Search results for "Information Systems"
showing 10 items of 1926 documents
Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research
2021
Information systems (IS) scholars have proposed guidelines for interpretive, mixed methods, and design science research in IS. Because many of these guidelines have also been suggested for evaluating what good or rigorous research is, they may be used as a checklist in the review process. In this paper, we raise the question: To what extent do research guidelines for interpretive, mixed methods, and design science research offer evidence that they can be used to evaluate the quality of research. We argue that scholars can use these guidelines to evaluate what good research is if there is compelling evidence that they lead to certain good research outcomes. We use three well-known sets of gu…
Estereotipos asociados al cuerpo humano: análisis de aplicaciones móviles usadas en la educación físico-deportiva
2022
Institutions and educators are massively and uncritically integrating digital curricular materials in their teaching praxis. This article aims to uncover whether health and fitness APP images convey or legitimize stereotypes linked to bodies, focusing on gender, race, somatotype and physical activity practice. We also analyse whether these apps are adequate for the recommended age or whether they are designed by physical education professionals. For that purpose, we designed a descriptive, comparative study based on content analysis on a sample of 373 images from 128 apps selected through a PRISMA review and a pilot test. Our results report that bodies reproduce a series of stereotypes: of …
Customers' Perceived Risk and Trust in Using Mobile Money Services—an Empirical Study of Ghana
2019
Although mobile money (MM) has been explored in the existing literature, the roles of trust and risk in MM use have received little attention from researchers. Furthermore, many of the existing studies have treated these constructs as unidimensional. The extant literature also shows that perceived risk has received little attention from researchers who have conducted studies on MM. Thus, the objective of this study is to examine the roles of trust and perceived risk in customers' intent to adopt MM services in Ghana. Both trust and perceived risk were broken down into various dimensions. The study involved 671 respondents who were selected via an intercept approach and an online survey. Str…
About time
2019
Purpose The purpose of this paper seeks to develop a motivation-based complementary framework for temporally dynamic user preferences to facilitate optimal timing in web personalisation. It also aims to highlight the benefits of considering user motivation when addressing issues in temporal dynamics. Design/methodology/approach Through theory, a complementary framework and propositions for motivation-based temporal dynamics for further testing are created. The framework is validated by feeding back findings, whereas some of the propositions are validated through an experiment. Findings The suggested framework distinguishes two ways (identifying/learning and shifting) of using a motive-base…
Explaining Causes Behind SQL Query Formulation Errors
2020
This Full Research Paper presents the most prominent query formulation errors in Structured Query Language (SQL), and maps these errors to their cognitive explanations. Understanding query formulation errors is a key to teaching SQL. more effectively. However, studies on what kind of errors novices struggle with are relatively scarce when compared to, for example, programming languages. Although committing errors is a crucial part in learning, some errors are relatively easy to fix, and their commonness is not necessarily an indication of their difficulty. Other errors, however, halt the learning process, and are never fixed by the query writer. Using a previously established error taxonomy…
OPTEER, un dispositif de connaissance et d’analyse territoriale par et pour les acteurs de la transition énergétique
2018
International audience; The aim of this article is to illustrate, through the implementation and exploitation of the OPTEER platform (Territorial Energy Observation and Prospective at the Regional scale), how the various tools made available to territorial actors and what collective uses of geographic information have developed. Based on his experience of more than 10 years, around which crystallized operational developments and research experiments, are also evoked the new needs related to the requirements of the implementation of energy transition and the tracks of research,development and porting envisaged to guarantee the durability of the device.; Cet article a pour objectif d’illustre…
Software Complexity and Organization of Firms’ Offshoring Activities
2017
How does software complexity shape software providers’ offshoring tasks, and how do such firms organize their offshoring activity? These questions are important, since the global software development market is growing rapidly, offering new opportunities for software managers and entrepreneurs to distribute their activities geographically. Based on a multi-site case study of 12 software firms, we study connections between software complexity and the offshoring strategies selected. Our findings suggest that software firms select a variety of organizational structures for their offshoring activity, and that the selection is shaped by the complexity of the software in question. peerReviewed
The state of research on software engineering competencies: A systematic mapping study
2022
Considering the critical role of software in modern societies, we face an urgent need to educate more competent software professionals. Software engineering competencies (SEC) are considered the backbone of successfully developing software products. Consequently, SEC has become a hotspot for software engineering research and practice. Although scientific literature on SEC is not lacking, to our knowledge, a comprehensive overview of the current state of SEC research is missing. To that end, we conducted an extensive and systematic review of the SEC literature. We provide an overview of the current state of research on SEC, with a particular focus on common SEC research areas. In addition to…
Does openness and open access policy relate to the success of universities?
2013
This study takes a closer look at the Ranking Web of Universities and Ranking Web of Repositories rankings and tries to examine if there is a connection between these two rankings. Study is done by analyzing the success of University of Jyväskylä and the institutional repository JyX of the University in these rankings. Comparison shows that the JyX archive plays an important role in University’s success especially when analyzing the presence and openness of the University. By analyzing the success of eight European countries in these rankings and cross reading these findings with the development of relative citation impact shown in a report by the Finnish Academy, some interesting common tr…
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed