Search results
1 – 10 of over 158000Mohammad Reza Rasouli, Jos J. M. Trienekens, Rob J. Kusters and Paul W.P.J. Grefen
– The purpose of this paper is to identify information governance (IG) requirements in the context of dynamic business networking (BN).
Abstract
Purpose
The purpose of this paper is to identify information governance (IG) requirements in the context of dynamic business networking (BN).
Design/methodology/approach
For the identification of IG requirements a systematic literature review is conducted. The practical significance of identified IG requirements is evaluated through a case study.
Findings
A comprehensive list of IG requirements in dynamic BN is identified. These requirements are classified in information quality, information security, and metadata domains. The conducted case study demonstrates information exchange issues in a real world dynamic BN that reflects the practical significance of the identified IG requirements.
Research limitations/implications
Exploiting emerging market opportunities through a dynamic BN necessitates the realization of a comprehensive IG program within the network. Otherwise, information exchange related risks can interrupt the operations in a BN. In this research the authors concentrate on interactions between parties within a BN. The interactions with customers for the co-creation of value are not addressed directly. Although the conducted case study reflects the practical significance of the identified IG requirements clearly, more empirical study is needed for prioritizing these IG requirements.
Practical implications
The governor of a BN needs to balance between the value obtained from dynamic networked interactions and the risk evolving from the dynamic inter-organizational information exchange.
Originality/value
The comprehensive list of IG requirements that are identified in this research can be used to develop an IG program that enables high quality and secure information exchange in a dynamic BN.
Details
Keywords
Irina Farquhar and Alan Sorkin
This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…
Abstract
This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.
Simon Ashworth, Michelle Dillinger and Karsten Körkemeyer
This paper aims to describe the development of guidance to help clients and operational teams to clearly define information requirements for projects using building information…
Abstract
Purpose
This paper aims to describe the development of guidance to help clients and operational teams to clearly define information requirements for projects using building information modelling (BIM). ISO 19650 standards highlight this as a critical first step to ensure adequate information is available to optimise built assets over their whole life cycle.
Design/methodology/approach
A document analysis of existing BIM guidance supported by literature was undertaken to answer the research questions: “What guidance already exists specific to clients? and Would additional guidance help clients to better fulfil their role as the ‘appointing party’ in line with ISO 19650?”
Findings
A research gap was established highlighting a lack of guidance specifically aimed to help clients formulate information requirements as the appointing party. This research makes recommendations for an approach to define the requirements and support successful outcomes for BIM projects.
Practical implications
This paper provides a standardised approach and a starting point for an appointing party to gather and structure information requirements in line with ISO 19650.
Originality/value
This paper considers BIM information requirements specifically from an operations perspective with a focus on the client and facility management team.
Details
Keywords
Information science, or informatics, has almost from its beginnings been characterized by a seemingly inordinate self‐consciousness, exemplified by concern with its status…
Abstract
Information science, or informatics, has almost from its beginnings been characterized by a seemingly inordinate self‐consciousness, exemplified by concern with its status vis‐à‐vis other disciplines, with its status as a science, and with the significance of its objects of investigation and the goals of that investigation. The bibliography by Port, and the survey by Wellisch, of definitions of information science, and the historical survey by Harmon, all give substantial evidence of this self‐consciousness. Some aspects of this attitude are of course due to the social and political problems facing any new discipline (or field of investigation aspiring to such status), such as indifference or hostility from the established academic community, the fight for a share of limited research and development funds, the inferiority complex associated with having no well‐defined methods of investigation in a social situation which requires them for acceptance, and so on. Other aspects of this self‐consciousness may, however, be more related to strictly internal, ‘scientific’ concerns; that is, to problems within the theoretical structure of information science which must be solved in order for substantial progress in solving its practical problems to be made. This review surveys contributions to one such problem: the question of a suitable concept of information for information science.
Yong Shi, Pamela Specht and Justin Stolen
In allocating scarce resources to a new information system (IS), a non‐trivial task becomes the determination of a best priority ranking of the IS’s intangible information…
Abstract
In allocating scarce resources to a new information system (IS), a non‐trivial task becomes the determination of a best priority ranking of the IS’s intangible information requirements. Given a set of individual users’ rankings of the information requirements, illustrates, through a real‐world case study, a streamlined consensus priority ranking (SCPR) method based on a concept of minimizing the disagreement (distance) between individual rankings. Compared to a traditional weighted ranking method, the SCPR method is easy to understand, systematic and requires no weighting methodology. Thus, the SCPR method can help the system development team make efficient decisions when allocating resources for a new information system.
Details
Keywords
Heng‐Li Yang and Jih‐Hsin Tang
To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of…
Abstract
Purpose
To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of elicited requirements in web‐based information systems (WIS).
Design/methodology/approach
A lab experiment was designed and conducted to investigate the relationship between college students' elicited requirements for two WIS cases and their social networks.
Findings
The individual centrality in “information” networks has a significant positive relationship with the numbers of elicited “information” requirements and total requirements; however, the individual centrality in other social networks has no significant relationship with the number of the elicited requirements.
Research limitations/implications
The requirements collected from “key users” may account for most requirements, which is similar to the results predicted by Pareto's rule.
Practical implications
The origin of a WIS depends on a few influential users. These key users possess more power than others, and they define not only the “requirements” of the site but also its content or knowledge. The WIS designers may take advantage of this fact.
Originality/value
This paper fills the information requirement elicitation gap, while transferring the conventional IS development experiences to WIS.
Details
Keywords
Abdou Karim Jallow, Peter Demian, Andrew N. Baldwin and Chimay Anumba
The purpose of this paper is to investigate in-depth the current approach of managing client requirements in construction and to highlight the significant factors, which…
Abstract
Purpose
The purpose of this paper is to investigate in-depth the current approach of managing client requirements in construction and to highlight the significant factors, which contribute to the complexity of managing the requirements in order to define a better approach.
Design/methodology/approach
A case study of a leading international global built asset and engineering consultancy organization was conducted over two years. The case study was conducted principally using semi-participant observations supplemented with other qualitative data collection methods (i.e. interviews, questionnaires and document analysis). Thematic analysis was used to analyze the data.
Findings
The results highlight major factors associated with the complexity of managing client requirements information, which include: mechanisms for documentation, storage and access, distribution of requirements information between stakeholders and across lifecycle phases of a project, traceability management and the provision of effective change management incorporating dependency checking and impact analysis.
Research limitations/implications
The main limitation of the research is the use of an in-depth study of a single organization, which applied the same project management method across all the projects they managed. Further work is planned to develop the proposed framework fully, and develop a software platform to operationalize and evaluate its industrial applicability with construction projects.
Practical implications
The implications of this research is that a better approach to managing requirements information is needed, which will facilitate the design, construction and operations of buildings within budget and time. An integrated framework and an associated tool are suggested to implement the approach.
Originality/value
This study identifies major research gaps and problems in the architecture, engineering, construction and facilities management industry; proposes and presents Electronic Requirements Information Management framework to facilitate lifecycle management of the requirements.
Details
Keywords
Sandra T. Matarneh, Mark Danso-Amoako, Salam Al-Bizri, Mark Gaterell and Rana T. Matarneh
This paper aims to identify a generic set of information requirements for facilities management (FM) systems, which should be included in BIM as-built models for efficient…
Abstract
Purpose
This paper aims to identify a generic set of information requirements for facilities management (FM) systems, which should be included in BIM as-built models for efficient information exchange between BIM and FM systems, and to propose a process to identify, verify and collect the required information for use in FM systems during the project’s lifecycle.
Design/methodology/approach
Both qualitative and quantitative approaches were applied at different stages of the study’s sequential design. The collection and analysis of qualitative data was based on an extensive literature review of similar studies, standards, best practices and case study documentation. This was followed by a questionnaire survey of 191 FM practitioners in the UK. This formed the background of the third stage, which was the development of the information management process to streamline information exchange between building information models and FM systems.
Findings
The study identifies a generic list of information requirements of building information models to support FM systems. In addition, the study presents an information management process that generates a specific database for FM systems using an open data format.
Originality/value
The existing literature focuses on specific building types (educational buildings) or specific information requirements related to particular systems (mechanical systems). The existing standards, guidelines and best practices focus on the information requirements to support the operations and maintenance (O&M) phase in general. This study is different from previous studies because it develops a set of specific information requirements for building information models to support FM systems. FM organisations and owners can use the proposed list of information requirements as a base to generate specific data output for their FM systems’ input, to decrease the redundant activity of manual data entry and focus their efforts on key activities.
Details
Keywords
Stefan Taubenberger, Jan Jürjens, Yijun Yu and Bashar Nuseibeh
In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly…
Abstract
Purpose
In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly identified or unidentified vulnerabilities – can occur as uncertain data are used. Furthermore, businesses' security needs are not considered sufficiently. Hence, security functions may not protect business assets sufficiently and cost‐effectively. This paper aims to resolve vulnerability errors by analysing the security requirements of information assets in business process models.
Design/methodology/approach
Business process models have been selected for use, because there is a close relationship between business process objectives and risks. Security functions are evaluated in terms of the information flow of business processes regarding their security requirements. The claim that vulnerability errors can be resolved was validated by comparing the results of a current risk assessment approach with the proposed approach. The comparison is conducted both at three entities of an insurance company, as well as through a controlled experiment within a survey among security professionals.
Findings
Vulnerability identification errors can be resolved by explicitly evaluating security requirements in the course of business; this is not considered in current assessment methods.
Originality/value
It is shown that vulnerability identification errors occur in practice. With the explicit evaluation of security requirements, identification errors can be resolved. Risk assessment methods should consider the explicit evaluation of security requirements.
Details
Keywords
Tugba Gurcaylilar-Yenidogan and Dilek Erdogan
Based on a survey study of 138 software buyers in Turkey, this study examines conditional indirect effects of requirements uncertainty on supplier opportunism where buyer…
Abstract
Purpose
Based on a survey study of 138 software buyers in Turkey, this study examines conditional indirect effects of requirements uncertainty on supplier opportunism where buyer dependence, a proxy for relation-specific investments, undertakes a mediator role. The authors consider a two-level moderation effect of trust and contract in buyer–supplier relationships throughout the software project lifecycle.
Design/methodology/approach
A survey-based empirical study was conducted, and conditional process analyses were run using PROCESS macro in SPSS. The present study tests a two-stage moderated mediation model in which competence-based trust with a detailed contract setting moderates the mediational path from requirements uncertainty to buyer dependence.
Findings
The data obtained from the buyer side in the Turkish software industry showed that a relationship in which the buyer is structurally dependent begins at a high level of trust. On the other hand, the authors found that contractual rigidity fosters supplier opportunism ex-post in evolving process of the relationship.
Originality/value
This study contributes to project management literature by testing a two-level moderation effect of governance and the mediator role of buyer dependence in the relationship between requirements uncertainty and supplier opportunism. Moving differently from the previous studies, this study integrates contributions of both economic perspectives, such as resource dependence theory and transaction cost analysis, and relational perspectives into the information processing view.
Details