Search results for "information systems"
showing 10 items of 1926 documents
Collaborative 3D learning games for future learning: teachers’ instructional practices to enhance shared knowledge construction among students
2013
Collaborative games will enable new kinds of possibilities for learning. In the future, the goal of game-based learning should be to introduce new ideas and deepen in-depth understanding of learners. However, studies have shown that shared high-level knowledge construction is a challenging process. Moreover, thus far, few empirical studies have examined what constitutes the teacher’s role in games. The focus of this paper is to investigate teachers’ real-time instructional activities in a scripted 3D game setting. Our hypothesis is that groups with real-time teacher instruction will come up with more shared knowledge construction that can be considered productive than groups studying withou…
2020
Despite the positive aspects of information technology (IT) use, it is common for users to experience negative IT incidents. Examples of negative IT incidents include getting lost in an unfamiliar country due to a dysfunctional map application and missing a monetary insurance benefit due to the failure of an activity tracker application. Such incidents can harm IT providers by giving rise to user dissatisfaction, discontinued use, switching, and negative word-of-mouth. To minimize this harm, it is important to understand how users cope after negative incidents. Specifically, information systems (IS) researchers have called for research that uncovers the complex interplay of IT users’ coping…
Deliberate or Instinctive? : Proactive and Reactive Coping for Technostress
2019
Employees in organizations face technostress that is, stress from information technology (IT) use. Although technostress is a highly prevalent organizational phenomenon, there is a lack of theory-based understanding on how IT users can cope with it. We theorize and validate a model for deliberate proactive and instinctive reactive coping for technostress. Drawing from theories on coping, our model posits that the reactive coping behaviors of distress venting and distancing from IT can alleviate technostress by diminishing the negative effect of technostress creators on IT-enabled productivity. The proactive coping behaviors of positive reinterpretation and IT control can help IT users by in…
Taking on the “Dark Side”–Coping With Technostress
2020
Technostress is stress that individuals experience due to their use of information technology. It is associated with critical workplace consequences including reduced productivity. While the negative consequences are well known, what is less understood is how individuals can cope with technostress to alleviate them. We report on two studies that explain how organizational IT users can cope with technostress. The first is a qualitative study conducted in the U.K., by interviewing thirty executives/knowledge workers. Here, we identified seven coping behaviors that individuals engage in, in response to technostress. The second is a survey of 846 U.S. employees who use IT in their workplace. He…
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice
2004
. Several approaches for and against the unauthorized copying of software have been proposed. These approaches can be divided into two categories: moral reasoning and solution. These categories of approaches to unauthorized copying of software are scrutinized in the light of Kohlberg's theory of Cognitive Moral Development. The results suggest that most approaches presenting solutions to unauthorized copying of software have focused attention on the lower levels of moral development, while approaches at the highest stage are few and far between. No single approach covers all the stages of moral development. The implications of this analysis for practice and research are discussed.
Improving protein secondary structure predictions by prediction fusion
2009
Protein secondary structure prediction is still a challenging problem at today. Even if a number of prediction methods have been presented in the literature, the various prediction tools that are available on-line produce results whose quality is not always fully satisfactory. Therefore, a user has to know which predictor to use for a given protein to be analyzed. In this paper, we propose a server implementing a method to improve the accuracy in protein secondary structure prediction. The method is based on integrating the prediction results computed by some available on-line prediction tools to obtain a combined prediction of higher quality. Given an input protein p whose secondary struct…
Learning-automaton-based online discovery and tracking of spatiotemporal event patterns.
2013
Discovering and tracking of spatiotemporal patterns in noisy sequences of events are difficult tasks that have become increasingly pertinent due to recent advances in ubiquitous computing, such as community-based social networking applications. The core activities for applications of this class include the sharing and notification of events, and the importance and usefulness of these functionalities increase as event sharing expands into larger areas of one's life. Ironically, instead of being helpful, an excessive number of event notifications can quickly render the functionality of event sharing to be obtrusive. Indeed, any notification of events that provides redundant information to the…
Automated Synthesis of Application-layer Connectors from Automata-based Specifications
2019
Abstract Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability bo…
Lambda+, the renewal of the Lambda Architecture: Category Theory to the rescue
2021
Designing software architectures for Big Data is a complex task that has to take into consideration multiple parameters, such as the expected functionalities, the properties that are untradeable, or the suitable technologies. Patterns are abstractions that guide the design of architectures to reach the requirements. One of the famous patterns is the Lambda Architecture, which proposes real-time computations with correctness and fault-tolerance guarantees. But the Lambda has also been highly criticized, mostly because of its complexity and because the real-time and correctness properties are each effective in a different layer but not in the overall architecture. Furthermore, its use cases a…
Incentive systems for risky investment decisions under unknown preferences
2017
Abstract Our paper examines how to design incentive systems for managers making multi-period risky investment decisions. We show how compensation functions and performance measures must be designed to ensure that managers implement the expected value-maximizing set of projects. The Relative Benefit Cost Allocation (RBCA) Scheme 1 and its extensions revealed in literature on unknown time preferences generally fail to do so under unknown time and risk preferences. We illustrate that when coping with such unknown preferences in a risky setting, a specific state-dependent allocation rule is required. We introduce such an allocation scheme, which we refer to as the State-Contingent RBCA Scheme, …