Search results
1 – 10 of over 22000Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido
Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…
Abstract
Purpose
Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.
Design/methodology/approach
The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.
Findings
Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.
Practical implications
This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.
Originality/value
To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.
Details
Keywords
To elaborate the nature of critique presented in the models and concepts of human information behaviour (HIB) research by identifying the issues to which the critique is directed…
Abstract
Purpose
To elaborate the nature of critique presented in the models and concepts of human information behaviour (HIB) research by identifying the issues to which the critique is directed and the ways in which the critique is conducted.
Design/methodology/approach
Conceptual analysis focusing on 58 key studies on the topic. First, the objects and ways of conducting the critique were identified. Thereafter, three levels of depth at which the critique is conducted were specified. The conceptual analysis is based on the comparison of the similarities and differences between the articulations of critique presented at these levels.
Findings
At the lowest level of depth, critique of HIB research is directed to the lack of research by identifying gaps and complaining the neglect or paucity of studies in a significant domain. At the level of critiquing the shortcomings of existing studies, the attention is focused on the identification and analysis of the inadequacies of concepts and models. Finally, constructive critiques of research approaches dig deeper in that they not only identify weaknesses of existing studies but also propose alternative in which the shortcomings can be avoided, and the conceptualizations of HIB enhanced.
Research limitations/implications
As the study focuses on critiques addressed to HIB models and concepts, the findings cannot be generalized to concern the field of Library and Information Science (LIS) as a whole. Moreover, due to the emphasis of the qualitative research approach, the findings offer only an indicative picture of the frequency of the objects critiqued in HIB research.
Originality/value
The study pioneers by providing an in-depth analysis of the nature of critiques presented in a LIS research domain.
Details
Keywords
Tristan Gerrish, Kirti Ruikar, Malcolm Cook, Mark Johnson and Mark Phillip
The purpose of this paper is to present a review of the implications building information modelling (BIM) is having on the building energy modelling (BEM) and design of buildings…
Abstract
Purpose
The purpose of this paper is to present a review of the implications building information modelling (BIM) is having on the building energy modelling (BEM) and design of buildings. It addresses the issues surrounding exchange of information throughout the design process, and where BIM may be useful in contributing to effective design progression and information availability.
Design/methodology/approach
Through review of current design procedures and examination of the concurrency between architectural and thermophysical design modelling, a procedure for information generation relevant to design stakeholders is created, and applied to a high-performance building project currently under development.
Findings
The extents of information key to the successful design of a buildings energy performance in relation to its architectural objectives are given, with indication of the level of development required at each stage of the design process.
Practical implications
BIM offers an extensible medium for parametric information storage, and its implementation in design development offers the capability to include BEM parameter-integrated construction information. The extent of information required for accurate BEM at stages of a building’s design is key to understanding how best to record performance information in a BIM environment.
Originality/value
This paper contributes to the discussion around the integration of concurrent design procedures and a common data environment. It presents a framework for the creation and dissemination of information during design, exemplifies this on a real building project and evaluates the barriers experienced in successful implementation.
Details
Keywords
Jan-Halvard Bergquist, Samantha Tinet and Shang Gao
The purpose of this study is to create an information classification model that is tailored to suit the specific needs of public sector organizations in Sweden.
Abstract
Purpose
The purpose of this study is to create an information classification model that is tailored to suit the specific needs of public sector organizations in Sweden.
Design/methodology/approach
To address the purpose of this research, a case study in a Swedish municipality was conducted. Data was collected through a mixture of techniques such as literature, document and website review. Empirical data was collected through interviews with 11 employees working within 7 different sections of the municipality.
Findings
This study resulted in an information classification model that is tailored to the specific needs of Swedish municipalities. In addition, a set of steps for tailoring an information classification model to suit a specific public organization are recommended. The findings also indicate that for a successful information classification it is necessary to educate the employees about the basics of information security and classification and create an understandable and unified information security language.
Practical implications
This study also highlights that to have a tailored information classification model, it is imperative to understand the value of information and what kind of consequences a violation of established information security principles could have through the perspectives of the employees.
Originality/value
It is the first of its kind in tailoring an information classification model to the specific needs of a Swedish municipality. The model provided by this study can be used as a tool to facilitate a common ground for classifying information within all Swedish municipalities, thereby contributing the first step toward a Swedish municipal model for information classification.
Details
Keywords
The purpose of this paper is to contribute to the creation of a holistic picture of information behavior by examining the connections between information seeking and sharing.
Abstract
Purpose
The purpose of this paper is to contribute to the creation of a holistic picture of information behavior by examining the connections between information seeking and sharing.
Design/methodology/approach
Conceptual analysis is used to focus on the ways in which the researchers have modeled the interplay of information seeking and sharing. The study draws on conceptual analysis of 27 key studies examining the above issue, with a focus on the scrutiny of six major models for information behavior.
Findings
Researchers have employed three main approaches to model the relationships between information seeking and sharing. The indirect approach conceptualizes information seeking and sharing as discrete activities connected by an intermediating factor, for example, information need. The sequential approach assumes that information seeking precedes information sharing. From the viewpoint of the interactive approach, information seeking and sharing appear as mutually related activities shaping each other iteratively or in a cyclical manner. The interactive approach provides the most sophisticated research perspective on the relationships of information seeking and sharing and contributes to holistic understanding of human information behavior.
Research limitations/implications
As the study focuses on information seeking and sharing, no attention is devoted to other activities constitutive of information behavior, for example, information use.
Originality/value
The study pioneers by providing an in-depth analysis of the connections of information seeking and information sharing.
Details
Keywords
Yuejiang Li, H. Vicky Zhao and Yan Chen
With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The…
Abstract
Purpose
With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The diffusion processes of different information are not independent, and they interact with and influence each other. Modeling and analyzing the interaction between correlated information play an important role in the understanding of the characteristics of information dissemination and better control of the information flows. This paper aims to model the correlated information diffusion process over the crowd intelligence networks.
Design/methodology/approach
This study extends the classic epidemic susceptible–infectious–recovered (SIR) model and proposes the SIR mixture model to describe the diffusion process of two correlated pieces of information. The whole crowd is divided into different groups with respect to their forwarding state of the correlated information, and the transition rate between different groups shows the property of each piece of information and the influences between them.
Findings
The stable state of the SIR mixture model is analyzed through the linearization of the model, and the stable condition can be obtained. Real data are used to validate the SIR mixture model, and the detailed diffusion process of correlated information can be inferred by the analysis of the parameters learned through fitting the real data into the SIR mixture model.
Originality/value
The proposed SIR mixture model can be used to model the diffusion of correlated information and analyze the propagation process.
Details
Keywords
The purpose of this paper is to clarify the conceptual issues of information behaviour research by reviewing the approaches to information interaction in the context of information…
Abstract
Purpose
The purpose of this paper is to clarify the conceptual issues of information behaviour research by reviewing the approaches to information interaction in the context of information seeking and retrieval (IS&R).
Design/methodology/approach
The study uses the conceptual analysis focussing on four pioneering models for interactive IS&R proposed by Belkin, Ingwersen and Ingwersen and Järvelin.
Findings
A main characteristic of models for information interaction is the tripartite setting identifying information resources accessible through information systems, intermediary/interface and user. Dialogue is a fundamental constituent of information interaction. Early models proposed by Belkin and Ingwersen focussed on the dialogue occurring in user-intermediary interaction, while more recent frameworks developed by Ingwersen and Järvelin devote more attention to dialogue constitutive of user-information system interaction.
Research limitations/implications
As the study focusses on four models developed within the period of 1984-2005, the findings cannot be generalised to depict the phenomena of information interaction as a whole. Further research is needed to model the specific features of information interaction occurring in the networked information environments in particular.
Originality/value
The study pioneers by providing an in-depth analysis of the ways in which pioneering researchers have conceptualised the phenomena of interaction in the context of IS&R. The findings contribute to the elaboration of the conceptual space of information behaviour research.
Details
Keywords
Yixuan Nan, Yi Liu, Jianping Shen and Yueting Chai
This paper aims to study the material conscious information network (MCIN) to present new models of clothing products and persons and propose new crowd-designing patterns to…
Abstract
Purpose
This paper aims to study the material conscious information network (MCIN) to present new models of clothing products and persons and propose new crowd-designing patterns to reconstruct an improved supply–demand relationship in clothing industry.
Design/methodology/approach
This paper aims to study the MCIN to present new models of clothing products and persons and propose new crowd-designing patterns to reconstruct an improved supply–demand relationship in clothing industry.
Findings
At last, this paper implements a prototype system of novel e-commerce platform based on the CDCI to illustrate the effectiveness and soundness of the CDCI modeling.
Originality/value
Different from most related works just focusing on the physiology dimension in the matching of customer and clothing, this paper proposes that the dimension of physiology, character, knowledge and experience should be synthetically considered.
Details
Keywords
Elham Rostami, Fredrik Karlsson and Shang Gao
This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).
Abstract
Purpose
This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).
Design/methodology/approach
This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.
Findings
This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.
Research limitations/implications
The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.
Practical implications
Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.
Originality/value
The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.
Details
Keywords
Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck and Verónica Burriel Coll
This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized…
Abstract
Purpose
This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized enterprise (SME) cluster. The purpose of this paper is to provide SMEs with a tailored maturity model enabling them to capture and improve their information security capabilities.
Design/methodology/approach
Design Science Research was followed to design and evaluate the method as a design artifact.
Findings
The method has successfully been used to adapt the ISFAM model to a group of SMEs within a regional cluster resulting in a model that is aligned with the OCs of the cluster. Areas for further investigation and improvements were identified.
Research limitations/implications
The study is based on applying the proposed method for the SMEs active in the transport, logistics and packaging sector in the Port of Rotterdam. Future research can focus on different sectors and regions. The method can be used for adapting other focus area maturity models.
Practical implications
The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.
Originality/value
The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.
Details