... societies, and individual and honorary membership schemes are also offered INFORMATION SYSTEMS RESEARCH Relevant Theory and Informed Practice IFIP TC8 / WG8.2 Year Retrospective: Relevant Theory and Informed ... papers and panel descriptions refereed for presentation at an International Federation of Information Processing (IFIP) Working Group 8.2 conference entitled Relevant Theory and Informed Practice: ... electronically, associate editors and reviewers to be assigned by the cochairs, reviews and reports to be garnered and evaluated, decisions and recommendations to be made and recorded, and accept/reject letters...
Ngày tải lên: 03/06/2014, 01:42
... the theory and methodology of economics In this thesis, three IS research problems: competition and compatibility between open source and proprietary software, IT investment value, advertising and ... interaction of development and use of IS with organizations” (Cushing 1990), and “understanding what is or might be done with computer and software technical systems, and the effects they have ... asymmetry between buyers and sellers These three studies demonstrate that economic theory and methodology can be used effectively in IS research to address problems related to IT and its application...
Ngày tải lên: 16/09/2015, 08:30
A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research
... structuration theory Administrative behavior, theory of Agency theory Argumentation theory Chaos theory Cognitive dissonance theory Cognitive fit theory Competitive strategy (Porter) Complexity theory ... Contingency theory Critical social theory Diffusion of innovations theory Dynamic capabilities Evolutionary theory Expectation confirmation theory Feminism theory Game theory General systems theory ... Equilibrium Theory Real options theory Resource-based view of the firm Resource dependency theory Self-efficacy theory SERVQUAL Social exchange theory Social cognitive theory Social network theory...
Ngày tải lên: 02/06/2014, 09:38
Technologies in Information Systems
... and personalized technologies, metadata and content standards, free and open source software, ubiquitous and pervasive technologies, intelligent agents, content/knowledge management systems and ... variety and exceptions, strong communication needs, weakly structured processes, networks and communities, and as requiring a high level of skill and expertise as well as a number of specific practices ... information and for networking between companies and research institutes The programs provide opportunities and financial support to carry out ambitious research and development projects and to build...
Ngày tải lên: 18/10/2013, 17:15
Finding and Fixing Vulnerabilities in Information Systems docx
... and robustness; techniques that improve intelligence, surveillance, and reconnaissance (ISR) and self-awareness; techniques for counterintelligence and denial of ISR and target acquisition; and ... insights into ISO standards and their use xxiii ACRONYMS ATO C2 C4I CARVER CC CERT CI COTS DARPA DDoS air tasking order command and control command, control, communications, computers, and intelligence ... Eight NEXT STEPS AND DISCUSSION Future Challenges and Opportunities Guiding the Evaluation of Critical Functions and Systems Additional Guidance and Automation: Spreadsheet and Web-Based...
Ngày tải lên: 15/03/2014, 22:20
Working Papers in Information Systems and Business Administration doc
... reshuffle a given initial sequence and rule violations are minimized The problem is formalized and problem-specific exact and heuristic solution procedures are developed and studied To speed up search, ... violations over all options o and cycles t π0 (i) and π1 (i) return the number of the model that is processed at cycle i before and after resequencing, respectively Constraints (2) and (3) enforce that ... sequencing rules (1:2 and 2:3) of length two and three, the active sequences have length one and two, respectively At decision point i = 2, we have two active sequences act1 = {0} and act2 = {1, 1}...
Ngày tải lên: 23/03/2014, 05:22
handbook of critical information systems research theory and application
... Wood-Harper, and J DeGross (eds), Relevant Theory and Informed Practice: Looking Forward from a 20-year Perspective on IS Research, Boston, MA: Kluwer Academic, pp 195–211 Klein, H.K and Hirschheim, ... process and understand users’ needs and requirements? How users experience the same process and create and co-create meaningful understanding of an IS design? How various IS users – employees and ... systems, and the application of critical theory and actor-network theory in the field of information systems Lynette Kvasny is Assistant Professor of Information Sciences and Technology, and a founding...
Ngày tải lên: 03/06/2014, 01:19
managing psychological factors in information systems work an orientation to emotional intelligence
... their maturity and effectiveness at work; and ii) to catalyze specific, continuing efforts among both IT professionals and MIS academics, which would lead towards a deeper understanding and broader ... (1961) Thus, between 1923 and 1941, Katherine Briggs and her daughter Isabel Briggs Myers studied Jungian theory in more depth and observed personalities in terms of the theory In 1941, a decision ... development and maintenance of systems where too much structure and predictability would not be desirable System planning and brainstorming, for example, thrive on flexibility and spontaneity Business and...
Ngày tải lên: 06/07/2014, 15:45
Báo cáo hóa học: " Research Article Video Data Hiding for Managing Privacy Information in Surveillance Systems" ppt
... protection system and its components Section introduces the data hiding framework for managing privacy information and various embedding techniques and perceptual distortion and rate models Keeping ... ranges of D and R so that varying δ translates to trading-off between D and R As such, NF is not a free parameter and is determined based on the particular compression mechanism On the other hand, the ... The stages and states of the DP algorithm and the optimal path/solution coefficients will break the run-length pattern into two and the bit-rate increase will depend on the original and the resulting...
Ngày tải lên: 22/06/2014, 00:20
Tài liệu Who Talks to Whom in African Agricultural Research Information Networks? ppt
... Breeding, Soils and Chemistry, and Horticulture) Plant Protection and Quarantine Services and Technical Services have very high means for both information sending and receiving, and high levels ... experience and knowledge and to access its own information networks This would help institutions collaborate and share information, and facilitate linkages between the private sector and CGIAR center and ... measures to identify and analyze networks within and between organizations (Knoke and Yang 2007, 2008; Scott 1987) It helps to identify information pathways, brokers, and gatekeepers, and it supports...
Ngày tải lên: 21/02/2014, 01:20
Tài liệu land resources information systems for food security in sadc countries ppt
Ngày tải lên: 23/02/2014, 04:20
Research " INFORMATION ENGINEERING IMPLEMENTATION ISSUES: AN INFORMATION SYSTEMS MANAGER''''S PERSPECTIVE " pdf
Ngày tải lên: 07/03/2014, 02:20
Jan dul, tony hak case study methodology in business research (2007)
... research 30 3.1 Theory- oriented and practice- oriented research 3.1.1 General research objectives of theory- oriented and practice- oriented research 3.1.2 Orientation: how to choose between theory- oriented ... between practice- oriented research and theory- oriented research, and discuss general features of research objectives for each of these two types We define practice and we formulate the aim of practice- oriented ... practice- oriented case studies, theory- building case studies and theory- testing case studies) in one consistent methodological framework We define methodological notions (such as theory , “theorybuilding”,...
Ngày tải lên: 22/03/2014, 22:36
databases in networked information systems 7th international workshop, dnis 2011, aizu-wakamatsu, japan, december 12-14, 2011 proceedings
... data rich applications and data management services In most cases and especially with Platform-as-a-Service (PaaS) and Softwareas-a-Service (SaaS), users cannot control and audit their own data ... discuss the relevant techniques and present a framework based on secure index that targets to support multiple common database queries and strikes a good balance between functionality and confidentiality ... confidentiality and query efficiency simultaneously for supporting common relational database queries (i.e., range queries and aggregation queries) and database updates (i.e., data insertion and deletion)...
Ngày tải lên: 31/05/2014, 00:13
basic research in information science and technology for air force needs
... command -and- control situation relative to the perspective (rank) of the user and the granularity (detail of the information) In other words, one must understand and characterize the most likely and ... vehicles and the networks are taskable by groundand air-based commanders • Mixed-reality training environments Research to enable training for air crews, command post staff, and commanders in ... deadlines, and congestion control, all based on network coding • Network performance optimization, building on dynamic (convex and nonconvex) programming, game theory, and control theory • Policy-based...
Ngày tải lên: 31/05/2014, 23:40
systematic organisation of information in fuzzy systems
... reduction of relevant uncertainty It is shown how the emergence of fuzzy set theory and the theory of monotone measures considerably expanded the framework for formalizing uncertainty and the associated ... This theory, which was extensively developed by Shafer [41], is usually referred to as evidence theory or Dempster-Shafer theory In this theory, lower and upper probabilities are called belief and ... constraint, in which case r = p, X is a random variable and R is its probability distribution; random-set constraint, r = rs, in which case X is set-valued random variable and R is its probability distribution;...
Ngày tải lên: 01/06/2014, 11:53