Search results for "Information system"
showing 10 items of 2404 documents
Utilizing online serious games to facilitate distributed requirements elicitation
2015
Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …
Continuous Requirements Risk Profiling in Information Systems Development
2015
With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…
An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems
2012
Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …
An Information System Design Product Theory for Integrated Order, Transportation and Warehouse Management Systems
2013
Globalization, lead time reduction and cost pressures, and other factors make it nontrivial for most companies to devise and manage effective logistics services to meet client requirements. They are better off using the services of specialized third party logistics service providers. These providers compete fiercely and need to develop and improve their services continuously to gain competitive advantage. Integrating the logistics process for improving communication and coordination is the most feasible way for third party logistics providers to deal with these pressures. Yet, the extant literature provides little theoretical guidance for integrating the logistics life-cycle, including orde…
Consumers’ adoption of information services
2013
This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.
Flexible entity search on surfaces
2016
Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…
A two-step, user-centered approach to personalized tourist recommendations
2017
Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…
Vertical Software Industry Evolution: The Impact of Software Costs and Limited Customer Base
2013
ContextSoftware systems are commonly used in a variety of industries as a means of automating organizational business processes. Initially, such software is often developed in-house by the vertical organizations possibly with the support of professional IT service providers; however, in many cases, internally developed software is eventually replaced with the software products provided by independent software vendors. These vendors often use license fees to recover their software development investments, as well as to gain some margin. However, if the vendor's customer base for a specific type of software is limited, then either the license fees are too high and hence the customers may pref…
Social Collaborative Viewpoint Regression with Explainable Recommendations
2017
A recommendation is called explainable if it not only predicts a numerical rating for an item, but also generates explanations for users' preferences. Most existing methods for explainable recommendation apply topic models to analyze user reviews to provide descriptions along with the recommendations they produce. So far, such methods have neglected user opinions and influences from social relations as a source of information for recommendations, even though these are known to improve the rating prediction. In this paper, we propose a latent variable model, called social collaborative viewpoint regression (sCVR), for predicting item ratings based on user opinions and social relations. To th…
A Novel Model for Cybersecurity Economics and Analysis
2017
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…