronic medical record (EMR) systems. Legislation such as the Health Information Technology for Economic and Clinical Health Act (HITECH), which codified the adoption and “meaningful use” of electronic records in the US, has further spurred the industry-wide adoption of EMR. However, despite what are often large investments in EMR, studies indicate that the healthcare industry maintains a culture of system workarounds. Though perhaps not uncommon, the creation of informal workflows among healthcare workers is problematic for assuring information security and patient privacy, particularly when involving decisions of information management (e.g., information storage, retrieval, and/or transmission). Drawing on the framework of contextual integrity, we assert that one can often explain workarounds involving information transmissions in terms of trade-offs informed by context-specific informational norms. We surveyed healthcare workers and analyzed their willingness to engage in a series of EMR workaround scenarios. Our results indicate that contextual integrity provides a useful framework for understanding information transmission and workaround decisions in the health sector. Armed with these findings, managers and system designers should be better able to anticipate healthcare workers’ information transmission principles (e.g., privacy norms) and workaround patterns (e.g., usage norms). We present our findings and discuss their significance for research and practice

    Taking “Fun and Games” Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

    Get PDF
    Hedonic-motivation systems (HMS)—systems used primarily to fulfill users’ intrinsic motivations—are the elephant in the room for IS research. Growth in HMS sales has outperformed utilitarian-motivation systems (UMS) sales for more than a decade, generating billions in revenue annually; yet IS research focuses mostly on UMS. In this study, we explain the role of intrinsic motivations in systems use and propose the hedonic-motivation system adoption model (HMSAM) to improve the understanding of HMS adoption. Instead of a minor, general TAM extension, HMSAM is an HMS-specific system acceptance model based on an alternative theoretical perspective, which is in turn grounded in flow-based cognitive absorption (CA). The HMSAM extends van der Heijden’s (2004) model of hedonic system adoption by including CA as a key mediator of perceived ease of use (PEOU) and of behavioral intentions to use (BIU) hedonic-motivation systems. Results from experiments involving 665 participants confirm that, in a hedonic context, CA is a more powerful and appropriate predictor of BIU than PEOU or joy, and that the effect of PEOU on BIU is fully mediated by CA sub-constructs. This study lays a foundation, provides guidance, and opens up avenues for future HMS, UMS, and mixed-motivation system research
    • …
    corecore