共查询到20条相似文献,搜索用时 46 毫秒
1.
IT outsourcing research has often been at the transaction level, focusing on the role of the characteristics of the IT activities
as the antecedents of outsourcing decisions. The present study extends past research efforts examining the relationships between
organizational level variables—in particular the business strategy—and the decision to outsource. Results show that prospectors
and analyzers are more aggressive in their use of outsourcing for IT operations. However, no differences between the behaviour
of the different strategic groups were found for maintenance activities, suggesting that these activities are too far from
the core of the organization to be influenced by strategic profile.
相似文献
2.
Offshore outsourcing to vendors in foreign countries causes unique challenges which need to be understood and managed effectively.
This paper explores cultural differences in IS offshoring arrangements involving German client organizations that outsource
application development activities to Indian vendors. For this purpose, a research framework is developed based on both theoretical
considerations and specific empirical observations from multiple case studies. The goal is to (1) explore the nature of cultural
differences in offshore outsourcing arrangements in depth and to (2) analyze the relationship between those cultural differences
and offshore outsourcing success. Based on the case findings, implications and practices for the management of offshore development
projects are outlined. The results indicate that cultural differences in terms of power distance, IS designer values, and
an active versus passive working attitude critically affect several dimensions of relationship quality, thereby influencing
offshore outsourcing success. A clear definition of roles and mechanisms, strong leadership, and an active management of culture
by adapting to either the client’s or the vendor’s national culture appeared to be effective ways to manage cultural differences.
相似文献
3.
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise
of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations
hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom
filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect
their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the
storage requirement.
This research was supported by the USA National Science Foundation Grants CCR-0310974 and IIS-0546027.
相似文献
4.
IT outsourcing is a complex and opaque decision problem. Managers facing a decision about IT outsourcing have difficulty in
framing what needs to be thought about further in their discourses. Framing is one of the most crucial steps of human decision
making and needs to be assisted to better understand a decision situation. In this research, we examine a number of decision
primitives in the context of an IT outsourcing decision situation. We demonstrate how the decision primitives can be employed
so that managers can probe deep to better understand a decision situation and to establish a decision basis. In the organizational
setting, we exemplify the use of the decision primitives in relation to the perceived outsourcing implications for the managers
looking for assistance in accommodating a knowledge management perspective on IT outsourcing. Consequently, we induce insight
and a guideline on how to use knowledge management for effective outsourcing in one of the leading financial institutes in
Europe.
相似文献
5.
Trust has been considered a central aspect of successful IT outsourcing. Although a great deal of interest in trust has been
described, there are very few theoretical models in the IT outsourcing literature to explain mutual trust, its role, and its
impact in IT outsourcing. This study proposes a trust-based relationship research model to assess the perceived IT outsourcing
success in terms of (1) mutual trust with its temporal dimension of initial trust and initial distrust, and (2) knowledge
sharing with the moderating effect of mutual dependency. This model was then validated and applied in a study involving organizations
in Korea. The data was collected and analyzed to understand initial trust, initial distrust, knowledge sharing, and mutual
dependency as contributing factors to success in IT outsourcing. The results show that mutual trust between the service receiver
and provider is very important for knowledge sharing and outsourcing success, and is affected by the initial perception to
each other’s partner at the beginning of the outsourcing process. Interestingly, this study also shows that initial trust
is considered a significant factor in the perception of mutual trust from the service receiver’s perspective, but not from
the service provider’s viewpoint. The results help extend our understanding of critical success factors in outsourcing success
and of different standpoints between the service receiver and provider.
相似文献
6.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary
Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition
and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational
intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process,
we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
相似文献
7.
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components
(including human components). These trust assumptions, whether implicit or explicit, affect the scope of the analysis, derivation
of security requirements, and in some cases how functionality is realized. This paper presents trust assumptions in the context
of analysis of security requirements. A running example shows how trust assumptions can be used by a requirements engineer
to help define and limit the scope of analysis and to document the decisions made during the process. The paper concludes
with a case study examining the impact of trust assumptions on software that uses the secure electronic transaction specification.
相似文献
8.
The Stanford Event Heap has been shown to provide appropriate support for constructing interactive workspace applications.
Given this success it is natural to consider the Event Heap as a platform to support other classes of Ubiquitous Computing
applications. In this paper we argue that the distributed, spontaneous nature of these applications places additional demands
on the Event Heap that require extensions to both the engineering and API. Suitable extensions are described and their use
to support a typical Ubicomp application is discussed.
相似文献
9.
Recent scandals concerning the discovery of fraud committed by a few high profile companies has reinforced a need for innovative
approaches to detecting fraudulent company behavior. Fraud detection experts agree that many of the critical clues to fraud,
such as frequent management and auditor changes, can be found in qualitative sources such as news articles, press releases,
and footnotes accompanying financial statements. This paper presents a simulated multi-agent system that learns how to collect
valuable events from textual sources with pinpoint precision, utilizing the best content providers for each event type while
minimizing the overall cost.
相似文献
10.
The paper reflects on the unique experience of social and technological development in Lithuania since the regaining of independence
as a newly reshaped society constructing a distinctive competitive IST-based model at global level. This has presented Lithuanian
pattern of how to integrate different experiences and relations between generations in implementing complex information society
approaches. The resulting programme in general is linked to the Lisbon objectives of the European Union. The experience of
transitional countries in Europe, each different but facing some common problems, may be useful to developing countries in
Africa.
相似文献
11.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed. 相似文献
12.
The complexity of group dynamics occurring in small group interactions often hinders the performance of teams. The availability
of rich multimodal information about what is going on during the meeting makes it possible to explore the possibility of providing
support to dysfunctional teams from facilitation to training sessions addressing both the individuals and the group as a whole.
A necessary step in this direction is that of capturing and understanding group dynamics. In this paper, we discuss a particular
scenario, in which meeting participants receive multimedia feedback on their relational behaviour, as a first step towards
increasing self-awareness. We describe the background and the motivation for a coding scheme for annotating meeting recordings
partially inspired by the Bales’ Interaction Process Analysis. This coding scheme was aimed at identifying suitable observable
behavioural sequences. The study is complemented with an experimental investigation on the acceptability of such a service.
相似文献
13.
This paper introduces a concept called task muddiness as a metric for higher intelligence. Task muddiness is meant to be inclusive and expendable in nature. The intelligence required
to execute a task is measured by the composite muddiness of the task described by multiple muddiness factors. The composite
muddiness explains why many challenging tasks are muddy and why autonomous mental development is necessary for muddy tasks.
It facilitates better understanding of intelligence, what the human adult mind can do, and how to build a machine to acquire
higher intelligence. The task-muddiness indicates a major reason why a higher biological mind is autonomously developed from
autonomous, simple-to-complex experience. The paper also discusses some key concepts that are necessary for understanding
the mind and intelligence, such as intelligence metrics, the mode a task is conveyed to the task executor, a human and a machine
being a joint task performer in the traditional artificial intelligence (AI), a developmental agent (human or machine) being
a sole task performer, and the need for autonomy in task-nonexplicit learning.
相似文献
14.
Listening to music on personal, digital devices whilst mobile is an enjoyable, everyday activity. We explore a scheme for
exploiting this practice to immerse listeners in navigation cues. Our prototype, ONTRACK, continuously adapts audio, modifying
the spatial balance and volume to lead listeners to their target destination. First we report on an initial lab-based evaluation
that demonstrated the approach’s efficacy: users were able to complete tasks within a reasonable time and their subjective
feedback was positive. Encouraged by these results we constructed a handheld prototype. Here, we discuss this implementation
and the results of field-trials. These indicate that even with a low-fidelity realisation of the concept, users can quite
effectively navigate complicated routes.
相似文献
15.
The purposes of this study are (a) to establish a measurement for evaluating conversational impressions of group discussions,
and (b) to make an exploratory investigation on their interactional processes which may affect to form those impressions.
The impression rating and factor analysis undertaken first give us four factors concerning conversational impressions of “focus
group interviews (FGIs)”: conversational activeness, conversational sequencing, the attitudes of participants and the relationships
of participants. In relation to the factors of conversational activeness and conversational sequencing in particular, the
microanalysis of four selected topical scenes from our database further shows that the behavior of the moderator and the interviewees
is organized not independently but with reference to each other. The study thus emphasizes the importance of the integration
of quantitative and qualitative approaches towards human interactions.
相似文献
16.
An important area of Human Reliability Assessment in interactive systems is the ability to understand the causes of human
error and to model their occurrence. This paper investigates a new approach to analysis of task failures based on patterns
of operator behaviour, in contrast with more traditional event-based approaches. It considers, as a case study, a formal model
of an Air Traffic Control system operator’s task which incorporates a simple model of the high-level cognitive processes involved.
The cognitive model is formalised in the CSP process algebra. Various patterns of behaviour that could lead to task failure
are described using temporal logic. Then a model-checking technique is used to verify whether the set of selected behavioural
patterns is sound and complete with respect to the definition of task failure. The decomposition is shown to be incomplete
and a new behavioural pattern is identified, which appears to have been overlooked in the informal analysis of the problem.
This illustrates how formal analysis of operator models can yield fresh insights into how failures may arise in interactive
systems.
相似文献
17.
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed
about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathered regarding the speed and accuracy with which participants aimed and clicked
on visual-tags using camera-phones. We found that participants’ attitudes to visual-tag-based applications were broadly positive,
although they had several important reservations about camera-phone technology more generally. Data from our pointing-device
task demonstrated that novice users were able to aim and click on visual-tags quickly (well under 3 s per pointing-device
trial on average) and accurately (almost all meeting our defined speed/accuracy tradeoff of 6% error-rate). Based on our findings,
design lessons for camera-phone and visual-tag applications are presented.
相似文献
18.
This paper describes security and privacy issues for multimedia database management systems. Multimedia data includes text,
images, audio and video. It describes access control for multimedia database management systems and describes security policies
and security architectures for such systems. Privacy problems that result from multimedia data mining are also discussed.
相似文献
19.
There are only a few ethical regulations that deal explicitly with robots, in contrast to a vast number of regulations, which
may be applied. We will focus on ethical issues with regard to “responsibility and autonomous robots”, “machines as a replacement
for humans”, and “tele-presence”. Furthermore we will examine examples from special fields of application (medicine and healthcare,
armed forces, and entertainment). We do not claim to present a complete list of ethical issue nor of regulations in the field
of robotics, but we will demonstrate that there are legal challenges with regard to these issues.
相似文献
20.
In this paper, we present an Inverse Multi-Objective Robust Evolutionary (IMORE) design methodology that handles the presence
of uncertainty without making assumptions about the uncertainty structure. We model the clustering of uncertain events in
families of nested sets using a multi-level optimization search. To reduce the high computational costs of the proposed methodology
we proposed schemes for (1) adapting the step-size in estimating the uncertainty, and (2) trimming down the number of calls
to the objective function in the nested search. Both offline and online adaptation strategies are considered in conjunction
with the IMORE design algorithm. Design of Experiments (DOE) approaches further reduce the number of objective function calls
in the online adaptive IMORE algorithm. Empirical studies conducted on a series of test functions having diverse complexities
show that the proposed algorithms converge to a set of Pareto-optimal design solutions with non-dominated nominal and robustness
performances efficiently.
相似文献
|