... the conurbation of Greater Manchester, lying onthe north west side ofthe conurbation There is a long tradition of collaboration between the City and local universities in various areas of research, ... description The paper illustrates this with a description ofthe description and ofthe process The author’s goal was to contextualize theresearch by focusing onthe method and the process oftheresearch ... to the conference chairs ofthe previous research methods conferences and to the past WG 8.2 chairs We asked each of them to provide personal remembrances oftheresearch conferences and the...
... accepted as not only one ofthe reference disciplines of IS but also one ofthe main IS research themes Ever since the first International Conference of Information Systems (ICIS), economics has ... addresses these research questions using the Hotelling model of competition between the open source and proprietary software In contrast with the conventional Hotelling model, only one party – the ... is the number of open source users and k measures the degree of contribution of each consumer to the quality ofthe open source software The parameter γ is to the network externality that a software...
... Contingency theory Critical social theory Diffusion of innovations theory Dynamic capabilities Evolutionary theory Expectation confirmation theory Feminism theory Game theory General systems theory ... Illusion of control Information processing theory Institutional theory Theory - Knowledge-based theory ofthe firm Media richness theory Organizational information processing theory Organizational ... component of theory includes a representation of a systematic view of phenomena by a notation of specific relationships among a set of constructs (or variables) The third component of theory includes...
... organization to learn, led us to the consideration ofthe following levels of analysis At the core ofthe study ofthe learning process is the distinction between two levels of analysis: ontological ... organizations considering the adoption of ERP Thenext section introduces various strategies of ERP implementation with a list of ERP software vendors ERP is a long-term IT investment The total cost of ... the direction ofthe gazelle can mean the lion losing its meal Once the diagnosis is made, then the living being needs to select a course of action and execute the action For the lion it may mean...
... ofthe system that contributes to the function, execution, or management ofthe system The partitioning of information system components into conceptual “objects” facilitates the consideration ... assessment of an attack’s success is critical when other operations rely onthe success ofthe attack In the case of a nondeliberate system failure, only the target vulnerability that enables the failure ... component in information systems, and the vulnerability of human and social systems must be addressed during a comprehensive evaluation of risks Onthe Use ofthe “Object” Concept The use of an...
... violations) ofthe current partial solution, which is the sum of arc weights along the shortest path from the root node to the current node, and add the lower bound argument of equation (8), ... 100 onthe graph modified according to the aforementioned suggestions For each instance, Table compares the average material deviation r ofthe solution found by BS with the solution using the ... actO } of active sequences for the O different i i i options at production cycle i Example: Consider the current decision point i = depicted in Figure 1(c) The production ofthe model at position...
... in the social relations of IS use The second case considers home e-shopping and the domestication and consumption of ICTs within the context ofthe family and households, with particular consideration ... research in the context of critical theoretic concerns, such as domination, power and control onthe one hand, and liberation, empowerment and emancipation, onthe other Critical social research ... epistemology The nature of critical IS research Part I sets the scene by considering the nature of critical IS researchThe chapters consider the origins of critical IS research, the ways in which such research...
... When one accepts the vision that awareness of psychological dimensions within oneself and within one’s work environment will indeed enhance the work ofthe IT professional, one must then wonder ... domain ofthe SJ; from them, he derives energy and motivation An important question for the future ofthe IS profession is whether the sphere of influence ofthe SJ is shrinking In days of basic, ... auxiliary, T is therefore the dominant function ofthe ISTP The tertiary function is the opposite ofthe auxiliary, in this case, N, and the inferior function is the opposite ofthe dominant, in...
... based onthe particular compression mechanism Onthe other hand, the choice of δ depends on applications—it is selected based onthe particular application which may favor the least amount of distortion ... followed by a nonzero coefficient The length ofthe run and the nonzero coefficient determine the length ofthe codeword, and the longer the run-length, the shorter the codeword in the Huffman table ... bitstreams ofthe privacy information, encrypted based onthe approach described in Section The goal is to hide the second input in the first input in a joint data-hiding compression framework After the...
... position to one onthe extreme periphery ofthe network Of note are the means for information receiving for the CGIAR centers and the Natural Resources College With the exception ofthe International ... agricultural research paradigm In thenext section we present a description ofthe methodology used in the study; this is followed by the results and discussion section Section provides a conclusion and ... industry associations remain onthe periphery ofthe network An examination of Table 3.2 confirms the influential roles ofthe aforementioned DARS sections (Plant Protection and Quarantine Services,...
... reflections on example case studies Formulation of or rejection/ confirmation of proposition (for theory-oriented research) Formulation of concepts or rejection/ confirmation of hypothesis (for ... choices; contribution ofthe study to theresearch objective – consequences ofthe results for the theory, or consequences ofthe results for practice (for practiceoriented research) ; suggestions for ... Exploration of theory 3.2.5.2 Exploration of practice for finding a proposition 3.2.5.3 Exploration of practice for confirming the relevance of a proposition 3.2.6 Contributions to theory development...
... encloses the requested data, and although the dimensions ofthe bounding box are fixed, the position ofthe bounding box can be random around the requested data In real applications, the position ofthe ... implemented in one retrieval if they all request the same column addresses ofthe matrix Further Consideration on Selecting Anonymization Ranges In current bbPIR, we only require that an anonymization range ... query onthe index key attributes and then performing aggregation onthe result tuples ofthe range query onthe client side Some aggregation queries on index key attributes can be directly done on...
... which on pages 51-56 expands the notion of information operations described in the vision statement to the notion of information superiority:10 Information superiority is a key enabler ofthe type ... by the National Academy of Sciences to secure the services of eminent members of appropriate professions in the examination of policy matters pertaining to the health ofthe public The Institute ... Experimentation and demonstration of these research approaches in domains of relevance to the Air Force To address the second question, the committee recommends that AFOSR support a new line of research, ...
... ofthe second half ofthe 20* century It is closely connected with two important generalizations in mathematics One of them is the generalization of classical measure theory [7] to the theory of ... communication One ofthe three basic functions of language is to convey information about world 14 W Ostasiewicz / Uncertainty and Unsharpness of Information One ofthe modes of conveying information ... Clearly, if K' > k then the theory based on capacities of order K is less general than the one based on capacities of order k The least general of all these theories is the one in which the inequalities...
... considerations ofthe IS planning environment, ofthe major issues of importance to IS planners, ofthe principal approaches used in developing IS plans, and ofthe evaluation ofthe success of IS The ... forms the third section ofthe book, which considers the link between an organization’s IS strategy (the inner circle) and the organization’s business strategy Because ofthe common substitution of ... and their impact onthe organization The reason behind the inclusion of this fourth section is that, ultimately, the aim of introducing IS into organizations is to have positive results on the...