首页 > 最新文献

Proceedings of the 38th Annual Hawaii International Conference on System Sciences最新文献

英文 中文
Increasing Availability by Sacrificing Data Integrity - A Problem Statement 通过牺牲数据完整性来提高可用性——一个问题陈述
M. Jandl, A. Szep, R. Smeikal, K. M. Göschka
Distributed software systems are the basis for innovative applications (e.g. pervasive computing, telecommunication services, and control engineering). The key for achieving scalable and maintainable distributed systems is dependability, because otherwise the complexity of distribution would leave the system uncontrollable. Hence, our approach aims at a concept for optimizing dependability. We present a research project and contribute with reasons motivating the relevance of our objective by showing real-life application scenarios and by analyzing relevant related work. Further, we contribute with our solution approach and the key idea: Similar to other approaches we use replication as means to provide transparent fault-tolerance and persistence, but we are especially focused on increasing availability by relaxing data integrity using a mixture of asynchronous and synchronous replication techniques.
分布式软件系统是创新应用(如普适计算、电信服务和控制工程)的基础。实现可伸缩和可维护的分布式系统的关键是可靠性,否则分布的复杂性将使系统无法控制。因此,我们的方法旨在优化可靠性的概念。我们提出了一个研究项目,并通过展示现实生活中的应用场景和分析相关工作,给出了激发我们目标相关性的原因。此外,我们还提供了我们的解决方案方法和关键思想:与其他方法类似,我们使用复制作为提供透明容错和持久性的手段,但我们特别关注通过使用异步和同步复制技术的混合来放松数据完整性,从而提高可用性。
{"title":"Increasing Availability by Sacrificing Data Integrity - A Problem Statement","authors":"M. Jandl, A. Szep, R. Smeikal, K. M. Göschka","doi":"10.1109/HICSS.2005.312","DOIUrl":"https://doi.org/10.1109/HICSS.2005.312","url":null,"abstract":"Distributed software systems are the basis for innovative applications (e.g. pervasive computing, telecommunication services, and control engineering). The key for achieving scalable and maintainable distributed systems is dependability, because otherwise the complexity of distribution would leave the system uncontrollable. Hence, our approach aims at a concept for optimizing dependability. We present a research project and contribute with reasons motivating the relevance of our objective by showing real-life application scenarios and by analyzing relevant related work. Further, we contribute with our solution approach and the key idea: Similar to other approaches we use replication as means to provide transparent fault-tolerance and persistence, but we are especially focused on increasing availability by relaxing data integrity using a mixture of asynchronous and synchronous replication techniques.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Awareness of IT Control Frameworks in an Australian State Government: A Qualitative Case Study 澳大利亚州政府对信息技术控制框架的认识:定性案例研究
C. Warland, Gail Ridley
IT control frameworks set out best practices for IT actions, processes and monitoring within organisations, and are believed to lead to more effective IT governance. It is difficult to assess the adoption, awareness and perception of the value of the frameworks in the Australian public sector, due to the limited academic literature available. The exploratory research reported in this paper evaluated the awareness and understanding of IT control frameworks in three public sector agencies within an Australian state government, adopting a flexible definition of IT control frameworks. Comparison was made between the level of awareness and the outcomes of recent internal and external IT audits for the agencies, where available. Qualitative data were gathered from internal documentation and nine interviews, seeking IT and business-oriented perspectives. No use of formalised IT control frameworks was found, although informal approaches were noted. Awareness and understanding of IT control frameworks in the agencies appeared limited. The agencies investigated will lack motivation to derive value from utilising IT control frameworks without increased awareness of their purpose. Further research is warranted in this area, including the investigation of effective mechanisms for raising awareness of the potential of the frameworks.
IT控制框架为组织内的IT行动、流程和监控设定了最佳实践,并被认为会导致更有效的IT治理。由于可用的学术文献有限,很难评估澳大利亚公共部门对框架价值的采用、认识和感知。本文报告的探索性研究评估了澳大利亚州政府内三个公共部门机构对IT控制框架的认识和理解,采用了灵活的IT控制框架定义。对各机构最近进行的内部和外部信息技术审计(如有)的认识水平和结果进行了比较。定性数据是从内部文档和9个访谈中收集的,寻求IT和面向业务的视角。没有发现正式的IT控制框架的使用,尽管注意到非正式的方法。各机构对信息技术控制框架的认识和理解似乎有限。被调查的机构将缺乏从利用IT控制框架中获得价值的动机,而没有增加对其目的的认识。有必要在这一领域进行进一步研究,包括调查提高对框架潜力认识的有效机制。
{"title":"Awareness of IT Control Frameworks in an Australian State Government: A Qualitative Case Study","authors":"C. Warland, Gail Ridley","doi":"10.1109/HICSS.2005.116","DOIUrl":"https://doi.org/10.1109/HICSS.2005.116","url":null,"abstract":"IT control frameworks set out best practices for IT actions, processes and monitoring within organisations, and are believed to lead to more effective IT governance. It is difficult to assess the adoption, awareness and perception of the value of the frameworks in the Australian public sector, due to the limited academic literature available. The exploratory research reported in this paper evaluated the awareness and understanding of IT control frameworks in three public sector agencies within an Australian state government, adopting a flexible definition of IT control frameworks. Comparison was made between the level of awareness and the outcomes of recent internal and external IT audits for the agencies, where available. Qualitative data were gathered from internal documentation and nine interviews, seeking IT and business-oriented perspectives. No use of formalised IT control frameworks was found, although informal approaches were noted. Awareness and understanding of IT control frameworks in the agencies appeared limited. The agencies investigated will lack motivation to derive value from utilising IT control frameworks without increased awareness of their purpose. Further research is warranted in this area, including the investigation of effective mechanisms for raising awareness of the potential of the frameworks.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
The Rules of Virtual Groups 虚拟组规则
J. Walther, Ulla K. Bunz, Natalya N. Bazarova
Concerns about virtual groups include how members develop trust and liking for partners. Previous studies have explored behavioral variables leading to subjectively-experienced trust and/or liking, or trusting behaviors that are associated with group productivity. Drawing on practices described elsewhere and deriving principles from social information processing theory of computer-mediated communication, this research identified a set of communication rules for virtual groups. A quasi-experimental procedure promoted variance in rule following behavior, allowing assessment of rules in an inter-university course. Six rules were assessed through self-reported measures, and results reveal correlations between each rule and trust and liking. Less consistent are the relationships between rule-following and actual performance. Results suggest that either a powerful set of rules has been identified, or that rule-following per se reduces uncertainty and enhances trust in distributed work teams.
对虚拟群体的担忧包括成员如何建立信任和喜欢伙伴。之前的研究已经探索了导致主观体验的信任和/或喜欢的行为变量,或者与群体生产力相关的信任行为。借鉴其他地方描述的实践,并从计算机媒介通信的社会信息处理理论中得出原则,本研究确定了一套虚拟群体的通信规则。准实验程序促进了规则遵循行为的差异,允许对校际课程中的规则进行评估。通过自我报告的方式评估了六条规则,结果揭示了每条规则与信任和喜爱之间的相关性。遵守规则和实际性能之间的关系不太一致。结果表明,要么已经确定了一组强大的规则,要么规则遵循本身减少了不确定性,并增强了分布式工作团队中的信任。
{"title":"The Rules of Virtual Groups","authors":"J. Walther, Ulla K. Bunz, Natalya N. Bazarova","doi":"10.1109/HICSS.2005.617","DOIUrl":"https://doi.org/10.1109/HICSS.2005.617","url":null,"abstract":"Concerns about virtual groups include how members develop trust and liking for partners. Previous studies have explored behavioral variables leading to subjectively-experienced trust and/or liking, or trusting behaviors that are associated with group productivity. Drawing on practices described elsewhere and deriving principles from social information processing theory of computer-mediated communication, this research identified a set of communication rules for virtual groups. A quasi-experimental procedure promoted variance in rule following behavior, allowing assessment of rules in an inter-university course. Six rules were assessed through self-reported measures, and results reveal correlations between each rule and trust and liking. Less consistent are the relationships between rule-following and actual performance. Results suggest that either a powerful set of rules has been identified, or that rule-following per se reduces uncertainty and enhances trust in distributed work teams.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Ambivalence and the Bivariate Nature of Attitudes in Information Systems Research 信息系统研究中的矛盾心理和态度的二元性
E. Walden, Glenn J. Browne, Jeff T. Larsen
People using information technologies experience both joy and frustration, and thus develop both positive and negative attitudes toward systems. Many researchers in information systems have studied user attitudes toward technology, and such attitudes have in fact been one of the most frequently studied phenomena in the IS field. User attitudes have generally been measured utilizing bipolar scales, on which the low end represents strong negative attitudes and the high end represents strong positive attitudes. However, psychologists have long recognized that the positive and negative dimensions of attitudes can be separated, and attitudes are thus bivariate. In the present research, we investigate whether the positive and negative aspects of user attitudes are separable using constructs from the Technology Acceptance Model, one of the most frequently tested models in information systems research. Our results demonstrate that users can experience both positive and negative attitudes toward a system, and that the positive and negative attitudes are independent. Implications for information systems theory and measurement are discussed.
使用信息技术的人既会感到高兴,也会感到沮丧,从而对系统产生积极和消极的态度。许多信息系统研究人员研究了用户对技术的态度,这种态度实际上是信息系统领域最常研究的现象之一。用户态度通常使用双极量表来测量,其中低端代表强烈的消极态度,高端代表强烈的积极态度。然而,心理学家早就认识到,态度的积极和消极维度是可以分开的,因此态度是二元的。在本研究中,我们使用信息系统研究中最常测试的模型之一技术接受模型中的结构来调查用户态度的积极和消极方面是否可分离。我们的研究结果表明,用户可以体验到对系统的积极和消极态度,并且积极和消极态度是独立的。讨论了信息系统理论和测量的含义。
{"title":"Ambivalence and the Bivariate Nature of Attitudes in Information Systems Research","authors":"E. Walden, Glenn J. Browne, Jeff T. Larsen","doi":"10.1109/HICSS.2005.73","DOIUrl":"https://doi.org/10.1109/HICSS.2005.73","url":null,"abstract":"People using information technologies experience both joy and frustration, and thus develop both positive and negative attitudes toward systems. Many researchers in information systems have studied user attitudes toward technology, and such attitudes have in fact been one of the most frequently studied phenomena in the IS field. User attitudes have generally been measured utilizing bipolar scales, on which the low end represents strong negative attitudes and the high end represents strong positive attitudes. However, psychologists have long recognized that the positive and negative dimensions of attitudes can be separated, and attitudes are thus bivariate. In the present research, we investigate whether the positive and negative aspects of user attitudes are separable using constructs from the Technology Acceptance Model, one of the most frequently tested models in information systems research. Our results demonstrate that users can experience both positive and negative attitudes toward a system, and that the positive and negative attitudes are independent. Implications for information systems theory and measurement are discussed.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"707 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploiting Sink Mobility for Maximizing Sensor Networks Lifetime 利用Sink迁移最大化传感器网络生命周期
Z. Wang, S. Basagni, E. Melachrinoudis, C. Petrioli
This paper explores the idea of exploiting the mobility of data collection points (sinks) for the purpose of increasing the lifetime of a wireless sensor network with energy-constrained nodes. We give a novel linear programming formulation for the joint problems of determining the movement of the sink and the sojourn time at different points in the network that induce the maximum network lifetime. Differently from previous solutions, our objective function maximizes the overall network lifetime (here defined as the time till the first node "dies" because of energy depletion) rather than minimizing the energy consumption at the nodes. For wireless sensor networks with up to 256 nodes our model produces sink movement patterns and sojourn times leading to a network lifetime up to almost five times that obtained with a static sink. Simulation results are performed to determine the distribution of the residual energy at the nodes over time. These results confirm that energy consumption varies with the current sink location, being the nodes more drained those in the proximity of the sink. Furthermore, the proposed solution for computing the sink movement results in a fair balancing of the energy depletion among the network nodes.
本文探讨了利用数据采集点(sink)的移动性来增加具有能量约束节点的无线传感器网络的生命周期的想法。本文给出了一种新的线性规划公式,用于确定网络中引起最大网络生存期的节点的移动和逗留时间的联合问题。与之前的解决方案不同,我们的目标函数最大化整个网络的生命周期(这里定义为直到第一个节点因为能量耗尽而“死亡”的时间),而不是最小化节点的能量消耗。对于具有多达256个节点的无线传感器网络,我们的模型产生sink移动模式和逗留时间,导致网络生命周期几乎是静态sink的五倍。仿真结果确定了节点上剩余能量随时间的分布。这些结果证实,能量消耗随当前sink位置的变化而变化,即靠近sink的节点更耗尽。此外,提出的计算sink移动的解决方案使得网络节点之间的能量消耗得到了公平的平衡。
{"title":"Exploiting Sink Mobility for Maximizing Sensor Networks Lifetime","authors":"Z. Wang, S. Basagni, E. Melachrinoudis, C. Petrioli","doi":"10.1109/HICSS.2005.259","DOIUrl":"https://doi.org/10.1109/HICSS.2005.259","url":null,"abstract":"This paper explores the idea of exploiting the mobility of data collection points (sinks) for the purpose of increasing the lifetime of a wireless sensor network with energy-constrained nodes. We give a novel linear programming formulation for the joint problems of determining the movement of the sink and the sojourn time at different points in the network that induce the maximum network lifetime. Differently from previous solutions, our objective function maximizes the overall network lifetime (here defined as the time till the first node \"dies\" because of energy depletion) rather than minimizing the energy consumption at the nodes. For wireless sensor networks with up to 256 nodes our model produces sink movement patterns and sojourn times leading to a network lifetime up to almost five times that obtained with a static sink. Simulation results are performed to determine the distribution of the residual energy at the nodes over time. These results confirm that energy consumption varies with the current sink location, being the nodes more drained those in the proximity of the sink. Furthermore, the proposed solution for computing the sink movement results in a fair balancing of the energy depletion among the network nodes.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 546
How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) 如何使用OASIS的可扩展访问控制标记语言(XACML)声明XML结构化信息对象的访问控制策略
A. Matheus
Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous information objects, which is the base for more advanced use like in electronic commerce. But, the access to these information objects is not always unrestricted. The owner of the information objects may control access due to different reasons. This paper introduces a novel approach for declaring information object related access restrictions, based on a valid XML encoding. The paper shows, how the access restrictions can be declared using XACML and Xpath. Based on the specified 'fine grained' policies, multiple policies can be applicable. If these policies declare positive and negative permissions for the same subject, policy inconsistencies exist. The paper also focuses on specifying the ground of policy inconsistencies and how to solve them.
Web服务作为当今Internet的新构建模块,提供了访问分布式和异构信息对象的能力,这是电子商务等更高级应用的基础。但是,对这些信息对象的访问并不总是无限制的。由于不同的原因,信息对象的所有者可能会控制访问。本文介绍了一种基于有效XML编码的声明信息对象相关访问限制的新方法。本文展示了如何使用XACML和Xpath声明访问限制。根据指定的“细粒度”策略,可以应用多个策略。如果这些策略声明同一主题的正权限和负权限,则存在策略不一致。本文还着重阐述了政策矛盾产生的原因以及如何解决这些问题。
{"title":"How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML)","authors":"A. Matheus","doi":"10.1109/HICSS.2005.300","DOIUrl":"https://doi.org/10.1109/HICSS.2005.300","url":null,"abstract":"Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous information objects, which is the base for more advanced use like in electronic commerce. But, the access to these information objects is not always unrestricted. The owner of the information objects may control access due to different reasons. This paper introduces a novel approach for declaring information object related access restrictions, based on a valid XML encoding. The paper shows, how the access restrictions can be declared using XACML and Xpath. Based on the specified 'fine grained' policies, multiple policies can be applicable. If these policies declare positive and negative permissions for the same subject, policy inconsistencies exist. The paper also focuses on specifying the ground of policy inconsistencies and how to solve them.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123337732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 709
Technology Management in a Knowledge Based Economy 知识经济中的技术管理
G. V. D. Pijl, P. Ribbers, M. Smits
In the first paper Anne Quaadgras builds and analyzes the emerging radio frequency ID (RFID) ecosystem based on announcements of alliances among firms, and analyzes propositions with respect to the behavior of large, multiline technology firms around this innovative, technology based platform. The RFID network is used to empirically show that absorptive capacity, and exploration vs. exploitation theories may start to explain the behavior of large firms. Quaadgras shows that a propensity to form alliances in general makes it more likely that large established firms will join the RFID ecosystem, and that more exploratory firms join earlier. Greater availability of slack resources also leads to the formation of more alliances (greater degree centrality) in the network. The ecosystem perspective and these results may affect alliance decisions have implications for alliance decisions of firms entering into high cost technological innovations.
在第一篇论文中,Anne Quaadgras基于公司之间的联盟公告构建并分析了新兴的射频识别(RFID)生态系统,并分析了大型多线技术公司围绕这一创新技术平台的行为主张。RFID网络被用来实证地表明,吸收能力和探索与剥削理论可能开始解释大公司的行为。Quaadgras表明,一般来说,形成联盟的倾向使大型成熟公司更有可能加入RFID生态系统,而更多探索性公司更早加入。闲置资源的可用性越高,也会导致网络中形成更多的联盟(更大的中心性)。生态系统视角对联盟决策的影响对企业进入高成本技术创新的联盟决策具有启示意义。
{"title":"Technology Management in a Knowledge Based Economy","authors":"G. V. D. Pijl, P. Ribbers, M. Smits","doi":"10.1109/HICSS.2005.581","DOIUrl":"https://doi.org/10.1109/HICSS.2005.581","url":null,"abstract":"In the first paper Anne Quaadgras builds and analyzes the emerging radio frequency ID (RFID) ecosystem based on announcements of alliances among firms, and analyzes propositions with respect to the behavior of large, multiline technology firms around this innovative, technology based platform. The RFID network is used to empirically show that absorptive capacity, and exploration vs. exploitation theories may start to explain the behavior of large firms. Quaadgras shows that a propensity to form alliances in general makes it more likely that large established firms will join the RFID ecosystem, and that more exploratory firms join earlier. Greater availability of slack resources also leads to the formation of more alliances (greater degree centrality) in the network. The ecosystem perspective and these results may affect alliance decisions have implications for alliance decisions of firms entering into high cost technological innovations.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123360993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interorganizational Control with IT 利用IT进行组织间控制
John Tillquist
The role of interorganizational information technologies (IT) in the external control of organizations is examined. At the beginning of the case study, an insurance firm is mired in government regulation and hostile relations with independent repair shops. Interorganizational IT was used to gain control over the activities and direction of the repair shops, easing tensions and streamlining the market. The design of the system allowed the insurance company to appear socially conscientious, shifting away from a reputation as a cost center. The reason why these changes were able to come about is explained by the shifting dependencies along the value chain brought about by strategic deployment of the new IT.
研究了组织间信息技术(IT)在组织外部控制中的作用。在案例研究的开始,一家保险公司陷入了政府监管的困境,并与独立维修店建立了敌对关系。组织间IT被用来控制维修车间的活动和方向,缓解紧张局势并使市场流线型化。该系统的设计使保险公司看起来具有社会责任感,摆脱了作为成本中心的声誉。这些变化能够发生的原因可以通过新IT的战略部署所带来的价值链上的依赖转移来解释。
{"title":"Interorganizational Control with IT","authors":"John Tillquist","doi":"10.1109/HICSS.2005.337","DOIUrl":"https://doi.org/10.1109/HICSS.2005.337","url":null,"abstract":"The role of interorganizational information technologies (IT) in the external control of organizations is examined. At the beginning of the case study, an insurance firm is mired in government regulation and hostile relations with independent repair shops. Interorganizational IT was used to gain control over the activities and direction of the repair shops, easing tensions and streamlining the market. The design of the system allowed the insurance company to appear socially conscientious, shifting away from a reputation as a cost center. The reason why these changes were able to come about is explained by the shifting dependencies along the value chain brought about by strategic deployment of the new IT.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning from Project Experiences Using a Legacy-Based Approach 使用基于遗留的方法从项目经验中学习
L. Cooper, A. Majchrzak, Samer Faraj
As project teams become used more widely, the question of how to capitalize on the knowledge learned in these teams remains an open issue. Using previous research on transactive memory systems, an approach to promoting post-project learning was developed. This Legacy Session concept was tested on four in-tact project teams. The results from those pilot sessions were used to evaluate the feasibility of the approach and develop recommendations for future research.
随着项目团队的应用越来越广泛,如何利用从这些团队中学到的知识仍然是一个悬而未决的问题。利用以往对交互记忆系统的研究,我们开发了一种促进项目后学习的方法。这个遗留会话概念在四个实际项目团队中进行了测试。这些试验会议的结果被用来评价这种方法的可行性,并为今后的研究提出建议。
{"title":"Learning from Project Experiences Using a Legacy-Based Approach","authors":"L. Cooper, A. Majchrzak, Samer Faraj","doi":"10.1109/HICSS.2005.386","DOIUrl":"https://doi.org/10.1109/HICSS.2005.386","url":null,"abstract":"As project teams become used more widely, the question of how to capitalize on the knowledge learned in these teams remains an open issue. Using previous research on transactive memory systems, an approach to promoting post-project learning was developed. This Legacy Session concept was tested on four in-tact project teams. The results from those pilot sessions were used to evaluate the feasibility of the approach and develop recommendations for future research.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Development and Evaluation of Prototype Mobile Decision Support for Hospital Triage 医院分诊移动决策支持原型系统的开发与评价
J. S. Pedro, F. Burstein, J. Wassertheil, Nitin Arora, L. Churilov, A. Zaslavsky
Ambiguous triage scenarios in hospital emergency departments are often difficult to assess without decision support. Subjective assessments of such scenarios can either lead to under-triaging or over-triaging for which true conditions of patients are often not addressed within the required time. In this paper, we propose a decision support model that can guide a clinician when identifying the urgency of medical intervention when patient presents with ambiguous triage case. Our model is a heuristic approach that selects the best triage category, identifies corresponding discriminating attribute of the patient, and allows clinician to attach a level of confidence in the decision. We implemented this model as a mobile decision support system, called iTriage. Results of an initial evaluation of iTriage using fourteen paper-based adult triage scenarios showed that our model produced robust decisions for urgent scenarios. For non-urgent scenarios, the proposed model provided guidance especially when the scenarios were ambiguously stated.
在没有决策支持的情况下,医院急诊科模糊不清的分诊情况往往难以评估。对这种情况的主观评估可能导致分诊不足或分诊过度,而患者的真实情况往往不能在规定的时间内得到解决。在本文中,我们提出了一个决策支持模型,该模型可以指导临床医生在患者出现模棱两可的分诊病例时识别医疗干预的紧迫性。我们的模型是一种启发式方法,选择最佳分类,识别患者相应的判别属性,并允许临床医生在决策中附加一定程度的信心。我们将这个模型作为一个移动决策支持系统,称为iTriage。使用14个基于纸张的成人分诊场景对iTriage进行初步评估的结果表明,我们的模型对紧急场景产生了稳健的决策。对于非紧急情景,建议的模型提供了指导,特别是当情景表述含糊不清时。
{"title":"On Development and Evaluation of Prototype Mobile Decision Support for Hospital Triage","authors":"J. S. Pedro, F. Burstein, J. Wassertheil, Nitin Arora, L. Churilov, A. Zaslavsky","doi":"10.1109/HICSS.2005.464","DOIUrl":"https://doi.org/10.1109/HICSS.2005.464","url":null,"abstract":"Ambiguous triage scenarios in hospital emergency departments are often difficult to assess without decision support. Subjective assessments of such scenarios can either lead to under-triaging or over-triaging for which true conditions of patients are often not addressed within the required time. In this paper, we propose a decision support model that can guide a clinician when identifying the urgency of medical intervention when patient presents with ambiguous triage case. Our model is a heuristic approach that selects the best triage category, identifies corresponding discriminating attribute of the patient, and allows clinician to attach a level of confidence in the decision. We implemented this model as a mobile decision support system, called iTriage. Results of an initial evaluation of iTriage using fourteen paper-based adult triage scenarios showed that our model produced robust decisions for urgent scenarios. For non-urgent scenarios, the proposed model provided guidance especially when the scenarios were ambiguously stated.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1