874 research outputs found

    Consulting at the Laser ISP (LISP) Company: Using Excel Metrics Capabilities to Solve Semi-Structured Management Problems

    Get PDF
    Introductory Information System (IS) courses commonly focus too heavily on teaching application features, as opposed to teaching unstructured problem-solving skills. In response to this pedagogical gap, professors at Brigham Young University have developed integrated cases that improve the instruction for their introductory IS course. In this paper, we overview a case that provides a realistic and compelling problem-solving experience for teaching Microsoft Excel measurement capabilities. This case describes the customer service issues and installation problems faced by an Internet service provider, along with pertinent cost and service data. The case requires the student to play the role of a management consultant who is asked to make business recommendations using Excel. To effectively work with this case, students need exposure to Excel lookups, date/time capabilities, and countif / sumif functions, as well as other basic Excel features. To help the instructor implement this case, we have provided teaching notes that overview the history of the case, teaching suggestions, and a highly detailed grading and discussion template

    Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess

    Get PDF
    Privacy and security concerns are pervasive because of the ease of access to information. Recurrent negative cases in the popular press attest to the failure of current privacy regulations to keep consumer and protected health information sufficiently secure in today’s climate of increased IT use. One reason for such failure is that organizations violate these regulations for multiple reasons. To address this issue, we propose a theoretical model to explain the likelihood that organizations will select an externally governed privacy or security rule for violation in response to organizational strain or slack resources. Our proposed theoretical model, the selective organizational information privacy and security violations model (SOIPSVM), explains how organizational structures and processes, along with characteristics of regulatory rules, alter perceptions of risk when an organization’s performance does not match its aspiration levels and, thereby, affects the likelihood of rule violations. Importantly, we contextualize SOIPSVM to organizational privacy and security violations. SOIPSVM builds on and extends the selective organizational rule violations model (SORVM), which posits that organizational rule violations are selective. SOIPSVM provides at least four contributions to the privacy and security literature that can further guide empirical research and practice. First, SOIPSVM introduces the concept of selectivity in rule violations to privacy and security research. This concept can improve privacy and security research by showing that organizational violations of privacy and security rules are dynamic and selective yet influenced by external forces. Second, SOIPSVM extends the boundaries of SORVM, which is limited to explaining the behavior of organizations under strain, such as economic hardship. We contribute to the theory of selective deviance by proposing that selectivity extends to organizations with slack resources. Third, we address ideas of non-economic risk and strain in addition to economic risk and strain. Thus, SOIPSVM explains organizational rule-violating behavior as an attempt to protect core organizational values from external entities that pressure organizations to change their values to comply with rules. Fourth, we broaden the theoretical scope of two important constructs (namely, structural secrecy and procedural emphasis) to improve the model’s explanatory power. Fifth, we identify important elements of rule enforcement by drawing from the tenets of general deterrence theory. We also discuss how one can study constructs from general deterrence theory at the organizational level. To conclude, we offer recommendations for the structuring of organizations and external regulations to decrease organizational rule violations, which often lead to the abuse of consumer information

    The IS Core: An Integration of the Core IS Courses

    Get PDF
    This paper describes an innovative, integrated implementation of the core Information Systems courses. While the published IS curriculum provides standards on course content, it gives little direction on the implementation of the courses. At Brigham Young University, we have reengineered the traditional topics of analysis, database, design, development, networking, etc. into an integrated, 24-hour course block called the “IS Core”. Instead of students moving from class to class, professors now rotate through integrated subjects in a common classroom environment. The IS Core has allowed the department to increase the rigor and integration between subjects so students see the entire systems process and has provided opportunities for cross-topic assignments and integrated exercises. Finally, it has resulted in unintended, additional benefits like increased student culture and student ownership of the major

    An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research

    Get PDF
    Interest in the repertory grid technique has been growing in the IS field. This article seeks to inform the reader on the proper use and application of the technique in IS research. The methodology has unique advantages that make it suitable for many research settings. In this tutorial, we describe the technique, its theoretical underpinnings, and how it may be used by IS researchers. We conclude by detailing many IS research opportunities that exist in respect to the repertory grid technique

    Overview and Guidance on Agile Development in Large Organizations

    Get PDF
    A continual debate surrounds the effectiveness of agile software development practices. Some organizations adopt agile practices to become more competitive, improve processes, and reduce costs. Other organizations are skeptical about whether agile development is beneficial. Large organizations face an additional challenge in integrating agile practices with existing standards and business processes. To examine the effects of agile development practices in large organizations, we review and integrate scientific literature and theory on agile software development. We further organize our theory and observations into a framework with guidelines for large organizations considering agile methodologies. Based on this framework, we present recommendations that suggest ways large organizations with established processes can successfully implement agile practices. Our analysis of the literature and theory provides new insight for researchers of agile software development and assists practitioners in determining how to adopt agile development in their organizations

    Overview and Guidance on Agile Development in Large Organizations

    Get PDF
    A continual debate surrounds the effectiveness of agile software development practices. Some organizations adopt agile practices to become more competitive, improve processes, and reduce costs. Other organizations are skeptical about whether agile development is beneficial. Large organizations face an additional challenge in integrating agile practices with existing standards and business processes. To examine the effects of agile development practices in large organizations, we review and integrate scientific literature and theory on agile software development. We further organize our theory and observations into a framework with guidelines for large organizations considering agile methodologies. Based on this framework, we present recommendations that suggest ways large organizations with established processes can successfully implement agile practices. Our analysis of the literature and theory provides new insight for researchers of agile software development and assists practitioners in determining how to adopt agile development in their organizations

    A generalist–specialist trade-off between switchgrass cytotypes impacts climate adaptation and geographic range

    Get PDF
    Polyploidy results from whole-genome duplication and is a unique form of heritable variation with pronounced evolutionary implications. Different ploidy levels, or cytotypes, can exist within a single species, and such systems provide an opportunity to assess how ploidy variation alters phenotypic novelty, adaptability, and fitness, which can, in turn, drive the development of unique ecological niches that promote the coexistence of multiple cytotypes. Switchgrass, Panicum virgatum, is a widespread, perennial C4 grass in North America with multiple naturally occurring cytotypes, primarily tetraploids (4×) and octoploids (8×). Using a combination of genomic, quantitative genetic, landscape, and niche modeling approaches, we detect divergent levels of genetic admixture, evidence of niche differentiation, and differential environmental sensitivity between switchgrass cytotypes. Taken together, these findings support a generalist (8×)–specialist (4×) trade-off. Our results indicate that the 8× represent a unique combination of genetic variation that has allowed the expansion of switchgrass’ ecological niche and thus putatively represents a valuable breeding resource

    Large Differences in Publicly Visible Health Behaviours across Two Neighbourhoods of the Same City

    Get PDF
    Background: There are socioeconomic disparities in the likelihood of adopting unhealthy behaviours, and success at giving them up. This may be in part because people living in deprived areas are exposed to greater rates of unhealthy behaviour amongst those living around them. Conventional self-report surveys do not capture these differences in exposure, and more ethological methods are required in order to do so. Methodology/Principal Findings: We performed 12 hours of direct behavioural observation in the streets of two neighbourhoods of the same city which were similar in most regards, except that one was much more socioeconomically deprived than the other. There were large differences in the publicly visible health behaviours observed. In the deprived neighbourhood, we observed 266 more adults smoking (rate ratio 3.44), 53 more adults drinking alcohol (rate ratio not calculable), and 38 fewer adults running (rate ratio 0.23), than in the affluent neighbourhood. We used data from the Health Survey for England to calculate the differences we ought to expect to have seen given the individual-level socioeconomic characteristics of the residents. The observed disparities between the two neighbourhoods were considerably greater than this null model predicted. There were also different patterns of smoking in proximity to children in the two neighbourhoods. Conclusions/Significance: The differences in observed smoking, drinking alcohol, and physical activity between these tw
    • …
    corecore