Search results for "Information Systems"

showing 10 items of 1926 documents

Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research

2021

Information systems (IS) scholars have proposed guidelines for interpretive, mixed methods, and design science research in IS. Because many of these guidelines have also been suggested for evaluating what good or rigorous research is, they may be used as a checklist in the review process. In this paper, we raise the question: To what extent do research guidelines for interpretive, mixed methods, and design science research offer evidence that they can be used to evaluate the quality of research. We argue that scholars can use these guidelines to evaluate what good research is if there is compelling evidence that they lead to certain good research outcomes. We use three well-known sets of gu…

mixed methodsNoticeComputer sciencebusiness.industrydesign sciencemetodologiaInternet privacyresearch guidelinestietojärjestelmätiedeDesign sciencePermissionComputer Science Applicationstheory of scientific methodologyServertutkimusmenetelmätInformation systemtieteenteoriainterpretive researchDesign science researchbusinessCitationPublicationInformation SystemsJournal of the Association for Information Systems
researchProduct

Estereotipos asociados al cuerpo humano: análisis de aplicaciones móviles usadas en la educación físico-deportiva

2022

Institutions and educators are massively and uncritically integrating digital curricular materials in their teaching praxis. This article aims to uncover whether health and fitness APP images convey or legitimize stereotypes linked to bodies, focusing on gender, race, somatotype and physical activity practice. We also analyse whether these apps are adequate for the recommended age or whether they are designed by physical education professionals. For that purpose, we designed a descriptive, comparative study based on content analysis on a sample of 373 images from 128 apps selected through a PRISMA review and a pilot test. Our results report that bodies reproduce a series of stereotypes: of …

mobile appsstereotypesComputer Networks and Communicationsbody imageimage interpretationdigital competenceestereotiposComputer Science ApplicationsEducationaplicaciones móvilesTelèfon mòbilinterpretación de imágenes:PEDAGOGÍA [UNESCO]UNESCO::PEDAGOGÍAimagen corporalInformation Systemscompetencia digital docente
researchProduct

Customers' Perceived Risk and Trust in Using Mobile Money Services—an Empirical Study of Ghana

2019

Although mobile money (MM) has been explored in the existing literature, the roles of trust and risk in MM use have received little attention from researchers. Furthermore, many of the existing studies have treated these constructs as unidimensional. The extant literature also shows that perceived risk has received little attention from researchers who have conducted studies on MM. Thus, the objective of this study is to examine the roles of trust and perceived risk in customers' intent to adopt MM services in Ghana. Both trust and perceived risk were broken down into various dimensions. The study involved 671 respondents who were selected via an intercept approach and an online survey. Str…

mobile networkstrustGhanaperceived riskComputer Science ApplicationsManagement Information SystemsRisk perceptionasiakkaatEmpirical researchmobiilipalvelutluottamusverkkopankitMobile paymentmobile moneyBusinessmobile paymentsMarketingta512riskitpankkipalvelutInternational Journal of E-Business Research
researchProduct

About time

2019

Purpose The purpose of this paper seeks to develop a motivation-based complementary framework for temporally dynamic user preferences to facilitate optimal timing in web personalisation. It also aims to highlight the benefits of considering user motivation when addressing issues in temporal dynamics. Design/methodology/approach Through theory, a complementary framework and propositions for motivation-based temporal dynamics for further testing are created. The framework is validated by feeding back findings, whereas some of the propositions are validated through an experiment. Findings The suggested framework distinguishes two ways (identifying/learning and shifting) of using a motive-base…

motivaatioMatching (statistics)General Computer Sciencefundamental motives frameworkComputer sciencetemporal dynamicsmieltymyksetmedia_common.quotation_subjectajoitus (suunnittelu)käyttäjäpsykologiaData sciencePreferencePersonalizationEmpirical researchpreference matchingOriginalityDynamics (music)web personalizationräätälöintiPractical implicationsverkkopalvelutInformation Systemsmedia_commonJournal of Systems and Information Technology
researchProduct

Explaining Causes Behind SQL Query Formulation Errors

2020

This Full Research Paper presents the most prominent query formulation errors in Structured Query Language (SQL), and maps these errors to their cognitive explanations. Understanding query formulation errors is a key to teaching SQL. more effectively. However, studies on what kind of errors novices struggle with are relatively scarce when compared to, for example, programming languages. Although committing errors is a crucial part in learning, some errors are relatively easy to fix, and their commonness is not necessarily an indication of their difficulty. Other errors, however, halt the learning process, and are never fixed by the query writer. Using a previously established error taxonomy…

noviceSQLoppiminenComputer scienceJoins02 engineering and technologySemanticscomputer.software_genrekyselykieletohjelmointikieletSet (abstract data type)020204 information systems0202 electrical engineering electronic engineering information engineeringdatabasecomputer.programming_languageeducationSQLSyntax (programming languages)business.industry05 social sciences050301 educationRelational operatorerrorStructured Query Language (SQL)koulutusvirheetArtificial intelligencebusiness0503 educationcomputerNatural language processingNatural language2020 IEEE Frontiers in Education Conference (FIE)
researchProduct

OPTEER, un dispositif de connaissance et d’analyse territoriale par et pour les acteurs de la transition énergétique

2018

International audience; The aim of this article is to illustrate, through the implementation and exploitation of the OPTEER platform (Territorial Energy Observation and Prospective at the Regional scale), how the various tools made available to territorial actors and what collective uses of geographic information have developed. Based on his experience of more than 10 years, around which crystallized operational developments and research experiments, are also evoked the new needs related to the requirements of the implementation of energy transition and the tracks of research,development and porting envisaged to guarantee the durability of the device.; Cet article a pour objectif d’illustre…

observation territorialedonnées climat-air-energie020209 energyanimation0211 other engineering and technologiesuses of information021107 urban & regional planning02 engineering and technologyGeneral Medicine[SHS.GEO]Humanities and Social Sciences/Geographyinformation systemsclimate-air-energy dataterritorial observation[ SHS.GEO ] Humanities and Social Sciences/Geographysystème d'information0202 electrical engineering electronic engineering information engineeringprospective territorialeusage de l'informationterritorial foresight
researchProduct

Software Complexity and Organization of Firms’ Offshoring Activities

2017

How does software complexity shape software providers’ offshoring tasks, and how do such firms organize their offshoring activity? These questions are important, since the global software development market is growing rapidly, offering new opportunities for software managers and entrepreneurs to distribute their activities geographically. Based on a multi-site case study of 12 software firms, we study connections between software complexity and the offshoring strategies selected. Our findings suggest that software firms select a variety of organizational structures for their offshoring activity, and that the selection is shaped by the complexity of the software in question. peerReviewed

offshoringKnowledge managementOffshoringComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryulkoistaminen05 social sciencesProgramming complexitysoftware firmsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyVariety (cybernetics)OutsourcingGlobal software developmentsoftware complexitySoftware020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringSelection (linguistics)Organizational structurebusiness050203 business & management
researchProduct

The state of research on software engineering competencies: A systematic mapping study

2022

Considering the critical role of software in modern societies, we face an urgent need to educate more competent software professionals. Software engineering competencies (SEC) are considered the backbone of successfully developing software products. Consequently, SEC has become a hotspot for software engineering research and practice. Although scientific literature on SEC is not lacking, to our knowledge, a comprehensive overview of the current state of SEC research is missing. To that end, we conducted an extensive and systematic review of the SEC literature. We provide an overview of the current state of research on SEC, with a particular focus on common SEC research areas. In addition to…

ohjelmistokehittäjätohjelmistotuotantoosaamisen kehittäminenCompetenciesMapping studyEssential competenciesCompetenceHardware and Architectureohjelmistoalasoftware developmentkompetenssiohjelmistokehityssystemaattiset kirjallisuuskatsauksetSoftwareInformation SystemsJournal of Systems and Software
researchProduct

Does openness and open access policy relate to the success of universities?

2013

This study takes a closer look at the Ranking Web of Universities and Ranking Web of Repositories rankings and tries to examine if there is a connection between these two rankings. Study is done by analyzing the success of University of Jyväskylä and the institutional repository JyX of the University in these rankings. Comparison shows that the JyX archive plays an important role in University’s success especially when analyzing the presence and openness of the University. By analyzing the success of eight European countries in these rankings and cross reading these findings with the development of relative citation impact shown in a report by the Finnish Academy, some interesting common tr…

open accessUniversity of JyväskyläJyxbusiness.industrymedia_common.quotation_subjectLibrary and Information SciencesPublic relationsCitation impactComputer Science ApplicationsInstitutional repositoryuniversity rankingsRankingjulkaisuarkistotPolitical scienceReading (process)open access policyOpenness to experienceavoimuusRanking Web of RepositoriesbusinessRanking Web of UniversitiesInformation Systemsmedia_commonInformation Services & Use
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct