ACM Trans. Manag. Inf. Syst.最新文献

筛选
英文 中文
A Fitness-Utility Model for Design Science Research 一种适合设计科学研究的实用新型
ACM Trans. Manag. Inf. Syst. Pub Date : 2011-05-05 DOI: 10.1145/2499962.2499963
T. Gill, A. Hevner
{"title":"A Fitness-Utility Model for Design Science Research","authors":"T. Gill, A. Hevner","doi":"10.1145/2499962.2499963","DOIUrl":"https://doi.org/10.1145/2499962.2499963","url":null,"abstract":"Current thinking in design science research (DSR) defines the usefulness of the design artifact in a relevant problem environment as the primary research goal. Here we propose a complementary evaluation model for DSR. Drawing from evolutionary economics, we define a fitness-utility model that better captures the evolutionary nature of design improvements and the essential DSR nature of searching for a satisfactory design across a fitness landscape. Our goal is to move DSR to more meaningful evaluations of design artifacts for sustainable impacts. A key premise of this new thinking is that the evolutionary fitness of a design artifact is more valuable than its immediate usefulness. We conclude with a discussion of the strengths and challenges of the fitness-utility model for the performance of rigorous and relevant DSR.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
A multimethod study of information quality in wiki collaboration wiki协作中信息质量的多方法研究
ACM Trans. Manag. Inf. Syst. Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929920
Gerald C. Kane
{"title":"A multimethod study of information quality in wiki collaboration","authors":"Gerald C. Kane","doi":"10.1145/1929916.1929920","DOIUrl":"https://doi.org/10.1145/1929916.1929920","url":null,"abstract":"In this article, the author presents the results of a two-phase, multimethod study of wiki-based collaboration in an attempt to better understand how peer-produced collaboration is done well in wiki environments. Phase 1 involves an in-depth case study of the collaborative processes surrounding the development of the Wikipedia article on the 2007 Virginia Tech massacre. The rich data collected are used to develop an initial set of testable hypotheses of factors that enhance the quality of peer-produced information in wiki environments. Phase 2 tests these theories through a quantitative analysis of the collaborative features associated with 188 similar articles that Wikipedia considered for recognition as their best (i.e., the top 0.1%). Four collaborative features are examined for their effects on quality: volume of contributor activity, type of contributor activity, number of anonymous contributors, and top contributor experience. Volume of contributor activity is the only feature that is unsupported, a particularly interesting result because previous literature connects that factor most clearly to success in wiki-based collaboration. Implications are discussed.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Computer use and wage returns: The complementary roles of IT-related human capital and nonroutine tasks 计算机使用与工资回报:it相关人力资本与非常规任务的互补作用
ACM Trans. Manag. Inf. Syst. Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929922
Debabrata Dey, Ming Fan, Gang Peng
{"title":"Computer use and wage returns: The complementary roles of IT-related human capital and nonroutine tasks","authors":"Debabrata Dey, Ming Fan, Gang Peng","doi":"10.1145/1929916.1929922","DOIUrl":"https://doi.org/10.1145/1929916.1929922","url":null,"abstract":"The effect of computer use on individual workers is relatively underresearched in the IS literature. Prior studies on computer use usually treat technologies as a “black box” and rarely look into how computers are used in workplaces and why IT-related skills are important there. In this study, we use the data from the Current Population Survey (CPS) and the data on job requirements for over 12,000 occupations from the Dictionary of Occupational Titles (DOT), to examine the complementary roles of skill sets and nonroutine tasks in providing computer-use wage returns for individual workers. We find that computer use is associated with increased levels of interactive and numerical skills required for the general workforce. In addition, workers who use computers at work and possess higher levels of interactive skills receive higher wages. We also find that computer use complements performing nonroutine tasks, particularly nonroutine abstract tasks in contributing to the wage premium. As the tasks become increasingly routine, the impact of computer use on wage returns diminishes.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Editorial: Design science, grand challenges, and societal impacts 社论:设计科学、重大挑战和社会影响
ACM Trans. Manag. Inf. Syst. Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929917
Hsinchun Chen
{"title":"Editorial: Design science, grand challenges, and societal impacts","authors":"Hsinchun Chen","doi":"10.1145/1929916.1929917","DOIUrl":"https://doi.org/10.1145/1929916.1929917","url":null,"abstract":"It has been a great relief and pleasure for me to finally see the inaugural issue of the much-anticipated ACM Transactions on Management Information Systems (ACM TMIS) in print and distributed at the recent ICIS meeting in St. Louis, Missouri on December 12–15, 2010. Many thanks to those AEs, advisors, authors, colleagues, and friends who attended our little celebration party at the beautiful conference site, Hyatt Regency St. Louis at the Arch. In total, we had close to 80 guests who attended the party and I signed many copies of the “collector’s edition” of this exciting inaugural issue! With this great beginning, I hope to see the continuous growth and success of this important ACM journal for the MIS community.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123356636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Visualizing web search results using glyphs: Design and evaluation of a flower metaphor 可视化的网络搜索结果使用字形:设计和评估一个花的隐喻
ACM Trans. Manag. Inf. Syst. Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929918
M. Chau
{"title":"Visualizing web search results using glyphs: Design and evaluation of a flower metaphor","authors":"M. Chau","doi":"10.1145/1929916.1929918","DOIUrl":"https://doi.org/10.1145/1929916.1929918","url":null,"abstract":"While the Web provides a lot of useful information to managers and decision makers in organizations for decision support, it requires a lot of time and cognitive effort for users to sift through a search result list returned by search engines to find useful information. Previous research in information visualization has shown that visualization techniques can help users comprehend information and accomplish information tasks more efficiently and effectively. However, only a limited number of such techniques have been applied to Web search result visualization with mixed evaluation results. Using a design science approach, this research designed and implemented a glyph (a graphical object that represents the values of multiple dimensions using multiple visual parameters) and a system for visualizing Web search results. A flower metaphor was adopted in the glyph design to represent the characteristics and metadata of Web documents. Following the cognitive fit theory, an experimental study was conducted to evaluate three displays: a numeric display, a glyph display, and a combined display which showed numbers only, glyphs only, and both, respectively. Experimental results showed that the glyph display and the combined display performed better when task complexity was high, and the numeric display and the combined display performed better when task complexity was low. The combined display also received the best perceived usability from the subjects. Based on the findings, the implications of the study to research and practice are discussed and some future research directions are suggested.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132245683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Uncovering and testing archetypes of effective public sector CIOs 发现和测试有效的公共部门首席信息官的原型
ACM Trans. Manag. Inf. Syst. Pub Date : 2011-03-01 DOI: 10.1145/1929916.1929921
Gregory S. Dawson, R. Watson
{"title":"Uncovering and testing archetypes of effective public sector CIOs","authors":"Gregory S. Dawson, R. Watson","doi":"10.1145/1929916.1929921","DOIUrl":"https://doi.org/10.1145/1929916.1929921","url":null,"abstract":"Given the importance of public sector CIOs to government performance and citizens' faith in democracy as an efficient provider of services, it is important to understand what makes some government CIOs more effective than others. Q Method is used to uncover five archetypes of public sector CIOs which are shown to be reliable across two Q sorts. These archetypes include politically-oriented CIO, savvy negotiator, technology optimizer, and skillful communicator. Further analysis using a tournament scoring approach indicates that business-oriented CIOs are the most effective. Applying a stakeholder perspective to interpret the results, it is proposed that business-oriented CIOs understand the value in tracking closely to an organization's business leaders and strategically ignoring other stakeholders in their environment, even politically powerful ones. The development and comparison of archetypes provide a new focus of CIO research by extending from the individual level of the attribute to a combination of attributes (archetypes).","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132366598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A privacy protection technique for publishing data mining models and research data 发布数据挖掘模型和研究数据的隐私保护技术
ACM Trans. Manag. Inf. Syst. Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877732
Yu Fu, Zhiyuan Chen, Güneş Koru, A. Gangopadhyay
{"title":"A privacy protection technique for publishing data mining models and research data","authors":"Yu Fu, Zhiyuan Chen, Güneş Koru, A. Gangopadhyay","doi":"10.1145/1877725.1877732","DOIUrl":"https://doi.org/10.1145/1877725.1877732","url":null,"abstract":"Data mining techniques have been widely used in many research disciplines such as medicine, life sciences, and social sciences to extract useful knowledge (such as mining models) from research data. Research data often needs to be published along with the data mining model for verification or reanalysis. However, the privacy of the published data needs to be protected because otherwise the published data is subject to misuse such as linking attacks. Therefore, employing various privacy protection methods becomes necessary. However, these methods only consider privacy protection and do not guarantee that the same mining models can be built from sanitized data. Thus the published models cannot be verified using the sanitized data. This article proposes a technique that not only protects privacy, but also guarantees that the same model, in the form of decision trees or regression trees, can be built from the sanitized data. We have also experimentally shown that other mining techniques can be used to reanalyze the sanitized data. This technique can be used to promote sharing of research data.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133271465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Editorial: Welcome to the first issue of ACM TMIS 编辑:欢迎来到ACM TMIS的第一期
ACM Trans. Manag. Inf. Syst. Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877726
Hsinchun Chen
{"title":"Editorial: Welcome to the first issue of ACM TMIS","authors":"Hsinchun Chen","doi":"10.1145/1877725.1877726","DOIUrl":"https://doi.org/10.1145/1877725.1877726","url":null,"abstract":"It is a great pleasure for me to announce the first issue of the long-awaited ACM Transactions on Management Information Systems (ACM TMIS), the only ACM journal devoted to the MIS community. The Association for Computing Machinery (http://www.acm.org), or ACM, was founded in 1947 as the world’s first scientific and educational computing society. It has more than 92,000 members as of 2009.1 An ACM publication brings significant prestige and recognition due to the community’s long-standing and high societal impact and its wide reach to academic institutions and the IT industry. It takes a tremendous effort for a small group of MIS researchers and educators to make ACM TMIS a reality. In particular, I would like to acknowledge the groundwork that had been done by Alan Hevner in proposing an earlier MIS journal idea to the ACM, and the assistance and guidance of Ee-Peng Lim as a member of the ACM Publications Board during the entire approval process. We have received exceptionally strong support from the EICs of many key ACM publications and from SIGs (Special Interest Groups) within the ACM community, including: ACM Transactions on Information Systems (TOIS) EIC Jamie Callan, ACM Transactions on Knowledge Discovery from Data (TKDD) EIC Jiawei Han, ACM Transactions on Database Systems (TODS) EIC Meral Özsoyoğlu, ACM Journal of Data and Information Quality (JDIQ) EIC Stuart Madnick, ACM Transactions on the Web (TWEB) EIC Helen Ashman, ACM SIGMIS Chair Janice Sipior, ACM SIGKDD Chair Gregory Piatetsky-Shapiro,","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why give away something for nothing? Investigating virtual goods pricing and permission strategies 为什么要白白放弃呢?调查虚拟商品定价和许可策略
ACM Trans. Manag. Inf. Syst. Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877729
Sulin Ba, Dan Ke, Jan Stallaert, Zhongju Zhang
{"title":"Why give away something for nothing? Investigating virtual goods pricing and permission strategies","authors":"Sulin Ba, Dan Ke, Jan Stallaert, Zhongju Zhang","doi":"10.1145/1877725.1877729","DOIUrl":"https://doi.org/10.1145/1877725.1877729","url":null,"abstract":"With the rapid increase of virtual goods created for virtual world exchanges and the record growth of user-to-user transactions in these in-world economies, an important question is how a creator sets prices for a virtual good so as to maximize her profit from her creation. Virtual goods share similar economic properties (such as substantial production cost and negligible marginal cost) with other types of digital goods. However, one aspect that distinguishes a virtual good is that consumers in a virtual world may want to use multiple copies of the identical good at the same time, and such simultaneous use of multiple copies of the identical good increases a consumer's utility. In this research, we focus on the COPY permission of virtual goods. We develop an economic model to examine under what conditions the COPY permission setting leads to the highest profit for the creator of a virtual good, and what the pricing strategies are in a dynamic setting when such permission choices are present. Theoretical and practical implications of the research are discussed.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures 信息安全搜索行为的驱动因素:网络攻击和漏洞披露的调查
ACM Trans. Manag. Inf. Syst. Pub Date : 2010-12-01 DOI: 10.1145/1877725.1877728
Jingguo Wang, Nan Xiao, H. R. Rao
{"title":"Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures","authors":"Jingguo Wang, Nan Xiao, H. R. Rao","doi":"10.1145/1877725.1877728","DOIUrl":"https://doi.org/10.1145/1877725.1877728","url":null,"abstract":"More and more people use search engines to seek for various information. This study investigates the search behavior that drives the search for information security knowledge via a search engine. Based on theories in information search and information security behavior we examine the effects of network attacks and vulnerability disclosures on search for information security knowledge by ordinary users. We construct a unique dataset from publicly available sources, and use a dynamic regression model to test the hypotheses empirically. We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search. Implications of the study are discussed.","PeriodicalId":178565,"journal":{"name":"ACM Trans. Manag. Inf. Syst.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122569861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信