Search results for "information systems"

showing 10 items of 1926 documents

Collaborative 3D learning games for future learning: teachers’ instructional practices to enhance shared knowledge construction among students

2013

Collaborative games will enable new kinds of possibilities for learning. In the future, the goal of game-based learning should be to introduce new ideas and deepen in-depth understanding of learners. However, studies have shown that shared high-level knowledge construction is a challenging process. Moreover, thus far, few empirical studies have examined what constitutes the teacher’s role in games. The focus of this paper is to investigate teachers’ real-time instructional activities in a scripted 3D game setting. Our hypothesis is that groups with real-time teacher instruction will come up with more shared knowledge construction that can be considered productive than groups studying withou…

Cooperative learningammatillinen koulutusoppiminenComputer scienceCommunicationTeaching methodMultimethodologyContext (language use)Collaborative learningteachers’ instructional activityComputer Science ApplicationsEducationpelitEmpirical researchCSCLhyötypelitContent analysisVocational educationPedagogyComputingMilieux_COMPUTERSANDEDUCATIONta516yhteisöllinen oppiminenInformation SystemsTechnology, Pedagogy and Education
researchProduct

2020

Despite the positive aspects of information technology (IT) use, it is common for users to experience negative IT incidents. Examples of negative IT incidents include getting lost in an unfamiliar country due to a dysfunctional map application and missing a monetary insurance benefit due to the failure of an activity tracker application. Such incidents can harm IT providers by giving rise to user dissatisfaction, discontinued use, switching, and negative word-of-mouth. To minimize this harm, it is important to understand how users cope after negative incidents. Specifically, information systems (IS) researchers have called for research that uncovers the complex interplay of IT users’ coping…

Coping (psychology)Information Systems and Managementbusiness.industry05 social sciencesActivity trackerApplied psychologyInformation technologyDysfunctional family02 engineering and technologyComputer Science ApplicationsManagement Information SystemsHarm020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation system050211 marketingInsurance benefitbusinessPsychologyPractical implicationsInformation SystemsMIS Quarterly
researchProduct

Deliberate or Instinctive? : Proactive and Reactive Coping for Technostress

2019

Employees in organizations face technostress that is, stress from information technology (IT) use. Although technostress is a highly prevalent organizational phenomenon, there is a lack of theory-based understanding on how IT users can cope with it. We theorize and validate a model for deliberate proactive and instinctive reactive coping for technostress. Drawing from theories on coping, our model posits that the reactive coping behaviors of distress venting and distancing from IT can alleviate technostress by diminishing the negative effect of technostress creators on IT-enabled productivity. The proactive coping behaviors of positive reinterpretation and IT control can help IT users by in…

Coping (psychology)Information Systems and Managementmedia_common.quotation_subjectpalautuminen02 engineering and technologytechnostress copingManagement Science and Operations ResearchtietotekniikkaManagement Information Systemsinformation systems usereactive coping020204 information systems0502 economics and businessTechnostress0202 electrical engineering electronic engineering information engineeringteknostressimedia_commonProactive copingselviytyminen05 social sciencesstressiComputer Science ApplicationsInstinct050211 marketingPsychologySocial psychologyproactive copingtechnostress
researchProduct

Taking on the “Dark Side”–Coping With Technostress

2020

Technostress is stress that individuals experience due to their use of information technology. It is associated with critical workplace consequences including reduced productivity. While the negative consequences are well known, what is less understood is how individuals can cope with technostress to alleviate them. We report on two studies that explain how organizational IT users can cope with technostress. The first is a qualitative study conducted in the U.K., by interviewing thirty executives/knowledge workers. Here, we identified seven coping behaviors that individuals engage in, in response to technostress. The second is a survey of 846 U.S. employees who use IT in their workplace. He…

Coping (psychology)InterviewApplied psychologyBehavioural sciences02 engineering and technology113 Computer and information sciencesElectronic mailComputer Science ApplicationsGreat RiftHardware and Architecture020204 information systemsTechnostress0202 electrical engineering electronic engineering information engineeringTask analysisPsychologySoftwareQualitative research
researchProduct

Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice

2004

.  Several approaches for and against the unauthorized copying of software have been proposed. These approaches can be divided into two categories: moral reasoning and solution. These categories of approaches to unauthorized copying of software are scrutinized in the light of Kohlberg's theory of Cognitive Moral Development. The results suggest that most approaches presenting solutions to unauthorized copying of software have focused attention on the lower levels of moral development, while approaches at the highest stage are few and far between. No single approach covers all the stages of moral development. The implications of this analysis for practice and research are discussed.

CopyingComputingMilieux_THECOMPUTINGPROFESSIONComputer Networks and Communicationsbusiness.industryComputer ethicsInternet privacyComputingMilieux_LEGALASPECTSOFCOMPUTINGCognitionMoral reasoningSoftwareMoral developmentLawrence Kohlberg's stages of moral developmentbusinessPsychologySocial psychologySoftwareInformation SystemsInformation Systems Journal
researchProduct

Improving protein secondary structure predictions by prediction fusion

2009

Protein secondary structure prediction is still a challenging problem at today. Even if a number of prediction methods have been presented in the literature, the various prediction tools that are available on-line produce results whose quality is not always fully satisfactory. Therefore, a user has to know which predictor to use for a given protein to be analyzed. In this paper, we propose a server implementing a method to improve the accuracy in protein secondary structure prediction. The method is based on integrating the prediction results computed by some available on-line prediction tools to obtain a combined prediction of higher quality. Given an input protein p whose secondary struct…

CorrectnessComputer sciencemedia_common.quotation_subjectProtein structure predictioncomputer.software_genreSet (abstract data type)Global distance testHardware and ArchitectureSignal ProcessingQuality (business)Data miningBioinformatics Protein Secondary Structure Prediction ClassificationCASPProtein secondary structurecomputerSoftwareInformation Systemsmedia_commonData integrationInformation Fusion
researchProduct

Learning-automaton-based online discovery and tracking of spatiotemporal event patterns.

2013

Discovering and tracking of spatiotemporal patterns in noisy sequences of events are difficult tasks that have become increasingly pertinent due to recent advances in ubiquitous computing, such as community-based social networking applications. The core activities for applications of this class include the sharing and notification of events, and the importance and usefulness of these functionalities increase as event sharing expands into larger areas of one's life. Ironically, instead of being helpful, an excessive number of event notifications can quickly render the functionality of event sharing to be obtrusive. Indeed, any notification of events that provides redundant information to the…

CorrectnessUbiquitous computingComputer scienceMachine learningcomputer.software_genreOnline SystemsPattern Recognition AutomatedSpatio-Temporal AnalysisRobustness (computer science)Artificial IntelligenceComputer SystemsHumansElectrical and Electronic EngineeringLearning automatabusiness.industrySpatiotemporal patternSocial SupportComputer Science ApplicationsAutomatonHuman-Computer InteractionControl and Systems EngineeringMemory footprintArtificial intelligenceData miningbusinesscomputerSoftwareAlgorithmsInformation SystemsIEEE transactions on cybernetics
researchProduct

Automated Synthesis of Application-layer Connectors from Automata-based Specifications

2019

Abstract Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability bo…

CorrectnessUbiquitous computingGeneral Computer ScienceComputer Networks and CommunicationsComputer scienceDistributed computingInteroperability0102 computer and information sciences02 engineering and technology01 natural sciencesHeterogeneous ApplicationsTheoretical Computer Science020204 information systems0202 electrical engineering electronic engineering information engineeringProtocol MismatchesCommunication & CoordinationProtocol (object-oriented programming)Automated Mediator SynthesisSoundnessApplied MathematicsAutomated Mediator Synthesis Interoperability Protocols Heterogeneous Applications Communication & Coordination Protocol MismatchesInteroperabilityApplication layerAutomatonComputational Theory and Mathematics010201 computation theory & mathematicsKey (cryptography)Protocols
researchProduct

Lambda+, the renewal of the Lambda Architecture: Category Theory to the rescue

2021

Designing software architectures for Big Data is a complex task that has to take into consideration multiple parameters, such as the expected functionalities, the properties that are untradeable, or the suitable technologies. Patterns are abstractions that guide the design of architectures to reach the requirements. One of the famous patterns is the Lambda Architecture, which proposes real-time computations with correctness and fault-tolerance guarantees. But the Lambda has also been highly criticized, mostly because of its complexity and because the real-time and correctness properties are each effective in a different layer but not in the overall architecture. Furthermore, its use cases a…

Correctness[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Computer sciencebusiness.industryDistributed computingBig data020207 software engineering02 engineering and technologyLambdaArchitecture patternComputer Science::Hardware ArchitectureSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Use caseArchitectureLayer (object-oriented design)Category theorybusinessComputingMilieux_MISCELLANEOUSLambda ArchitectureCategory theory
researchProduct

Incentive systems for risky investment decisions under unknown preferences

2017

Abstract Our paper examines how to design incentive systems for managers making multi-period risky investment decisions. We show how compensation functions and performance measures must be designed to ensure that managers implement the expected value-maximizing set of projects. The Relative Benefit Cost Allocation (RBCA) Scheme 1 and its extensions revealed in literature on unknown time preferences generally fail to do so under unknown time and risk preferences. We illustrate that when coping with such unknown preferences in a risky setting, a specific state-dependent allocation rule is required. We introduce such an allocation scheme, which we refer to as the State-Contingent RBCA Scheme, …

Cost allocationCoping (psychology)Actuarial scienceInformation Systems and ManagementComputer scienceAccrual05 social sciencesSpecific knowledgeMicroeconomicsInvestment decisionsIncentiveAccounting0502 economics and businessCash flowPerformance measurement050207 economicsFinance050205 econometrics Management Accounting Research
researchProduct