21 research outputs found

    A systematic literature review of the use of social media for business process management

    Get PDF
    In today’s expansion of new technologies, innovation is found necessary for organizations to be up to date with the latest management trends. Although organizations are increasingly using new technologies, opportunities still exist to achieve the nowadays essential omnichannel management strategy. More precisely, social media are opening a path for benefiting more from an organization’s process orientation. However, social media strategies are still an under-investigated field, especially when it comes to the research of social media use for the management and improvement of business processes or the internal way of working in organizations. By classifying a variety of articles, this study explores the evolution of social media implementation within the BPM discipline. We also provide avenues for future research and strategic implications for practitioners to use social media more comprehensively

    The Carbon_h-Factor: Predicting Individuals' Research Impact at Early Stages of Their Career

    Get PDF
    Assessing an individual's research impact on the basis of a transparent algorithm is an important task for evaluation and comparison purposes. Besides simple but also inaccurate indices such as counting the mere number of publications or the accumulation of overall citations, and highly complex but also overwhelming full-range publication lists in their raw format, Hirsch (2005) introduced a single figure cleverly combining different approaches. The so-called h-index has undoubtedly become the standard in scientometrics of individuals' research impact (note: in the present paper I will always use the term “research impact” to describe the research performance as the logic of the paper is based on the h-index, which quantifies the specific “impact” of, e.g., researchers, but also because the genuine meaning of impact refers to quality as well). As the h-index reflects the number h of papers a researcher has published with at least h citations, the index is inherently positively biased towards senior level researchers. This might sometimes be problematic when predictive tools are needed for assessing young scientists' potential, especially when recruiting early career positions or equipping young scientists' labs. To be compatible with the standard h-index, the proposed index integrates the scientist's research age (Carbon_h-factor) into the h-index, thus reporting the average gain of h-index per year. Comprehensive calculations of the Carbon_h-factor were made for a broad variety of four research-disciplines (economics, neuroscience, physics and psychology) and for researchers performing on three high levels of research impact (substantial, outstanding and epochal) with ten researchers per category. For all research areas and output levels we obtained linear developments of the h-index demonstrating the validity of predicting one's later impact in terms of research impact already at an early stage of their career with the Carbon_h-factor being approx. 0.4, 0.8, and 1.5 for substantial, outstanding and epochal researchers, respectively

    Critical analysis of information security culture definitions

    Get PDF
    This article aims to advance the understanding of information security culture through a critical reflection on the wide-ranging definitions of information security culture in the literature. It uses the hermeneutic approach for conducting literature reviews. The review identifies 16 definitions of information security culture in the literature. Based on the analysis of these definitions, four different views of culture are distinguished. The shared values view highlights the set of cultural value patterns that are shared across the organization. An action-based view highlights the behaviors of individuals in the organization. A mental model view relates to the abstract view of the individual’s thinking on how information security culture must work. Finally, a problem-solving view emphasizes a combination of understanding from shared value-based and action-based views. The paper analyzes and presents the limitations of these four views of information security culture definitions

    Open Innovation Contests for Improving Healthcare - An Explorative Case Study Focusing on Challenges in a Testbed Initiative

    No full text
    Working with innovation is important in several sectors and industries. One emerging arena for innovation is the arrangements of innovation contests. The aim of the paper is to describe and characterize an open innovation contest for improving healthcare, and to address the challenges involved. The research is a qualitative, explorative and interpretive case study of a Swedish region providing publicly funded healthcare. The conclusions show the need to generate and analyze data from actors with several perspectives in the contest. Challenges identified include defining and precisely expressing the problem, separating and delimiting the different problems and achieving a joint view. Other challenges were identifying and attracting knowledgeable participants, to consider incentives, and communicating the contest. In the collaboration stage, challenges involved the contest design, enabling knowledge sharing, managing various agendas, and being open-minded to new ideas; and finally, assessing whether the problem is suitable for open innovation contests at all

    Big Data to Knowledge – Harnessing Semiotic Relationships of Data Quality and Skills in Genome Curation Work

    No full text
    This article aims to understand the views of genomic scientists with regard to the data quality assurances associated with semiotics and data–information–knowledge (DIK). The resulting communication of signs generated from genomic curation work, was found within different semantic levels of DIK that correlate specific data quality dimensions with their respective skills. Syntactic data quality dimensions were ranked the highest among all other semiotic data quality dimensions, which indicated that scientists spend great efforts for handling data wrangling activities in genome curation work. Semantic- and pragmatic-related sign communications were about meaningful interpretation, thus required additional adaptive and interpretative skills to deal with data quality issues. This expanded concept of ‘curation’ as sign/semiotic was not previously explored from the practical to the theoretical perspectives. The findings inform policy makers and practitioners to develop framework and cyberinfrastructure that facilitate the initiatives and advocacies of ‘Big Data to Knowledge’ by funding agencies. The findings from this study can also help plan data quality assurance policies and thus maximise the efficiency of genomic data management. Our results give strong support to the relevance of data quality skills communication for relationship with data quality assurance in genome curation activities

    A literature review of the practice of educating children about technology making

    No full text
    Abstract Inspired by the Maker Movement and attempts of integrating Making into formal education of children, we have examined how practice-oriented the research on Making and education is in Child-Computer Interaction field. Our results show that despite the growing interest practice-orientation is still weak. Making efforts rarely aim for longitudinal durable patterns and practices even though practice-driven research has started to gain prominence in the whole Human-Computer Interaction field. General ideas of what Making integrated with education can be and should be seem to be well shared among practitioners, however. We demonstrate what aspects should be considered when doing practice-oriented Making research and point out gaps in our current understanding of the practice. We also provide guidelines for how to study Making in order to develop sustainable practices
    corecore