-
作者:Lee, KC; Kwon, SJ
作者单位:Sungkyunkwan University (SKKU)
摘要:Conventional approaches to business-to-business (B2B) negotiation use primary negotiation terms (PNTs) such as price or order quantity for modeling and analysis, but pay little attention to Such secondary negotiation terms (SNTs) as resource availability and corporate culture. This paper argues that SNTs also contribute to good negotiation decisions because PNTs and SNTs are closely interlinked in the form of causal relationships. Moreover, B2B negotiation demands a practical and useful framew...
-
作者:Levina, N; Vaast, E
作者单位:New York University; Long Island University; Long Island University Post
摘要:This paper examines how information technology (IT) transforrns relations across fields of practice within organizations. Drawing on Bourdieu's practice theory, we argue that the production of any practice involves varying degrees of embodiment (i.e., relying on personal relationships) and objectification (i.e., relying on the exchange of objects). We subsequently characterize boundary-spanning practices according to their relative degrees of embodiment and objectification. We distinguish betw...
-
作者:Khoumbati, K; Themistocleous, M; Irani, Z
作者单位:Brunel University
摘要:The integration of heterogeneous information systems has always been problematic in health-care organizations, as it is associated with the delivery of key services and has high operational costs. Therefore, health-care organizations are looking for new means to increase their functional capabilities and reduce integration cost. In addressing this need, enterprise application integration (EAI) technology has emerged to facilitate systems integration, enhance the quality of services, and reduce...
-
作者:Oh, WS; Gallivan, MJ; Kim, JW
作者单位:McGill University; University System of Georgia; Georgia State University; Concordia University - Canada
摘要:Despite the fact that several event studies have investigated the market's reaction to information technology (IT) investment announcements, little is known about how specific transactional risks influence the market value of a firm. This study examines stock market data to assess investors' responses to various transactional risks associated with IT outsourcing. More specifically, we develop and test several hypotheses to understand how transactional risks that arise due to a range of factors...
-
作者:Cao, JW; Crews, JM; Lin, M; Deokar, A; Burgoon, JK; Nunamaker, JF Jr
作者单位:University of Delaware; Nevada System of Higher Education (NSHE); University of Nevada Reno; University of Arizona; University of Arizona; University of Arizona
摘要:Historically, information systems (IS) researchers have questioned which research paradigms, activities, and methods IS research should follow. In this paper, we argue that different research methods and activities may interact with each other, different research paradigms may complement each other due to such interactions, and therefore, a multimethodological, cross-paradigm research approach may result in better IS research than a singular approach. Three existing multimethodological IS rese...
-
作者:Zhou, LN; Shi, YM; Zhang, DS; Sears, A
作者单位:University System of Maryland; University of Maryland Baltimore County
摘要:The great potential of speech recognition systems in freeing users' hands while interacting with computers has inspired a variety of promising applications. However, given the performance of the state-of-the-art speech recognition technology today, widespread acceptance of speech recognition technology would not be realistic without designing and developing new approaches to detecting and correcting recognition errors effectively. In seeking solutions to the above problem, identifying cues to ...
-
作者:Sun, LL; Srivastava, RP; Mock, TJ
作者单位:Rutgers University System; Rutgers University New Brunswick; University of Kansas; University of Southern California; Maastricht University
摘要:This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions. First, the evidential reasoning approach provides a rigorous, structured manner to incorporate relevant ISS risk factors, related countermeasures, and their interrelationships when estimating ISS risk. Second, the methodology employs the belief funct...
-
作者:Paul, DL
作者单位:University of Denver
摘要:Advances in information and communications technology have made possible collaborative activities in virtual settings. Virtual settings can significantly expand the knowledge resources available, yet they also create additional challenges to the already difficult activities of collaborating. The purpose of this research is to provide a better understanding of how collaborative activities in virtual settings enable the different parties to achieve their desired objectives by examining them from...
-
作者:Fruhling, A; De Vreede, GJ
作者单位:University of Nebraska System; Delft University of Technology
摘要:eXtreme Programming (XP) is a well-known agile software development method. While a number of reports have been published on explaining the XP methodology and the perceived benefits when using XP for system development in recent years, less is known about the actual operationalization of the XP principles. This paper presents an action research study reporting on the experiences of implementing the XP methodology in a development project for a Web-based, distributed information system. The goa...
-
作者:Zwass, V