truth journals and politics the case of the mis quarterly

information systems research relevant theory and informed practice

information systems research relevant theory and informed practice

... Legitimacy of the Information Systems Discipline Across the Atlantic Frantz Rowe, Duane P Truex III, and Lynnette Kvasny 83 Contents vi Truth, Journals, and Politics: The Case of the MIS Quarterly ... proved themselves critical in the best senses of the word and in the best traditions of WG 8.2, and we, the program chairs, tried to the same In the interest of seeing more diversity in thought and ... VUMAN) and Computation (UMIST) The latter will be renamed the School of Informatics and will concentrate on the development of its historical strengths on the applied side of the discipline of Computing...

Ngày tải lên: 03/06/2014, 01:42

769 472 0
Three applications of economic theory and methodology in information systems research

Three applications of economic theory and methodology in information systems research

... externalities for the open source and proprietary software Thus, the price and profit of the proprietary software vary correspondently I compare the maximum profit of the 17 proprietary software under ... utilities of open source and proprietary software consumers respectively; p * and π * are the equilibrium price and profit of the proprietary software; M and M represent the equilibrium market share of ... give the equilibrium outcomes when the base-level quality of the proprietary software is different from that of the open source software Suppose the open source software and the proprietary software...

Ngày tải lên: 16/09/2015, 08:30

131 1,3K 0
A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research

A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research

... position in the BoK, explain the importance of the article, compare and contrast the findings and position of the article with other articles from the BoK, and evaluate the findings of the article ... list of the main academic writing standards or code of conduct violations and their definitions misrepresenting the work of others presenting speculations or general claims of others as if they ... advantage of knowledge and discoveries of other researchers will be able to expand the BoK further However, ‘standing on the shoulders of midgets’ will not provide much of a horizon for the novice...

Ngày tải lên: 02/06/2014, 09:38

32 467 0
Technologies in Information Systems

Technologies in Information Systems

... consisting of components of different nature, based on the semantic and the agent technologies The authors present the general idea and some emergent issues of GUN and describe the current state of the ... following levels of analysis At the core of the study of the learning process is the distinction between two levels of analysis: ontological and epistemological On the one hand, the epistemological ... determine the presence of certain ideas and/ or concepts The transcripts of the interviews were analyzed and coded into the three categories of: interviewee’s definition of IS agility, agreement of the...

Ngày tải lên: 18/10/2013, 17:15

351 319 1
Finding and Fixing Vulnerabilities in Information Systems docx

Finding and Fixing Vulnerabilities in Information Systems docx

... research and development center supported by the Office of the Secretary of Defense, the Joint Staff, the unified commands, and the defense agencies under Contract DASW01-01-C-0004 Library of Congress ... appropriateness of the security techniques identified in the matrix to the particular user type and attack stage Chapters Five and Six describe step of the methodology and support the selection of security ... systems, and the vulnerability of human and social systems must be addressed during a comprehensive evaluation of risks On the Use of the “Object” Concept The use of an “object” is a common theoretical...

Ngày tải lên: 15/03/2014, 22:20

134 520 0
Working Papers in Information Systems and Business Administration doc

Working Papers in Information Systems and Business Administration doc

... study the influence of the beam width BW on the performance of BS We set P = 10 and varied BW between 10 and 200 in steps of 10 Figures 4(a) and 4(b) show the number of explored nodes and the time ... violations) of the current partial solution, which is the sum of arc weights along the shortest path from the root node to the current node, and add the lower bound argument of equation (8), which is the ... compared to the optimal algorithms We study how the performance of A*, BS, and IBS depends on the number of pull-off tables P and the number of production cycles T Figures 3(a) and 3(b) show the average...

Ngày tải lên: 23/03/2014, 05:22

23 405 0
handbook of critical information systems research theory and application

handbook of critical information systems research theory and application

... understanding of these issues Thus, Part II of the handbook provides examples of the application of critical IS research In these chapters we can see the ways in which the research agenda, the theories ... understand the historical and cultural forces involved in the social relations of IS use The second case considers home e-shopping and the domestication and consumption of ICTs within the context of ... in the course of their practical life, and as a consequence of their endeavours to understand or explain it for themselves Social life – of which these endeavours are part – on the other hand,...

Ngày tải lên: 03/06/2014, 01:19

441 404 0
managing psychological factors in information systems work an orientation to emotional intelligence

managing psychological factors in information systems work an orientation to emotional intelligence

... is therefore the dominant function of the ISTP The tertiary function is the opposite of the auxiliary, in this case, N, and the inferior function is the opposite of the dominant, in this case, ... tasks, therefore, are the natural domain of the SJ; from them, he derives energy and motivation An important question for the future of the IS profession is whether the sphere of influence of the ... is the opposite of the dominant Of the four functions (four possible middle letters), the dominant is the most preferred and the inferior is least preferred Also, the letters for the dominant and...

Ngày tải lên: 06/07/2014, 15:45

291 1,4K 1
Báo cáo hóa học: " Research Article Video Data Hiding for Managing Privacy Information in Surveillance Systems" ppt

Báo cáo hóa học: " Research Article Video Data Hiding for Managing Privacy Information in Surveillance Systems" ppt

... 3: The stages and states of the DP algorithm and the optimal path/solution coefficients will break the run-length pattern into two and the bit-rate increase will depend on the original and the ... pattern In the H.263 standard, a runlength pattern is defined as a run of zero coefficients followed by a nonzero coefficient The length of the run and the nonzero coefficient determine the length of the codeword, ... t(i, j) is the frequency sensitivity threshold, c(0, 0, k) is the DC term of block k, and c0 is the average luminance of the image [21] The higher the mask value, the less distortion the corresponding...

Ngày tải lên: 22/06/2014, 00:20

18 364 0
Tài liệu Who Talks to Whom in African Agricultural Research Information Networks? ppt

Tài liệu Who Talks to Whom in African Agricultural Research Information Networks? ppt

... Denmark, Finland, France, Germany, India, Ireland, Italy, Japan, the Netherlands, Norway, the Philippines, South Africa, Sweden, Switzerland, the United Kingdom, the United States, and the World ... periphery of the network Of note are the means for information receiving for the CGIAR centers and the Natural Resources College With the exception of the International Potato Center, they remain ... by their position in the network, lie on the periphery of the network This is also the case for some private-sector companies and industry associations However, at the same time, we see that the...

Ngày tải lên: 21/02/2014, 01:20

24 327 0
Jan dul, tony hak case study methodology in business research (2007)

Jan dul, tony hak case study methodology in business research (2007)

... both, and the two really distinctive features of the case study in comparison to the survey and the experiment create our definition of the case study: A case study is a study in which (a) one case ... depth of the research and progress of the project Then it is important to justify decisions and to estimate its consequences for the outcome of the research 1.4.3 Glossary and flowcharts One of the ... the literature, namely the fact that a case study basically is an inquiry of only one single instance (the case) , or sometimes a small number of instances, of the object of study Yin’s and others’...

Ngày tải lên: 22/03/2014, 22:36

329 551 0
databases in networked information systems 7th international workshop, dnis 2011, aizu-wakamatsu, japan, december 12-14, 2011 proceedings

databases in networked information systems 7th international workshop, dnis 2011, aizu-wakamatsu, japan, december 12-14, 2011 proceedings

... example of an index built on Perm No of the Employee table (the upper part) and the corresponding index matrix ID (the lower part) In the figure, the branching factor of the B+-tree b = 4, and the ... encloses the requested data, and although the dimensions of the bounding box are fixed, the position of the bounding box can be random around the requested data In real applications, the position of the ... children, and every node of I has [ (b − 1)/2 , b − 1] keys To accommodate the maximum number of children pointers and keys, we fix the size of a tree node to 2b + 1, and let the column size of the...

Ngày tải lên: 31/05/2014, 00:13

334 1,2K 0
basic research in information science and technology for air force needs

basic research in information science and technology for air force needs

... from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine The members of the committee responsible for the report were chosen for their ... command -and- control situation relative to the perspective (rank) of the user and the granularity (detail of the information) In other words, one must understand and characterize the most likely and ... Academy of Sciences to secure the services of eminent members of appropriate professions in the examination of policy matters pertaining to the health of the public The Institute acts under the responsibility...

Ngày tải lên: 31/05/2014, 23:40

117 362 0
systematic organisation of information in fuzzy systems

systematic organisation of information in fuzzy systems

... volumes of his selected papers published in the period 1965–95 [24, 25] 3 Theories of Uncertainty The emergence of fuzzy set theory and the theory of monotone measures considerably expanded the framework ... co-organizers of the NATO workshop A special mention for the gracious cooperation of the Rector of the University of Tras-osMontes e Alto Douro/CETAV, Prof Torres Pereira, for the Vice-Rector of the same ... terms of reduction of relevant uncertainty It is shown how the emergence of fuzzy set theory and the theory of monotone measures considerably expanded the framework for formalizing uncertainty and...

Ngày tải lên: 01/06/2014, 11:53

409 463 0
w