Search results

1 – 10 of over 158000
Article
Publication date: 8 August 2016

Mohammad Reza Rasouli, Jos J. M. Trienekens, Rob J. Kusters and Paul W.P.J. Grefen

– The purpose of this paper is to identify information governance (IG) requirements in the context of dynamic business networking (BN).

1902

Abstract

Purpose

The purpose of this paper is to identify information governance (IG) requirements in the context of dynamic business networking (BN).

Design/methodology/approach

For the identification of IG requirements a systematic literature review is conducted. The practical significance of identified IG requirements is evaluated through a case study.

Findings

A comprehensive list of IG requirements in dynamic BN is identified. These requirements are classified in information quality, information security, and metadata domains. The conducted case study demonstrates information exchange issues in a real world dynamic BN that reflects the practical significance of the identified IG requirements.

Research limitations/implications

Exploiting emerging market opportunities through a dynamic BN necessitates the realization of a comprehensive IG program within the network. Otherwise, information exchange related risks can interrupt the operations in a BN. In this research the authors concentrate on interactions between parties within a BN. The interactions with customers for the co-creation of value are not addressed directly. Although the conducted case study reflects the practical significance of the identified IG requirements clearly, more empirical study is needed for prioritizing these IG requirements.

Practical implications

The governor of a BN needs to balance between the value obtained from dynamic networked interactions and the risk evolving from the dynamic inter-organizational information exchange.

Originality/value

The comprehensive list of IG requirements that are identified in this research can be used to develop an IG program that enables high quality and secure information exchange in a dynamic BN.

Details

Industrial Management & Data Systems, vol. 116 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Article
Publication date: 6 December 2022

Simon Ashworth, Michelle Dillinger and Karsten Körkemeyer

This paper aims to describe the development of guidance to help clients and operational teams to clearly define information requirements for projects using building information

1114

Abstract

Purpose

This paper aims to describe the development of guidance to help clients and operational teams to clearly define information requirements for projects using building information modelling (BIM). ISO 19650 standards highlight this as a critical first step to ensure adequate information is available to optimise built assets over their whole life cycle.

Design/methodology/approach

A document analysis of existing BIM guidance supported by literature was undertaken to answer the research questions: “What guidance already exists specific to clients? and Would additional guidance help clients to better fulfil their role as the ‘appointing party’ in line with ISO 19650?”

Findings

A research gap was established highlighting a lack of guidance specifically aimed to help clients formulate information requirements as the appointing party. This research makes recommendations for an approach to define the requirements and support successful outcomes for BIM projects.

Practical implications

This paper provides a standardised approach and a starting point for an appointing party to gather and structure information requirements in line with ISO 19650.

Originality/value

This paper considers BIM information requirements specifically from an operations perspective with a focus on the client and facility management team.

Article
Publication date: 1 January 1978

N.J. BELKIN

Information science, or informatics, has almost from its beginnings been characterized by a seemingly inordinate self‐consciousness, exemplified by concern with its status…

2744

Abstract

Information science, or informatics, has almost from its beginnings been characterized by a seemingly inordinate self‐consciousness, exemplified by concern with its status vis‐à‐vis other disciplines, with its status as a science, and with the significance of its objects of investigation and the goals of that investigation. The bibliography by Port, and the survey by Wellisch, of definitions of information science, and the historical survey by Harmon, all give substantial evidence of this self‐consciousness. Some aspects of this attitude are of course due to the social and political problems facing any new discipline (or field of investigation aspiring to such status), such as indifference or hostility from the established academic community, the fight for a share of limited research and development funds, the inferiority complex associated with having no well‐defined methods of investigation in a social situation which requires them for acceptance, and so on. Other aspects of this self‐consciousness may, however, be more related to strictly internal, ‘scientific’ concerns; that is, to problems within the theoretical structure of information science which must be solved in order for substantial progress in solving its practical problems to be made. This review surveys contributions to one such problem: the question of a suitable concept of information for information science.

Details

Journal of Documentation, vol. 34 no. 1
Type: Research Article
ISSN: 0022-0418

Article
Publication date: 1 March 1996

Yong Shi, Pamela Specht and Justin Stolen

In allocating scarce resources to a new information system (IS), a non‐trivial task becomes the determination of a best priority ranking of the IS’s intangible information

1652

Abstract

In allocating scarce resources to a new information system (IS), a non‐trivial task becomes the determination of a best priority ranking of the IS’s intangible information requirements. Given a set of individual users’ rankings of the information requirements, illustrates, through a real‐world case study, a streamlined consensus priority ranking (SCPR) method based on a concept of minimizing the disagreement (distance) between individual rankings. Compared to a traditional weighted ranking method, the SCPR method is easy to understand, systematic and requires no weighting methodology. Thus, the SCPR method can help the system development team make efficient decisions when allocating resources for a new information system.

Details

Information Management & Computer Security, vol. 4 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 June 2005

Heng‐Li Yang and Jih‐Hsin Tang

To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of…

2146

Abstract

Purpose

To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of elicited requirements in web‐based information systems (WIS).

Design/methodology/approach

A lab experiment was designed and conducted to investigate the relationship between college students' elicited requirements for two WIS cases and their social networks.

Findings

The individual centrality in “information” networks has a significant positive relationship with the numbers of elicited “informationrequirements and total requirements; however, the individual centrality in other social networks has no significant relationship with the number of the elicited requirements.

Research limitations/implications

The requirements collected from “key users” may account for most requirements, which is similar to the results predicted by Pareto's rule.

Practical implications

The origin of a WIS depends on a few influential users. These key users possess more power than others, and they define not only the “requirements” of the site but also its content or knowledge. The WIS designers may take advantage of this fact.

Originality/value

This paper fills the information requirement elicitation gap, while transferring the conventional IS development experiences to WIS.

Details

Industrial Management & Data Systems, vol. 105 no. 5
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 9 September 2014

Abdou Karim Jallow, Peter Demian, Andrew N. Baldwin and Chimay Anumba

The purpose of this paper is to investigate in-depth the current approach of managing client requirements in construction and to highlight the significant factors, which…

2797

Abstract

Purpose

The purpose of this paper is to investigate in-depth the current approach of managing client requirements in construction and to highlight the significant factors, which contribute to the complexity of managing the requirements in order to define a better approach.

Design/methodology/approach

A case study of a leading international global built asset and engineering consultancy organization was conducted over two years. The case study was conducted principally using semi-participant observations supplemented with other qualitative data collection methods (i.e. interviews, questionnaires and document analysis). Thematic analysis was used to analyze the data.

Findings

The results highlight major factors associated with the complexity of managing client requirements information, which include: mechanisms for documentation, storage and access, distribution of requirements information between stakeholders and across lifecycle phases of a project, traceability management and the provision of effective change management incorporating dependency checking and impact analysis.

Research limitations/implications

The main limitation of the research is the use of an in-depth study of a single organization, which applied the same project management method across all the projects they managed. Further work is planned to develop the proposed framework fully, and develop a software platform to operationalize and evaluate its industrial applicability with construction projects.

Practical implications

The implications of this research is that a better approach to managing requirements information is needed, which will facilitate the design, construction and operations of buildings within budget and time. An integrated framework and an associated tool are suggested to implement the approach.

Originality/value

This study identifies major research gaps and problems in the architecture, engineering, construction and facilities management industry; proposes and presents Electronic Requirements Information Management framework to facilitate lifecycle management of the requirements.

Details

Engineering, Construction and Architectural Management, vol. 21 no. 5
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 16 December 2019

Sandra T. Matarneh, Mark Danso-Amoako, Salam Al-Bizri, Mark Gaterell and Rana T. Matarneh

This paper aims to identify a generic set of information requirements for facilities management (FM) systems, which should be included in BIM as-built models for efficient…

1710

Abstract

Purpose

This paper aims to identify a generic set of information requirements for facilities management (FM) systems, which should be included in BIM as-built models for efficient information exchange between BIM and FM systems, and to propose a process to identify, verify and collect the required information for use in FM systems during the project’s lifecycle.

Design/methodology/approach

Both qualitative and quantitative approaches were applied at different stages of the study’s sequential design. The collection and analysis of qualitative data was based on an extensive literature review of similar studies, standards, best practices and case study documentation. This was followed by a questionnaire survey of 191 FM practitioners in the UK. This formed the background of the third stage, which was the development of the information management process to streamline information exchange between building information models and FM systems.

Findings

The study identifies a generic list of information requirements of building information models to support FM systems. In addition, the study presents an information management process that generates a specific database for FM systems using an open data format.

Originality/value

The existing literature focuses on specific building types (educational buildings) or specific information requirements related to particular systems (mechanical systems). The existing standards, guidelines and best practices focus on the information requirements to support the operations and maintenance (O&M) phase in general. This study is different from previous studies because it develops a set of specific information requirements for building information models to support FM systems. FM organisations and owners can use the proposed list of information requirements as a base to generate specific data output for their FM systems’ input, to decrease the redundant activity of manual data entry and focus their efforts on key activities.

Article
Publication date: 12 July 2013

Stefan Taubenberger, Jan Jürjens, Yijun Yu and Bashar Nuseibeh

In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly…

1004

Abstract

Purpose

In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly identified or unidentified vulnerabilities – can occur as uncertain data are used. Furthermore, businesses' security needs are not considered sufficiently. Hence, security functions may not protect business assets sufficiently and cost‐effectively. This paper aims to resolve vulnerability errors by analysing the security requirements of information assets in business process models.

Design/methodology/approach

Business process models have been selected for use, because there is a close relationship between business process objectives and risks. Security functions are evaluated in terms of the information flow of business processes regarding their security requirements. The claim that vulnerability errors can be resolved was validated by comparing the results of a current risk assessment approach with the proposed approach. The comparison is conducted both at three entities of an insurance company, as well as through a controlled experiment within a survey among security professionals.

Findings

Vulnerability identification errors can be resolved by explicitly evaluating security requirements in the course of business; this is not considered in current assessment methods.

Originality/value

It is shown that vulnerability identification errors occur in practice. With the explicit evaluation of security requirements, identification errors can be resolved. Risk assessment methods should consider the explicit evaluation of security requirements.

Details

Information Management & Computer Security, vol. 21 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 6 February 2023

Tugba Gurcaylilar-Yenidogan and Dilek Erdogan

Based on a survey study of 138 software buyers in Turkey, this study examines conditional indirect effects of requirements uncertainty on supplier opportunism where buyer…

Abstract

Purpose

Based on a survey study of 138 software buyers in Turkey, this study examines conditional indirect effects of requirements uncertainty on supplier opportunism where buyer dependence, a proxy for relation-specific investments, undertakes a mediator role. The authors consider a two-level moderation effect of trust and contract in buyer–supplier relationships throughout the software project lifecycle.

Design/methodology/approach

A survey-based empirical study was conducted, and conditional process analyses were run using PROCESS macro in SPSS. The present study tests a two-stage moderated mediation model in which competence-based trust with a detailed contract setting moderates the mediational path from requirements uncertainty to buyer dependence.

Findings

The data obtained from the buyer side in the Turkish software industry showed that a relationship in which the buyer is structurally dependent begins at a high level of trust. On the other hand, the authors found that contractual rigidity fosters supplier opportunism ex-post in evolving process of the relationship.

Originality/value

This study contributes to project management literature by testing a two-level moderation effect of governance and the mediator role of buyer dependence in the relationship between requirements uncertainty and supplier opportunism. Moving differently from the previous studies, this study integrates contributions of both economic perspectives, such as resource dependence theory and transaction cost analysis, and relational perspectives into the information processing view.

Details

International Journal of Managing Projects in Business, vol. 16 no. 2
Type: Research Article
ISSN: 1753-8378

Keywords

1 – 10 of over 158000