... Legitimacy ofthe Information Systems Discipline Across the Atlantic Frantz Rowe, Duane P Truex III, and Lynnette Kvasny 83 Contents vi Truth, Journals, and Politics: TheCaseoftheMISQuarterly ... proved themselves critical in the best senses ofthe word and in the best traditions of WG 8.2, and we, the program chairs, tried to the same In the interest of seeing more diversity in thought and ... VUMAN) and Computation (UMIST) The latter will be renamed the School of Informatics and will concentrate on the development of its historical strengths on the applied side ofthe discipline of Computing...
... externalities for the open source and proprietary software Thus, the price and profit ofthe proprietary software vary correspondently I compare the maximum profit ofthe 17 proprietary software under ... utilities of open source and proprietary software consumers respectively; p * and π * are the equilibrium price and profit ofthe proprietary software; M and M represent the equilibrium market share of ... give the equilibrium outcomes when the base-level quality ofthe proprietary software is different from that ofthe open source software Suppose the open source software andthe proprietary software...
... position in the BoK, explain the importance ofthe article, compare and contrast the findings and position ofthe article with other articles from the BoK, and evaluate the findings ofthe article ... list ofthe main academic writing standards or code of conduct violations and their definitions misrepresenting the work of others presenting speculations or general claims of others as if they ... advantage of knowledge and discoveries of other researchers will be able to expand the BoK further However, ‘standing on the shoulders of midgets’ will not provide much of a horizon for the novice...
... consisting of components of different nature, based on the semantic andthe agent technologies The authors present the general idea and some emergent issues of GUN and describe the current state ofthe ... following levels of analysis At the core ofthe study ofthe learning process is the distinction between two levels of analysis: ontological and epistemological On the one hand, the epistemological ... determine the presence of certain ideas and/ or concepts The transcripts ofthe interviews were analyzed and coded into the three categories of: interviewee’s definition of IS agility, agreement of the...
... research and development center supported by the Office ofthe Secretary of Defense, the Joint Staff, the unified commands, andthe defense agencies under Contract DASW01-01-C-0004 Library of Congress ... appropriateness ofthe security techniques identified in the matrix to the particular user type and attack stage Chapters Five and Six describe step ofthe methodology and support the selection of security ... systems, andthe vulnerability of human and social systems must be addressed during a comprehensive evaluation of risks On the Use ofthe “Object” Concept The use of an “object” is a common theoretical...
... study the influence ofthe beam width BW on the performance of BS We set P = 10 and varied BW between 10 and 200 in steps of 10 Figures 4(a) and 4(b) show the number of explored nodes andthe time ... violations) ofthe current partial solution, which is the sum of arc weights along the shortest path from the root node to the current node, and add the lower bound argument of equation (8), which is the ... compared to the optimal algorithms We study how the performance of A*, BS, and IBS depends on the number of pull-off tables P andthe number of production cycles T Figures 3(a) and 3(b) show the average...
... understanding of these issues Thus, Part II ofthe handbook provides examples ofthe application of critical IS research In these chapters we can see the ways in which the research agenda, the theories ... understand the historical and cultural forces involved in the social relations of IS use The second case considers home e-shopping andthe domestication and consumption of ICTs within the context of ... in the course of their practical life, and as a consequence of their endeavours to understand or explain it for themselves Social life – of which these endeavours are part – on the other hand,...
... is therefore the dominant function ofthe ISTP The tertiary function is the opposite ofthe auxiliary, in this case, N, andthe inferior function is the opposite ofthe dominant, in this case, ... tasks, therefore, are the natural domain ofthe SJ; from them, he derives energy and motivation An important question for the future ofthe IS profession is whether the sphere of influence ofthe ... is the opposite ofthe dominant Ofthe four functions (four possible middle letters), the dominant is the most preferred andthe inferior is least preferred Also, the letters for the dominant and...
... 3: The stages and states ofthe DP algorithm andthe optimal path/solution coefficients will break the run-length pattern into two andthe bit-rate increase will depend on the original andthe ... pattern In the H.263 standard, a runlength pattern is defined as a run of zero coefficients followed by a nonzero coefficient The length ofthe run andthe nonzero coefficient determine the length ofthe codeword, ... t(i, j) is the frequency sensitivity threshold, c(0, 0, k) is the DC term of block k, and c0 is the average luminance ofthe image [21] The higher the mask value, the less distortion the corresponding...
... Denmark, Finland, France, Germany, India, Ireland, Italy, Japan, the Netherlands, Norway, the Philippines, South Africa, Sweden, Switzerland, the United Kingdom, the United States, andthe World ... periphery ofthe network Of note are the means for information receiving for the CGIAR centers andthe Natural Resources College With the exception ofthe International Potato Center, they remain ... by their position in the network, lie on the periphery ofthe network This is also thecase for some private-sector companies and industry associations However, at the same time, we see that the...
... both, andthe two really distinctive features ofthecase study in comparison to the survey andthe experiment create our definition ofthecase study: A case study is a study in which (a) one case ... depth ofthe research and progress ofthe project Then it is important to justify decisions and to estimate its consequences for the outcome ofthe research 1.4.3 Glossary and flowcharts One ofthe ... the literature, namely the fact that a case study basically is an inquiry of only one single instance (the case) , or sometimes a small number of instances, ofthe object of study Yin’s and others’...
... example of an index built on Perm No ofthe Employee table (the upper part) andthe corresponding index matrix ID (the lower part) In the figure, the branching factor ofthe B+-tree b = 4, andthe ... encloses the requested data, and although the dimensions ofthe bounding box are fixed, the position ofthe bounding box can be random around the requested data In real applications, the position ofthe ... children, and every node of I has [ (b − 1)/2 , b − 1] keys To accommodate the maximum number of children pointers and keys, we fix the size of a tree node to 2b + 1, and let the column size of the...
... from the councils ofthe National Academy of Sciences, the National Academy of Engineering, andthe Institute of Medicine The members ofthe committee responsible for the report were chosen for their ... command -and- control situation relative to the perspective (rank) ofthe user andthe granularity (detail ofthe information) In other words, one must understand and characterize the most likely and ... Academy of Sciences to secure the services of eminent members of appropriate professions in the examination of policy matters pertaining to the health ofthe public The Institute acts under the responsibility...
... volumes of his selected papers published in the period 1965–95 [24, 25] 3 Theories of Uncertainty The emergence of fuzzy set theory andthe theory of monotone measures considerably expanded the framework ... co-organizers ofthe NATO workshop A special mention for the gracious cooperation ofthe Rector ofthe University of Tras-osMontes e Alto Douro/CETAV, Prof Torres Pereira, for the Vice-Rector ofthe same ... terms of reduction of relevant uncertainty It is shown how the emergence of fuzzy set theory andthe theory of monotone measures considerably expanded the framework for formalizing uncertainty and...
... conceptualization ofthe term, and hence ofthe scope ofthe book, is presented in Figure 0.1 The inner circle ofthe figure depicts the information systems (IS) strategy Whether explicitly articulated, ... plans, andofthe evaluation ofthe success of IS The third circle in Figure 0.1 naturally forms the third section ofthe book, which considers the link between an organization’s IS strategy (the ... the telephone, and – besides the processing of data – voice, text and image processing moved to the forefront The emphasis shifted from the provision of data to the provision of information and...