579 research outputs found

    Cross Cultural Implications of the Technology Artifact

    Get PDF

    The insider on the outside: a novel system for the detection of information leakers in social networks

    Get PDF
    Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles

    MODIFICATIONS AND INNOVATIONS TO TECHNOLOGY ARTIFACTS

    Get PDF
    What happens to a technology artifact after it is adopted? It has to evolve within its particular context to be effective; if it doesn’t, it will become part of the detritus of change, like the many genes without a discernible function in a living organism. In this paper, we report on a study of post-adoption technology behavior that examined how users modified and innovated with technology artifacts. We uncovered three types of changes conducted to technology artifacts: personalization, customization, and inventions. Personalization attempts are modifications involving changes to technology parameters to meet the specificities of the user; customizing attempts occur to adapt the technology parameters to meet the specificities of the user’s environment; and inventions are exaptations conducted to the technology artifact. The paper presents a grounded theoretic analysis of the post-adoption evolution based in-depth interviews with 20 software engineers in one multi-national organization. We identify a life-cycle model that connects the various types of modifications conducted to technology artifacts. The life-cycle model elaborates on how individual and organizational dynamics are linked to diffusion of innovations. While the research is still in progress and the post-adoption evolution model has to be refined, the research has significant value in understanding the full life-cycle of adoption of technological artifacts and how is maximum value derived from them

    Going back to basics in design science: from the information technology artifact to the information systems artifact

    Get PDF
    The concept of the “IT artifact” plays a central role in the information systems research community’s discourse on design science. We pose the alternative concept of the “IS artifact,” unpacking what has been called the IT artifact into a separate “information artifact,” “technology artifact,” and “social artifact.” Technology artifacts (such as hardware and software), information artifacts (such as a message), and social artifacts (such as a charitable act) are different kinds of artifacts that together interact in order to form the IS artifact. We illustrate the knowledge value of the IS artifact concept with material from three cases. The result is to restore the idea that the study of design in information systems needs to attend to the design of the entire IS artifact, not just the IT artifact. This result encourages an expansion in the use of design science research methodology to study broader kinds of artifacts

    Revealing the Root Causes of Digital Health Data Quality Issues: A Qualitative Investigation of the Odigos Framework

    Get PDF
    Digital health data quality is a critical concern in the healthcare industry, jeopardizing the secondary use of data for revolutionizing population health, and hindering patient care and organizational outcomes. Limited published evidence exists for explaining why these data quality issues emerge. The Odigos framework is a notable exception asserting that data quality issues emerge from three worlds: material world (e.g., technology artifact), personal world (e.g., technology users/use), and social world (e.g., organizations/ institutions) but has yet to systematically unpack the elements within these worlds. Through deductive and inductive analysis of interview data from a case study of the Emergency Department of Australia’s first large digital hospital, we apply and extend the Odigos framework by identifying elements emanating from the three worlds and their interrelationships as root causes of data quality issues. These elements can then be used by hospitals to develop strategies to proactively improve their digital health data quality

    A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life

    Get PDF
    The research aimed to design, develop and evaluate an innovative Web 2.0-based collaborative learning (CL) under the guidelines of design science research methodology (DSRM). The Islamic ethical system based on verses of the Quran and social constructionist theory as knowledge base, supports the design process. This is in response to the lesser amount of focus on the practical research methods in Islamic education. The developed information Technology artifact was used for two courses in IIUM. The findings of research show that the practical methodology of this study could provide opportunities for practical methodology of this study could provide opportunities for practice of Islam as a way of life or " Islamicisation". In addition, this study's ethical CL process in a social constructionist environment could promote critical thinking, use of knowledge and religious awareness of studnets that are the main goals of IIUM with Islamic education

    MOVING BEYOND IS IDENTITY: CONCEPTS AND DISCOURSES

    Get PDF
    The ongoing debate about the identity of the Information Systems (IS) discipline is examined from a new perspective. Two recent studies are contrasted to demonstrate the limits of retrospective analysis for defining the field of IS. A new model for IS research, based on concepts and discourses is suggested. Latent Semantic Analysis is proposed as an approach to identifying concepts which form transdisciplinary discourses. Conceptual mapping across disciplines may elucidate fruitful areas of research and a transdisciplinary approach to research may improve research salience and intellectual contributions. Such an approach may also weaken or dissolve the discipline as an applied business/organizational field focused on the information technology artifact. This has the long term effect of maintaining intellectual plasticity and relevance, while expanding the range of intellectual contributions available to IS researchers. Moving beyond IS identity will require rethinking institutional structures upon which the identity of IS is currently dependent

    A realisation of ethical concerns with smartphone personal health monitoring apps

    Get PDF
    The pervasiveness of smartphones has facilitated a new way in which owners of devices can monitor their health using applications (apps) that are installed on their smartphones. Smartphone personal health monitoring (SPHM) collects and stores health related data of the user either locally or in a third party storing mechanism. They are also capable of giving feedback to the user of the app in response to conditions are provided to the app therefore empowering the user to actively make decisions to adjust their lifestyle. Regardless of the benefits that this new innovative technology offers to its users, there are some ethical concerns to the user of SPHM apps. These ethical concerns are in some way connected to the features of SPHM apps. From a literature survey, this paper attempts to recognize ethical issues with personal health monitoring apps on smartphones, viewed in light of general ethics of ubiquitous computing. The paper argues that there are ethical concerns with the use of SPHM apps regardless of the benefits that the technology offers to users due to SPHM apps’ ubiquity leaving them open to known and emerging ethical concerns. The paper then propose a need further empirical research to validate the claim

    Information Technology and Organizational Contexts: Orienting Our Work Along Key Dimensions

    Get PDF
    The locus of the Information Systems discipline is at the intersection of organizations, people, and those technologies and systems specifically related to the acquisition, storage, analysis, interpretation, and communication of data. However, much of the published research is trifurcated, emphasizing one dimension and virtually ignoring the others. We argue that a deeper understanding of and an appropriate emphasis on the technological dimension, the information technology artifact, will significantly benefit research in the discipline. By doing this in a manner that explicitly recognizes the organizational and human contexts, we will better orient our work toward the needs of our various constituencies. We look at two specific examples of potentially rich areas of enquiry: workflow management and the semantic Web. Using a design science paradigm, we describe how these two can serve as exemplars to address the key research concerns of the discipline. We conclude by discussing the roles that authors, journals, and the discipline itself can play in addressing the challenges that are presented

    Adoption of Collaboration Technologies: Integrating Technology Acceptance and Collaboration Technology Research

    Get PDF
    This paper integrates the technology acceptance model (TAM) with constructs from collaboration technology research to present a model of collaboration technology use. Specifically, constructs in four sets of characteristics—technology, individual and group, task, and situational—drawn from various media choice theories are presented as determinants of the TAM constructs of perceived usefulness, perceived ease of use, and attitude toward using collaboration technology. The model was tested among 349 short message service (SMS) users in Finland. The model was largely supported, with the most significant findings being the effects of the four technology characteristics—social presence, media richness, immediacy, and concurrency—on the TAM constructs. In addition to making an important contribution by integrating two of the more dominant streams of information systems research, the model presented here is focused on a specific class of technology—i.e., collaboration technology—and, therefore, answers recent calls for developing models that deepen our understanding about the technology artifact
    corecore