Search results

1 – 10 of over 11000
Open Access
Article
Publication date: 7 June 2023

Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…

1250

Abstract

Purpose

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.

Design/methodology/approach

The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.

Findings

Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.

Practical implications

This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.

Originality/value

To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.

Details

Journal of Knowledge Management, vol. 27 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

Open Access
Article
Publication date: 19 August 2021

Reijo Savolainen

To elaborate the nature of critique presented in the models and concepts of human information behaviour (HIB) research by identifying the issues to which the critique is directed…

2155

Abstract

Purpose

To elaborate the nature of critique presented in the models and concepts of human information behaviour (HIB) research by identifying the issues to which the critique is directed and the ways in which the critique is conducted.

Design/methodology/approach

Conceptual analysis focusing on 58 key studies on the topic. First, the objects and ways of conducting the critique were identified. Thereafter, three levels of depth at which the critique is conducted were specified. The conceptual analysis is based on the comparison of the similarities and differences between the articulations of critique presented at these levels.

Findings

At the lowest level of depth, critique of HIB research is directed to the lack of research by identifying gaps and complaining the neglect or paucity of studies in a significant domain. At the level of critiquing the shortcomings of existing studies, the attention is focused on the identification and analysis of the inadequacies of concepts and models. Finally, constructive critiques of research approaches dig deeper in that they not only identify weaknesses of existing studies but also propose alternative in which the shortcomings can be avoided, and the conceptualizations of HIB enhanced.

Research limitations/implications

As the study focuses on critiques addressed to HIB models and concepts, the findings cannot be generalized to concern the field of Library and Information Science (LIS) as a whole. Moreover, due to the emphasis of the qualitative research approach, the findings offer only an indicative picture of the frequency of the objects critiqued in HIB research.

Originality/value

The study pioneers by providing an in-depth analysis of the nature of critiques presented in a LIS research domain.

Details

Aslib Journal of Information Management, vol. 73 no. 5
Type: Research Article
ISSN: 2050-3806

Keywords

Open Access
Article
Publication date: 20 March 2017

Tristan Gerrish, Kirti Ruikar, Malcolm Cook, Mark Johnson and Mark Phillip

The purpose of this paper is to present a review of the implications building information modelling (BIM) is having on the building energy modelling (BEM) and design of buildings…

9595

Abstract

Purpose

The purpose of this paper is to present a review of the implications building information modelling (BIM) is having on the building energy modelling (BEM) and design of buildings. It addresses the issues surrounding exchange of information throughout the design process, and where BIM may be useful in contributing to effective design progression and information availability.

Design/methodology/approach

Through review of current design procedures and examination of the concurrency between architectural and thermophysical design modelling, a procedure for information generation relevant to design stakeholders is created, and applied to a high-performance building project currently under development.

Findings

The extents of information key to the successful design of a buildings energy performance in relation to its architectural objectives are given, with indication of the level of development required at each stage of the design process.

Practical implications

BIM offers an extensible medium for parametric information storage, and its implementation in design development offers the capability to include BEM parameter-integrated construction information. The extent of information required for accurate BEM at stages of a building’s design is key to understanding how best to record performance information in a BIM environment.

Originality/value

This paper contributes to the discussion around the integration of concurrent design procedures and a common data environment. It presents a framework for the creation and dissemination of information during design, exemplifies this on a real building project and evaluates the barriers experienced in successful implementation.

Details

Engineering, Construction and Architectural Management, vol. 24 no. 2
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 16 August 2021

Jan-Halvard Bergquist, Samantha Tinet and Shang Gao

The purpose of this study is to create an information classification model that is tailored to suit the specific needs of public sector organizations in Sweden.

2102

Abstract

Purpose

The purpose of this study is to create an information classification model that is tailored to suit the specific needs of public sector organizations in Sweden.

Design/methodology/approach

To address the purpose of this research, a case study in a Swedish municipality was conducted. Data was collected through a mixture of techniques such as literature, document and website review. Empirical data was collected through interviews with 11 employees working within 7 different sections of the municipality.

Findings

This study resulted in an information classification model that is tailored to the specific needs of Swedish municipalities. In addition, a set of steps for tailoring an information classification model to suit a specific public organization are recommended. The findings also indicate that for a successful information classification it is necessary to educate the employees about the basics of information security and classification and create an understandable and unified information security language.

Practical implications

This study also highlights that to have a tailored information classification model, it is imperative to understand the value of information and what kind of consequences a violation of established information security principles could have through the perspectives of the employees.

Originality/value

It is the first of its kind in tailoring an information classification model to the specific needs of a Swedish municipality. The model provided by this study can be used as a tool to facilitate a common ground for classifying information within all Swedish municipalities, thereby contributing the first step toward a Swedish municipal model for information classification.

Open Access
Article
Publication date: 18 June 2019

Reijo Savolainen

The purpose of this paper is to contribute to the creation of a holistic picture of information behavior by examining the connections between information seeking and sharing.

6804

Abstract

Purpose

The purpose of this paper is to contribute to the creation of a holistic picture of information behavior by examining the connections between information seeking and sharing.

Design/methodology/approach

Conceptual analysis is used to focus on the ways in which the researchers have modeled the interplay of information seeking and sharing. The study draws on conceptual analysis of 27 key studies examining the above issue, with a focus on the scrutiny of six major models for information behavior.

Findings

Researchers have employed three main approaches to model the relationships between information seeking and sharing. The indirect approach conceptualizes information seeking and sharing as discrete activities connected by an intermediating factor, for example, information need. The sequential approach assumes that information seeking precedes information sharing. From the viewpoint of the interactive approach, information seeking and sharing appear as mutually related activities shaping each other iteratively or in a cyclical manner. The interactive approach provides the most sophisticated research perspective on the relationships of information seeking and sharing and contributes to holistic understanding of human information behavior.

Research limitations/implications

As the study focuses on information seeking and sharing, no attention is devoted to other activities constitutive of information behavior, for example, information use.

Originality/value

The study pioneers by providing an in-depth analysis of the connections of information seeking and information sharing.

Open Access
Article
Publication date: 13 August 2019

Yuejiang Li, H. Vicky Zhao and Yan Chen

With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The…

1496

Abstract

Purpose

With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The diffusion processes of different information are not independent, and they interact with and influence each other. Modeling and analyzing the interaction between correlated information play an important role in the understanding of the characteristics of information dissemination and better control of the information flows. This paper aims to model the correlated information diffusion process over the crowd intelligence networks.

Design/methodology/approach

This study extends the classic epidemic susceptible–infectious–recovered (SIR) model and proposes the SIR mixture model to describe the diffusion process of two correlated pieces of information. The whole crowd is divided into different groups with respect to their forwarding state of the correlated information, and the transition rate between different groups shows the property of each piece of information and the influences between them.

Findings

The stable state of the SIR mixture model is analyzed through the linearization of the model, and the stable condition can be obtained. Real data are used to validate the SIR mixture model, and the detailed diffusion process of correlated information can be inferred by the analysis of the parameters learned through fitting the real data into the SIR mixture model.

Originality/value

The proposed SIR mixture model can be used to model the diffusion of correlated information and analyze the propagation process.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 26 April 2018

Reijo Savolainen

The purpose of this paper is to clarify the conceptual issues of information behaviour research by reviewing the approaches to information interaction in the context of information

8054

Abstract

Purpose

The purpose of this paper is to clarify the conceptual issues of information behaviour research by reviewing the approaches to information interaction in the context of information seeking and retrieval (IS&R).

Design/methodology/approach

The study uses the conceptual analysis focussing on four pioneering models for interactive IS&R proposed by Belkin, Ingwersen and Ingwersen and Järvelin.

Findings

A main characteristic of models for information interaction is the tripartite setting identifying information resources accessible through information systems, intermediary/interface and user. Dialogue is a fundamental constituent of information interaction. Early models proposed by Belkin and Ingwersen focussed on the dialogue occurring in user-intermediary interaction, while more recent frameworks developed by Ingwersen and Järvelin devote more attention to dialogue constitutive of user-information system interaction.

Research limitations/implications

As the study focusses on four models developed within the period of 1984-2005, the findings cannot be generalised to depict the phenomena of information interaction as a whole. Further research is needed to model the specific features of information interaction occurring in the networked information environments in particular.

Originality/value

The study pioneers by providing an in-depth analysis of the ways in which pioneering researchers have conceptualised the phenomena of interaction in the context of IS&R. The findings contribute to the elaboration of the conceptual space of information behaviour research.

Open Access
Article
Publication date: 12 June 2017

Yixuan Nan, Yi Liu, Jianping Shen and Yueting Chai

This paper aims to study the material conscious information network (MCIN) to present new models of clothing products and persons and propose new crowd-designing patterns to…

1299

Abstract

Purpose

This paper aims to study the material conscious information network (MCIN) to present new models of clothing products and persons and propose new crowd-designing patterns to reconstruct an improved supply–demand relationship in clothing industry.

Design/methodology/approach

This paper aims to study the MCIN to present new models of clothing products and persons and propose new crowd-designing patterns to reconstruct an improved supply–demand relationship in clothing industry.

Findings

At last, this paper implements a prototype system of novel e-commerce platform based on the CDCI to illustrate the effectiveness and soundness of the CDCI modeling.

Originality/value

Different from most related works just focusing on the physiology dimension in the matching of customer and clothing, this paper proposes that the dimension of physiology, character, knowledge and experience should be synthetically considered.

Details

International Journal of Crowd Science, vol. 1 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 13 February 2023

Elham Rostami, Fredrik Karlsson and Shang Gao

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

1175

Abstract

Purpose

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

Design/methodology/approach

This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.

Findings

This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.

Research limitations/implications

The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.

Practical implications

Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.

Originality/value

The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 31 December 2019

Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck and Verónica Burriel Coll

This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized…

2584

Abstract

Purpose

This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized enterprise (SME) cluster. The purpose of this paper is to provide SMEs with a tailored maturity model enabling them to capture and improve their information security capabilities.

Design/methodology/approach

Design Science Research was followed to design and evaluate the method as a design artifact.

Findings

The method has successfully been used to adapt the ISFAM model to a group of SMEs within a regional cluster resulting in a model that is aligned with the OCs of the cluster. Areas for further investigation and improvements were identified.

Research limitations/implications

The study is based on applying the proposed method for the SMEs active in the transport, logistics and packaging sector in the Port of Rotterdam. Future research can focus on different sectors and regions. The method can be used for adapting other focus area maturity models.

Practical implications

The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.

Originality/value

The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

1 – 10 of over 11000