0000000000323283

AUTHOR

Tero Vartiainen

showing 19 related works from this author

How is Project Success Affected by Replacing the Project Manager?

2007

Project successEngineeringEngineering managementbusiness.industryCritical success factorProject sponsorshipSuccess factorsSoftware engineeringbusinessProject manager
researchProduct

Errors and Complications in SQL Query Formulation

2018

SQL is taught in almost all university level database courses, yet SQL has received relatively little attention in educational research. In this study, we present a database management system independent categorization of SQL query errors that students make in an introductory database course. We base the categorization on previous literature, present a class of logical errors that has not been studied in detail, and review and complement these findings by analyzing over 33,000 SQL queries submitted by students. Our analysis verifies error findings presented in previous literature and reveals new types of errors, namely logical errors recurring in similar manners among different students. We…

Information managementlanguagesSQLkieli ja kieletGeneral Computer ScienceComputer scienceexercise designListing (computer)02 engineering and technologytietotekniikkaQuery languageDatabase designkyselykieletEducation020204 information systemsstandardointi0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDEDUCATIONerrorstietojenkäsittelycomputer.programming_languageComplement (set theory)inhimilliset tekijätta113query languagesstandardizationClass (computer programming)SQLInformation retrievalInformationSystems_DATABASEMANAGEMENT020207 software engineeringCategorizationvirheetcomputerhuman factors
researchProduct

Replacement of the Project Manager Reflected Through Activity Theory and Work–System Theory

2010

Replacement of the project manager (RPM) is a known phenomenon in information systems (IS) projects, but scant attention is given to it in the project management or IS literature. Given its critical effects on the project business, the organization, the project team, and the project manager, it should be studied in more depth. We identified factors which make RPM occurrences inherently different and we show that work-system theory and activity theory give comprehensive lenses to advance research on RPM. For the future research on RPM we identified three objectives: experiences on RPM, process model for RPM, and organizational culture’s influence on RPM occurrences.

EngineeringProcess managementKnowledge managementbusiness.industryProcess (engineering)PhenomenonInformation systemOrganizational cultureActivity theoryProject managementbusinessProject teamProject manager
researchProduct

Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice

2004

.  Several approaches for and against the unauthorized copying of software have been proposed. These approaches can be divided into two categories: moral reasoning and solution. These categories of approaches to unauthorized copying of software are scrutinized in the light of Kohlberg's theory of Cognitive Moral Development. The results suggest that most approaches presenting solutions to unauthorized copying of software have focused attention on the lower levels of moral development, while approaches at the highest stage are few and far between. No single approach covers all the stages of moral development. The implications of this analysis for practice and research are discussed.

CopyingComputingMilieux_THECOMPUTINGPROFESSIONComputer Networks and Communicationsbusiness.industryComputer ethicsInternet privacyComputingMilieux_LEGALASPECTSOFCOMPUTINGCognitionMoral reasoningSoftwareMoral developmentLawrence Kohlberg's stages of moral developmentbusinessPsychologySocial psychologySoftwareInformation SystemsInformation Systems Journal
researchProduct

Co-Creation of Value for IT-Enabled Services : A Case of Geocaching

2013

This study explores how value is co-created in one particular IT-enabled service, geocaching. Consumer Information Systems (CIS) framework is used as a sensitizing framework to study experienced geocachers' (n=14) perceptions of what they value in geocaching. The following core values emerged that motivate people to co-create value in geocaching: challenging oneself and others, joy of success, learning, and social relations. The results reveal that geocaching is distinctively hedonic in nature, as people pursue happiness and utility via geocaching. Even support for the geocaching community was motivated by such values. In addition, the results reveal that the environment of geocaching and s…

Value (ethics)media_common.quotation_subjectInternet privacyContext (language use)information systemskäyttäjälähtöisyysConsumer informationGlobal Positioning SystemCo-creationInformation systemSociologymedia_commontietojärjestelmätService (business)ta113geographic information systemsbusiness.industryyhteisöllisyysgeokätköilyPublic relationsSocial relationvalue co-creationHappinessbusinessIT enabled servicesmotivointi
researchProduct

Unauthorized copying of software

2007

Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and we then asked how these results compared with the theoretical reasons offered by computer ethics scholars. The results shed a new light on students' mor…

CopyingComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryComputer scienceComputer ethicsPublic relationsIntellectual propertyComputer usersSoftwareEmpirical researchOrder (business)Computer softwareGeneral Earth and Planetary SciencesbusinessGeneral Environmental ScienceACM SIGCAS Computers and Society
researchProduct

Morally Successful Collaboration between Academia and Industry — A Case of a Project Course

2006

Academia-industry collaboration is common in the IT-field, and it includes training programs, research centre activities, and industry advisory boards (Watson and Huber 2000). For the industry, co-operation provides possibilities to acquire human resources and, for the academia, co-operation ensures that research and teaching activities are relevant. Regardless of its popularity little is known about moral issues relating to this phenomenon. This study intends to fill the gap in knowledge by determining the nature of moral conflicts perceived by clients, students, and instructors of a collaborative project course, and by formulating a framework to successfully getting grips with these confl…

EngineeringMoral developmentResearch centreWatsonbusiness.industryPhenomenonInternalism and externalismEngineering ethicsHuman resourcesbusinessPopularityMoral dilemma
researchProduct

Continuous Requirements Risk Profiling in Information Systems Development

2015

With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…

ta113Requirements managementIterative and incremental developmentProcess managementKnowledge managementbusiness.industryComputer sciencerisk profilingRisk management information systemsvaatimusmäärittelytinformation systemsrisk managementinformation systems developmentohjelmistosuunnitteluSoftwareISDInformation systemriskianalyysiohjelmistokehitysbusinessDesign methodsRisk managementsoftware engineeringtietojärjestelmätAgile software development2015 48th Hawaii International Conference on System Sciences
researchProduct

End-user ethics teaching: issues and a solution based on universalization

2005

The ethical aspects of computing have gained increasing attention at the professional level of education in universities. As a result, several works have been produced relating to computer ethics education at this level. However, the ever-increasing role and usage of computer technology means that ethical education related to computing is also necessary for non-professional/non-major computing/information systems students. Due to the differences between professional and non-professional education in terms of substance, along with pragmatic reasons (e.g. lack of resources), the ordinary end-users need a different educational program. This paper first explores issues (i.e. challenges and prob…

Knowledge managementComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryEnd userComputer scienceComputer ethicsEducational technologyUniversalizationEnd-user computingInformation ethicsInformation systemEngineering ethicsbusinessEducational programProceedings of the 34th Annual Hawaii International Conference on System Sciences
researchProduct

Micro-Level Mechanisms to Support Value Co-Creation for Design of Digital Services

2023

This study identifies micro-level value co-creation mechanisms that support the design of digital services. As services are now becoming digital—or at least digitally enabled—how to design digital services that enable value co-creation between a service provider and customers has become an increasingly important question. Our qualitative research study provides one answer to this question. Based on 113 in-depth laddering interviews analyzed using interpretive structural modeling, our study shows that value co-creation mechanisms differ between business-to-business and customer-to-customer digital service types. We identify five mechanisms to support value co-creation in the design of digit…

Organizational Behavior and Human Resource Managementdesign of digital servicesSociology and Political Sciencemicro-level mechanismsarvonluontiladdering interviewpalvelumuotoiluvalue co-creationsähköiset palvelutinterpretive structural modelingtheorykvalitatiivinen tutkimusqualitative researchInformation Systems
researchProduct

Attitudes to and factors affecting unauthorized copying of computer software in Finland

2005

Several quantitative studies have sought to determine the factors affecting the unauthorized copying of software, particularly in North America. However, we find no statistically reliable studies on the situation in Europe. In order to address this gap in the literature, we explored the attitudes to and factors affecting the unauthorized copying of computer software of 249 Finnish university students: nine hypotheses derived from the existing research on unauthorized copying of computer software or theories of ethics were tested. A quantitative questionnaire was used as the research instrument. The results shed new light on the characteristics of users and factors affecting the unauthorized…

CopyingInfluence factorbusiness.industryInternet privacyGeneral Social SciencesComputingMilieux_LEGALASPECTSOFCOMPUTINGHuman-Computer InteractionSoftwareArts and Humanities (miscellaneous)Computer softwareDevelopmental and Educational PsychologyPsychologybusinessSocial psychologyBehaviour & Information Technology
researchProduct

Replacing Project Managers in Information Technology Projects

2015

According to anecdotal evidence, project managers working on information technology (IT) projects are occasionally replaced, although the literature on information systems (IS) and project management (PM) makes little mention of it. With a view to narrowing this knowledge gap the authors examined the reasons behind the practice. The authors took an interpretive approach to the data gathering and analysis, and collected descriptions about replacing project managers (RPM) from interviews and questionnaires (n=43). The concept of contradiction served as a lens through which to identify the underlying reasons. Contradiction refers to statements asserting or expressing the opposite of another st…

ta113EngineeringKnowledge managementData collectionbusiness.industryIT project managementmedia_common.quotation_subjectContradictionsReplacementProject managerInformation technologyContext (language use)Public relationsTurnoverManagement of Technology and InnovationPhenomenonComputer Science (miscellaneous)Information systemContradictionProject managementbusinessta512Anecdotal evidencemedia_commonInternational Journal of Human Capital and Information Technology Professionals
researchProduct

Value Co-Creation and Co-Destruction in an IS Artifact: Contradictions of Geocaching

2016

In this paper we study how value co-creation and value co-destruction are present in an IS artifact. We apply the concept of contradiction (structural tension) to study an IS artifact, geocaching. Based on the analysis of interview data and discussion forum postings, we identified the following contradictions: i) introducing secret society to outsiders, ii) geocaching by breaking its rules, iii) experiencing nature while consuming it, iv) building community occurs with competition. These contradictions show that value co-creation and co-destruction interacts in this IS artifact. Based on the results, we propose that IS research should adopt the concepts of value co-creation and co-destructi…

media_common.quotation_subjectContext (language use)geocaching02 engineering and technologyArtifact (software development)Competition (economics)World Wide Webvalue020204 information systems0502 economics and businessco-destruction0202 electrical engineering electronic engineering information engineeringCo-creationInformation systemContradictionSociologymedia_commonta11305 social sciencesEpistemologySecret societycommunityIS artifacts050211 marketingValue (mathematics)co-creation2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

Value Co-Creation and Co-Destruction in Online Video Games : An Exploratory Study and Implications for Future Research

2018

In this empirical study we studied how players of online video games co-create and co-destroy value. From players’ perceptions we identified that value co-creation and co-destruction occur amid themes of giving feedback and building relations. Feedback encourages players but it may also be harmful in the form of verbal abuse. Building relations relates to making friends in general but also on an international level. Building relations also relates to competition that creates a bad spirit. The most intensive interplay between value co-creation and codestruction was found in gaming groups. Gaming groups motivate players to engage in intense gameplay, but at the same time they are resourcedema…

ta113arvoketjutKnowledge managementbusiness.industryComputer sciencevideopelitarvonluonti05 social sciencesExploratory researchComputingMilieux_PERSONALCOMPUTING050109 social psychologyvideo gamesOnline videovalue co-creationvalue co-destructionpelitpelillistäminen0502 economics and businessCo-creation050211 marketing0501 psychology and cognitive sciencesgamificationbusinessValue (mathematics)games
researchProduct

A Study of Computer Science Students' Ethical Attitudes and Its Implications to

2003

In this study I investigated 198 Finnish computer science students' attitudes concerning computer usage and professional practic e in computing to determine content for computer ethics education. Students were to analyse acceptability of individuals' behavi our in 23 cases. It is postulated that divergence of attitudes in cases lead students to present opposing viewpoints during smal l group discussions and thus to develop moral sensitivity and judgment in students. The following issues emerged in this study: cracking to computer systems, using a database of an employer for one's own purposes, honesty in client relationships, acknowled ging someone's contribution, keeping software without p…

CopyingComputingMilieux_THECOMPUTINGPROFESSIONDivergence (linguistics)business.industryComputer ethicsmedia_common.quotation_subjectApplied psychologyViewpointsSoftwareComputer usageHonestyGeneral Earth and Planetary SciencesSociologybusinessSocial psychologyGeneral Environmental Sciencemedia_commonACM SIGCAS Computers and Society
researchProduct

Omission of Quality Software Development Practices : A Systematic Literature Review

2018

Software deficiencies are minimized by utilizing recommended software development and quality assurance practices. However, these recommended practices (i.e., quality practices) become ineffective if software professionals purposefully ignore them. Conducting a systematic literature review (n = 4,838), we discovered that only a small number of previous studies, within software engineering and information systems literature, have investigated the omission of quality practices. These studies explain the omission of quality practices mainly as a result of organizational decisions and trade-offs made under resource constraints or market pressure. However, our study indicates that different aspe…

General Computer ScienceComputer scienceProcess (engineering)korjausvelkamedia_common.quotation_subjectsoftware managementohjelmistotuotantoammattietiikka02 engineering and technologyTheoretical Computer Science020204 information systemsPhenomenon0202 electrical engineering electronic engineering information engineeringInformation systemQuality (business)informational systems developmentmedia_commontietojärjestelmätbusiness.industrySoftware development020207 software engineeringlaatulaadunvarmistusystematic literature reviewsohjelmistosuunnitteluSystematic reviewRisk analysis (engineering)technical debtTechnical debtbehavioral software engineeringbusinessohjelmistokehitysQuality assurance
researchProduct

Financial literacy in the digital age : A research agenda

2023

Digital innovations are transforming financial services and resulting changes in consumer behavior and personal money management. Diffusion of pervasive digital technologies offers individuals quick and easy access to various digital services bringing opportunities and challenges into their personal money management. The study aimed to explore how digitalization affects individuals’ financial literacy and financial capability. As a result, we identified three main themes in the intersection of finance and digitalization: Fintech, Financial behavior in digital environments, and Behavioral interventions. We propose directions for measuring digital financial literacy, updates to the financial …

digital financial servicesfinancial literacytaloustietofinancial capabilitytalouskasvatuspersonal money managementsähköiset palvelutkuluttajakäyttäytyminendigital financial literacy
researchProduct

Moral conflicts in a project course in information systems education

2005

Tero Vartiaisen väitöskirja kuvaa informaatioteknologian ammattilaisiksi opiskelevien ja työelämässä toimivien IT-ammattilaisten yhteistyöprojektissa kohtaamia moraalisia ongelmia. Hän tutki tietojenkäsittelytieteiden yliopisto-opintoihin kuuluvaa projektikurssia, jossa opiskelijaryhmät toteuttavat alan kehityshankkeita yrityksille. Hanke voi kohdistua esimerkiksi tietojärjestelmän tai organisaation tietojenkäsittelyprosessien kehittämiseen. Liike-elämän ja yliopiston välinen yhteistyö on vaativaa kaikille osapuolille. Vartiainen kartoitti asiakkaiden, opiskelijoiden ja yliopisto-ohjaajien kohtaamia moraalisia ongelmia. Hän keräsi tietoa osallistuvalla havainnoinnilla, haastatteluin, päiväk…

opiskelijatmoraalityöntekijättietotekniikkaetiikkayliopistotristiriidatyhteistyötietojenkäsittelyoppi
researchProduct

Supplemental Material - Micro-Level Mechanisms to Support Value Co-Creation for Design of Digital Services

2023

Supplemental Material for Micro-Level Mechanisms to Support Value Co-Creation for Design of Digital Services by Tuure Tuunanen, Juuli Lumivalo, Tero Vartiainen, Yixin Zhang, and Michael M. Myers in Journal of Service Research

FOS: Economics and business150310 Organisation and Management Theory150402 Hospitality Management
researchProduct