首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
回顾了与信息搜寻(information seeking)和搜索(information search)环境(context)及情境(situation)相关的研究,阐述人们对环境和情境的理解。作为环境或情境的重要要素,工作任务(work tasks)已成为信息行为相关研究的起点。文章论述了工作任务的定义,并将相关研究概括为直接研究和间接研究,以帮助理解该领域的研究途径和方式,促进其在中国的发展。  相似文献   

2.
The case(s) demonstrates the importance of business process management (BPM) and business intelligence systems (BIS) in achieving better firm performance. It has been well documented in the literature that research on the effectively usage and combination of knowledge from BPM and BIS in turbulent service environments is limited. In response, we conduct an exploratory comparative case study of four firms in banking and telecommunication industries that have implemented BPM initiative and BIS solution. Our results firstly highlight that actual results of applying BPM and BIS differ greatly from the results that were originally planned. Secondly, we find that BIS initiatives are usually driven by improving marketing and sales, while BPM initiatives are driven by improving business processes. Thirdly, we identify that there is a lack of strong commitment to using both systems for supporting performance management.  相似文献   

3.
4.
In a context where enterprises and organizations aim to optimise their behaviour, obtain certifications and labels, and benefit from the smart use of information systems and technology, two considerations drive this research: (1) the weak maturity level of worldwide Business Process Management (BPM), which exposes the need to reconcile academic theories with industrial contexts, and (2) the need for upcoming software functionalities that prioritize removing the barriers frequently encountered by industrialists when trying to implement the method. To reach such goals, this research work has developed a conceptual framework to represent the BPM implementation state. It is built along three axes: the BPM Cycle (Design, Enact, Maintain), the Field (Culture, Business, IT) and the Abstraction Level (Data, Jobs, Behaviour). An organization’s overall BPM maturity can thus be evaluated by positioning its capabilities along the framework’s axes. It is also suggested that the framework be used to track the implementation of new procedures in an organisation. The framework is presented and detailed before being applied to a complete case study.  相似文献   

5.
Cloud Computing is an emerging technology which promises to bring with it great benefits to all types of computing activities including business support. However, the full commitment to Cloud Computing necessary to gain the full benefit is a major project for any organisation, since it necessitates adoption of new business processes and attitudes to computing services in addition to the immediately obvious systems changes. Hence the evaluation of a Cloud Computing project needs to consider the balance of benefits and risks to the organisation in the full context of the environment in which it operates; it is not sufficient or appropriate to examine technical considerations alone.In this paper, we consider the application of CAPM, a well established approach used for the analysis of risks and benefits of commercial projects to Cloud adoption projects and propose a revised and improved technique, OSM. To support the validity of OSM, two full case studies are presented. In the first, we describe an application of the approach to the iSolutions Group at University of Southampton, which focuses on evaluations of Cloud Computing service improvement. We then illustrate the use of OSM for measuring learning satisfaction of two cohort groups at the University of Greenwich. The results confirm the advantages of using OSM. We conclude that OSM can analyse the risk and return status of Cloud Computing services and help organisations that adopt Cloud Computing to evaluate and review their Cloud Computing projects and services. OSM is an emerging service and analytics model supported by several case studies.  相似文献   

6.
Recent years have seen a profound change in how most users interact with search engines: the majority of search requests now come from mobile devices, which are used in a number of distracting contexts. This use of mobile devices in various situational contexts away from a desk presents a range of novel challenges for users and, consequently, possibilities for interface improvements. However, there is at present a lack of work that evaluates interaction in such contexts to understand what effects context and mobility have on behaviour and errors and, ultimately, users’ search performance.Through a controlled study, in which we simulate walking conditions on a treadmill and obstacle course, we use a combination of interaction logs and multiple video streams to capture interaction behaviour as participants (n = 24) complete simple search tasks. Using a bespoke tagging tool to analyse these recordings, we investigate how situational context and distractions impact user behaviour and performance, contrasting this with users in a baseline, seated condition. Our findings provide insights into the issues these common contexts cause, how users adapt and how such interfaces could be improved.  相似文献   

7.
The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, and suggests that personal information ought to be regarded as communicative acts. The paper suggests a reconceptualization of informational privacy from having its focus on controlling, limiting, and restricting access to material carriers of information to a focus on a regulation of the use, analysis, and interpretation of personal information.  相似文献   

8.
新兴技术不确定性、组织模式网络化、市场的服务导向和价值共创等趋势下,传统创新生态系统所嵌入的技术情境、组织情境和市场情境发生转变。现有创新生态系统文献缺乏对研究情境全面的、系统的关注。研究以系统性评述为基础,整合应用文献计量分析与内容分析,识别出创新生态系统研究的焦点主题、理论发展、应用方法,以及由文献簇涌现的研究情境(包含技术情境、组织情境、市场情境)。研究从情境视角为创新生态系统理论与实践的发展提供启示。  相似文献   

9.
Users increasingly use mobile devices to engage in social activity and commerce, enabling new forms of data collection by firms and marketers. User privacy expectations for these new forms of data collection remain unclear. A particularly difficult challenge is meeting expectations for contextual integrity, as user privacy expectations vary depending upon data type collected and context of use. This article illustrates how fine-grained, contextual privacy expectations can be measured. It presents findings from a factorial vignette survey that measured the impact of diverse real-world contexts (e.g., medical, navigation, music), data types, and data uses on user privacy expectations. Results demonstrate that individuals’ general privacy preferences are of limited significance for predicting their privacy judgments in specific scenarios. Instead, the results present a nuanced portrait of the relative importance of particular contextual factors and information uses, and demonstrate how those contextual factors can be found and measured. The results also suggest that current common activities of mobile application companies, such as harvesting and reusing location data, images, and contact lists, do not meet users’ privacy expectations. Understanding how user privacy expectations vary according to context, data types, and data uses highlights areas requiring stricter privacy protections by governments and industry.  相似文献   

10.
Using Layder's domain theory (1997) as an analytical framework, this article shows how the information society can be measured through various levels of society. Layder's notions of psychobiography, situated activity, social setting, and contextual resources help identify cultural and social indicators for understanding changes in the information society. With the help of empirical indicators for each domain, this article uses the case of Estonia to show that there is often more to the information society than what is captured by traditional measures. This article calls for a context-sensitive approach, which takes into consideration social and cultural indicators. Measurements from all four domains are necessary for understanding the complexity of information-society-related issues.  相似文献   

11.
Today’s data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM).  相似文献   

12.
廉俊颖  杜建华  申娟娟 《科教文汇》2012,(28):121-122,124
项目化教学法是基于典型工作任务和职业能力分析而进行课程设计和教学实施的一种教学模式.将企业工作中的真实项目引入教学之中.在学生完成工作任务的过程中实现新知识的自主学习和职业能力的培养.项目化教学法已经越来越多地应用于BEC课堂教学.旨在提高学生在商务情境下英语听、说、读、写的综合运用能力和商务职业素养。本文以《新剑桥商务英语中级》这本教材第六、七部分为例.展示项目化教学的设计与实施方案.以期对高职商务英语专业其他课程的项目化教学实践提供可资借鉴之处。  相似文献   

13.
Although business process management (‘BPM’) is a popular concept, it has not yet been properly theoretically grounded. This leads to problems in identifying both generic and case-specific critical success factors of BPM programs. The paper proposes an underlying theoretical framework with the utilization of three theories: contingency, dynamic capabilities and task–technology fit. The main premise is that primarily the fit between the business environment and business processes is needed. Then both continuous improvement and the proper fit between business process tasks and information systems must exist. The underlying theory is used to identify critical success factors on a case study from the banking sector.  相似文献   

14.
The purpose of this article and the special issue is to improve our understanding of the theoretical, managerial, and policy implications of entrepreneurial innovation. We accomplish this objective by examining the role of context in stimulating such activity, as well as its impact on the outcomes of entrepreneurial innovation. Our analysis begins by outlining an overarching framework for entrepreneurial innovation and context. With reference to this framework we then compare the attributes of national innovation systems, entrepreneurship and entrepreneurial innovation, and categorize contextual influences on entrepreneurial innovation. We then situate the papers presented in this special issue within this framework. We conclude by outlining an agenda for additional research on this topic, focusing on the relationships between contexts and entrepreneurial innovation and then discuss policy implications, focusing on how public and private actors can meet these challenges.  相似文献   

15.
国外流程管理的技术演进研究   总被引:1,自引:0,他引:1  
本文在分析综述流程管理内涵的基础上,指出了流程管理对传统职能管理的五大超越,探讨了流程管理的起源,即与传统的"科层制"职能管理具有同源性,都起源于泰勒的科学管理,并以此为起点进一步对流程管理的技术演进做了详细的梳理,对流程管理未来的发展方向--流程管理系统作了概迷.  相似文献   

16.
Improving how knowledge is leveraged in organizations for improved business performance is today considered as a major organizational change. Knowledge management (KM) projects are stigmatized as demanding, fuzzy and complex, with questionable outcomes—more than 70% of them do not deliver what they promised. A case of Samsung Electronics mobile branch we present shows how KM projects can be more successful if they are treated as business process-oriented organizational change projects. Both organizations and academia can stand on the shoulders of giants as previous experience and research in that area is rich. Adding the KM flavor to such organizational change is the goal of this case study; the learning outcomes include a six-step KM solution design method, a justification for the business process level of analysis and managerial action, and the need for modest and just-do-it approach when introducing KM-related organizational interventions.  相似文献   

17.
This paper proposes a strategic model for assessing the coherence between companies’ knowledge strategies and their business strategies as well as in their competitive and organisational contexts. In analysing knowledge management literature, we locate three principal strategies: (1) knowledge development (internal or external), (2) knowledge sharing (codification or personalisation) and (3) knowledge exploitation (internal or external). We then position the three strategies and six related policies in the context-content-process dimensions of Pettigrew's model to create a useful framework for strategic analysis and a model to assess the coherence of companies’ knowledge strategy. The model can be used to evaluate how an existing knowledge strategy aligns with a company's characteristics and to formulate and implement a coherent knowledge strategy based on the current competitive environment, organisational context and business strategy.  相似文献   

18.
文章介绍了一种时空语境实在论的观点。首先分析了当代时空实在论发展的特征,确定了时空语境实在论的目标,进而确定了时空语境实在论的本体论基础,构造了时空语境实在论对时空实在的理解模式,最后阐明了时空语境实在论的方法论特征。  相似文献   

19.
User related issues have long been broadly discussed in the information system development (ISD) project research area. In this study, we focus on user risk and identify two risk countering approaches to demonstrate how to deal with user risk and its negative impact on ISD projects. We hypothesize that (1) user risk has a negative impact on project performance, (2) users’ bond with the project and the development team can help reduce user risk, and (3) developers’ task knowledge and vertical coordination can ease the negative impact of user risk and increase project performance. A quantitative approach with survey data collected from 240 practitioners confirmed our hypotheses. In addition, we interviewed seven developers and three user representatives to complete our understanding of this issue. Implications for academia and practitioners are discussed at the end of this paper. Suggestions for future research directions are also provided.  相似文献   

20.
The mobile phone is not just another device; it is with you day and night, and you rely on its capabilities in work and in private. In short, the mobile phone is your companion. As your companion, it should understand your situational and informational needs. How do we increase the friendliness of your mobile phone, in order to fulfil this promise? In this paper, we explore how context awareness can be used for managing the user mobile experience. To this end, we employed a design research approach to integrate context-aware and cloud based services in an Android application. Through a user evaluation and proof-of-concept implementation we show how new technologies can increase the friendliness of your mobile phone. In so doing, we provide evidence that adaptive applications based on user context offer a fertile ground for taking mobile companionship to the next level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号