Search results for "Management information systems"
showing 10 items of 291 documents
Can software risk management improve system development: an exploratory study
1997
Software risk management can be defined as an attempt to formalise risk oriented correlates of development success into a readily applicable set of principles and practices. Earlier research suggests that it can reduce the likelihood of a system failure. Using a survey instrument we investigate this claim further. The investigation addresses the following questions: (1) which characteristics of risk management practices; and (2) which other environmental and process factors (such as development methods, manager's experience) relate to improved performance in managing software risks? Our findings support in general the claim that the use of risk management methods improves system development…
Attention Shaping and Software Risk—A Categorical Analysis of Four Classical Risk Management Approaches
1998
This paper examines software risk management in a novel way, emphasizing the ways in which managers address software risks through sequential attention shaping and intervention. Software risks are interpreted as incongruent states within a socio-technical model of organizational change that includes task, structure, technology, and actors. Such incongruence can lead to failures in developing or implementing the system and thus to major losses. Based on this model we synthesize a set of software risk factors and risk resolution techniques, which cover the socio-technical components and their interactions. We use the model to analyze how four classical risk management approaches—McFarlan's p…
External managerial networking in meta-organizations. Evidence from regional councils in Norway
2019
Municipalities increasingly engage in cooperation with other municipalities to realize economies of scale and scope, to solve ‘wicked problems’ and to manage border crossing challenges. Often, such...
Executives' Commitment to Information Security
2020
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…
Adding sensor-free intention-based affective support to an Intelligent Tutoring System
2017
Abstract Emotional factors considerably influence learning and academic performance. In this paper, we validate the hypothesis that learning platforms can adjust their response to have an effect on the learner’s pleasure, arousal and/or dominance, without using a specific emotion detection system during operation. To this end, we have enriched an existing Intelligent Tutoring System (ITS) by designing a module that is able to regulate the level of help provided to maximize valence, arousal or autonomy as desired. The design of this module followed a two-stage methodology. In the first stage, the ITS was adapted to collect data from several groups of students in primary education, by providi…
Positionless aspect based sentiment analysis using attention mechanism.
2021
Abstract Aspect-based sentiment analysis (ABSA) aims at identifying fine-grained polarity of opinion associated with a given aspect word. Several existing articles demonstrated promising ABSA accuracy using positional embedding to show the relationship between an aspect word and its context. In most cases, the positional embedding depends on the distance between the aspect word and the remaining words in the context, known as the position index sequence. However, these techniques usually employ both complex preprocessing approaches with additional trainable positional embedding and complex architectures to obtain the state-of-the-art performance. In this paper, we simplify preprocessing by …
Assessment of Social Services’ Disaster Risk Management: Case Finland
2017
Local actors are crucial in disaster risk management; thus, their capacities should be assessed periodically. In this study, local social services’ preparedness plans were assessed using Emergency Management Program Measurement and quantitative document analysis. The specific aim was to study how social service areas of various sizes were prepared for disasters in Finland. The results showed that disaster risk management capacity varied significantly between large and small service areas. Larger areas were better prepared for supporting management, and had better procedures to activate their response, modern public information and deeper cooperation with the private sector and the civil soc…
Value, supplier dependence and long‐term orientation
2011
PurposeIn organizational markets, many companies tend to reduce the number of providers to focus on establishing relationships with few of them. The purpose of this paper is to analyze the influence of relationship value and dependence of supplier on long‐term orientation and customer loyalty in the setting of relationships between travel agencies and their main providers.Design/methodology/approachA partial least square regression is performed to test a proposed model that links several relational variables with outcomes in terms of customer loyalty.FindingsResults provide support for the positive indirect influence of relationship value on long‐term orientation, while customer dependence …
Logistics service quality: a new way to loyalty
2008
PurposeNow‐a‐days, logistics research focuses on the ability of logistics to deliver a quality service and generate greater satisfaction with the delivered service. Therefore, the aim of this work is to analyze the quality, satisfaction, and loyalty sequence in the logistic service delivery context, with the purpose of considering the role of information and communication technologies (ICT) in this chain of effects.Design/methodology/approachAfter reviewing the different approaches given by the literature, SEM analysis is used to contrast the hypotheses for the analyzed constructs in the presence of high/low ICT level. A questionnaire based on personal survey was conducted among manufacture…
The four spheres of value co-creation in humanitarian professional services
2021
PurposeThe study focuses on the value co-creation processes in humanitarian professional services provision, analysing the key enabling factors of beneficiaries' participation, involved in long-term integration programmes (L-TIPs).Design/methodology/approachThrough an in-depth case study, the research looks at the practices of value co-creation in humanitarian professional services, considering both the perspectives of the professional service provider and beneficiary.FindingsIn professional services beneficiary's participation affects the success of the L-TIPs outcomes. Participation's enablers can be classified into four different spheres, each belonging to different elements of professio…