88,180 research outputs found

    User resistance strategies and the problems of blanket prescriptions: a case study of resistance success

    Get PDF
    There is a growing body of research on resistance in IS projects, a good deal of which focuses on strategies for overcoming resistance. However, within this strand of research, it appears that there is a ‘blanket prescription’ approach that does not account for diversity in resistance reasoning. We offer a qualitative study of the response of diverse actors to a pilot of a custom developed client tracking information system, which brought about diverse covert and overt resistance activities. This empirical research is used to explore the heterogeneous user and how such a ‘blanket prescription’ to avert organisational-wide resistance went wrong and how resistance succeeded. This paper aims to contribute to the body of existing literature on IS user resistance by emphasizing the injurious continuous error of excluding such constructs as the heterogeneous user within user resistance research

    Risky business: when a CRM vendor masqueraded as an ERP specialist

    Get PDF
    Taking a social shaping perspective we unpack the development trajectory of a packaged software product to show, that contrary to mainstream accounts, design is not completely specified a-priori and that the process continues throughout implementation, and use. We show how developers, in this case third party vendors, can continue to engage in shaping packages during implementation and also how users contribute to the development effort. In particular, we illustrate how a customer relationship management package application targeted at a particular organisational function was configured to make an enterprise wide system and the key role of the vendor in this effort. To do this we refer to a 3- year qualitative field study of an expanding United Kingdom based consultancy company undergoing extreme ICT related change. This empirical research is used to explore an often ignored phenomenon, that of the role of vendors in appropriating ICTs and the potential risks they bring. Through this, we highlight the plight and responsibilities of low-level organisational actors in this process in cognisance of the fact they usually have a minor role in ICT selection but become a major player in dealing with vendors at the implementation stage when the devil is truly in the detail. The risks we identify relate to: vendor sales pitches of products as specifically related to their capabilities and the products they put forward; the calling upon of organisational resources by vendors; vendor knowledge of the application are and the actual ‘social’, ‘technical’ and ‘organisational’ capabilities of vendors to deliver a working product. We also point to the risks managers in vendor and consumer organisations create by placing their staff in difficult conditions within appropriation processes. The implications of our work centre on the need for further research related to: vendor/developer risks of packaged software, custom and open source projects; notions of professionalism and ethics in the software industry and project working conditions

    Social networking and digital gaming media convergence : classification and its consequences for appropriation

    Get PDF
    Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space – scamming. Scammers dupe members with respect to their ‘Furni’, virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members – as a social networking site and/or a digital game. In turn, this may affect members’ beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline

    Spurious regressions of stationary AR(p) processes with structural breaks

    Get PDF
    When a pair of independent series is highly persistent, there is a spurious regression bias in a regression between these series, closely related to the classic studies of Granger and Newbold (1974). Although this is well known to occur with independent I(1) processes, this paper provides theoretical and numerical evidence that the phenomenon of spurious regression also arises in regressions between stationary AR(p) processes with structural breaks, which occur at different points in time, in the means and the trends. The intuition behind this is that structural breaks can increase the persistence levels in the processes (e.g., Granger and Hyung (2004)), which then leads to spurious regressions. These phenomena occur for general distributions and serial dependence of the innovation terms

    More than just friends? Facebook, disclosive ethics and the morality of technology

    Get PDF
    Social networking sites have become increasingly popular destinations for people wishing to chat, play games, make new friends or simply stay in touch. Furthermore, many organizations have been quick to grasp the potential they offer for marketing, recruitment and economic activities. Nevertheless, counterclaims depict such spaces as arenas where deception, social grooming and the posting of defamatory content flourish. Much research in this area has focused on the ends to which people deploy the technology, and the consequences arising, with a view to making policy recommendations and ethical interventions. In this paper, we argue that tracing where morality lies is more complex than these efforts suggest. Using the case of a popular social networking site, and concepts about the morality of technology, we disclose the ethics of Facebook as diffuse and multiple. In our conclusions we provide some reflections on the possibilities for action in light of this disclosure

    Fostering Agricultural and Food System Transformation in Africa

    Get PDF
    Agricultural and Food Policy, Downloads July 2008 - June 2009: 8,

    Structure and specificity of T cell receptor gamma/delta on major histocompatibility complex antigen-specific CD3+, CD4-, CD8- T lymphocytes.

    Get PDF
    Analyses of TCR-bearing murine and human T cells have defined a unique subpopulation of T cells that express the TCR-gamma/delta proteins. The specificity of TCR-gamma/delta T cells and their role in the immune response have not yet been elucidated. Here we examine alloreactive TCR-gamma/delta T cell lines and clones that recognize MHC-encoded antigens. A BALB/c nu/nu (H-2d)-derived H-2k specific T cell line and derived clones were both cytolytic and released lymphokines after recognition of a non-classical H-2 antigen encoded in the TL region of the MHC. These cells expressed the V gamma 2/C gamma 1 protein in association with a TCR-delta gene product encoded by a Va gene segment rearranged to two D delta and one J delta variable elements. A second MHC-specific B10 nu/nu (H-2b) TCR-gamma/delta T cell line appeared to recognize a classical H-2D-encoded MHC molecule and expressed a distinct V gamma/C gamma 4-encoded protein. These data suggest that many TCR-gamma/delta-expressing T cells may recognize MHC-linked antigens encoded within distinct subregions of the MHC. The role of MHC-specific TCR-gamma/delta cells in immune responses and their immunological significance are discussed

    Sparse Coding Predicts Optic Flow Specificities of Zebrafish Pretectal Neurons

    Full text link
    Zebrafish pretectal neurons exhibit specificities for large-field optic flow patterns associated with rotatory or translatory body motion. We investigate the hypothesis that these specificities reflect the input statistics of natural optic flow. Realistic motion sequences were generated using computer graphics simulating self-motion in an underwater scene. Local retinal motion was estimated with a motion detector and encoded in four populations of directionally tuned retinal ganglion cells, represented as two signed input variables. This activity was then used as input into one of two learning networks: a sparse coding network (competitive learning) and backpropagation network (supervised learning). Both simulations develop specificities for optic flow which are comparable to those found in a neurophysiological study (Kubo et al. 2014), and relative frequencies of the various neuronal responses are best modeled by the sparse coding approach. We conclude that the optic flow neurons in the zebrafish pretectum do reflect the optic flow statistics. The predicted vectorial receptive fields show typical optic flow fields but also "Gabor" and dipole-shaped patterns that likely reflect difference fields needed for reconstruction by linear superposition.Comment: Published Conference Paper from ICANN 2018, Rhode
    corecore