|
1. |
Editorial |
|
Information Systems Journal,
Volume 5,
Issue 3,
1995,
Page 159-160
David Avison,
Guy Fitzgerald,
Preview
|
PDF (94KB)
|
|
ISSN:1350-1917
DOI:10.1111/j.1365-2575.1995.tb00105.x
出版商:Blackwell Publishing Ltd
年代:1995
数据来源: WILEY
|
2. |
Ethics and information technology use: a factor analysis of attitudes to computer use |
|
Information Systems Journal,
Volume 5,
Issue 3,
1995,
Page 161-183
Sue Conger,
Karen D. Loch,
B. Loerine Helft,
Preview
|
PDF (1152KB)
|
|
摘要:
Abstract.In 1986 Richard O. Mason identified privacy, accuracy, property and access as four ethical issues for the information age. The research reported here sought to answer the questions: are these social issues empirically verifiable constructs? Second, what consensus exists on the factors?A field survey of 79 business professionals and students identified 12 factors which were grouped into five clusters: ownership, access, motivation, responsibility and privacy. These constructs identify additional dimensions and complexity to extend Mason's definition of key ethical issues. The importance of separating the computer user who experiences the ethical dilemma from the stakeholder(s) who deal with the consequences of the dilemma is identified.This study also demonstrates some consensus within the survey items. Consensus exists that it is unethical to profit from non‐job, computer‐related acts. Consensus also exists that personal use of company‐owned information technology resources is acceptable. The other items show little consensus, identifying areas of necessary discussion within the computing professions to determine ethically consistent and appropriate computer
ISSN:1350-1917
DOI:10.1111/j.1365-2575.1995.tb00106.x
出版商:Blackwell Publishing Ltd
年代:1995
数据来源: WILEY
|
3. |
The impact of EDI implementation commitment and implementation success on competitive advantage and firm performance |
|
Information Systems Journal,
Volume 5,
Issue 3,
1995,
Page 185-202
H. R. Rao,
C. C. Pegels,
A. F. Salam,
K. T. Hwang,
V. Seth,
Preview
|
PDF (1004KB)
|
|
摘要:
Abstract.Electronic Data Interchange Systems (EDI) are increasingly being used by business firms to improve operations and customer service. One of the major motivations for business organizations using EDI is to gain a strategic advantage in the marketplace. Although EDI has been implemented by many organizations, unfortunately not all have gained the same level of expected advantage or envisioned benefits.In this study we focus on the impact of EDI implementation commitment and implementation success on competitive advantage and firm performance. We study two categories of companies: companies that initiate the development of EDI and are known as hub companies and those that are their non‐hub counterparts. Findings indicate that non‐hub firms may not reap the same level of expected benefits resulting from EDI technology adoption and implementation as hub fi
ISSN:1350-1917
DOI:10.1111/j.1365-2575.1995.tb00107.x
出版商:Blackwell Publishing Ltd
年代:1995
数据来源: WILEY
|
4. |
On the deep structure of information systems |
|
Information Systems Journal,
Volume 5,
Issue 3,
1995,
Page 203-223
Yair Wand,
Ron Weber,
Preview
|
PDF (1168KB)
|
|
摘要:
Abstract.The deep structure of an information system comprises those properties that manifest the meaning of the real‐world system the information system is intended to model. In this paper we describe three models we have developed of information systems' deep‐structure properties. The first, the representational model, proposes a set of constructs that enable the ontological expressiveness of grammars used to model information systems (such as the entity‐relationship model) to be evaluated. The second, the state‐tracking model, proposes four requirements that information systems must satisfy if they are to faithfully track the real‐world system they are intended to model. The third, the good‐decomposition model, proposes three necessary conditions that information systems must meet if they are to be well decomposed. The three models provide a theoretically based, structured way of evaluating grammars that are used to analyse, design and implement information systems and scripts that have been generated using these grammars to describe specific informat
ISSN:1350-1917
DOI:10.1111/j.1365-2575.1995.tb00108.x
出版商:Blackwell Publishing Ltd
年代:1995
数据来源: WILEY
|
5. |
Methodology as metaphor: the practical basis for multiview methodology (a reply to M.C. Jackson) |
|
Information Systems Journal,
Volume 5,
Issue 3,
1995,
Page 225-231
Heather Watson,
Trevor Wood‐Harper,
Preview
|
PDF (396KB)
|
|
摘要:
Abstract.Multiview Methodology (MVM) combines a range of hard and soft approaches to developing information systems. We explain the practical basis for MVM's combination. This centres on the gap between theory and practice. This arises because methodology in use is metaphorical since its meaning is both (a) a practitioner's experience and (b) a property of a methodology. In practice, the meaning of a methodology is therefore not necessarily restricted to an espoused theory. Multiple perspectives make this explicit and help to create new interpretations.
ISSN:1350-1917
DOI:10.1111/j.1365-2575.1995.tb00109.x
出版商:Blackwell Publishing Ltd
年代:1995
数据来源: WILEY
|
|