Search results

1 – 10 of over 71000
Article
Publication date: 1 January 1992

Reinhard Budde and Heinz Züllighoven

Overviews the history of prototyping. Illustrates trends which havesupported the emergence of it. Comments on methods which are in linewith prototyping. Suggests future areas of…

Abstract

Overviews the history of prototyping. Illustrates trends which have supported the emergence of it. Comments on methods which are in line with prototyping. Suggests future areas of research and development. Explores the integration of prototyping into systems development which incorporates pre‐existing software.

Details

Information Technology & People, vol. 6 no. 2/3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 1992

Hubert Biskup and Karlheinz Kautz

Discusses problems related to software engineering taskmaintenance. Argues that since many scientists and practitioners haveregarded maintenance as divorced from development, it…

144

Abstract

Discusses problems related to software engineering task maintenance. Argues that since many scientists and practitioners have regarded maintenance as divorced from development, it is not properly embedded in project models. Relates four case studies. Looks at the range of maintenance tasks and strategies. Proposes a change of perspective that would make maintenance part of development. Advocates methods, tools and techniques as possible means of overcoming the problematic situation.

Details

Information Technology & People, vol. 6 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 February 1982

VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library housekeeping processes, principally in the…

Abstract

VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library housekeeping processes, principally in the UK. It is edited and substantially written by the Information Office for Library Automation based in Southampton University Library and supported by a grant from the British Library Research and Development Department. Copyright for VINE articles rests with the British Library Board, but opinions expressed in VINE do not necessarily reflect the views and policies of the British Library. The subscription for 1981 and 1982 for VINE is £20 for UK subscribers and £23 for overseas subscribers — subscription year runs from January to December.

Details

VINE, vol. 12 no. 2
Type: Research Article
ISSN: 0305-5728

Article
Publication date: 1 December 1999

Ken Ducatel

Information and communication technologies (ICTs) have featured strongly in all the recent national foresight studies. This paper documents some of the common trends that emerge…

Abstract

Information and communication technologies (ICTs) have featured strongly in all the recent national foresight studies. This paper documents some of the common trends that emerge from a comparison of these different studies and attempts to draw some strategic conclusions. The first section charts their relative importance. The main trends identified in the national foresight studies are then discussed by main technological areas in turn: software, components and peripherals, advanced telecommunications and telematics applications. Finally, the third part of the paper, strong interactions that ICTs have with other technological disciplines is considered, especially in relation to new materials, nanostructures and bioinformatics.

Details

Foresight, vol. 1 no. 6
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 1 March 1994

William J. Caelli

Distributed computing systems impose new requirements on the security ofthe operating systems and hardware structures of the computersparticipating in a distributed data network…

2243

Abstract

Distributed computing systems impose new requirements on the security of the operating systems and hardware structures of the computers participating in a distributed data network environment. It is proposed that multiple level (greater than two) security hardware, with associated full support for that hardware at the operating system level, is required to meet the needs of this emerging environment. The normal two layer (supervisor/user) structure may probably be insufficient to enforce and protect security functions consistently and reliably in a distributed environment. Such two‐layer designs are seen as part of earlier single computer/processor system structures while a minimum three/four‐layer security architecture appears necessary to meet the needs of the distributed computing environment. Such multi‐level hardware security architecture requirements are derived from earlier work in the area, particularly the Multics project of the mid‐1960s, as well as the design criteria for the DEC VAX 11/780 and Intel iAPX‐286 processor and its successors, as two later examples of machine structures. The security functions of individual nodes participating in a distributed computing environment, and their associated evaluation level, appear critical to the development of overall security architectures for the protection of distributed computing systems.

Details

Information Management & Computer Security, vol. 2 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 13 January 2012

Bernt Ivar Olsen, Niels Windfeld Lund, Gunnar Ellingsen and Gunnar Hartvigsen

This conceptual article aims to discuss how the concept of a document and documentation along with a general document model could inform us in the design and engineering of…

2177

Abstract

Purpose

This conceptual article aims to discuss how the concept of a document and documentation along with a general document model could inform us in the design and engineering of information or rather documentation systems.

Design/methodology/approach

This paper presents a broad and complementary document model, derived from the last couple of decades' discussion on what is a document and what is documentation. This model is used as a basis for a method, a conceptual tool or a template for analysis of socio‐technical systems.

Findings

The authors contend that the document systems analysis is a holistic approach compared to the traditional systems design and engineering reductionist approach, and also in the context of sociotechnical systems design. The document model is a taxonomy of the constituents of the document and, the authors argue, a potential communication tool in systems design.

Research limitations/implications

The document model presented in this article is discussed more or less solely in the context of information systems design, specifically sociotechnical systems. Moreover, the authors have tried to fit the theory and model within this context here, even though the concepts and thoughts can have much more general implications.

Practical implications

This presentation of a novel document model and framework is presented as a potential tool for systems analysis and design. The authors regard this as a realistic vision for the framework, but at the current stage of development for the model it is probably more useful as draft for such a tool or framework; a point of departure for the discussion of practical – and theoretical – implications of a broad and holistic document model.

Originality/value

A novel, unpublished document model, derived from theoretical discourses of document ontology in the “neo‐documentalist” movement spawned from a particular research community in Tromsø, Norway, is presented and discussed in the light of information systems design.

Article
Publication date: 1 February 1981

VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library house‐keeping processes, principally in…

Abstract

VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library house‐keeping processes, principally in the UK. It is edited and substantially written by the Information Officer for Library Automation based in Southampton University Library and supported by a grant from the British Library Research and Development Department. Copyright for VINE articles rests with the British Library Board, but opinions expressed in VINE do not necessarily reflect the news and policies of the British Library. The subscription for VINE in 1981 will be £20 for UK subscribers and £23 for overseas subscribers — the subscription year runs from January to December and VINE is available in either paper or microfiche format.

Details

VINE, vol. 11 no. 2
Type: Research Article
ISSN: 0305-5728

Book part
Publication date: 31 December 2010

The following is an introductory profile of the fastest growing firms over the three-year period of the study listed by corporate reputation ranking order. The business activities…

Abstract

The following is an introductory profile of the fastest growing firms over the three-year period of the study listed by corporate reputation ranking order. The business activities in which the firms are engaged are outlined to provide background information for the reader.

Details

Reputation Building, Website Disclosure and the Case of Intellectual Capital
Type: Book
ISBN: 978-0-85724-506-9

Article
Publication date: 1 December 2000

Peter Blakey, Chris Phillips and Julie Bunnell

Training is a critical factor in enabling users to make effective use of their computers. A variety of training methods have been proposed in the literature. These training…

Abstract

Training is a critical factor in enabling users to make effective use of their computers. A variety of training methods have been proposed in the literature. These training methods will be considered within the framework of procedural and conceptual training, with special reference to their application in the training of novice end users in the use of applications software. The impact of learning styles and other user characteristics on the selection of training methods for use in this area is discussed. Finally, a current research programme to explore the effectiveness of training methods for novice end users is briefly described.

Details

Journal of Systems and Information Technology, vol. 4 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 1 September 1994

Hussein A. Abdullah and Chris R. Chatwin

The adoption of integrated computer‐based manufacturing and managementtechniques by small, traditional engineering companies often representsan unaffordable and high risk…

604

Abstract

The adoption of integrated computer‐based manufacturing and management techniques by small, traditional engineering companies often represents an unaffordable and high risk investment strategy in technology that is often not well understood by its recipients. Paradoxically, the opportunity for complete success in a small to medium‐sized enterprise (SME) is greater than in a large company which very often is incapable of full integration due to the divisions and inertia implicit in a large hierarchical organization. To derive full benefits from such an investment the company must possess a meticulous understanding of its market, fiscal environment, operations management, engineering and technological skills, manufacturing facilities and product range. It must adopt an appropriate implementation of CIM that does not debase previous ad hoc investments in what are often termed islands‐of‐automation or information technology. For success a well‐planned stepwise approach is vital. Reports on the approach adopted by a small to medium‐sized Scottish engineering company specializing in the production of mechanical actuation systems. Over a three‐year period the company embarked on a low‐cost, phased implementation of software and hardware systems that exploit a database to integrate its design, manufacturing the business operations. A major element in these systems is the distributed Command, Communication and Control (C3) environment which has transformed the effectiveness of operations. The company′s investments were based on a prudent assessment of its current and planned product range, existing and planned manufacturing facilities, the scale of its operations and business objectives.

Details

Integrated Manufacturing Systems, vol. 5 no. 3
Type: Research Article
ISSN: 0957-6061

Keywords

1 – 10 of over 71000