Dr. Scott Bernard will speak on the topic of organizational design and his experiences with and approach to integrating strategic, business, and technology planning for large/complex organizations using a holistic enterprise architecture framework.
Scott Bernard博士将讲述组织设计的主题,以及他使用整体企业架构框架为大型/复杂组织集成战略、业务和技术规划的经验和方法。
{"title":"Keynote: Organizational Design","authors":"Scott A. Bernard","doi":"10.1145/2890602.2890628","DOIUrl":"https://doi.org/10.1145/2890602.2890628","url":null,"abstract":"Dr. Scott Bernard will speak on the topic of organizational design and his experiences with and approach to integrating strategic, business, and technology planning for large/complex organizations using a holistic enterprise architecture framework.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126934357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Novice IT professionals are not well-endowed with experience and professional knowledge-attributes gained in the course of IT work-which could facilitate labor market outcomes such as entering the IT workforce immediately after completing college education. However, college-based career experiences such as job shadowing, mentorship, internships and cooperative education are valuable sources of human capital which can engender good future performance and productivity; and, thus, can often decide the employment fate of novice IT professionals. The current study draws on human capital theory and develop a set of hypotheses relating college-based career experiences to the likelihood of securing IT jobs. We test our hypotheses using data from the National Longitudinal Survey of Youth 1997 cohort. We find that hands-on forms of college-based career experiences such internships and cooperative education increase the likelihood of securing IT jobs immediately after completing college. We do not find support for vicarious forms of college-based career experiences i.e. mentorship and job shadowing. We discuss the implications of our results on research and practice.
{"title":"College-Based Career Experiences as Determinants of IT Labor Market Entry: A Survival Analysis Model","authors":"T. Setor, D. Joseph","doi":"10.1145/2890602.2890607","DOIUrl":"https://doi.org/10.1145/2890602.2890607","url":null,"abstract":"Novice IT professionals are not well-endowed with experience and professional knowledge-attributes gained in the course of IT work-which could facilitate labor market outcomes such as entering the IT workforce immediately after completing college education. However, college-based career experiences such as job shadowing, mentorship, internships and cooperative education are valuable sources of human capital which can engender good future performance and productivity; and, thus, can often decide the employment fate of novice IT professionals. The current study draws on human capital theory and develop a set of hypotheses relating college-based career experiences to the likelihood of securing IT jobs. We test our hypotheses using data from the National Longitudinal Survey of Youth 1997 cohort. We find that hands-on forms of college-based career experiences such internships and cooperative education increase the likelihood of securing IT jobs immediately after completing college. We do not find support for vicarious forms of college-based career experiences i.e. mentorship and job shadowing. We discuss the implications of our results on research and practice.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126724807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this paper is to explore contemporary understandings of the smart city movement in relation to information technology (IT) transformations, specifically emerging aware technologies and the use of social media in urban spaces. Faced with rapid urban growth, cities are responding by innovating themselves to address the associated and unprecedented challenges and opportunities. This paper is significant in that it reaches across interdisciplinary domains, to shed light on awareness and the smart cities phenomena. The theoretical perspective for this work draws on material-discursive practices, practice theory, and a performative perspective in relation to IT transformations, smart cities, and awareness. The research design for this study employs an exploratory case study approach, a minimally viable social media space, and multiple methods of qualitative and quantitative data collection and analysis. This paper focuses on two levels of analysis, the individual and the social, in contemporary urban environments. Anecdotal evidence from informal conversations conducted in parallel with this study supports further data analysis, comparison, and triangulation. Key findings are discussed in terms of awareness in relation to experiences of contemporary urban spaces based on the constructs of noticing, sensing, sharing, and smartness. The major contributions of this work include: further development of the research literature for awareness and for IT transformations in relation to smart cities; development, operationalization, and advancing of a conceptual framework for awareness in smart cities; and the identification of future directions for smart cities practitioners and researchers.
{"title":"Is It All About Awareness?: People, Smart Cities 3.0, and Evolving Spaces for IT","authors":"H. McKenna","doi":"10.1145/2890602.2890612","DOIUrl":"https://doi.org/10.1145/2890602.2890612","url":null,"abstract":"The purpose of this paper is to explore contemporary understandings of the smart city movement in relation to information technology (IT) transformations, specifically emerging aware technologies and the use of social media in urban spaces. Faced with rapid urban growth, cities are responding by innovating themselves to address the associated and unprecedented challenges and opportunities. This paper is significant in that it reaches across interdisciplinary domains, to shed light on awareness and the smart cities phenomena. The theoretical perspective for this work draws on material-discursive practices, practice theory, and a performative perspective in relation to IT transformations, smart cities, and awareness. The research design for this study employs an exploratory case study approach, a minimally viable social media space, and multiple methods of qualitative and quantitative data collection and analysis. This paper focuses on two levels of analysis, the individual and the social, in contemporary urban environments. Anecdotal evidence from informal conversations conducted in parallel with this study supports further data analysis, comparison, and triangulation. Key findings are discussed in terms of awareness in relation to experiences of contemporary urban spaces based on the constructs of noticing, sensing, sharing, and smartness. The major contributions of this work include: further development of the research literature for awareness and for IT transformations in relation to smart cities; development, operationalization, and advancing of a conceptual framework for awareness in smart cities; and the identification of future directions for smart cities practitioners and researchers.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115654013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is estimated that 20 million females in the United States have an eating disorder, and many more have unhealthy eating behaviors [17, 21]. Two eating disorders that are more common among females than males are anorexia and bulimia nervosa [1]. Approximately 1 in 200 females will develop anorexia nervosa, and 1-3 in 100 will develop bulimia nervosa [13]. The prevalence of these eating disorders has been continuously increasing [21]. While biological and psychological factors play a role in an individual’s predisposition and development of eating disorders [5], researchers in psychology have highlighted the sociocultural perspective, which is used to understand how social and cultural factors, such as media, affect an individual’s mental processes and behaviors [2]. Much of this research has focused on conventional mass media, such as magazines and television. In recent years, researchers have been calling for more work in understanding the impact of new media, such as online content, on the thin ideal, body image, and eating disorder symptomology [15]. Recent work has shown that online content, such as social media, is associated with poor body image and eating disorders, especially among females [7, 12, 20]. Missing in this research are studies on the impact of weight loss applications (“apps”) on eating disorders even though they contain similar content. Weight loss apps are becoming increasingly popular [8]. They allow users to track their calories, exercise, weight, and other factors. Weight loss apps enable and promote dieting, which is a risk for developing an eating disorder [14]. In Human-Computer Interaction (HCI), there has been a great deal of research on apps for diet and/or physical activity [3, 4, 18, 19]. While HCI researchers have focused on designing these apps to promote behavior change, they have largely viewed weight loss app users as having similar needs and have paid little attention to other factors that may influence their app use, such as eating disorders. However, not all weight loss app users have the same needs or challenges. In order to understand the potential negative effects of these apps and the best ways to address these problems, researchers and designers must understand the various types of users who utilize weight loss apps. One such subgroup is women with anorexia and bulimia nervosa. This is an important user group to study because many females frequently suffer from disordered eating behaviors, and anorexia and bulimia nervosa are most common among females [1, 9]. On one hand, research has shown that people with behaviors indicative of eating disorders use technology to maintain the symptomology of their disorder [11, 16]. On the other hand, technology can also be used to aid in eating disorder recovery [10, 22]. However, there has been little research examining the role of weight loss apps in enabling eating disorders or in supporting eating disorder recovery and maintenance. There may be aspects of weig
{"title":"The Use of Weight Loss Apps by Women with Eating Disorders","authors":"E. Eikey","doi":"10.1145/2890602.2906187","DOIUrl":"https://doi.org/10.1145/2890602.2906187","url":null,"abstract":"It is estimated that 20 million females in the United States have an eating disorder, and many more have unhealthy eating behaviors [17, 21]. Two eating disorders that are more common among females than males are anorexia and bulimia nervosa [1]. Approximately 1 in 200 females will develop anorexia nervosa, and 1-3 in 100 will develop bulimia nervosa [13]. The prevalence of these eating disorders has been continuously increasing [21]. While biological and psychological factors play a role in an individual’s predisposition and development of eating disorders [5], researchers in psychology have highlighted the sociocultural perspective, which is used to understand how social and cultural factors, such as media, affect an individual’s mental processes and behaviors [2]. Much of this research has focused on conventional mass media, such as magazines and television. In recent years, researchers have been calling for more work in understanding the impact of new media, such as online content, on the thin ideal, body image, and eating disorder symptomology [15]. Recent work has shown that online content, such as social media, is associated with poor body image and eating disorders, especially among females [7, 12, 20]. Missing in this research are studies on the impact of weight loss applications (“apps”) on eating disorders even though they contain similar content. Weight loss apps are becoming increasingly popular [8]. They allow users to track their calories, exercise, weight, and other factors. Weight loss apps enable and promote dieting, which is a risk for developing an eating disorder [14]. In Human-Computer Interaction (HCI), there has been a great deal of research on apps for diet and/or physical activity [3, 4, 18, 19]. While HCI researchers have focused on designing these apps to promote behavior change, they have largely viewed weight loss app users as having similar needs and have paid little attention to other factors that may influence their app use, such as eating disorders. However, not all weight loss app users have the same needs or challenges. In order to understand the potential negative effects of these apps and the best ways to address these problems, researchers and designers must understand the various types of users who utilize weight loss apps. One such subgroup is women with anorexia and bulimia nervosa. This is an important user group to study because many females frequently suffer from disordered eating behaviors, and anorexia and bulimia nervosa are most common among females [1, 9]. On one hand, research has shown that people with behaviors indicative of eating disorders use technology to maintain the symptomology of their disorder [11, 16]. On the other hand, technology can also be used to aid in eating disorder recovery [10, 22]. However, there has been little research examining the role of weight loss apps in enabling eating disorders or in supporting eating disorder recovery and maintenance. There may be aspects of weig","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134080633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information Systems curricula require on-going and frequent review [2] [11]. Furthermore, such curricula must be flexible because of the fast-paced, dynamic nature of the workplace. Such flexibility can be maintained through modernizing course content or, inclusively, exchanging hardware or software for newer versions. Alternatively, flexibility can arise from incorporating new information into curricula from other disciplines. One field where the pace of change is extremely high is cybersecurity [3]. Students are left with outdated skills when curricula lag behind the pace of change in industry. For example, cryptography is a required learning objective in the DHS/NSA Center of Academic Excellence (CAE) knowledge criteria [1]. However, the overarching curriculum associated with basic ciphers has gone unchanged for decades. Indeed, a general problem in cybersecurity education is that students lack fundamental knowledge in areas such as ciphers [5]. In response, researchers have developed a variety of interactive classroom visualization tools [5] [8] [9]. Such tools visualize the standard approach to frequency analysis of simple substitution ciphers that includes review of most common, single letters in ciphertext. While fundamental ciphers such as the monoalphabetic substitution cipher have not been updated (these are historical ciphers), collective understanding of how humans interact with language has changed. Updated understanding in both English language pedagogy [10] [12] and automated cryptanalysis of substitution ciphers [4] potentially renders the interactive classroom visualization tools incomplete or outdated. Classroom visualization tools are powerful teaching aids, particularly for abstract concepts. Existing research has established that such tools promote an active learning environment that translates to not only effective learning conditions but also higher student retention rates [7]. However, visualization tools require extensive planning and design when used to actively engage students with detailed, specific knowledge units such as ciphers [7] [8]. Accordingly, we propose a heatmap-based frequency analysis visualization solution that (a) incorporates digraph and trigraph language processing norms; (b) and enhances the active learning pedagogy inherent in visualization tools. Preliminary results indicate that study participants take approximately 15% longer to learn the heatmap-based frequency analysis technique compared to traditional frequency analysis but demonstrate a 50% increase in efficacy when tasked with solving simple substitution ciphers. Further, a heatmap-based solution contributes positively to the field insofar as educators have an additional tool to use in the classroom. As well, the heatmap visualization tool may allow researchers to comparatively examine efficacy of visualization tools in the cryptanalysis of mono-alphabetic substitution ciphers.
{"title":"An Enhanced Visualization Tool for Teaching Monoalphabetic Substitution Cipher Frequency Analysis","authors":"Matthew D. Sprengel, Jason M. Pittman","doi":"10.1145/2890602.2890613","DOIUrl":"https://doi.org/10.1145/2890602.2890613","url":null,"abstract":"Information Systems curricula require on-going and frequent review [2] [11]. Furthermore, such curricula must be flexible because of the fast-paced, dynamic nature of the workplace. Such flexibility can be maintained through modernizing course content or, inclusively, exchanging hardware or software for newer versions. Alternatively, flexibility can arise from incorporating new information into curricula from other disciplines. One field where the pace of change is extremely high is cybersecurity [3]. Students are left with outdated skills when curricula lag behind the pace of change in industry. For example, cryptography is a required learning objective in the DHS/NSA Center of Academic Excellence (CAE) knowledge criteria [1]. However, the overarching curriculum associated with basic ciphers has gone unchanged for decades. Indeed, a general problem in cybersecurity education is that students lack fundamental knowledge in areas such as ciphers [5]. In response, researchers have developed a variety of interactive classroom visualization tools [5] [8] [9]. Such tools visualize the standard approach to frequency analysis of simple substitution ciphers that includes review of most common, single letters in ciphertext. While fundamental ciphers such as the monoalphabetic substitution cipher have not been updated (these are historical ciphers), collective understanding of how humans interact with language has changed. Updated understanding in both English language pedagogy [10] [12] and automated cryptanalysis of substitution ciphers [4] potentially renders the interactive classroom visualization tools incomplete or outdated. Classroom visualization tools are powerful teaching aids, particularly for abstract concepts. Existing research has established that such tools promote an active learning environment that translates to not only effective learning conditions but also higher student retention rates [7]. However, visualization tools require extensive planning and design when used to actively engage students with detailed, specific knowledge units such as ciphers [7] [8]. Accordingly, we propose a heatmap-based frequency analysis visualization solution that (a) incorporates digraph and trigraph language processing norms; (b) and enhances the active learning pedagogy inherent in visualization tools. Preliminary results indicate that study participants take approximately 15% longer to learn the heatmap-based frequency analysis technique compared to traditional frequency analysis but demonstrate a 50% increase in efficacy when tasked with solving simple substitution ciphers. Further, a heatmap-based solution contributes positively to the field insofar as educators have an additional tool to use in the classroom. As well, the heatmap visualization tool may allow researchers to comparatively examine efficacy of visualization tools in the cryptanalysis of mono-alphabetic substitution ciphers.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article deals with an analysis of some contracts Cloud Computing on the questions involved in the security of their environment. The objective of this study is to evaluate if the content of the contracts for the provision of IT services platforms in Computer Cloud includes, at present, the clauses necessary to transmit trust in relation the safety. The services must comply with the recommendations and with the security standards to convey reliability. Also is necessary to make indications about security's requirements in their contracts. This study analyzed through in a literature review, the standards and the recommendations proposed by groups of research and Cloud Computing regulatory entities and made a comparison with the contractual clauses published on the web by some suppliers of Cloud IT platforms. A comparison of these contracts with the recommendations of respected entities in the area of the security for consumption of this type of service shows that there is still a lot to improve in these agreements to clarify the aspects of the safety in a transparent way.
{"title":"What is Missing for Trust in the Cloud Computing?","authors":"Teófilo T. Branco, H. Santos","doi":"10.1145/2890602.2890605","DOIUrl":"https://doi.org/10.1145/2890602.2890605","url":null,"abstract":"This article deals with an analysis of some contracts Cloud Computing on the questions involved in the security of their environment. The objective of this study is to evaluate if the content of the contracts for the provision of IT services platforms in Computer Cloud includes, at present, the clauses necessary to transmit trust in relation the safety. The services must comply with the recommendations and with the security standards to convey reliability. Also is necessary to make indications about security's requirements in their contracts. This study analyzed through in a literature review, the standards and the recommendations proposed by groups of research and Cloud Computing regulatory entities and made a comparison with the contractual clauses published on the web by some suppliers of Cloud IT platforms. A comparison of these contracts with the recommendations of respected entities in the area of the security for consumption of this type of service shows that there is still a lot to improve in these agreements to clarify the aspects of the safety in a transparent way.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116342450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeremy D. Ezell, Diane Lending, S. Kruck, T. Dillon, Jeffrey L. May
In this paper, we present our plan to integrate requirements elicitation concepts and learning assessments into an Information System curriculum. Both contemporary research and practitioners have noted deficiencies in the abilities of entry-level IT consultants to effectively evaluate new information system needs in business environments. Thus, the ability to professionally and effectively elicit new IS requirements adds significant value to students seeking an IS degree.
{"title":"A Plan to Improve Learning of Requirements Elicitation in an IS Curriculum","authors":"Jeremy D. Ezell, Diane Lending, S. Kruck, T. Dillon, Jeffrey L. May","doi":"10.1145/2890602.2890621","DOIUrl":"https://doi.org/10.1145/2890602.2890621","url":null,"abstract":"In this paper, we present our plan to integrate requirements elicitation concepts and learning assessments into an Information System curriculum. Both contemporary research and practitioners have noted deficiencies in the abilities of entry-level IT consultants to effectively evaluate new information system needs in business environments. Thus, the ability to professionally and effectively elicit new IS requirements adds significant value to students seeking an IS degree.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research will look at consumer behaviors in Virtual Worlds (VW) in order to fill the research gap and build a model to explain why users chose to purchase in VWs. Results from this study will help Information Systems (IS) researchers and game developers understand specific user attributes that may affect their intentions to purchase. With this knowledge IS researchers and developers may have the opportunity to manipulate system components in ways to improve business processes and stimulate profits for businesses. This study will rely on the Theory of Reasoned Action (TRA), Flow Theory and the concept of desire for uniqueness (DFU). The study's data will come from online survey volunteer VW users in one region of the United States testing both the model's measurement tool and hypotheses with Structural Equation Modeling (SEM) with Partial Least Squares (PLS). The validity and reliability and the strength and polarity relationships between the variables (user skill, challenge and DFU; VW shopping attitude, subjective norms (SN); and VW purchase intentions) will be assessed. With the results of the study, suggestions for further research will be made.
{"title":"Virtual World Consumer Behavior","authors":"Angie M. Cox","doi":"10.1145/2890602.2906192","DOIUrl":"https://doi.org/10.1145/2890602.2906192","url":null,"abstract":"This research will look at consumer behaviors in Virtual Worlds (VW) in order to fill the research gap and build a model to explain why users chose to purchase in VWs. Results from this study will help Information Systems (IS) researchers and game developers understand specific user attributes that may affect their intentions to purchase. With this knowledge IS researchers and developers may have the opportunity to manipulate system components in ways to improve business processes and stimulate profits for businesses. This study will rely on the Theory of Reasoned Action (TRA), Flow Theory and the concept of desire for uniqueness (DFU). The study's data will come from online survey volunteer VW users in one region of the United States testing both the model's measurement tool and hypotheses with Structural Equation Modeling (SEM) with Partial Least Squares (PLS). The validity and reliability and the strength and polarity relationships between the variables (user skill, challenge and DFU; VW shopping attitude, subjective norms (SN); and VW purchase intentions) will be assessed. With the results of the study, suggestions for further research will be made.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"179 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we focus on the lived experiences of a particular Black scholar in pursuit of a PhD in IT. The content of this paper was adapted from a dissertation that focused on identifying and analyzing the factors that support or undermine the achievement of Black males completing IT degrees and entering the workforce. The content of this paper centers around the factors that impacted the scholar. In light of the Black Lives Matter movement, we wanted to take a social issue and deconstruct it to apply it to academia. In order to accomplish this, we used a researcher's lived experiences as a Black male for the data for this paper. By the scholar's own admission, [blinded for review] has not reached the level of success that the scholar would like the scholar is still striving to reach those goals. These are goals that the likes of Trayvon Martin, Mike Brown, Dontre Hamilton, Eric Garner, John Crawford III, Ezell Ford and countless others no longer have, which sparked the Black Lives Matter movement.
{"title":"Black Lives Matter: The Journey of a Black IT Scholar","authors":"C. Cain, E. Trauth","doi":"10.1145/2890602.2890623","DOIUrl":"https://doi.org/10.1145/2890602.2890623","url":null,"abstract":"In this paper, we focus on the lived experiences of a particular Black scholar in pursuit of a PhD in IT. The content of this paper was adapted from a dissertation that focused on identifying and analyzing the factors that support or undermine the achievement of Black males completing IT degrees and entering the workforce. The content of this paper centers around the factors that impacted the scholar. In light of the Black Lives Matter movement, we wanted to take a social issue and deconstruct it to apply it to academia. In order to accomplish this, we used a researcher's lived experiences as a Black male for the data for this paper. By the scholar's own admission, [blinded for review] has not reached the level of success that the scholar would like the scholar is still striving to reach those goals. These are goals that the likes of Trayvon Martin, Mike Brown, Dontre Hamilton, Eric Garner, John Crawford III, Ezell Ford and countless others no longer have, which sparked the Black Lives Matter movement.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sebastian Dürr, C. Oehlhorn, C. Maier, Sven Laumer
This literature review focusses research on Enterprise Social Media (ESM) and its use within virtual teams. The paper includes results from 38 articles outlining the existing body of knowledge and showing the steady progress in this research field. Previous literature often thematizes the external use of social media and technological aspects, but this research concentrates on the internal collaborative use, its challenges, related determinants, managerial implications and its impact on business. Existing research illustrates key factors in each of the previously mentioned subjects. However, as research should consider the entire field, a research agenda for further studies in this ESM topic is developed.
{"title":"A Literature Review on Enterprise Social Media Collaboration in Virtual Teams: Challenges, Determinants, Implications and Impacts","authors":"Sebastian Dürr, C. Oehlhorn, C. Maier, Sven Laumer","doi":"10.1145/2890602.2890611","DOIUrl":"https://doi.org/10.1145/2890602.2890611","url":null,"abstract":"This literature review focusses research on Enterprise Social Media (ESM) and its use within virtual teams. The paper includes results from 38 articles outlining the existing body of knowledge and showing the steady progress in this research field. Previous literature often thematizes the external use of social media and technological aspects, but this research concentrates on the internal collaborative use, its challenges, related determinants, managerial implications and its impact on business. Existing research illustrates key factors in each of the previously mentioned subjects. However, as research should consider the entire field, a research agenda for further studies in this ESM topic is developed.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130280201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}