... Reflections on the IS DisciplineInformationSystems A Cyborg Discipline? Magnus Ramage 71 Cores and Definitions: BuildingtheCognitiveLegitimacyoftheInformationSystemsDisciplineAcrosstheAtlantic ... in the public sector Trevor Wood-Harper is Professor ofInformationSystems at the School of Informatics at the University of Manchester and is Professor of Management InformationSystems at the ... many ofthe themes and motifs ofthe full research papers Issues regarding research method preoccupy two ofthe panels The first, “Twenty Years of Applying Grounded Theory in Information Systems, ”...
... provides theoretical support for the managers ofthe proprietary software regarding the compatibility strategies Furthermore, the results shed light on the impact ofthe open source software on the ... externalities for the open source and proprietary software Thus, the price and profit ofthe proprietary software vary correspondently I compare the maximum profit ofthe 17 proprietary software under ... give the equilibrium outcomes when the base-level quality ofthe proprietary software is different from that ofthe open source software Suppose the open source software and the proprietary software...
... interests include cognitive value of IS, of online learning systems, effectiveness of IS, and cognitive aspects of IS Dr Levy is the author ofthe book “Assessing the Value of eLearning systems His ... position in the BoK, explain the importance ofthe article, compare and contrast the findings and position ofthe article with other articles from the BoK, and evaluate the findings ofthe article ... Hermeneutics Illusion of control Information processing theory Institutional theory Theory - Knowledge-based theory ofthe firm Media richness theory Organizational information processing theory Organizational...
... 80) The examination ofthe activities required for an organization to learn, led us to the consideration ofthe following levels of analysis At the core ofthe study ofthe learning process is the ... precision The study of IS agility needs to progress along the lines of a formal theorybuilding exercise The first step in the study of 21 Revisiting Agility to Conceptualize InformationSystems ... introduction ofthe euro and the Y2K issue had an influence in the ERP decision The influence ofthe sectoral adscription was supported partially These findings evidence a certain influence ofthe imitation...
... resources (the “soft underbelly” oftheinformation systems) Thus, the methodology can be valuable as a way to hedge and balance both current and future threats Also, the complexity ofinformation systems, ... resources (the “soft underbelly” oftheinformation systems) ; thus, the methodology can be valuable as a way to hedge and balance current and future threats Also, the complexity ofinformation systems, ... processing ofinformation is a key component in information systems, and the vulnerability of human and social systems must be addressed during a comprehensive evaluation of risks On the Use of the...
... Proposition: The number of states in V is at most O(T OM P ) Proof: Overall there are T decision points and the number of possible sets K of models in the pull-off tables is M +P −1 The number of possible ... violations) ofthe current partial solution, which is the sum of arc weights along the shortest path from the root node to the current node, and add the lower bound argument of equation (8), which is the ... problem (see Section 3), the number of nodes and the time necessary for the algorithms increases about linear with T We study the influence ofthe beam width BW on the performance of BS We set P = 10...
... systems, evaluation ofinformation systems, and the application of critical theory and actor-network theory in the field ofinformationsystems Lynette Kvasny is Assistant Professor ofInformation Sciences ... published in journals such as the Journal ofthe Association for Information Systems, Communications ofthe Association for Information Systems, TheInformation Society and Information Technology and ... describe the organization ofthe book Included in this is a brief overview of each ofthe chapters The evolution of critical IS research Accompanying the development and diffusion of information...
... domain ofthe SJ; from them, he derives energy and motivation An important question for the future ofthe IS profession is whether the sphere of influence ofthe SJ is shrinking In days of basic, ... auxiliary, T is therefore the dominant function ofthe ISTP The tertiary function is the opposite ofthe auxiliary, in this case, N, and the inferior function is the opposite ofthe dominant, in ... much ofthe work is factual and could be considered “tangible.” With the increasing roles of intuitives in thesystemsofthe future, the breakdown deserves further investigation Distributions of...
... sensitive information However, the security flaw overlooked in most of these current systems is that they fail to consider the security impact of modifying the surveillance videos There are a number of ... in the modified video Perceptual quality ofthe embedded video is also of great importance as it effects the usability ofthe video for further processing Robustness refers to the survivability of ... discussion to the data hiding unit used for integrating the privacy information with the modified video The privacy information contains the image objects ofthe individuals carrying the RFID tags,...
... position to one on the extreme periphery ofthe network Of note are the means for information receiving for the CGIAR centers and the Natural Resources College With the exception ofthe International ... individual sections ofthe DARS, not the DARS as a whole Therefore, the main focus ofthe SNA is on interactions with individual DARS sections (listed in Table 1), the results of which we present ... for the purpose ofthe study provided sufficient information to allow their inclusion in the analysis Table 2.1—Organizations included in the social network analysis of Malawi’s NARS Type of organization...
... such studies might make use of theories, their aim is not to contribute to the development of those theories but rather to use them in practice Within the group of theory-oriented case studies, ... use of theories or theoretical notions, their aim is not to contribute to the development of those theories We use the label “practice-oriented” for this category of case studies The results of ... trade-offs all the time 1.3.6 Chapters 8–9: Theory -building research In Chapter we discuss theory -building research in general, and in Chapter the theory -building case study (aimed at the “discovery”...
... example of an index built on Perm No ofthe Employee table (the upper part) and the corresponding index matrix ID (the lower part) In the figure, the branching factor ofthe B+-tree b = 4, and the ... Table The numbers pointed to by arrows below the keys ofthe leaf nodes are the column addresses ofthe data tuples with those keys Encoding Units of Data Tuples Let the column size ofthe tuple ... encloses the requested data, and although the dimensions ofthe bounding box are fixed, the position ofthe bounding box can be random around the requested data In real applications, the position of the...
... secure the services of eminent members of appropriate professions in the examination of policy matters pertaining to the health ofthe public The Institute acts under the responsibility given to the ... IS&T NEEDS • Information fusion and understanding, the process of combining information to estimate and predict the state ofthe battlespace • Information management, the harnessing ofinformation ... software, the subject of Chapter 4, on the effective distribution and management ofinformation throughout the network, which is the prime topic of Chapter 5, and on the effective employment of...
... to the development of fuzzy systems theory, specifically for the development ofsystems for information processing and knowledge discovery The contributors to this volume review the state ofthe ... co-organizers ofthe NATO workshop A special mention for the gracious cooperation ofthe Rector ofthe University of Tras-osMontes e Alto Douro/CETAV, Prof Torres Pereira, for the Vice-Rector ofthe same ... phenomenon ofthe second half ofthe 20* century It is closely connected with two important generalizations in mathematics One of them is the generalization of classical measure theory [7] to the theory...
... conceptualization ofthe term, and hence ofthe scope ofthe book, is presented in Figure 0.1 The inner circle ofthe figure depicts theinformationsystems (IS) strategy Whether explicitly articulated, ... split the data processing discipline: the database designer, data analyst, data administrator joined the ranks ofthesystems analyst and systems designer At the other end ofthe scale, the programming ... objective Three ofthe dimensions of IS strategy proferred in Galliers (1991), drawing from Earl (1989), form the major topics ofthe readings in the first section ofthe book – information, information...