The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information Systems Adoption is a multi-faceted and complex investigation area that can cross disciplinary boundaries, combine multiple research methods and consider different methodological approaches to analyse emerging IS Adoption phenomena. In order to generate valuable and reliable outcomes a research methodology has to be carefully determined. A persistent concern of the IS discipline is choosing...
Outpatient clinics are demanding environments. It's crucial to provide with patients with safe, high-quality care. It's important that clinics run effectively and efficiently. This research proposed an integrated information system within the context of outpatient clinic, including both the DB and the user interface design. We will also compare the existed clinic system with the proposed system, and...
Today's service systems are growing more complex and dynamic due to the coupling of functionalities required under different contexts, which asks for extra effort from both service users and services developers. An ideal service system shall provide just right functionalities and just enough qualities to its user under a given usage context. Moreover, the service shall adapt itself when requirements...
Nowadays, most classrooms are equipped with technological resources and Internet connection, which enables access to an endless amount of tools that may contribute for a paradigm shift in teaching and learning. In spite of the availability of these technological resources, we seldom find pedagogical practices grounded upon institutional guidelines which make the best of these tools. This is partly...
IT outsourcing has got a high priority in science and practice. Scientifically is also Cloud Computing as a partial- and full IT outsourcing approach discussed. Technological and market-related developments in scientific research and economic reality provide the motivation to process the state-of-the-art and future considerations of IT outsourcing in a literature review. Overall, from 2000 to 2012,...
Information Systems (IS) are primary enablers in instigating organisational change, increasing organisational responsiveness and decreasing supply chain overheads. This paper aims to contribute through exploring and visualising Knowledge Mapping (KM) from the perspective of Information Systems Investment Evaluation (ISIE). Complexity of IS evaluation process increases with the increase in intricacy...
The paper introduces a structured logic for iterative and incremental accumulation of a design theory during a research project and across research programs. The logic is proposed to help researchers understand the links between parallel search spaces related to a particular design and linking to theoretical knowledge bases produced by previous search processes. The proposition rests on the notion...
There is little consensus among researchers and practitioners on how best to measure IS impact and on what level to assess this impact. Although various dimensions of IS impact, such as individual impact and organizational impact, have been proposed, the number and type of IS impact's dimensions and how these dimensions can be measured remain unclear. This paper contributes to IS research by synthesizing...
In this paper, we introduce a simulation-based, evolutionary approach for analyzing and improving the security of complex information systems. Rather than following a purely technical approach, we bring in a social and behavioral perspective through a combination of conceptual security knowledge modeling, behavioral modeling of threat agents, simulation of attacks, and evolutionary optimization. Based...
One of the most recent advancements in the use of internet for customer-level business management is the ability to track individual customers' activities, approach them proactively, provide customized offerings and manage customer lifecycles. Moving from managing the community to managing its individual members is the common denominator in many related developments. Customer co-created contents,...
Understanding skill acquisition in the context of information systems (IS) use is increasingly important as digital technologies continue to pervade all aspects of personal and business life. To address this important construct, in this study we explore potential antecedents of skill acquisition, including: playfulness, ease of use, comprehensiveness of use, and atypical use. We also explore the mediating...
Based on earlier work on technology adoption, we formulate a research model to tap into the interplay between intention to use and actual use of IT. We draw on a large-scale empirical study on self-service checkout (SCO) technology. Our findings indicate that perceived waiting time acts as an important trigger for intention to use turning into actual use of SCO. In the end of the paper we provide...
Chinese government has long been striving to promote the development of e-government in near several years through utilized lots of information communication technologies (ICT) in public sectors for accelerating administrative transformation. The e-government projects from different sectors of Chinese government, however, often start from multi-objectives and perform in thousands different ways. For...
This minitrack's purpose is to draw researchers' attention to Innovation, Design, and Development of ICT Enabled Services for both Consumers and Enterprises. It provides a discussion forum for researchers interested in fostering a service-based approach to these areas as well as an opportunity to present and debate both design and theory-based solutions to the problems facing industry in the deployment...
To deliver a business information system, it is necessary to not only verify the system, but also validate the system in order to assure the system can provide the business value which the users expect. However, conventional acceptance testing only confirms that the system meets the requirements specifications. Therefore, it is difficult to detect lack of user requirements. This article proposes business-driven...
Online web based learning shifts new platform of web so called Web 2.0 applications are rapidly accelerating market with new challenges and opportunities these implicate as well as in education. This paper investigates technology acceptance of web 2.0 tools in blended learning class setting. The work describes here thoughts in investigation the acceptability and potential use of web 2.0 as an aid...
The DeLone and McLean information systems success model [1, 2] has been investigated in many past researches [3, 4, 5, 6, 7]. However, its use in human resource (HR) field of study is not quite apparent. Based on literature, and recognising that trust is a significant component in managing human resources and in successful implementation of information systems, this research posits the integration...
This session will address how e-portfolios are being used in a variety of innovative ways in forth formal and informal learning contexts. The development and deployment of e-portfolios in a variety of learning environments will be discussed along with tools and technologies used to create them. The session will include a discussion of how e-portfolios can provide a potential bridge between formal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.