首页 > 最新文献

ACM Trans. Manag. Inf. Syst.最新文献

英文 中文
A Fitness-Utility Model for Design Science Research 一种适合设计科学研究的实用新型
Pub Date : 2011-05-05 DOI: 10.1145/2499962.2499963
T. Gill, A. Hevner
Current thinking in design science research (DSR) defines the usefulness of the design artifact in a relevant problem environment as the primary research goal. Here we propose a complementary evaluation model for DSR. Drawing from evolutionary economics, we define a fitness-utility model that better captures the evolutionary nature of design improvements and the essential DSR nature of searching for a satisfactory design across a fitness landscape. Our goal is to move DSR to more meaningful evaluations of design artifacts for sustainable impacts. A key premise of this new thinking is that the evolutionary fitness of a design artifact is more valuable than its immediate usefulness. We conclude with a discussion of the strengths and challenges of the fitness-utility model for the performance of rigorous and relevant DSR.
当前设计科学研究(DSR)将设计工件在相关问题环境中的有用性定义为主要研究目标。在此,我们提出了一个互补的DSR评价模型。借鉴进化经济学,我们定义了一个健身实用模型,它更好地捕捉了设计改进的进化本质,以及在健身景观中寻找令人满意的设计的基本DSR本质。我们的目标是推动DSR对设计工件的可持续影响进行更有意义的评估。这种新思想的一个关键前提是,设计工件的进化适应性比它的直接用途更有价值。最后,我们讨论了健身实用新型对严格和相关的DSR性能的优势和挑战。
{"title":"A Fitness-Utility Model for Design Science Research","authors":"T. Gill, A. Hevner","doi":"10.1145/2499962.2499963","DOIUrl":"https://doi.org/10.1145/2499962.2499963","url":null,"abstract":"Current thinking in design science research (DSR) defines the usefulness of the design artifact in a relevant problem environment as the primary research goal. Here we propose a complementary evaluation model for DSR. Drawing from evolutionary economics, we define a fitness-utility model that better captures the evolutionary nature of design improvements and the essential DSR nature of searching for a satisfactory design across a fitness landscape. Our goal is to move DSR to more meaningful evaluations of design artifacts for sustainable impacts. A key premise of this new thinking is that the evolutionary fitness of a design artifact is more valuable than its immediate usefulness. We conclude with a discussion of the strengths and challenges of the fitness-utility model for the performance of rigorous and relevant DSR.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
A multimethod study of information quality in wiki collaboration wiki协作中信息质量的多方法研究
Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929920
Gerald C. Kane
In this article, the author presents the results of a two-phase, multimethod study of wiki-based collaboration in an attempt to better understand how peer-produced collaboration is done well in wiki environments. Phase 1 involves an in-depth case study of the collaborative processes surrounding the development of the Wikipedia article on the 2007 Virginia Tech massacre. The rich data collected are used to develop an initial set of testable hypotheses of factors that enhance the quality of peer-produced information in wiki environments. Phase 2 tests these theories through a quantitative analysis of the collaborative features associated with 188 similar articles that Wikipedia considered for recognition as their best (i.e., the top 0.1%). Four collaborative features are examined for their effects on quality: volume of contributor activity, type of contributor activity, number of anonymous contributors, and top contributor experience. Volume of contributor activity is the only feature that is unsupported, a particularly interesting result because previous literature connects that factor most clearly to success in wiki-based collaboration. Implications are discussed.
在本文中,作者介绍了基于wiki的协作的两阶段多方法研究的结果,试图更好地理解如何在wiki环境中完成对等协作。第一阶段包括对围绕维基百科关于2007年弗吉尼亚理工大学大屠杀的文章开发的协作过程进行深入的案例研究。收集的丰富数据用于开发一套初始的可测试的假设,这些假设可以提高wiki环境中同行产生的信息的质量。第二阶段通过对188篇维基百科认为最好的文章(即前0.1%)相关的协作特征进行定量分析来测试这些理论。研究了四个协作特性对质量的影响:贡献者活动的数量、贡献者活动的类型、匿名贡献者的数量和顶级贡献者的经验。贡献者活动的数量是唯一不支持的特性,这是一个特别有趣的结果,因为以前的文献将这个因素与基于维基的协作的成功联系在一起。讨论了影响。
{"title":"A multimethod study of information quality in wiki collaboration","authors":"Gerald C. Kane","doi":"10.1145/1929916.1929920","DOIUrl":"https://doi.org/10.1145/1929916.1929920","url":null,"abstract":"In this article, the author presents the results of a two-phase, multimethod study of wiki-based collaboration in an attempt to better understand how peer-produced collaboration is done well in wiki environments. Phase 1 involves an in-depth case study of the collaborative processes surrounding the development of the Wikipedia article on the 2007 Virginia Tech massacre. The rich data collected are used to develop an initial set of testable hypotheses of factors that enhance the quality of peer-produced information in wiki environments. Phase 2 tests these theories through a quantitative analysis of the collaborative features associated with 188 similar articles that Wikipedia considered for recognition as their best (i.e., the top 0.1%). Four collaborative features are examined for their effects on quality: volume of contributor activity, type of contributor activity, number of anonymous contributors, and top contributor experience. Volume of contributor activity is the only feature that is unsupported, a particularly interesting result because previous literature connects that factor most clearly to success in wiki-based collaboration. Implications are discussed.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Computer use and wage returns: The complementary roles of IT-related human capital and nonroutine tasks 计算机使用与工资回报:it相关人力资本与非常规任务的互补作用
Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929922
Debabrata Dey, Ming Fan, Gang Peng
The effect of computer use on individual workers is relatively underresearched in the IS literature. Prior studies on computer use usually treat technologies as a “black box” and rarely look into how computers are used in workplaces and why IT-related skills are important there. In this study, we use the data from the Current Population Survey (CPS) and the data on job requirements for over 12,000 occupations from the Dictionary of Occupational Titles (DOT), to examine the complementary roles of skill sets and nonroutine tasks in providing computer-use wage returns for individual workers. We find that computer use is associated with increased levels of interactive and numerical skills required for the general workforce. In addition, workers who use computers at work and possess higher levels of interactive skills receive higher wages. We also find that computer use complements performing nonroutine tasks, particularly nonroutine abstract tasks in contributing to the wage premium. As the tasks become increasingly routine, the impact of computer use on wage returns diminishes.
在美国的文献中,计算机使用对个体工人的影响研究相对较少。之前关于计算机使用的研究通常将技术视为一个“黑盒子”,很少关注计算机在工作场所的使用情况以及为什么it相关技能在工作场所很重要。在这项研究中,我们使用来自当前人口调查(CPS)的数据和来自职业头衔词典(DOT)的超过12,000个职业的工作要求数据,来检验技能组合和非常规任务在为个体工人提供计算机使用工资回报方面的互补作用。我们发现,计算机的使用与一般劳动力所需的互动和数字技能水平的提高有关。此外,在工作中使用电脑并拥有更高水平的互动技能的工人获得更高的工资。我们还发现,计算机的使用补充了非常规任务的执行,特别是非常规的抽象任务,有助于提高工资。随着工作变得越来越常规,使用电脑对工资回报的影响就会减弱。
{"title":"Computer use and wage returns: The complementary roles of IT-related human capital and nonroutine tasks","authors":"Debabrata Dey, Ming Fan, Gang Peng","doi":"10.1145/1929916.1929922","DOIUrl":"https://doi.org/10.1145/1929916.1929922","url":null,"abstract":"The effect of computer use on individual workers is relatively underresearched in the IS literature. Prior studies on computer use usually treat technologies as a “black box” and rarely look into how computers are used in workplaces and why IT-related skills are important there. In this study, we use the data from the Current Population Survey (CPS) and the data on job requirements for over 12,000 occupations from the Dictionary of Occupational Titles (DOT), to examine the complementary roles of skill sets and nonroutine tasks in providing computer-use wage returns for individual workers. We find that computer use is associated with increased levels of interactive and numerical skills required for the general workforce. In addition, workers who use computers at work and possess higher levels of interactive skills receive higher wages. We also find that computer use complements performing nonroutine tasks, particularly nonroutine abstract tasks in contributing to the wage premium. As the tasks become increasingly routine, the impact of computer use on wage returns diminishes.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Editorial: Design science, grand challenges, and societal impacts 社论:设计科学、重大挑战和社会影响
Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929917
Hsinchun Chen
It has been a great relief and pleasure for me to finally see the inaugural issue of the much-anticipated ACM Transactions on Management Information Systems (ACM TMIS) in print and distributed at the recent ICIS meeting in St. Louis, Missouri on December 12–15, 2010. Many thanks to those AEs, advisors, authors, colleagues, and friends who attended our little celebration party at the beautiful conference site, Hyatt Regency St. Louis at the Arch. In total, we had close to 80 guests who attended the party and I signed many copies of the “collector’s edition” of this exciting inaugural issue! With this great beginning, I hope to see the continuous growth and success of this important ACM journal for the MIS community.
在最近于2010年12月12-15日在密苏里州圣路易斯举行的ICIS会议上,我终于看到了备受期待的ACM管理信息系统汇刊(ACM TMIS)的创刊号,这对我来说是一种极大的宽慰和愉悦。非常感谢那些出席我们在美丽的会议地点——圣路易斯凯悦酒店拱门举行的小型庆祝派对的专家、顾问、作者、同事和朋友们。总共有近80位客人参加了聚会,我在许多本令人兴奋的创刊号的“收藏版”上签名!有了这样一个良好的开端,我希望看到这本重要的ACM期刊对管理信息系统社区的持续增长和成功。
{"title":"Editorial: Design science, grand challenges, and societal impacts","authors":"Hsinchun Chen","doi":"10.1145/1929916.1929917","DOIUrl":"https://doi.org/10.1145/1929916.1929917","url":null,"abstract":"It has been a great relief and pleasure for me to finally see the inaugural issue of the much-anticipated ACM Transactions on Management Information Systems (ACM TMIS) in print and distributed at the recent ICIS meeting in St. Louis, Missouri on December 12–15, 2010. Many thanks to those AEs, advisors, authors, colleagues, and friends who attended our little celebration party at the beautiful conference site, Hyatt Regency St. Louis at the Arch. In total, we had close to 80 guests who attended the party and I signed many copies of the “collector’s edition” of this exciting inaugural issue! With this great beginning, I hope to see the continuous growth and success of this important ACM journal for the MIS community.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123356636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Visualizing web search results using glyphs: Design and evaluation of a flower metaphor 可视化的网络搜索结果使用字形:设计和评估一个花的隐喻
Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929918
M. Chau
While the Web provides a lot of useful information to managers and decision makers in organizations for decision support, it requires a lot of time and cognitive effort for users to sift through a search result list returned by search engines to find useful information. Previous research in information visualization has shown that visualization techniques can help users comprehend information and accomplish information tasks more efficiently and effectively. However, only a limited number of such techniques have been applied to Web search result visualization with mixed evaluation results. Using a design science approach, this research designed and implemented a glyph (a graphical object that represents the values of multiple dimensions using multiple visual parameters) and a system for visualizing Web search results. A flower metaphor was adopted in the glyph design to represent the characteristics and metadata of Web documents. Following the cognitive fit theory, an experimental study was conducted to evaluate three displays: a numeric display, a glyph display, and a combined display which showed numbers only, glyphs only, and both, respectively. Experimental results showed that the glyph display and the combined display performed better when task complexity was high, and the numeric display and the combined display performed better when task complexity was low. The combined display also received the best perceived usability from the subjects. Based on the findings, the implications of the study to research and practice are discussed and some future research directions are suggested.
虽然Web为组织中的管理人员和决策者提供了大量有用的信息以提供决策支持,但用户需要花费大量的时间和认知努力来筛选搜索引擎返回的搜索结果列表以查找有用的信息。以往对信息可视化的研究表明,可视化技术可以帮助用户更高效地理解信息并完成信息任务。然而,只有有限数量的此类技术被应用于具有混合评估结果的Web搜索结果可视化。使用设计科学方法,本研究设计并实现了一个字形(使用多个可视化参数表示多个维度值的图形对象)和一个用于可视化Web搜索结果的系统。字形设计中采用花的比喻来表示Web文档的特征和元数据。根据认知契合理论,对三种显示方式进行了实验研究,分别为数字显示、字形显示和仅显示数字、仅显示字形和两者的组合显示。实验结果表明,当任务复杂度较高时,字形显示和组合显示效果较好;当任务复杂度较低时,数字显示和组合显示效果较好。这种组合的显示屏也获得了受试者最好的可用性感知。在此基础上,讨论了本研究对研究和实践的启示,并提出了未来的研究方向。
{"title":"Visualizing web search results using glyphs: Design and evaluation of a flower metaphor","authors":"M. Chau","doi":"10.1145/1929916.1929918","DOIUrl":"https://doi.org/10.1145/1929916.1929918","url":null,"abstract":"While the Web provides a lot of useful information to managers and decision makers in organizations for decision support, it requires a lot of time and cognitive effort for users to sift through a search result list returned by search engines to find useful information. Previous research in information visualization has shown that visualization techniques can help users comprehend information and accomplish information tasks more efficiently and effectively. However, only a limited number of such techniques have been applied to Web search result visualization with mixed evaluation results. Using a design science approach, this research designed and implemented a glyph (a graphical object that represents the values of multiple dimensions using multiple visual parameters) and a system for visualizing Web search results. A flower metaphor was adopted in the glyph design to represent the characteristics and metadata of Web documents. Following the cognitive fit theory, an experimental study was conducted to evaluate three displays: a numeric display, a glyph display, and a combined display which showed numbers only, glyphs only, and both, respectively. Experimental results showed that the glyph display and the combined display performed better when task complexity was high, and the numeric display and the combined display performed better when task complexity was low. The combined display also received the best perceived usability from the subjects. Based on the findings, the implications of the study to research and practice are discussed and some future research directions are suggested.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132245683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Uncovering and testing archetypes of effective public sector CIOs 发现和测试有效的公共部门首席信息官的原型
Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929921
Gregory S. Dawson, R. Watson
Given the importance of public sector CIOs to government performance and citizens' faith in democracy as an efficient provider of services, it is important to understand what makes some government CIOs more effective than others. Q Method is used to uncover five archetypes of public sector CIOs which are shown to be reliable across two Q sorts. These archetypes include politically-oriented CIO, savvy negotiator, technology optimizer, and skillful communicator. Further analysis using a tournament scoring approach indicates that business-oriented CIOs are the most effective. Applying a stakeholder perspective to interpret the results, it is proposed that business-oriented CIOs understand the value in tracking closely to an organization's business leaders and strategically ignoring other stakeholders in their environment, even politically powerful ones. The development and comparison of archetypes provide a new focus of CIO research by extending from the individual level of the attribute to a combination of attributes (archetypes).
鉴于公共部门首席信息官作为高效的服务提供者对政府绩效和公民对民主的信心的重要性,了解是什么使一些政府首席信息官比其他首席信息官更有效是很重要的。Q方法用于揭示公共部门首席信息官的五种原型,这些原型在两种Q类型中都是可靠的。这些原型包括以政治为导向的CIO、精明的谈判者、技术优化者和熟练的沟通者。使用锦标赛评分方法的进一步分析表明,面向业务的cio是最有效的。应用利益相关者的角度来解释结果,建议以业务为导向的cio理解密切跟踪组织的业务领导者和战略性地忽略其环境中的其他利益相关者(甚至是政治上强大的利益相关者)的价值。原型的发展和比较从属性的个体层面扩展到属性的组合(原型),为CIO研究提供了一个新的焦点。
{"title":"Uncovering and testing archetypes of effective public sector CIOs","authors":"Gregory S. Dawson, R. Watson","doi":"10.1145/1929916.1929921","DOIUrl":"https://doi.org/10.1145/1929916.1929921","url":null,"abstract":"Given the importance of public sector CIOs to government performance and citizens' faith in democracy as an efficient provider of services, it is important to understand what makes some government CIOs more effective than others. Q Method is used to uncover five archetypes of public sector CIOs which are shown to be reliable across two Q sorts. These archetypes include politically-oriented CIO, savvy negotiator, technology optimizer, and skillful communicator. Further analysis using a tournament scoring approach indicates that business-oriented CIOs are the most effective. Applying a stakeholder perspective to interpret the results, it is proposed that business-oriented CIOs understand the value in tracking closely to an organization's business leaders and strategically ignoring other stakeholders in their environment, even politically powerful ones. The development and comparison of archetypes provide a new focus of CIO research by extending from the individual level of the attribute to a combination of attributes (archetypes).","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132366598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A privacy protection technique for publishing data mining models and research data 发布数据挖掘模型和研究数据的隐私保护技术
Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877732
Yu Fu, Zhiyuan Chen, Güneş Koru, A. Gangopadhyay
Data mining techniques have been widely used in many research disciplines such as medicine, life sciences, and social sciences to extract useful knowledge (such as mining models) from research data. Research data often needs to be published along with the data mining model for verification or reanalysis. However, the privacy of the published data needs to be protected because otherwise the published data is subject to misuse such as linking attacks. Therefore, employing various privacy protection methods becomes necessary. However, these methods only consider privacy protection and do not guarantee that the same mining models can be built from sanitized data. Thus the published models cannot be verified using the sanitized data. This article proposes a technique that not only protects privacy, but also guarantees that the same model, in the form of decision trees or regression trees, can be built from the sanitized data. We have also experimentally shown that other mining techniques can be used to reanalyze the sanitized data. This technique can be used to promote sharing of research data.
数据挖掘技术已广泛应用于医学、生命科学、社会科学等研究领域,从研究数据中提取有用的知识(如挖掘模型)。研究数据通常需要与数据挖掘模型一起发布,以便进行验证或重新分析。但是,需要保护发布数据的隐私,否则发布的数据会受到链接攻击等滥用。因此,采用各种隐私保护方法是必要的。但是,这些方法只考虑隐私保护,并不能保证可以从经过处理的数据构建相同的挖掘模型。因此,发布的模型无法使用经过处理的数据进行验证。本文提出了一种技术,该技术不仅可以保护隐私,还可以保证从经过处理的数据构建相同的模型(以决策树或回归树的形式)。我们还通过实验证明,可以使用其他挖掘技术来重新分析经过处理的数据。这种技术可以用来促进研究数据的共享。
{"title":"A privacy protection technique for publishing data mining models and research data","authors":"Yu Fu, Zhiyuan Chen, Güneş Koru, A. Gangopadhyay","doi":"10.1145/1877725.1877732","DOIUrl":"https://doi.org/10.1145/1877725.1877732","url":null,"abstract":"Data mining techniques have been widely used in many research disciplines such as medicine, life sciences, and social sciences to extract useful knowledge (such as mining models) from research data. Research data often needs to be published along with the data mining model for verification or reanalysis. However, the privacy of the published data needs to be protected because otherwise the published data is subject to misuse such as linking attacks. Therefore, employing various privacy protection methods becomes necessary. However, these methods only consider privacy protection and do not guarantee that the same mining models can be built from sanitized data. Thus the published models cannot be verified using the sanitized data. This article proposes a technique that not only protects privacy, but also guarantees that the same model, in the form of decision trees or regression trees, can be built from the sanitized data. We have also experimentally shown that other mining techniques can be used to reanalyze the sanitized data. This technique can be used to promote sharing of research data.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133271465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Editorial: Welcome to the first issue of ACM TMIS 编辑:欢迎来到ACM TMIS的第一期
Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877726
Hsinchun Chen
It is a great pleasure for me to announce the first issue of the long-awaited ACM Transactions on Management Information Systems (ACM TMIS), the only ACM journal devoted to the MIS community. The Association for Computing Machinery (http://www.acm.org), or ACM, was founded in 1947 as the world’s first scientific and educational computing society. It has more than 92,000 members as of 2009.1 An ACM publication brings significant prestige and recognition due to the community’s long-standing and high societal impact and its wide reach to academic institutions and the IT industry. It takes a tremendous effort for a small group of MIS researchers and educators to make ACM TMIS a reality. In particular, I would like to acknowledge the groundwork that had been done by Alan Hevner in proposing an earlier MIS journal idea to the ACM, and the assistance and guidance of Ee-Peng Lim as a member of the ACM Publications Board during the entire approval process. We have received exceptionally strong support from the EICs of many key ACM publications and from SIGs (Special Interest Groups) within the ACM community, including: ACM Transactions on Information Systems (TOIS) EIC Jamie Callan, ACM Transactions on Knowledge Discovery from Data (TKDD) EIC Jiawei Han, ACM Transactions on Database Systems (TODS) EIC Meral Özsoyoğlu, ACM Journal of Data and Information Quality (JDIQ) EIC Stuart Madnick, ACM Transactions on the Web (TWEB) EIC Helen Ashman, ACM SIGMIS Chair Janice Sipior, ACM SIGKDD Chair Gregory Piatetsky-Shapiro,
我非常高兴地宣布期待已久的ACM管理信息系统汇刊(ACM TMIS)的第一期,这是ACM唯一一本致力于管理信息系统社区的期刊。计算机协会(http://www.acm.org),简称ACM,成立于1947年,是世界上第一个科学和教育计算机协会。截至2009年,ACM拥有超过92,000名会员。由于ACM社区长期以来的高社会影响及其对学术机构和It行业的广泛影响,ACM出版物带来了显著的声望和认可。一小群管理信息系统研究人员和教育工作者需要付出巨大的努力才能使ACM管理信息系统成为现实。特别是,我要感谢Alan Hevner在向ACM提出早期MIS期刊的想法时所做的基础工作,以及作为ACM出版委员会成员的Ee-Peng Lim在整个批准过程中的帮助和指导。我们得到了许多重要ACM出版物的eic和ACM社区内sig(特殊兴趣小组)的大力支持,包括:ACM信息系统汇刊(TOIS) EIC Jamie Callan, ACM数据知识发现汇刊(TKDD) EIC韩嘉伟,ACM数据库系统汇刊(TODS) EIC Meral Özsoyoğlu, ACM数据与信息质量杂志(JDIQ) EIC Stuart Madnick, ACM网络汇刊(TWEB) EIC Helen Ashman, ACM SIGMIS主席Janice Sipior, ACM SIGKDD主席Gregory Piatetsky-Shapiro,
{"title":"Editorial: Welcome to the first issue of ACM TMIS","authors":"Hsinchun Chen","doi":"10.1145/1877725.1877726","DOIUrl":"https://doi.org/10.1145/1877725.1877726","url":null,"abstract":"It is a great pleasure for me to announce the first issue of the long-awaited ACM Transactions on Management Information Systems (ACM TMIS), the only ACM journal devoted to the MIS community. The Association for Computing Machinery (http://www.acm.org), or ACM, was founded in 1947 as the world’s first scientific and educational computing society. It has more than 92,000 members as of 2009.1 An ACM publication brings significant prestige and recognition due to the community’s long-standing and high societal impact and its wide reach to academic institutions and the IT industry. It takes a tremendous effort for a small group of MIS researchers and educators to make ACM TMIS a reality. In particular, I would like to acknowledge the groundwork that had been done by Alan Hevner in proposing an earlier MIS journal idea to the ACM, and the assistance and guidance of Ee-Peng Lim as a member of the ACM Publications Board during the entire approval process. We have received exceptionally strong support from the EICs of many key ACM publications and from SIGs (Special Interest Groups) within the ACM community, including: ACM Transactions on Information Systems (TOIS) EIC Jamie Callan, ACM Transactions on Knowledge Discovery from Data (TKDD) EIC Jiawei Han, ACM Transactions on Database Systems (TODS) EIC Meral Özsoyoğlu, ACM Journal of Data and Information Quality (JDIQ) EIC Stuart Madnick, ACM Transactions on the Web (TWEB) EIC Helen Ashman, ACM SIGMIS Chair Janice Sipior, ACM SIGKDD Chair Gregory Piatetsky-Shapiro,","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why give away something for nothing? Investigating virtual goods pricing and permission strategies 为什么要白白放弃呢?调查虚拟商品定价和许可策略
Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877729
Sulin Ba, Dan Ke, Jan Stallaert, Zhongju Zhang
With the rapid increase of virtual goods created for virtual world exchanges and the record growth of user-to-user transactions in these in-world economies, an important question is how a creator sets prices for a virtual good so as to maximize her profit from her creation. Virtual goods share similar economic properties (such as substantial production cost and negligible marginal cost) with other types of digital goods. However, one aspect that distinguishes a virtual good is that consumers in a virtual world may want to use multiple copies of the identical good at the same time, and such simultaneous use of multiple copies of the identical good increases a consumer's utility. In this research, we focus on the COPY permission of virtual goods. We develop an economic model to examine under what conditions the COPY permission setting leads to the highest profit for the creator of a virtual good, and what the pricing strategies are in a dynamic setting when such permission choices are present. Theoretical and practical implications of the research are discussed.
随着为虚拟世界交易而创造的虚拟商品的快速增长,以及这些虚拟世界经济中用户对用户交易的创纪录增长,一个重要的问题是,创造者如何为虚拟商品设定价格,从而从自己的创造中获得最大的利润。虚拟商品与其他类型的数字商品具有相似的经济属性(如可观的生产成本和可忽略的边际成本)。然而,区分虚拟商品的一个方面是,虚拟世界中的消费者可能希望同时使用相同商品的多个副本,而同时使用相同商品的多个副本会增加消费者的效用。本文主要研究虚拟商品的复制许可问题。我们开发了一个经济模型来研究在什么条件下复制许可设置会给虚拟商品的创造者带来最高的利润,以及当这种许可选择存在时,在动态设置下的定价策略是什么。讨论了本研究的理论意义和实践意义。
{"title":"Why give away something for nothing? Investigating virtual goods pricing and permission strategies","authors":"Sulin Ba, Dan Ke, Jan Stallaert, Zhongju Zhang","doi":"10.1145/1877725.1877729","DOIUrl":"https://doi.org/10.1145/1877725.1877729","url":null,"abstract":"With the rapid increase of virtual goods created for virtual world exchanges and the record growth of user-to-user transactions in these in-world economies, an important question is how a creator sets prices for a virtual good so as to maximize her profit from her creation. Virtual goods share similar economic properties (such as substantial production cost and negligible marginal cost) with other types of digital goods. However, one aspect that distinguishes a virtual good is that consumers in a virtual world may want to use multiple copies of the identical good at the same time, and such simultaneous use of multiple copies of the identical good increases a consumer's utility. In this research, we focus on the COPY permission of virtual goods. We develop an economic model to examine under what conditions the COPY permission setting leads to the highest profit for the creator of a virtual good, and what the pricing strategies are in a dynamic setting when such permission choices are present. Theoretical and practical implications of the research are discussed.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures 信息安全搜索行为的驱动因素:网络攻击和漏洞披露的调查
Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877728
Jingguo Wang, Nan Xiao, H. R. Rao
More and more people use search engines to seek for various information. This study investigates the search behavior that drives the search for information security knowledge via a search engine. Based on theories in information search and information security behavior we examine the effects of network attacks and vulnerability disclosures on search for information security knowledge by ordinary users. We construct a unique dataset from publicly available sources, and use a dynamic regression model to test the hypotheses empirically. We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search. Implications of the study are discussed.
越来越多的人使用搜索引擎来查找各种信息。本研究探讨透过搜寻引擎搜寻资讯安全知识的行为。基于信息搜索和信息安全行为理论,研究了网络攻击和漏洞披露对普通用户搜索信息安全知识的影响。我们从公开来源构建了一个独特的数据集,并使用动态回归模型对假设进行实证检验。我们发现,当天和前一天的网络攻击对搜索有显著影响,而漏洞披露对搜索没有显著影响。讨论了本研究的意义。
{"title":"Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures","authors":"Jingguo Wang, Nan Xiao, H. R. Rao","doi":"10.1145/1877725.1877728","DOIUrl":"https://doi.org/10.1145/1877725.1877728","url":null,"abstract":"More and more people use search engines to seek for various information. This study investigates the search behavior that drives the search for information security knowledge via a search engine. Based on theories in information search and information security behavior we examine the effects of network attacks and vulnerability disclosures on search for information security knowledge by ordinary users. We construct a unique dataset from publicly available sources, and use a dynamic regression model to test the hypotheses empirically. We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search. Implications of the study are discussed.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122569861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
ACM Trans. Manag. Inf. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1