Aim/Purpose: The proliferation of fake news through social media threatens to undercut the possibility of ascertaining facts and truth. This paper explores the use of ancient rhetorical tools to identify fake news generally and to see through the misinformation juggernaut of President Donald Trump. Background: The ancient rhetorical appeals described in Aristotle’s Rhetoric—ethos (character of the speaker), pathos (nature of the audience) and logos (message itself)—might be a simple, yet profound fix for the era of fake news. Also known as the rhetorical triangle and used as an aid for effective public speaking by the ancient Greeks, the three appeals can also be utilized for analyzing the main components of discourse. Methodology: Discourse analysis utilizes insights from rhetoric, linguistics, philosophy and anthropology in in order to interpret written and spoken texts. Contribution This paper analyzes Donald Trump’s effective use of Twitter and campaign rallies to create and sustain fake news. Findings: At the point of the writing of this paper, the Washington Post Trump Fact Checker has identified over 10,000 untruths uttered by the president in his first two years of office, for an average of eight untruths per day. In addition, analysis demonstrates that Trump leans heavily on ethos and pathos, almost to the exclusion of logos in his tweets and campaign rallies, making spectacular claims, which seem calculated to arouse emotions and move his base to action. Further, Trump relies heavily on epideictic rhetoric (praising and blaming), excluding forensic (legal) and deliberative rhetoric, which the ancients used for sustained arguments about the past or deliberations about the future of the state. In short, the analysis uncovers how and ostensibly why Trump creates and sustains fake news while claiming that other traditional news outlets, except for FOX news, are the actual purveyors of fake news. Recommendations for Practitioners: Information systems and communication practitioners need to be aware of the ways in which the systems they create and monitor are vulnerable to targeted attacks of the purveyors of fake news. Recommendation for Researchers: Further research on the identification and proliferation of fake news from a variety of disciplines is needed, in order to stem the flow of misinformation and untruths through social media. Impact on Society: The impact of fake news is largely unknown and needs to be better understood, especially during election cycles. Some researchers believe that social media constitute a fifth estate in the United States, challenging the authority of the three branches of government and the traditional press. Future Research: As noted above, further research on the identification and proliferation of fake news from a variety of disciplines is needed, in order to stem the flow of misinformation and untruths through social media.
{"title":"Ethos, Pathos and Logos: Rhetorical Fixes for an Old Problem: Fake News","authors":"A. J. Grant","doi":"10.28945/4154","DOIUrl":"https://doi.org/10.28945/4154","url":null,"abstract":"Aim/Purpose: The proliferation of fake news through social media threatens to undercut the possibility of ascertaining facts and truth. This paper explores the use of ancient rhetorical tools to identify fake news generally and to see through the misinformation juggernaut of President Donald Trump.\u0000\u0000Background: The ancient rhetorical appeals described in Aristotle’s Rhetoric—ethos (character of the speaker), pathos (nature of the audience) and logos (message itself)—might be a simple, yet profound fix for the era of fake news. Also known as the rhetorical triangle and used as an aid for effective public speaking by the ancient Greeks, the three appeals can also be utilized for analyzing the main components of discourse. \u0000\u0000Methodology: Discourse analysis utilizes insights from rhetoric, linguistics, philosophy and anthropology in in order to interpret written and spoken texts.\u0000Contribution This paper analyzes Donald Trump’s effective use of Twitter and campaign rallies to create and sustain fake news.\u0000\u0000Findings: At the point of the writing of this paper, the Washington Post Trump Fact Checker has identified over 10,000 untruths uttered by the president in his first two years of office, for an average of eight untruths per day. In addition, analysis demonstrates that Trump leans heavily on ethos and pathos, almost to the exclusion of logos in his tweets and campaign rallies, making spectacular claims, which seem calculated to arouse emotions and move his base to action. Further, Trump relies heavily on epideictic rhetoric (praising and blaming), excluding forensic (legal) and deliberative rhetoric, which the ancients used for sustained arguments about the past or deliberations about the future of the state. In short, the analysis uncovers how and ostensibly why Trump creates and sustains fake news while claiming that other traditional news outlets, except for FOX news, are the actual purveyors of fake news.\u0000\u0000Recommendations for Practitioners: Information systems and communication practitioners need to be aware of the ways in which the systems they create and monitor are vulnerable to targeted attacks of the purveyors of fake news.\u0000\u0000Recommendation for Researchers: Further research on the identification and proliferation of fake news from a variety of disciplines is needed, in order to stem the flow of misinformation and untruths through social media.\u0000\u0000Impact on Society: The impact of fake news is largely unknown and needs to be better understood, especially during election cycles. Some researchers believe that social media constitute a fifth estate in the United States, challenging the authority of the three branches of government and the traditional press.\u0000\u0000Future Research: As noted above, further research on the identification and proliferation of fake news from a variety of disciplines is needed, in order to stem the flow of misinformation and untruths through social media.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124725358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: To engage the reader to think more deeply about lying in the context to a discussion of fake news. Background: Many have read the scriptures holy to Christians; this discussion leads to questions about why even characters within tell things that are not true. Findings: The Hebrew and Greek Bibles are filled with instances where the characters, even G-d, appears to have lied, and commentators have drawn wisdom from these. Recommendations for Researchers: When noting fake news, ask why the news with its falsehoods are present-ed. That is, determine if the news is an eisegesis or an exegeses.
{"title":"Does G-d Lie? Understanding Dissembling in the Bible","authors":"A. J. Grant, E. Cohen","doi":"10.28945/4260","DOIUrl":"https://doi.org/10.28945/4260","url":null,"abstract":"Aim/Purpose: To engage the reader to think more deeply about lying in the context to a discussion of fake news.\u0000\u0000Background: Many have read the scriptures holy to Christians; this discussion leads to questions about why even characters within tell things that are not true.\u0000\u0000Findings: The Hebrew and Greek Bibles are filled with instances where the characters, even G-d, appears to have lied, and commentators have drawn wisdom from these.\u0000\u0000Recommendations for Researchers: When noting fake news, ask why the news with its falsehoods are present-ed. That is, determine if the news is an eisegesis or an exegeses.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: Continuing low percentage of on-time-completion of doctoral studies suggest the exploration of new approaches to the process is desirable. Background: PhD studies may be viewed as a project- it is a temporary endeavor undertaken to create a unique product. Project management practices have proven to be helpful in numerous domains. Methodology: Process analysis method will be applied, using: 1) semi-structured interviews with supervisors and supervisee, 2) data gathered by the school of advance graduate studies in higher education institute. Contribution: The research will explore the appropriated measurable indicators of successful PhD and identify project management practices that promote better process and outcomes of PhD studies. Impact on Society: Better and more efficient process will support lower individual and national spending on doctoral studies Future Research: Further research should explore relevance of the findings in various settings (characteristics of the supervisor and supervisee, higher education system etc.)
{"title":"A Project Management Perspective of PhD Supervision Process – Towards Effective and Efficient Model [Abstract]","authors":"Gali Naveh, Dorit Tubin","doi":"10.28945/4349","DOIUrl":"https://doi.org/10.28945/4349","url":null,"abstract":"Aim/Purpose: Continuing low percentage of on-time-completion of doctoral studies suggest the exploration of new approaches to the process is desirable.\u0000\u0000Background: PhD studies may be viewed as a project- it is a temporary endeavor undertaken to create a unique product. Project management practices have proven to be helpful in numerous domains.\u0000\u0000Methodology: Process analysis method will be applied, using: 1) semi-structured interviews with supervisors and supervisee, 2) data gathered by the school of advance graduate studies in higher education institute.\u0000\u0000Contribution: The research will explore the appropriated measurable indicators of successful PhD and identify project management practices that promote better process and outcomes of PhD studies.\u0000\u0000Impact on Society: Better and more efficient process will support lower individual and national spending on doctoral studies\u0000\u0000Future Research: Further research should explore relevance of the findings in various settings (characteristics of the supervisor and supervisee, higher education system etc.)","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128467959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: The current decade has witnessed rising spates of threats and attacks that have threatened the safety and security of cyberspace, thereby giving rise to contemporary discourses pertaining the realities that these ominous trends portend for technology innovation and digitalisation, in the emerging global digital society. In the process, the technological capabilities that have been used to effectively harness the efficiency that this virtual space provides for contemporary education and learning have been defamed. Aim/Purpose: This exploratory research interrogates the possible relationships between the contemporary concerns of global cyber security, and the realities and prospects of IAE and TeLEs, while elucidating the crucial factors that impose on such relationship(s). Methodology: This research adopts the qualitative research methodology with an exploratory approach to interrogate the various contemporary concerns of global cybersecurity as contained in existing literature, especially as it affects the proliferation and adoption of IT-aided education and Technology-enhanced Learning Environments (TeLEs); based on a systematic correlational analysis of key interposing concepts. Contribution: The research presents an overview of the current status and prospects of development of IAE and TeLEs, as well as the nature of the realities associated with contemporary concerns of global cybersecurity; then also discussing how these cybersecurity concerns impact on the wider adoption and implementation of IAE and TeLEs. Findings: The contemporary concerns of global cybersecurity that were discovered to impact on IAE and TeLEs include: Academic Dishonesty, Misconduct and Malpractice, Fake News, Steganography & Malware, and Cyberbullying. The interrogation of these concerns lead to an elucidation of the associated factors and interactions that have hampered the wider development and adoption of IAE and TeLEs for education, teaching and learning in the 21st century. These are properly positioned in reality by drawing on evidences and deductions from existing researches, and supported with real-life case studies to explain the implications of the portended realities for the emerging global information society. Recommendations for Practitioners & Researchers: The EMINDA cybersecurity framework for TeLEs is presented as a better way forward for lifting the future of IAE and TeLEs out of the quagmire it has been plunged into by the contemporary concerns of global cybersecurity. This framework synthesizes aspects of existing security strategies that have been deployed successfully to insure cybersecurity for various other digital and technological application domains. Impact on Society: The revolutionary impact of technology and digitization of teaching and learning in the modern era has come to stay, with exciting prospects for the future of the emerging global information society. At the same time, the realities of global cybersecurity have
{"title":"Cybersecurity, IT-aided Education, and TeLEs: Nexus, Vistas & Realities","authors":"E. Ogu, Chiemela Ogu","doi":"10.28945/4153","DOIUrl":"https://doi.org/10.28945/4153","url":null,"abstract":"Background: The current decade has witnessed rising spates of threats and attacks that have threatened the safety and security of cyberspace, thereby giving rise to contemporary discourses pertaining the realities that these ominous trends portend for technology innovation and digitalisation, in the emerging global digital society. In the process, the technological capabilities that have been used to effectively harness the efficiency that this virtual space provides for contemporary education and learning have been defamed.\u0000\u0000Aim/Purpose: This exploratory research interrogates the possible relationships between the contemporary concerns of global cyber security, and the realities and prospects of IAE and TeLEs, while elucidating the crucial factors that impose on such relationship(s).\u0000\u0000Methodology: This research adopts the qualitative research methodology with an exploratory approach to interrogate the various contemporary concerns of global cybersecurity as contained in existing literature, especially as it affects the proliferation and adoption of IT-aided education and Technology-enhanced Learning Environments (TeLEs); based on a systematic correlational analysis of key interposing concepts.\u0000\u0000Contribution: The research presents an overview of the current status and prospects of development of IAE and TeLEs, as well as the nature of the realities associated with contemporary concerns of global cybersecurity; then also discussing how these cybersecurity concerns impact on the wider adoption and implementation of IAE and TeLEs.\u0000\u0000Findings: The contemporary concerns of global cybersecurity that were discovered to impact on IAE and TeLEs include: Academic Dishonesty, Misconduct and Malpractice, Fake News, Steganography & Malware, and Cyberbullying. The interrogation of these concerns lead to an elucidation of the associated factors and interactions that have hampered the wider development and adoption of IAE and TeLEs for education, teaching and learning in the 21st century. These are properly positioned in reality by drawing on evidences and deductions from existing researches, and supported with real-life case studies to explain the implications of the portended realities for the emerging global information society.\u0000\u0000Recommendations for Practitioners & Researchers: The EMINDA cybersecurity framework for TeLEs is presented as a better way forward for lifting the future of IAE and TeLEs out of the quagmire it has been plunged into by the contemporary concerns of global cybersecurity. This framework synthesizes aspects of existing security strategies that have been deployed successfully to insure cybersecurity for various other digital and technological application domains.\u0000\u0000Impact on Society: The revolutionary impact of technology and digitization of teaching and learning in the modern era has come to stay, with exciting prospects for the future of the emerging global information society. At the same time, the realities of global cybersecurity have ","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is examined. Background: The study focuses on employees' attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial institution. Contribution: As far as we know, this is the first paper to thoroughly examine employees' awareness of information system procedures, among financial organizations in Israel and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. Findings: Our results indicate that employees' attitudes, normative beliefs and personal capabilities to comply with firm's ISP, have positive effects on the firm's ISP compliance. Also, employees' general awareness of IS, as well as awareness to ISP within the firm, positively affect employees' ISP compliance. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from other financial institutions and also institutions from other fields and also should apply qualitative analysis to explore other pillars of behavioral patterns related to the subject matter.
{"title":"The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: Case Study of a Financial Firm [Abstract]","authors":"Golan Carmi, D. Bouhnik","doi":"10.28945/4258","DOIUrl":"https://doi.org/10.28945/4258","url":null,"abstract":"Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is examined. \u0000\u0000Background: The study focuses on employees' attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities.\u0000 \u0000Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial institution. \u0000\u0000Contribution: As far as we know, this is the first paper to thoroughly examine employees' awareness of information system procedures, among financial organizations in Israel and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. \u0000\u0000Findings: Our results indicate that employees' attitudes, normative beliefs and personal capabilities to comply with firm's ISP, have positive effects on the firm's ISP compliance. Also, employees' general awareness of IS, as well as awareness to ISP within the firm, positively affect employees' ISP compliance. \u0000\u0000Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. \u0000\u0000Future Research: Future work should sample employees from other financial institutions and also institutions from other fields and also should apply qualitative analysis to explore other pillars of behavioral patterns related to the subject matter.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130978346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
[This Proceedings paper was revised and published in the 2019 issue of Journal of Information Technology Education: Research, Volume 18] Aim/Purpose: To understand readiness of students for learning in online environments across different age groups. Background: Online learners today are diverse in age due to increasing adult/mature students who continue their higher education while they are working. Understanding the influence of the learners’ age on their online learning experience is limited. Methodology: A survey methodology approach was followed. A sample of one thousand nine hundred and twenty surveys were used. Correlation analysis was performed. Contribution: The study contributes by adding to the limited body of knowledge in this area and adds to the dimensions of the Online Learning Readiness Survey additional dimensions such as usefulness, tendency, anxiety, and attitudes. Findings: Older students have more confidence than younger ones in computer proficiency and learning skills. They are more motivated, show better attitudes and are less anxious. Recommendations for Practitioners: Practitioners should consider preferences that allow students to configure the learning approach to their age. These preferences should be tied to the dimensions of the online learning readiness survey (OLRS). Recommendations for Researchers: More empirical research is required using OLRS for online learning environments. OLRS factors are strong and can predict student readiness and performance. These are opportunities for artificial intelligence in the support of technology-mediated tools for learning.
{"title":"Understanding Online Learning Based on Different Age Categories","authors":"Danielle Morin, Hamed Safaee Fard, R. Saadé","doi":"10.28945/4313","DOIUrl":"https://doi.org/10.28945/4313","url":null,"abstract":"[This Proceedings paper was revised and published in the 2019 issue of Journal of Information Technology Education: Research, Volume 18]\u0000\u0000Aim/Purpose: To understand readiness of students for learning in online environments across different age groups.\u0000\u0000Background: Online learners today are diverse in age due to increasing adult/mature students who continue their higher education while they are working. Understanding the influence of the learners’ age on their online learning experience is limited.\u0000\u0000Methodology: A survey methodology approach was followed. A sample of one thousand nine hundred and twenty surveys were used. Correlation analysis was performed.\u0000\u0000Contribution: The study contributes by adding to the limited body of knowledge in this area and adds to the dimensions of the Online Learning Readiness Survey additional dimensions such as usefulness, tendency, anxiety, and attitudes.\u0000\u0000Findings: Older students have more confidence than younger ones in computer proficiency and learning skills. They are more motivated, show better attitudes and are less anxious.\u0000\u0000Recommendations for Practitioners: Practitioners should consider preferences that allow students to configure the learning approach to their age. These preferences should be tied to the dimensions of the online learning readiness survey (OLRS).\u0000\u0000Recommendations for Researchers: More empirical research is required using OLRS for online learning environments. OLRS factors are strong and can predict student readiness and performance. These are opportunities for artificial intelligence in the support of technology-mediated tools for learning.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134631489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Ziemba, Monika Eisenbardt, Roisin Mullins, Sandra Dettmer
[This Proceedings paper was revised and published in the 2019 issue of the Interdisciplinary Journal of Information, Knowledge, and Management, Volume 14.] Aim/Purpose: The main purpose of this paper is to identify prosumers’ engagement in business process innovation through knowledge sharing. Background: In the increasingly competitive knowledge-based economy, companies must seek innovative methods of doing business, quickly react to consumer demand, and provide superior value to consumers. Simultaneously, contemporary consumers, named “prosumers”, want to be active co-creators of value and satisfy their consumption needs through collaboration with companies for co-creation, co-design, co-production, co-promotion, co-pricing, co-distribution, co-consumption, and co-maintenance. Consequently, consumer involvement in development and improvement of products and business process must be widely analyzed in various contexts. Methodology: The research is a questionnaire survey study of 388 prosumers in Poland and 76 in the UK. Contribution The contribution of this research is twofold. First, it identifies how prosumers can be engaged in business processes through knowledge sharing. Second, it investigates the differences between Poland- and UK-based prosumers in engagement in business process. Findings: The study found that prosumers are engaged in knowledge sharing at each stage of the business process innovation framework. However, there are differences in the types of processes that draw on prosumers’ engagement. Prosumers in Poland are found to engage mostly in the business process of developing and managing products, whereas prosumers in the UK engage mostly in the business process of managing customer services. Recommendations for Practitioners: This study provides practitioners with guidelines for engaging prosumers and their knowledge sharing to improve process innovation. Companies gain new insight from these findings about prosumers’ knowledge sharing for process innovation, which may help them make better decisions about which projects and activities they can engage with prosumers for future knowledge sharing and creating prospective innovations. Recommendations for Researchers: Researchers may use this methodology and do similar analysis with different samples in Poland, the UK, and other countries, for many additional comparisons between different groups and countries. Moreover, a different methodology may be used for identifying prosumers’ engagement and knowledge sharing for processes improvement. Future Research: This study examined prosumers’ engagement from the prosumers’ standpoint. Therefore prosumers’ engagement from the company perspective should be explored in future research.
{"title":"Prosumers’ Engagement in Business Process Innovation – The Case of Poland and the UK","authors":"E. Ziemba, Monika Eisenbardt, Roisin Mullins, Sandra Dettmer","doi":"10.28945/4320","DOIUrl":"https://doi.org/10.28945/4320","url":null,"abstract":"[This Proceedings paper was revised and published in the 2019 issue of the Interdisciplinary Journal of Information, Knowledge, and Management, Volume 14.]\u0000\u0000Aim/Purpose: The main purpose of this paper is to identify prosumers’ engagement in business process innovation through knowledge sharing.\u0000\u0000Background: In the increasingly competitive knowledge-based economy, companies must seek innovative methods of doing business, quickly react to consumer demand, and provide superior value to consumers. Simultaneously, contemporary consumers, named “prosumers”, want to be active co-creators of value and satisfy their consumption needs through collaboration with companies for co-creation, co-design, co-production, co-promotion, co-pricing, co-distribution, co-consumption, and co-maintenance. Consequently, consumer involvement in development and improvement of products and business process must be widely analyzed in various contexts.\u0000\u0000Methodology: The research is a questionnaire survey study of 388 prosumers in Poland and 76 in the UK.\u0000Contribution The contribution of this research is twofold. First, it identifies how prosumers can be engaged in business processes through knowledge sharing. Second, it investigates the differences between Poland- and UK-based prosumers in engagement in business process.\u0000\u0000Findings: The study found that prosumers are engaged in knowledge sharing at each stage of the business process innovation framework. However, there are differences in the types of processes that draw on prosumers’ engagement. Prosumers in Poland are found to engage mostly in the business process of developing and managing products, whereas prosumers in the UK engage mostly in the business process of managing customer services.\u0000\u0000Recommendations for Practitioners: This study provides practitioners with guidelines for engaging prosumers and their knowledge sharing to improve process innovation. Companies gain new insight from these findings about prosumers’ knowledge sharing for process innovation, which may help them make better decisions about which projects and activities they can engage with prosumers for future knowledge sharing and creating prospective innovations.\u0000\u0000Recommendations for Researchers: Researchers may use this methodology and do similar analysis with different samples in Poland, the UK, and other countries, for many additional comparisons between different groups and countries. Moreover, a different methodology may be used for identifying prosumers’ engagement and knowledge sharing for processes improvement.\u0000\u0000Future Research: This study examined prosumers’ engagement from the prosumers’ standpoint. Therefore prosumers’ engagement from the company perspective should be explored in future research.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133056798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
[This Proceedings paper was revised and published in the 2019 issue of the journal Issues in Informing Science and Information Technology, Volume 16] Aim/purpose The purpose of this article is to discuss the psychosocial and emotional outcomes of an introductory health science workshop designed to support and assist incoming health science students before starting their university study. Background For the past two decades, a South Australian university offered an on-campus face to face workshop titled ‘Preparation for Health Sciences’ to incoming first-year students from eleven allied health programs such as Nursing, Physiotherapy and Medical Imaging. While many were locals, a good number came from regional and rural areas, and many were international students also. They consisted of both on-campus and off-campus students. The workshop was created as a new learning environment that was available for students of diverse age groups, educational and cultural backgrounds to prepare them to study sciences. The content of the four-day workshop was developed in consultation with the program directors of the allied health programs. The objectives were to: introduce the assumed foundational science knowledge to undertake health sciences degree; gain confidence in approaching science subjects; experience lectures and laboratory activities; and become familiar with the University campus and its facilities. The workshop was delivered a week before the orientation week, before first-year formal teaching weeks. The topics covered were enhancing study skills, medical and anatomical terminology, body systems, basic chemistry and physics, laboratory activities, and assessment of learning. Methodology In order to determine the outcomes of the workshop, a survey was used requiring participants to agree or disagree about statements concerning the preparatory course and answer open-ended questions relating to the most important information learned and the best aspects of the workshop. Several students piloted this questionnaire before use in order to ascertain the clarity of instructions, terminology and statements. The result of the 2015-2018 pre- and post-evaluation showed that the workshop raised confidence and enthusiasm in commencing university and that the majority considered the workshop useful overall. The findings of the survey are drawn upon to examine the psychosocial and emotional impacts of the workshop on participants. Using secondary qualitative analysis, the researchers identified the themes relating to the psychosocial and emotional issues conveyed by the participants. Contribution The contributions of the article are in the areas of improving students’ confidence to complete their university degrees and increasing the likelihood of academic success. Findings Of the 285 students who participated in the workshops from 2015 to 2018, 166 completed the survey conducted at the conclusion of the initiative, representing a 58% response rate. The
{"title":"Transition to First Year University Study: A Qualitative Descriptive Study on the Psychosocial and Emotional Impacts of a Science Workshop","authors":"J. Thalluri, Joy Penman","doi":"10.28945/4297","DOIUrl":"https://doi.org/10.28945/4297","url":null,"abstract":"[This Proceedings paper was revised and published in the 2019 issue of the journal Issues in Informing Science and Information Technology, Volume 16]\u0000\u0000Aim/purpose\u0000The purpose of this article is to discuss the psychosocial and emotional outcomes of an introductory health science workshop designed to support and assist incoming health science students before starting their university study.\u0000 \u0000Background\u0000For the past two decades, a South Australian university offered an on-campus face to face workshop titled ‘Preparation for Health Sciences’ to incoming first-year students from eleven allied health programs such as Nursing, Physiotherapy and Medical Imaging. While many were locals, a good number came from regional and rural areas, and many were international students also. They consisted of both on-campus and off-campus students.\u0000 \u0000The workshop was created as a new learning environment that was available for students of diverse age groups, educational and cultural backgrounds to prepare them to study sciences. The content of the four-day workshop was developed in consultation with the program directors of the allied health programs. The objectives were to: introduce the assumed foundational science knowledge to undertake health sciences degree; gain confidence in approaching science subjects; experience lectures and laboratory activities; and become familiar with the University campus and its facilities. The workshop was delivered a week before the orientation week, before first-year formal teaching weeks. The topics covered were enhancing study skills, medical and anatomical terminology, body systems, basic chemistry and physics, laboratory activities, and assessment of learning.\u0000 \u0000Methodology\u0000In order to determine the outcomes of the workshop, a survey was used requiring participants to agree or disagree about statements concerning the preparatory course and answer open-ended questions relating to the most important information learned and the best aspects of the workshop. Several students piloted this questionnaire before use in order to ascertain the clarity of instructions, terminology and statements. The result of the 2015-2018 pre- and post-evaluation showed that the workshop raised confidence and enthusiasm in commencing university and that the majority considered the workshop useful overall. The findings of the survey are drawn upon to examine the psychosocial and emotional impacts of the workshop on participants. Using secondary qualitative analysis, the researchers identified the themes relating to the psychosocial and emotional issues conveyed by the participants.\u0000 \u0000Contribution\u0000The contributions of the article are in the areas of improving students’ confidence to complete their university degrees and increasing the likelihood of academic success.\u0000\u0000Findings\u0000Of the 285 students who participated in the workshops from 2015 to 2018, 166 completed the survey conducted at the conclusion of the initiative, representing a 58% response rate. The ","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127574677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
[This Proceedings paper was revised and published in the 2019 issue of the journal Issues in Informing Science and Information Technology, Volume 16] Aim/Purpose: Bring your own device (BYOD) provides opportunities for both the organization and employees, but the adoption of BYOD also introduces risks. This case study of an organization’s BYOD program identifies key positive and negative influences on the adoption decision. Background: The consumerization of IT introduced the BYOD phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organizational systems to perform their work tasks. Such devices include smartphones, tablets and laptop computers. Methodology: This research uses a case study approach to investigate how business priorities drive the adoption of BYOD and how resulting benefits and risks are realized and managed by the organization. Primary empirical data was collected using semi-structured interviews with 15 senior employees from a large South African financial services organization. Policy documents from the organization were analyzed as secondary data. Contribution: Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practices. Findings: The themes were analyzed using the Technology-Organization-Environment (TOE) framework, showing the key positive and negative influences on the adoption decision. Recommendations for Practitioners: Organizations need to clearly understand the reasons they want to introduce BYOD in their organizations. The conceptual framework can be applied by practitioners in their organizations to achieve their BYOD business objectives. Recommendations for Researchers: BYOD remains an important innovation for organizations with several aspects worthy of further study. The TOE framework presents a suitable lens for analysis, but other models should also be considered. Impact on Society: The findings show that organizations can use BYOD to improve client service, gain competitive advantage, and improve their processes using their digital devices and backend systems. The BYOD trend is thus not likely to go away anytime soon. Future Research: The applicability of findings should be validated across additional contexts. Additional models should also be used.
[这篇论文被修订并发表在2019年出版的《信息科学与信息技术问题》(Issues in informatics Science and Information Technology,第16卷)上]目的/目的:自带设备(BYOD)为组织和员工提供了机会,但采用BYOD也带来了风险。这个组织BYOD计划的案例研究确定了对采用决策的主要积极和消极影响。背景:IT消费化将BYOD现象引入企业环境。随着移动和互联网技术的进步,员工选择使用他们的个人设备访问组织系统来完成他们的工作任务。这些设备包括智能手机、平板电脑和笔记本电脑。方法:本研究采用案例研究的方法来调查业务优先级如何推动BYOD的采用,以及组织如何实现和管理由此带来的利益和风险。主要的经验数据收集使用半结构化访谈与15名高级员工来自一个大型南非金融服务组织。组织的政策文件作为辅助数据进行分析。贡献:对数据的专题分析揭示了六大主题:提高员工流动性;改善客户服务和体验;创造行业竞争优势;改进业务流程;信息安全风险;以及管理最佳实践。研究结果:使用技术-组织-环境(TOE)框架对主题进行了分析,显示了对采用决策的关键积极和消极影响。对从业者的建议:组织需要清楚地了解他们想在组织中引入BYOD的原因。从业者可以在他们的组织中应用概念框架来实现他们的BYOD业务目标。给研究人员的建议:BYOD仍然是组织的重要创新,有几个方面值得进一步研究。TOE框架为分析提供了一个合适的视角,但也应该考虑其他模型。对社会的影响:调查结果表明,组织可以使用BYOD来改善客户服务,获得竞争优势,并使用他们的数字设备和后端系统改进他们的流程。因此,BYOD的趋势不太可能很快消失。未来研究:研究结果的适用性应在其他背景下进行验证。还应使用其他模型。
{"title":"Business Priorities Driving BYOD Adoption: A Case Study of a South African Financial Services Organization","authors":"Jacques Ophoff, Steve Miller","doi":"10.28945/4303","DOIUrl":"https://doi.org/10.28945/4303","url":null,"abstract":"[This Proceedings paper was revised and published in the 2019 issue of the journal Issues in Informing Science and Information Technology, Volume 16]\u0000\u0000Aim/Purpose: Bring your own device (BYOD) provides opportunities for both the organization and employees, but the adoption of BYOD also introduces risks. This case study of an organization’s BYOD program identifies key positive and negative influences on the adoption decision.\u0000\u0000Background: The consumerization of IT introduced the BYOD phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organizational systems to perform their work tasks. Such devices include smartphones, tablets and laptop computers.\u0000\u0000Methodology: This research uses a case study approach to investigate how business priorities drive the adoption of BYOD and how resulting benefits and risks are realized and managed by the organization. Primary empirical data was collected using semi-structured interviews with 15 senior employees from a large South African financial services organization. Policy documents from the organization were analyzed as secondary data.\u0000\u0000Contribution: Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practices.\u0000\u0000Findings: The themes were analyzed using the Technology-Organization-Environment (TOE) framework, showing the key positive and negative influences on the adoption decision.\u0000\u0000Recommendations for Practitioners: Organizations need to clearly understand the reasons they want to introduce BYOD in their organizations. The conceptual framework can be applied by practitioners in their organizations to achieve their BYOD business objectives.\u0000\u0000Recommendations for Researchers: BYOD remains an important innovation for organizations with several aspects worthy of further study. The TOE framework presents a suitable lens for analysis, but other models should also be considered.\u0000\u0000Impact on Society: The findings show that organizations can use BYOD to improve client service, gain competitive advantage, and improve their processes using their digital devices and backend systems. The BYOD trend is thus not likely to go away anytime soon.\u0000\u0000Future Research: The applicability of findings should be validated across additional contexts. Additional models should also be used.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
[This Proceedings paper was revised and published in the 2019 issue of the journal Issues in Informing Science and Information Technology, Volume 16] Aim/Purpose: Our research goal was to examine the factors that motivate women to enroll in Computer Science (CS) courses in order to better understand the small number of women in the field of CS. Background: This work is in line with the growing interest in better understanding the problem of the underrepresentation of women in the field of CS. Methodology: We focused on a college that differs in its high numbers of female CS students. The student population there consists mostly of religious Jews; some of them are Haredi, who, because of their unique lifestyle, are expected to be the breadwinners in their family. Following group interviews with 18 students, a questionnaire was administered to all the female students and 449 of them responded. We analyzed it statistically. We compared the responses of the Haredi and non-Haredi students. Contribution: The main contribution of this work lies in the idea that studying the factors underlying women’s presence in a CS program in unique communities and cultures, where women are equally represented in the field, might shed light on the nature of this phenomenon, especially whether it is universal or confined to the surrounding culture. Findings: There were significant differences between the Haredi and non-Haredi women regarding the importance they attributed to different factors. Haredi women resemble, regarding some social and economic variables, women in developing countries, but differ in others. The non-Haredi women are more akin to Western women, yet they did not completely overlap. Both groups value their family and career as the most important factors in their lives. These factors unify women in the West and in developing countries, though with different outcomes. In the West, it deters women from studying CS, whereas in Israel and in Malaysia, other factors can overcome this barrier. Both groups attributed low importance to the masculine image of CS, found important in the West. Hence, our findings support the hypothesis that women’s participation in the field of CS is culturally dependent. Recommendations for Practitioners: It is important to learn about the culture within which women operate in order to attract more women to CS. Recommendations for Researchers: Future work is required to examine other loci where women are underrepre-sented in CS, as well as how the insights obtained in this study can be utilized to decrease women’s underrepresentation in other loci. Impact on Society: Women's underrepresentation in CS is an important topic for both economic and social justice reasons. It raises questions regarding fairness and equality. In the CS field the gender pay gaps are smaller than in other professional areas. Thus, resolving the underrepresentation of women in CS will serve as a means to decrease the social gender gap in other ar
[这篇论文被修订并发表在2019年的《信息科学与信息技术问题》(Issues in informed Science and Information Technology,第16卷)上]目的/目的:我们的研究目标是研究激励女性参加计算机科学(CS)课程的因素,以便更好地了解CS领域的少数女性。背景:这项工作符合人们对更好地理解女性在计算机科学领域代表性不足问题的日益增长的兴趣。研究方法:我们关注的是一所女性计算机科学学生人数众多的大学。那里的学生主要是虔诚的犹太人;他们中的一些人是Haredi,由于他们独特的生活方式,他们被期望成为家庭的经济支柱。在对18名学生进行小组访谈后,对所有女学生进行问卷调查,共有449名女学生作答。我们进行了统计分析。我们比较了正统派和非正统派学生的反应。贡献:这项工作的主要贡献在于,在独特的社区和文化中研究女性在计算机科学项目中存在的潜在因素,在这些社区和文化中,女性在该领域的代表性是平等的,这可能会揭示这种现象的本质,特别是它是普遍的还是局限于周围的文化。研究结果:对于不同因素的重要性,Haredi和非Haredi女性之间存在显著差异。在一些社会和经济变量方面,哈瑞迪妇女与发展中国家的妇女相似,但在其他方面有所不同。非正统派女性更类似于西方女性,但她们并没有完全重合。这两个群体都认为家庭和事业是他们生活中最重要的因素。这些因素将西方和发展中国家的女性团结在一起,尽管结果不同。在西方,这阻碍了女性学习计算机科学,而在以色列和马来西亚,其他因素可以克服这一障碍。这两组人都认为CS的男性形象不太重要,而这在西方很重要。因此,我们的研究结果支持了女性在CS领域的参与是文化依赖的假设。对从业者的建议:为了吸引更多的女性进入CS,了解女性运作的文化是很重要的。对研究人员的建议:未来的工作需要检查女性在CS中代表性不足的其他基因座,以及如何利用本研究获得的见解来减少女性在其他基因座中的代表性不足。对社会的影响:由于经济和社会公正的原因,女性在计算机科学中的代表性不足是一个重要的话题。它提出了关于公平和平等的问题。在计算机科学领域,性别收入差距比其他专业领域要小。因此,解决女性在计算机科学领域的代表性不足,将成为缩小其他领域社会性别差距的一种手段。
{"title":"Factors Influencing Women’s Decision to Study Computer Science: Is It Context Dependent?","authors":"Sarah Genut, Bnaya Ori, Y. Kolikant","doi":"10.28945/4296","DOIUrl":"https://doi.org/10.28945/4296","url":null,"abstract":"[This Proceedings paper was revised and published in the 2019 issue of the journal Issues in Informing Science and Information Technology, Volume 16]\u0000\u0000Aim/Purpose: Our research goal was to examine the factors that motivate women to enroll in Computer Science (CS) courses in order to better understand the small number of women in the field of CS.\u0000\u0000Background: This work is in line with the growing interest in better understanding the problem of the underrepresentation of women in the field of CS.\u0000\u0000Methodology: We focused on a college that differs in its high numbers of female CS students. The student population there consists mostly of religious Jews; some of them are Haredi, who, because of their unique lifestyle, are expected to be the breadwinners in their family. Following group interviews with 18 students, a questionnaire was administered to all the female students and 449 of them responded. We analyzed it statistically. We compared the responses of the Haredi and non-Haredi students.\u0000\u0000Contribution: The main contribution of this work lies in the idea that studying the factors underlying women’s presence in a CS program in unique communities and cultures, where women are equally represented in the field, might shed light on the nature of this phenomenon, especially whether it is universal or confined to the surrounding culture.\u0000\u0000Findings: There were significant differences between the Haredi and non-Haredi women regarding the importance they attributed to different factors. Haredi women resemble, regarding some social and economic variables, women in developing countries, but differ in others. The non-Haredi women are more akin to Western women, yet they did not completely overlap. Both groups value their family and career as the most important factors in their lives. These factors unify women in the West and in developing countries, though with different outcomes. In the West, it deters women from studying CS, whereas in Israel and in Malaysia, other factors can overcome this barrier. Both groups attributed low importance to the masculine image of CS, found important in the West. Hence, our findings support the hypothesis that women’s participation in the field of CS is culturally dependent.\u0000\u0000Recommendations for Practitioners: It is important to learn about the culture within which women operate in order to attract more women to CS.\u0000\u0000Recommendations for Researchers: Future work is required to examine other loci where women are underrepre-sented in CS, as well as how the insights obtained in this study can be utilized to decrease women’s underrepresentation in other loci.\u0000\u0000Impact on Society: Women's underrepresentation in CS is an important topic for both economic and social justice reasons. It raises questions regarding fairness and equality. In the CS field the gender pay gaps are smaller than in other professional areas. Thus, resolving the underrepresentation of women in CS will serve as a means to decrease the social gender gap in other ar","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}