ORCID Profile
0000-0003-2860-5215
Current Organisations
Georgia State University
,
Curtin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Elsevier BV
Date: 12-2003
Publisher: Springer International Publishing
Date: 2022
Publisher: Informa UK Limited
Date: 05-2006
Publisher: Wiley
Date: 29-11-2016
DOI: 10.1111/DME.13285
Publisher: Emerald
Date: 28-03-2020
DOI: 10.1108/JBIM-01-2019-0019
Abstract: Physical social cues can influence the buyer and seller in business-to-business (B2B) marketing. The current behavioural model does not account for the role of implicit bias. The purpose of this paper is to present that relationship and introduce a process model to weaken implicit bias through training with the employment of transformational conversation. With social cues as the predecessor to inferences, there is the potential for implicit bias to derail relationship building in a B2B context. The author’s qualitative field study offers guidance for businesses to make informed decisions about implicit bias training. The study findings show that an interactive workshop following a process model with the addition of transformational conversation can weaken implicit bias. The research was conducted with a small cohort of information technology professionals. More research should be done specifically with sellers and buyers in various industries over a longer period of time with periodic follow-up on sales performance and relationship building. Minority groups had a combined buying power of $3.9tn in 2018. For sellers to succeed, they have to be able to modulate the implicit biases that interfere with good sales relationships. This paper introduces implicit bias as a moderator into the conceptual framework of the behavioural response to social cues in the B2B context and offers a model of implicit bias training using a process model with transformational conversation.
Publisher: Wiley
Date: 05-08-2010
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Wiley
Date: 06-06-2007
Publisher: Springer Science and Business Media LLC
Date: 25-04-2018
Publisher: Elsevier BV
Date: 2014
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Informa UK Limited
Date: 2016
DOI: 10.1057/EJIS.2014.36
Publisher: Informa UK Limited
Date: 03-2013
Publisher: Informa UK Limited
Date: 06-2008
DOI: 10.1057/EJIS.2008.20
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: IEEE
Date: 2012
Publisher: Wiley
Date: 23-10-2020
DOI: 10.1002/ASI.24311
Publisher: Informa UK Limited
Date: 08-2007
Publisher: Elsevier BV
Date: 10-2018
DOI: 10.1016/J.SOCSCIMED.2018.08.007
Abstract: Health promotion interventions can be improved using methods from behavioural economics to identify and target specific decision-making biases at the in idual level. In this context, prospect theory provides a suitable framework within which decision-making processes can be operationalised. Focusing on a trade-off between health outcomes and behaviour change incurred by chronic disease management (lifestyle change, or 'self-management'), we are the first to measure the risk attitudes and quantify the full utility function under prospect theory of a patient population. We conducted a series of hypothetical elicitations over health outcomes associated with different self-management behaviours from a population of in iduals with or without 'manageable' chronic disease (n = 120). We observed risk aversion in both the gain and the loss domains, as well as significant loss aversion. There seems to be an age effect on risk attitudes in this context, with younger people being on average less risk averse than older people. Our work addresses a need to better understand these decision-making processes, so that behaviour change interventions tailored to specific patient populations can be improved.
Publisher: Informa UK Limited
Date: 02-2008
DOI: 10.1057/EJIS.2008.1
Publisher: Elsevier BV
Date: 2000
Publisher: Informa UK Limited
Date: 05-02-2021
Publisher: Informa UK Limited
Date: 04-2008
DOI: 10.1057/EJIS.2008.7
Publisher: Elsevier BV
Date: 04-2014
DOI: 10.1016/J.EJMECH.2014.03.011
Abstract: Recently disulfide-rich head-to-tail cyclic peptides have attracted the interest of medicinal chemists owing to their exceptional thermal, chemical and enzymatic stability brought about by their constrained structures. Here we review current trends in the field of peptide-based pharmaceuticals and describe naturally occurring cyclic disulfide-rich peptide scaffolds, discussing their pharmaceutically attractive properties and benefits. We describe how we can utilise these stable frameworks to graft and/or engineer pharmaceutically interesting epitopes to increase their selectivity and bioactivity, opening up new possibilities for addressing 'difficult' pharmaceutical targets.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2001
DOI: 10.1109/2.920612
Publisher: SAGE Publications
Date: 12-2010
DOI: 10.1057/JIT.2010.30
Publisher: Wiley
Date: 19-03-2017
DOI: 10.1111/DME.13331
Abstract: Self-directed pedometer use increases physical activity levels in the general population however, evidence of benefit for Type 2 diabetes is unclear and has not been systematically reviewed for accelerometers. To examine the impact of using physical activity monitoring devices (pedometers and accelerometers) on free-living physical activity and HbA We conducted a systematic literature review. Bibliographic databases included Medline, Embase, Web of Science, CINAHL, SportDiscus and the Cochrane Central Register of Controlled Trials. We included controlled trials evaluating interventions based on the use of pedometers or accelerometers to promote physical activity in people with Type 2 diabetes. Primary outcomes were physical activity (min/week or steps) and HbA Twelve trials (1458 participants) were identified, of which nine studied pedometers and three accelerometers. Random-effects meta-analysis showed an overall increase in physical activity (standardized mean difference 0.57, 95% CI 0.24, 0.91) in the intervention groups. Accelerometers and pedometers produced a similar effect size. No significant differences were observed in HbA People with Type 2 diabetes, provided with an accelerometer or pedometer, substantially increased their free-living physical activity. There is no evidence that monitor use alone improves HbA
Publisher: Association for Computing Machinery (ACM)
Date: 09-2000
Abstract: Knowledge and knowledge management are receiving tremendous interest from both practitioners and academics. Although knowledge management is often accepted as a very useful organizational activity, a number of the assumptions underlying knowledge management have not been investigated. This paper examines four knowledge management assumptions: knowledge is worth managing, organizations benefit from managing knowledge, knowledge can be managed, and little risk is associated with managing knowledge. The assumptions are analyzed at strategic and operational levels, and both negating and supporting evidence is presented. Based on this analysis, a framework for research in knowledge management is proposed. The framework is used to generate a number of key questions that should be addressed in knowledge management research. Particular attention is given to goals and rewards as well as to the role of information technology in knowledge management.
Publisher: JSTOR
Date: 2012
DOI: 10.2307/41703479
Publisher: Informa UK Limited
Date: 11-2011
DOI: 10.1057/EJIS.2011.40
Publisher: Royal College of General Practitioners
Date: 29-11-2018
Publisher: IEEE
Date: 2016
Publisher: Emerald
Date: 03-08-2015
Abstract: – The purpose of this paper is to suggest that translating a design theory (DT) into practice (e.g. creating an instance design artifact (IDA)) is hardly straight-forward and requires substantial creativity. Specifically the authors suggest that adopting a DT embodies a creativity passdown effect in which the creative thinking of a team of design theorist(s) inherent in DT invokes a creative mind of a team of artifact instance designer(s) in creating an IDA. In this study, the authors empirically investigate the creativity passdown effect through an action case in which a DT (DT nexus) was applied in creating an IDA (multi-outsourcing decision-making tool). – The case methodology applied here is described as an action case. An action case is a hybrid research approach that combines action research and interpretive case approaches. It combines intervention and interpretation in order to achieve both change and understanding. It is a form of soft field experiment with less emphasis on iteration and learning and more on trial and making. The approach is holistic in philosophy, and prediction is not emphasized. The intervention in the case was that of an instance designer team introducing a previously published DT as a basis for creating an IDA. – The experience in the action case suggests that using a DT in creating an IDA may encourage design thinking, and in certain way increase its power and practical relevance by fostering the creative mind of instance designers. Indeed, DTs provide a scientific basis for dealing with an instance problem, and this evokes the creativity mind of instance designers. Without such a scientific basis, it is a lot more challenging for instance artifact designers to deal with instance problems. – This study contributes to the literature concerning design science research, as it challenges the notion that adopting scientific design knowledge limits creativity inherent in creating IDA by illustrating creative elements involved in adopting DT as a basis for creating IDAs. – This study offers implications to practice, as it provides new insights regarding how DT can be used in instance design activities. – A report of this research previously appeared as a conference paper. However, the attached journal version has been completely rewritten to additionally contribute to the literature concerning design science research beyond the conference version. More specifically, in this version, the authors conceptualize adopting a DT to build an IDA as a theoretical basis, and the authors challenge the notion that adopting scientific design knowledge limits creativity inherent in creating IDA by illustrating creative elements involved in executing DT as a basis for creating IDAs.
Publisher: Wiley
Date: 07-2001
Publisher: Emerald
Date: 05-06-2017
Abstract: The purpose of this paper is to use translation theory to develop a framework (called FTRA) that explains how companies adopt agile methods in a discourse of fragmentation and articulation. A qualitative multiple case study of six firms using the Scrum agile methodology. Data were collected using mixed methods and analyzed using three progressive coding cycles and analytic induction. In practice, people translate agile methods for local settings by choosing fragments of the method and continuously re-articulating them according to the exact needs of the time and place. The authors coded the fragments as technological rules that share relationships within a framework spanning two dimensions: static-dynamic and actor-artifact. For consistency, the six cases intentionally represent one instance of agile methodology (Scrum). This limits the confidence that the framework is suitable for other kinds of methodologies. The FTRA framework and the technological rules are promising for use in practice as a prescriptive or even normative frame for governing methodology adaptation. Framing agile adaption with translation theory surfaces how the discourse between translocal (global) and local practice yields the social construction of agile methods. This result contrasts the more functionalist engineering perspective and privileges changeability over performance. The use of translation theory and the FTRA framework to explain how agile adaptation (in particular Scrum) emerges continuously in a process where method fragments are articulated and re-articulated to momentarily suit the local setting. Complete agility that rapidly and elegantly changes its own environment must, as a concomitant, rapidly and elegantly change itself. This understanding also elaborates translation theory by explaining how the articulation and re-articulation of ideas embody the means by which ideas travel in practice.
Publisher: Springer International Publishing
Date: 2016
Publisher: Informa UK Limited
Date: 08-2008
DOI: 10.1057/EJIS.2008.36
Publisher: Informa UK Limited
Date: 08-2007
Publisher: Springer US
Date: 2003
Publisher: Informa UK Limited
Date: 06-1998
Publisher: Springer Science and Business Media LLC
Date: 09-2010
Publisher: Association for Information Systems
Date: 04-2018
DOI: 10.17705/1JAIS.00491
Publisher: Informa UK Limited
Date: 05-2011
DOI: 10.1057/EJIS.2011.8
Publisher: Springer Science and Business Media LLC
Date: 2002
Publisher: Emerald
Date: 10-2006
DOI: 10.1108/09593840610718045
Abstract: The purpose of this paper is to report the findings of an in‐depth case study into virtual teamworking practices in a large petro‐chemical company. By drawing on the case study the paper offers a theoretical conceptualization of the development of commitment and personal trust relationships in a virtual teamworking context. The paper argues that the durability of virtual teamworking depends largely on commitment and personal trust relationships, which may gradually dissipate over time without collocated, face‐to‐face social interactions. The virtual teamworking technologies alone may have limited scope in contributing to reproduction and reinforcement of commitment and personal trust relationships. This research is based on an investigation in one organization that used a set of virtual teamworking technologies, which have been constantly improving in terms of capabilities and usability. In a business context investigated in this paper, the team working was not continuous, and the level and the range of activities varied over time. Future research should seek to explore whether personal and abstract trust can develop through continued online interaction. Findings indicate that virtual teams should seek to manage expectations of the use of such technologies in their interactions. Human relationships, rather than technologies are therefore important for nurturing both personal and impersonal trust relationships, which is vital for durable virtual teams. This paper argues that the long‐term virtual teamworking without face‐to‐face social interactions leads to a gradual dissipation of personal trust relationships, and subsequently loss of impersonal trust relations.
Publisher: Springer International Publishing
Date: 2016
Publisher: Association for Information Systems
Date: 05-2018
DOI: 10.17705/1JAIS.00495
Publisher: Springer International Publishing
Date: 2021
Publisher: IGI Global
Date: 04-2003
Abstract: Simple probability theory is not a good basis for security in the case of high-stakes information resources where these resources are subject to attacks upon national infrastructure or to battle space illumination. Probability theory induces us to believe that one cannot totally rule out all probabilities of an intrusion. An alternative theoretical base is possibility theory. While persistent, well-supported, and highly professional intrusion attacks will have a higher probability of success, operating instead against the possibility of intrusion places defenders in a theoretical framework more suitable for high-stakes protection. The purpose of this paper is to introduce an alternative quantitative approach to information security evaluation that is suitable for information resources that are potential targets of intensive professional attacks. This approach operates from the recognition that information resource security is only an opinion of officials responsible for security.
Publisher: Informa UK Limited
Date: 03-1998
Publisher: Royal College of General Practitioners
Date: 28-12-2017
Publisher: ACM Press
Date: 2009
Publisher: Elsevier BV
Date: 12-2019
Publisher: Informa UK Limited
Date: 02-10-2017
Publisher: Association for Information Systems
Date: 2011
DOI: 10.17705/1CAIS.02823
Publisher: Springer Science and Business Media LLC
Date: 2003
Publisher: Springer US
Date: 2001
Publisher: IEEE
Date: 2006
Publisher: Inderscience Publishers
Date: 2010
Publisher: Elsevier BV
Date: 06-2007
Publisher: Springer US
Date: 2006
Publisher: IGI Global
Date: 2006
Abstract: This article develops an analytical framework for new forms of information warfare that may threaten commercial and government computing systems by using e-collaboration in new ways. The framework covers (1) strategic model, (2) strategic arena, (3) e-collaboration, and (4) ethics and law. The framework then is used to compare two recorded instances of major hacker wars that erupted in the shadow of kinetic conflicts. In both cases, the hacker war appears to have been a grassroots collaborative enterprise by loosely organized civilians with neither government control nor permission. Collaborating across networks to coordinate their attacks, such hacker wars can attack both government and commercial computer networks without warning. The analysis shows how hacker wars demonstrate characteristics found in the frameworks and that there are forms of e-collaboration that represent a potentially difficult new source of threat for globalized information systems.
Publisher: IGI Global
Date: 10-2020
Abstract: A predominant understanding in information systems research (ISR) is that technology has institutionalizing, routinizing, and socializing effects in its interaction with users in the human enterprise. Subscribing to these effects from an organizational point of view no longer provides a full understanding of the more complex dynamics in the 21st century workplace inhabited by a vast amount of different technologies with different purposes. Through a critical realist analysis, focusing on patterns in socio-technical structures and more specific actions and outcomes afforded by the recent and forceful adoption of unified communication and collaboration platforms (UCC), the authors see a new, powerful socio-technical mechanism of in idualization that is profoundly changing these socio-technical dynamics. Through 18 interviews with knowledge professionals, the study finds that the mechanisms of in idualization reduce the influence of the organization as an institutionalizing and socializing socio-technical system. As an ex le, the power of in idualization creates new parallel structures of small networks of close colleagues. Thus, this research sees new structural patterns and dynamics emerging, forming a much more complex, yet self-organizing socio-technical system. The authors suggest expanding the socio-technical understanding of the present techno-organizational reality by taking into account the socio-technical mechanisms that produce certain outcomes. By understanding the fundamental mechanisms at work, they provide those with a fuller understanding of how these mechanisms can enable, while simultaneously crippling, each other. This fuller understanding also aids the pursuit of providing workplaces that achieve both humanistic and economic objectives.
Publisher: Springer International Publishing
Date: 2019
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 2016
Publisher: JSTOR
Date: 03-2002
DOI: 10.2307/4132338
Publisher: Elsevier BV
Date: 03-2018
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 2011
Publisher: Institute for Operations Research and the Management Sciences (INFORMS)
Date: 09-2003
DOI: 10.1287/ISRE.14.3.221.16560
Abstract: Generalizability is a major concern to those who do, and use, research. Statistical, s ling-based generalizability is well known, but methodologists have long been aware of conceptions of generalizability beyond the statistical. The purpose of this essay is to clarify the concept of generalizability by critically examining its nature, illustrating its use and misuse, and presenting a framework for classifying its different forms. The framework organizes the different forms into four types, which are defined by the distinction between empirical and theoretical kinds of statements. On the one hand, the framework affirms the bounds within which statistical, s ling-based generalizability is legitimate. On the other hand, the framework indicates ways in which researchers in information systems and other fields may properly lay claim to generalizability, and thereby broader relevance, even when their inquiry falls outside the bounds of s ling-based research.
Publisher: JSTOR
Date: 2009
DOI: 10.2307/20650319
Publisher: Informa UK Limited
Date: 2011
DOI: 10.1057/EJIS.2010.57
Publisher: Informa UK Limited
Date: 2011
DOI: 10.1057/EJIS.2010.56
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Informa UK Limited
Date: 07-2011
DOI: 10.1057/EJIS.2011.22
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2003
Publisher: Association for Information Systems
Date: 2019
DOI: 10.17705/1JAIS.00529
Publisher: Wiley
Date: 04-1998
Publisher: Wiley
Date: 22-06-2004
Publisher: JSTOR
Date: 2006
DOI: 10.2307/25148758
Publisher: Springer US
Date: 2001
Publisher: Palgrave Macmillan UK
Date: 2015
Publisher: Springer Science and Business Media LLC
Date: 13-03-2018
DOI: 10.1038/S41467-018-03099-X
Abstract: Pulmonary large-cell neuroendocrine carcinomas (LCNECs) have similarities with other lung cancers, but their precise relationship has remained unclear. Here we perform a comprehensive genomic ( n = 60) and transcriptomic ( n = 69) analysis of 75 LCNECs and identify two molecular subgroups: “type I LCNECs” with bi-allelic TP53 and STK11 / KEAP1 alterations (37%), and “type II LCNECs” enriched for bi-allelic inactivation of TP53 and RB1 (42%). Despite sharing genomic alterations with adenocarcinomas and squamous cell carcinomas, no transcriptional relationship was found instead LCNECs form distinct transcriptional subgroups with closest similarity to SCLC. While type I LCNECs and SCLCs exhibit a neuroendocrine profile with ASCL1 high / DLL3 high / NOTCH low , type II LCNECs bear TP53 and RB1 alterations and differ from most SCLC tumors with reduced neuroendocrine markers, a pattern of ASCL1 low / DLL3 low / NOTCH high , and an upregulation of immune-related pathways. In conclusion, LCNECs comprise two molecularly defined subgroups, and distinguishing them from SCLC may allow stratified targeted treatment of high-grade neuroendocrine lung tumors.
Publisher: JSTOR
Date: 2009
DOI: 10.2307/20650320
Publisher: Springer International Publishing
Date: 31-12-2018
Publisher: Informa UK Limited
Date: 29-01-2018
Publisher: Elsevier BV
Date: 02-2013
Publisher: Emerald
Date: 03-1997
DOI: 10.1108/13287269780000733
Abstract: Action researchers contend that a complex social process can be studied best by introducing changes into that process and observing the effects of these changes. The approach used by organizational consultants must also introduce change, but in this case, the theoretical development and the rigorous empirical foundation are prerequisite elements of the activity. Participative case studies are a common scientific report proceeding from consulting projects. This paper discusses the contrasts between the action research method, consulting, and participative case studies. Ethical problems arise when action research is knowingly or unknowingly conflated with consultation practices, since this combination makes the usual set of action research dilemmas even more problematic. An improved understanding of the action research‐consulting contrasts aids in distinguishing the contributions of participative case studies to the information systems literature.
Publisher: Elsevier BV
Date: 05-2011
Publisher: Elsevier BV
Date: 02-2021
Publisher: Informa UK Limited
Date: 02-2010
DOI: 10.1057/EJIS.2010.2
Publisher: IEEE
Date: 2006
Publisher: BMJ
Date: 06-2020
DOI: 10.1136/BMJRESP-2020-000577
Abstract: Increased iron availability modifies cardiorespiratory function in healthy volunteers and improves exercise capacity and quality of life in patients with heart failure or pulmonary hypertension. We hypothesised that intravenous iron would produce improvements in oxygenation, exercise capacity and quality of life in patients with chronic obstructive pulmonary disease (COPD). We performed a randomised, placebo-controlled, double-blind trial in 48 participants with COPD (mean±SD: age 69±8 years, haemoglobin 144.8±13.2 g/L, ferritin 97.1±70.0 µg/L, transferrin saturation 31.3%±15.2% GOLD grades II–IV), each of whom received a single dose of intravenous ferric carboxymaltose (FCM 15 mg/kg bodyweight) or saline placebo. The primary endpoint was peripheral oxygen saturation (SpO 2 ) at rest after 1 week. The secondary endpoints included daily SpO 2 , overnight SpO 2 , exercise SpO 2 , 6 min walk distance, symptom and quality of life scores, serum iron indices, spirometry, echocardiographic measures, and exacerbation frequency. SpO 2 was unchanged 1 week after FCM administration (difference between groups 0.8%, 95% CI −0.2% to 1.7%). However, in secondary analyses, exercise capacity increased significantly after FCM administration, compared with placebo, with a mean difference in 6 min walk distance of 12.6 m (95% CI 1.6 to 23.5 m). Improvements of ≥40 m were observed in 29.2% of iron-treated and 0% of placebo-treated participants after 1 week (p=0.009). Modified MRC Dyspnoea Scale score was also significantly lower after FCM, and fewer participants reported scores ≥2 in the FCM group, compared with placebo (33.3% vs 66.7%, p=0.02). No significant differences were observed in other secondary endpoints. Adverse event rates were similar between groups, except for hypophosphataemia, which occurred more frequently after FCM (91.7% vs 8.3%, p .001). FCM did not improve oxygenation over 8 weeks in patients with COPD. However, this treatment was well tolerated and produced improvements in exercise capacity and functional limitation caused by breathlessness. These effects on secondary endpoints require confirmation in future studies. ISRCTN09143837 .
Publisher: Association for Computing Machinery (ACM)
Date: 07-10-2005
Abstract: Taxonomies of information security threats usually distinguish between accidental and intentional sources of system risk. Security reports have paid a great deal of attention in recent years to the growing problem of hacking and intentional abuse. The prevalence of these reports suggests that hacking has become a more severe problem in relation to other security threats, such as human error. In this paper, we report on research that addresses this question: "How have changes over time in the frequency of hacking and other intentional forms of security threats affected the validity of information systems risk management taxonomies?" We replicate a simple study of the proportions of categories of security threats that was originally completed in 1993. Comparing the results from the replicated study with the results from the original study, we find that the proportions of threat categories have, in contradiction with the popular perception, remained relatively stable over the past decade. These results indicate that human error remains a significant and poorly recognized issue for information systems security. We propose and validate an elaborated taxonomy of information security threats that provides additional insight into human error as a significant source of security risk.
Publisher: Routledge
Date: 15-08-2017
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Elsevier BV
Date: 12-2010
Publisher: Springer International Publishing
Date: 2021
Publisher: SAGE Publications
Date: 09-1996
Publisher: Informa UK Limited
Date: 05-2015
DOI: 10.1057/KMRP.2013.34
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IGI Global
Date: 2006
DOI: 10.4018/978-1-59140-911-3.CH010
Abstract: The horrific terrorist attacks carried out on September 11, 2001, and the ensuing aftermath are driving managers to reconsider organizational risk. The collapsing towers moved the hypothetical risk of centralization to the shockingly real. In this new environment, organizations need to see survivability as a critical imperative motivating an updated enterprise risk mitigation strategy that includes new design objectives such as: (1) more geographically distributed organizations, (2) a move from redundant to physically distributed IT capabilities, and (3) more stringent security and survivability demands on enterprise IT infrastructures and network service providers. While in idual firms’ strategies will vary in the extent and type of physical decentralization, the overall tendency should be toward further dispersal of people, technology, and physical assets. This chapter examines the concepts of risk and decentralization as articulated in the scientific literature and then presents a strong logic for physical decentralization supported by a technical risk analysis.
Publisher: Informa UK Limited
Date: 04-2006
Publisher: Springer US
Date: 2003
Publisher: Springer Berlin Heidelberg
Date: 02-10-2012
Publisher: Informa UK Limited
Date: 12-2009
DOI: 10.1057/EJIS.2009.42
Publisher: Emerald
Date: 03-2001
DOI: 10.1108/09593840110384762
Abstract: Action research (AR), which emphasises collaboration between researchers and practitioners, is a qualitative research method that has much potential for the information systems (IS) field. AR studies of IS phenomena are now beginning to be published in the IS research literature. However, the rigour of many AR studies in IS can be improved. When AR has been published, the findings have frequently been emphasised at the expense of the process. In this article, we look at the process in AR projects, and look at some of the key choices and alternatives in controlling AR. We discuss three aspects of control: the procedures for initiating an AR project, those for determining authority within the project, and the degree of formalisation. We analyse seven recent AR projects in IS and from this analysis distil recommendations for determining these control structures.
Publisher: Emerald
Date: 03-04-2018
Abstract: The purpose of this paper is to develop and empirically test a process model (comprising of seven dimensions), for identifying online customer engagement patterns leading to recommendation. These seven dimensions are communication, interaction, experience, satisfaction, continued involvement, bonding, and recommendation. The authors used a non-participant form of netnography for analyzing 849 comments from Australian banks Facebook pages. High levels of inter-coder reliability strengthen the study’s empirical validity and ensure minimum researcher bias and maximum reliability and replicability. The authors identified 22 unique pattern of customer engagement, out of which nine patterns resulted in recommendation/advocacy. Engagement pattern communication-interaction-recommendation was the fastest route to recommendation, observed in nine instances (or 2 percent). In comparison, C-I-E-S-CI-B-R was the longest route to recommendation observed in ninety-six instances (or 18 percent). Of the eight patterns that resulted in recommendation, five patterns (or 62.5 percent) showed bonding happening before recommendation. The authors limited the data collection to Facebook pages of major banks in Australia. The authors did not assess customer demography and did not share the findings with the banks. The findings will guide e-marketers on how to best engage with customers to enhance brand loyalty and continuously be in touch with their clients. Most models are conceptual and assume that customers typically journey through all the stages in the model. The work is interesting because the empirical study found that customers travel in multiple different ways through this process. It is significant because it changes the way the authors understand patterns of online customer engagement.
Publisher: Informa UK Limited
Date: 11-2012
DOI: 10.1057/EJIS.2012.46
Publisher: Springer Science and Business Media LLC
Date: 25-08-2010
Publisher: IEEE
Date: 2009
Publisher: JSTOR
Date: 12-1996
DOI: 10.2307/249565
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer US
Date: 2008
Publisher: IGI Global
Date: 2007
DOI: 10.4018/978-1-59904-147-6.CH007
Abstract: Software developers can use agile software development methods to build secure information systems. Current agile methods have few (if any) explicit security fea-tures. While several discrete security methods (such as checklists and management standards) can supplement agile methods, few of these integrate seamlessly into other software development methods. Because of the severe constraints imposed by agile methods, these discrete security techniques integrate very poorly into agile approaches. This chapter demonstrates how the security features can be integrated into an agile method called feature driven development.
Publisher: Springer International Publishing
Date: 2014
Publisher: Association for Computing Machinery (ACM)
Date: 02-1996
Abstract: Systems analysis and design is a practical discipline, difficult to teach realistically with conventional methods. HyperCase is an interactive program that presents an organization called Maple Ridge Engineering in a highly graphical environment for use on a microcomputer. Use of hypertext allows students to navigate through the organization, doing interviews, and examining diagrams in the order they prefer, rather than in the prescribed, linear fashion found in conventional cases.The effectiveness of HyperCase versus conventional cases and role playing in helping students reach six different levels of educational objectives was assessed in an experiment with 22 students. Those using HyperCase performed as well or better on the examination questions than those using standard approaches. In the second part of the study, results from an affective student questionnaire completed by the original 22 students, plus 97 others, revealed that they were overwhelmingly positive in their reaction to this new approach. Little difference in the reactions among experienced and inexperienced computer users was found. Based on our empirical findings, we conclude that students felt their experience with HyperCase was an important departure from the traditional systems analysis and design class.
Publisher: Elsevier BV
Date: 06-2019
DOI: 10.1016/J.MEHY.2019.03.032
Abstract: The increasing incidence of type 2 diabetes transcends all cultures, largely due to populations transitioning from traditional diets and manual occupations, to sedentary, calorific lifestyles. Excess calorie intake leads to intramuscular fat accumulation and insulin resistance. Physical inactivity causes underutilization of mitochondria causing dysfunction and inflammation. Both insulin resistance and mitochondrial dysfunction mechanisms are known to be closely related and to antagonise one another, although the precise nature of the relationship has eluded characterization. It is poorly understood why this mutual dysfunction progresses on to clinical diabetes in only some patients, why progression is often stepwise and why diabetes control only weakly predicts future cardiovascular disease in in iduals. Clinical prediction in patients is therefore currently unsatisfactory and current linear assumptions require challenging. Cells contain networks of oscillating ionic fluxes. Cellular activity is characterised by complex patterns of fluctuation with sudden transitions between patterns. The non-linear nature of these oscillations is well characterised in neuronal activity, cardiac impulses and more recently mitochondria, but not previously in relation to diabetes. Cells under metabolic stress demonstrate complex fluctuations of mitochondrial distribution, coupling strength and synchronisation resulting in periodic or chaotic oscillations of function, causing accumulation of intracellular fat and excess reactive oxygen species (ROS), which exacerbates insulin resistance. Glucose, insulin and HbA1c in patients are also known to oscillate in complex patterns but the mechanisms and significance are largely unknown. Drawing on existing evidence and models from other diseases, a nonlinear, dynamical hypothesis of diabetes onset and progression is proposed. Insulin receptor pathways and mitochondria are treated as two populations of coupled, phase oscillators. Health or disease states depend on system stability or instability and reflect the balance of substrate supply and energy demand. The implication of this novel mechanism is that diabetes and the complications are not the consequence of a distinct pathological agent or pathway, but more an evolving dysrhythmia of normal cellular energetics systems, resulting from accumulated adverse lifestyle conditions. This hypothesis is proposed with the intention of stimulating research into non-linear dynamical constructs as an alternative to current linear models, to improve risk prediction and trajectory analysis in type 2 diabetes.
Publisher: IGI Global
Date: 2005
DOI: 10.4018/978-1-59140-471-2.CH015
Abstract: Possibility theory is an alternative to probability theory as a basis for security management in settings where information resources are elements of national information infrastructure. Probability theory is founded on the assumption that one cannot totally rule out an intrusion. Possibility theory operates under a contrasting assumption. While persistent, well-supported, and highly professional intrusion attacks will have a higher probability of success, operating instead against the possibility of intrusion places defenders in a theoretical framework more suitable for high-stakes protection. The purpose of this chapter is to introduce this alternative quantitative approach to information security evaluation. It is suitable for information resources that are potential targets of intensive professional attacks. This approach operates from the recognition that information resource security is only an opinion of officials responsible for security.
Publisher: Elsevier BV
Date: 1999
Publisher: Emerald
Date: 06-11-2017
DOI: 10.1108/JAOC-02-2015-0019
Abstract: The purpose of this study is to show how the presence of change caused a shift in the roles and responsibilities of the internal audit function (IAF). The methodological design/approach was constructed by combining specific aspects of widely known management accounting and organizational change frameworks. The theoretical premise was based on the old institutional economics component of institutional theory. As such, this study used the case study method to examine and analyze the impact of this change in eight specific organizations using the new two-tiered organizational change framework. This new framework analyzes the multidimensional facets of organizational change in the IAF. From the findings, it was observed that the change can be evolutionary, episodic, continuous and/or teleological, and people, organisms and organizations that are subject to it will react or respond to that change in a myriad of ways. Moreover, the implications of change can be environmental, socioeconomic and political. This study makes an intellectual contribution by introducing a new two-tiered organizational change framework to explain the IAF’s response to the environmental change factor of regulation.
Publisher: SAGE Publications
Date: 03-03-2021
Abstract: This technology report introduces an innovative risk communication tool developed to support providers in communicating diabetes-related risks more intuitively to people with type 2 diabetes mellitus (T2DM). The development process involved three main steps: (1) selecting the content and format of the risk message (2) developing a digital interface and (3) assessing the usability and usefulness of the tool with clinicians through validated questionnaires. The tool calculates personalized risk information based on a validated simulation model (United Kingdom Prospective Diabetes Study Outcomes Model 2) and delivers it using more intuitive risk formats, such as “effective heart age” to convey cardiovascular risks. Clinicians reported high scores for the usability and usefulness of the tool, making its adoption in routine care promising. Despite increased use of risk calculators in clinical care, this is the first time that such a tool has been developed in the diabetes area. Further studies are needed to confirm the benefits of using this tool on behavioral and health outcomes in T2DM populations.
Publisher: Springer Science and Business Media LLC
Date: 10-2007
Publisher: Emerald
Date: 27-05-2014
Abstract: – The purpose of this paper is to develop and evaluate an integrated computer abuse model that incorporates both organizational abuse settings and the psychological processes of the abuser. – The paper developed an emote opportunity (EO) model through a comprehensive literature review and conducted a case study to evaluate the explanatory and prescriptive usefulness of the model. – The EO model helps explain the interaction between organization-centric factors and in idual-centric factors. It also helps explain how potential computer abusers elicit an emotion process component that ultimately contributes to computer abuse behaviors. The model connects both organizational external regulation processes and in idual internal regulation processes to emote process components of potential abusers. – The study considers only organizational computing resources as the target of computer abuse. The model is evaluated by historical data from a computer abuse case. Future research with contemporary empirical data would further evaluate these findings. Organizations should be aware of the opportunities they create for abuse and the emotional state-of-mind of potential abusers within organizations. – Organizations should take a holistic approach that incorporates personal emotions and organizational abuse opportunity settings to prevent computer abuse. – A multilevel, integrated EO model incorporating organizational environment and in idual emotion processes provides an elaborated and holistic understanding of computer abuse. The model helps organizations consider the emotional state-of-mind of abusers as well as their organizational situation.
Publisher: Springer International Publishing
Date: 2016
Publisher: Wiley
Date: 04-1993
Publisher: Association for Computing Machinery (ACM)
Date: 02-2018
Abstract: This paper investigates the relationship between Information Systems (IS) integration and the use of cybersecurity countermeasures using an adapted exposure to risk perspective which considers both the probability of a risk through vulnerability points theory and the impact of the risk if it occurs. Based on an econometric analysis of a survey s le of 9,721 French firms, the study finds that higher degrees of system integration entail higher degrees of cybersecurity usage. Whereas previously it was thought that systems integration reduces the number of vulnerabilities and thus the need for cybersecurity countermeasures, we find that the more the system is integrated, the greater the use of self-protective cybersecurity countermeasures. We theorize that this finding comes from the elimination of many uncontrollable vulnerabilities and the presence of fewer, but controllable, vulnerability points. This finding holds both for internal and external integration but is stronger in the latter case. Moreover, results show that internal dynamism is positively correlated with cybersecurity countermeasures. Our reasoning applies to cybersecurity in terms of self-protective security measures but not necessarily to risk-transfer security measures.
Publisher: Wiley
Date: 12-12-2014
DOI: 10.1111/ISJ.12055
Publisher: Wiley
Date: 17-12-2014
DOI: 10.1111/ISJ.12054
Publisher: MIS Quarterly
Date: 03-03-2015
Publisher: Association for Computing Machinery (ACM)
Date: 12-1993
Abstract: The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that systems analysts and designers develop expertise in methods for specifying information systems security. The characteristics found in three generations of general information system design methods provide a framework for comparing and understanding current security design methods. These methods include approaches that use checklists of controls, ide functional requirements into engineering partitions, and create abstract models of both the problem and the solution. Comparisons and contrasts reveal that advances in security methods lag behind advances in general systems development methods. This analysis also reveals that more general methods fail to consider security specifications rigorously.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2007
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Association for Computing Machinery (ACM)
Date: 08-1999
Publisher: Informa UK Limited
Date: 10-2008
DOI: 10.1057/EJIS.2008.45
Publisher: Elsevier BV
Date: 12-1991
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Edward Elgar Publishing
Date: 21-07-2023
Publisher: SAGE Publications
Date: 06-2012
DOI: 10.1057/JIT.2012.9
Publisher: Informa UK Limited
Date: 03-2004
Publisher: Informa UK Limited
Date: 02-2009
DOI: 10.1057/EJIS.2009.3
Publisher: Association for Computing Machinery (ACM)
Date: 03-1999
Abstract: Knowledge management is used as the underlying theory to develop a set of key process areas for a supplement to the CMM in small or medium-sized enterprises (SME) that develop software. These processes involve a focus on managing knowledge capability rather than traditional project management. A longitudinal case study provides evidence that current practices have already established the feasibility of these key process areas.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2006
DOI: 10.1109/MITP.2006.86
Publisher: ACM Press
Date: 2009
Publisher: Kluwer Academic Publishers
Date: 2005
Publisher: Informa UK Limited
Date: 12-2008
DOI: 10.1057/EJIS.2008.54
Publisher: Elsevier BV
Date: 2016
Publisher: Informa UK Limited
Date: 05-1995
DOI: 10.1057/EJIS.1995.8
Location: United Kingdom of Great Britain and Northern Ireland
Location: United States of America
Location: United Kingdom of Great Britain and Northern Ireland
Location: United Kingdom of Great Britain and Northern Ireland
Location: United States of America
Location: United States of America
Location: United States of America
Location: No location found
No related grants have been discovered for Richard Baskerville.