Search results for "Edge"
showing 10 items of 3866 documents
Introduction to the designing and deploying next generation knowledge systems and knowledge intensive business processes minitrack
2013
Work systems and the knowledge systems enabling them need to be aligned with emerging technologies to ensure organizational acceptance and to support effective organizational value creation. Traditional, often monolithic knowledge system architectures need to be redesigned due to technological progress manifested by, for example, social software, mashups, and semantic technologies. In our view, these redesigns lead to a new class of knowledge systems that we call “Next Generation Knowledge Systems.” Project management (PM) involved in the design and deployment of knowledge systems differs from the PM involved in traditional IS projects. While design projects are essential in creating next g…
Activity Theory as a Lens to Identify Challenges in Surgical Skills Training at Hospital Work Environment
2015
In this paper the concepts from activity theory (AT) are applied for identifying the challenges and contradictions emerging in surgical residentâs curriculum based training at hospital. AT is utilised as a lens to identify contradictions that cause disturbances, problems, ruptures, breakdowns, and clashes which emerge while surgical skills training is implemented in a new way at hospital. We especially aim at finding solutions for contradictions which emerge while the new and old working culture are confronted and the workers are required to balance themselves between the patient care demands and workplace learning requirements. We are using the conceptual theoretical approach to describe…
Utilizing online serious games to facilitate distributed requirements elicitation
2015
Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …
Continuous Requirements Risk Profiling in Information Systems Development
2015
With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…
An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems
2012
Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …
An Information System Design Product Theory for Integrated Order, Transportation and Warehouse Management Systems
2013
Globalization, lead time reduction and cost pressures, and other factors make it nontrivial for most companies to devise and manage effective logistics services to meet client requirements. They are better off using the services of specialized third party logistics service providers. These providers compete fiercely and need to develop and improve their services continuously to gain competitive advantage. Integrating the logistics process for improving communication and coordination is the most feasible way for third party logistics providers to deal with these pressures. Yet, the extant literature provides little theoretical guidance for integrating the logistics life-cycle, including orde…
Consumers’ adoption of information services
2013
This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.
Conceptualizing the Value Co-Destruction Process for Service Systems: Literature Review and Synthesis
2017
This study conceptualizes the notion of value co-destruction by reviewing and synthesizing the scattered and scarce value co-destruction literature in interdisciplinary fields. Building on our synthesis, we outline a conceptual framework for the value co-destruction process consisting of three interrelated categories of key concepts. Our framework helps in identifying, analyzing and rectifying unwanted outcomes of a service process and highlighting the dynamic nature of value co-destruction in service systems. peerReviewed
Value Co-Creation and Co-Destruction in Online Video Games : An Exploratory Study and Implications for Future Research
2018
In this empirical study we studied how players of online video games co-create and co-destroy value. From players’ perceptions we identified that value co-creation and co-destruction occur amid themes of giving feedback and building relations. Feedback encourages players but it may also be harmful in the form of verbal abuse. Building relations relates to making friends in general but also on an international level. Building relations also relates to competition that creates a bad spirit. The most intensive interplay between value co-creation and codestruction was found in gaming groups. Gaming groups motivate players to engage in intense gameplay, but at the same time they are resourcedema…
Research literature clustering using diffusion maps
2013
We apply the knowledge discovery process to the mapping of current topics in a particular field of science. We are interested in how articles form clusters and what are the contents of the found clusters. A framework involving web scraping, keyword extraction, dimensionality reduction and clustering using the diffusion map algorithm is presented. We use publicly available information about articles in high-impact journals. The method should be of use to practitioners or scientists who want to overview recent research in a field of science. As a case study, we map the topics in data mining literature in the year 2011. peerReviewed