首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
可用性测试方法在IA研究中的应用   总被引:9,自引:1,他引:9  
企业进行信息构建时必须研究用户,而可用性测试作为信息构建的重要组成部分,是一种研究用户的有效手段,通过规范的可用性测试过程,可了解用户行为并指导网站设计。作为可用性测试方法的一种,卡片分拣法可以探索用户对于网站信息如何分类,以此提高用户搜索成功率。  相似文献   

3.
Information technology (IT) engagement is defined as a need to spend more time using IT. Practice-based examples show that IT engagement can have adverse effects in organizations. Although users can potentially get more work done through IT engagement, observations show that the users might jeopardize their well-being and hamper their work performance. We aimed to investigate this complexity in the research on IT engagement by examining its potential antecedents and outcomes in organizations. Considering the potentially mixed outcomes, we developed a model to examine the effects of IT engagement on personal productivity and strain. We also aimed to explain the antecedents of IT engagement by drawing on the collective expectations for IT use. In particular, we examined the extent to which normative pressure on IT use drives users’ information load and IT engagement. Finally, we sought to understand whether users’ attempts to avert dependency on IT use reduced their IT engagement. Several hypotheses were developed and tested with survey data of 1091 organizational IT users. The findings help explain the role of normative pressure as a key driver of IT engagement and validate the positive and negative outcomes of IT engagement in organizations.  相似文献   

4.
Managing information about client requirements effectively can contribute to improve the quality of built facilities, and their related services. However, the process has been challenging to construction project management often resulting in failed projects. This necessitates an overwhelming need for a better approach. This paper presents a novel enterprise architecture framework for managing information about client requirements across all phases of a construction project and through-life of a built facility. The Integrated electronic Requirements Information Management Framework (eRIM) defines an information-centric, and process and service-oriented enterprise architecture approach to requirements management. It also describes how Information and Communication Technology (ICT)/Information Systems (IS) can support this information management. In developing the framework, findings from three case study projects were collated through observations, a questionnaire and interviews of construction practitioners. It is concluded that when implemented and incorporated in the management of construction projects, the eRIM architecture framework can potentially contribute towards improved and more efficient and effective management of client requirements across all stages of a project. Further work is outlined to operationalize the framework.  相似文献   

5.
试论科技查新服务与专题情报服务的整合   总被引:3,自引:0,他引:3  
李丹 《情报科学》2003,21(11):1204-1206,1216
本文详细阐述科技查新服务和专题情报服务各自的特点,对其进行了分析比较,并从二者有机结合的角度,探讨新时期情报信息服务的发展趋势。  相似文献   

6.
并行信息检索及其控制过程   总被引:1,自引:0,他引:1  
张敏  耿骞 《情报科学》2004,22(8):985-988,994
本文探讨了并行处理的有关问题。对于一些针对大型数据库进行的检索,检索的响应时间有时成为影响系统的可用性。针对并行检索的有关问题,本文讨论了并行检索的类型及相关的结构。重点对MIMD结构的算法和SIMD结构的算法进行了探讨。  相似文献   

7.
Information governance as an approach to better govern the use of information within and outside an organization is rapidly gaining popularity. A common and scientific ground for this approach has not yet been formulated. In this article the authors describe a definition for information governance, extending the common, one-dimensional approach into a more generic statement. Starting from the well-known principles of IT governance the authors further explore the aspects of both information and governance. Four hypotheses are proposed to give ground to the use of information governance. These hypotheses will be the basis for further research.  相似文献   

8.
A growing body of studies is developing approaches to evaluating human interaction with Web search engines, including the usability and effectiveness of Web search tools. This study explores a user-centered approach to the evaluation of the Web search engine Inquirus – a Web meta-search tool developed by researchers from the NEC Research Institute. The goal of the study reported in this paper was to develop a user-centered approach to the evaluation including: (1) effectiveness: based on the impact of users' interactions on their information problem and information seeking stage, and (2) usability: including screen layout and system capabilities for users. Twenty-two volunteers searched Inquirus on their own personal information topics. Data analyzed included: (1) user pre- and post-search questionnaires and (2) Inquirus search transaction logs. Key findings include: (1) Inquirus was rated highly by users on various usability measures, (2) all users experienced some level of shift/change in their information problem, information seeking, and personal knowledge due to their Inquirus interaction, (3) different users experienced different levels of change/shift, and (4) the search measure precision did not correlate with other user-based measures. Some users experienced major changes/shifts in various user-based variables, such as information problem or information seeking stage with a search of low precision and vice versa. Implications for the development of user-centered approaches to the evaluation of Web and information retrieval (IR) systems and further research are discussed.  相似文献   

9.
电子政务网站易用度定量评价与有效性证明模型实证研究   总被引:1,自引:0,他引:1  
公众操作易用性的直接定量测度是电子政务流程研究的一大难题,信息距离理论可以对一个事物信息状态转移所遇障碍进行测度,通过对网站流程信息距离的计算,可以评价网站服务的易用度,而数据包络把信息距离计算问题转化为网站易用度的投入-产出的问题,可以对电子政务网站流程的信息距离进行有效性证明.本文设计了电子政务网站易用性信息距离定量评价模型和数据包络有效性证明模型,并以电子税务网站中个人纳税信息的获取为例进行实证.  相似文献   

10.
一种新的信息系统--语义信息系统   总被引:1,自引:0,他引:1  
本文提出了一种新的信息系统——语义信息系统,分析它的产生背景、定义、结构和特点,并论述了它与传统的管理信息系统、决策支持系统、竞争情报系统、专家系统的区别。  相似文献   

11.
Mobile agent technology has been used in various applications including e-commerce, information processing, distributed network management, and database access. Information search and retrieval can be conducted by mobile agents in a decentralized system. As compared with the client/server model, the mobile agent approach has an advantage of saving network bandwidth and offering flexibility in information search and retrieval. In this paper, we present a model for mobile agents to select the most reputable information host to search and retrieve information. We use opinion-based belief structure to represent, aggregate and calculate the reputation of an information host. Since reputation is a multi-faced concept, our approach first allows the users to rank each information host's quality of service based on a set of evaluation categories. Then, a comprehensive, final reputation of the host is obtained by aggregating those specific category reputations. To recognize the subjective nature of a reputation, the transferable belief model is used to represent and rank the category reputation. Experiments are conducted using the Aglets technology to illustrate mobile agent migration.  相似文献   

12.
Information technology (IT) has transformed business practices in the last several decades: operations, product strategies, distribution, and customer service have become increasingly dependent on IT. Moreover, IT has changed its orientation from that of pure operational utility in the 1960s and 1970s to that of a competitive weapon in the 1990s and today. These phenomena have affected the way modern organizations are managed, as well as the way IT affects the strategic activities of an organization's value-chain.In particular, aligning an organization's business and IT strategies in order to deliver higher business performance presupposes a strategic business opportunity to which information systems technology is integral. In other words, Strategic Alignment between business and IT can have a positive business impact only if we see an organization's IT components as parts of a well-integrated organizational system. If business strategy is viewed separately from IT strategy or IT strategy is viewed only as a “support” tool, then there is little likelihood that the above positive impact of strategic alignment can take place.This research suggests, develops and tests a strategic co-alignment model by examining three types of integration that impact the planning process and the overall performance of information-intensive organizations: technological integration (TI), functional integration and strategic integration (SI).The results of this research yield some useful set of guidelines for theory building for IS, as well as for the business practice aspect of IS: most interesting is the role of consistency (co-alignment) between an organization's business and strategic information systems plans to improve overall firm performance. Other recommendations include having a high degree of involvement of IS executives in corporate planning, the use of outsourcing services to promote organizational systems integration, and the importance of internal coordination mechanisms to facilitate both systems consistency and lower transaction costs. Finally, this study has employed cluster analysis and discriminant analysis to interpret the research findings.  相似文献   

13.
Although information systems (IS) success has been given much attention in IS literature, failure has received lesser attention. This study empirically validates a model of digital service failure for consumers by integrating three dimensions from Tan’s failure model and one dimension from DeLone and Mclean’s Information Success model. The factors have been mapped to Expectation Disconfirmation Theory (EDT). Experiential survey approach has been used to collect primary data from information systems users who have experienced digital service failure. Structural equation modeling (SEM) has been used for model testing and validation to measure the impact of information, system, functional and service failure of digital service on end users. The findings suggests that information, functional, system and service failure has an impact on the consumers through the outcome, process, cost and user satisfaction of digital services.  相似文献   

14.
Supplier reliability and order fulfilment performance are usually assessed using a perfect-order calculation. Information management of perfect-order estimation is frequently reduced to expert estimates and to the multiplication of probabilities of failure-free performance of some logistics operations. Moreover, perfect-order estimation is calculated without consideration of supply chain structure, possible combinations of failures, and operational policies (e.g., safety stock levels and alternative transportation routes). As a result, the existing methods frequently provide different estimates for the same statistics and cannot be consistently used in the allocation of companies’ resources to improve the order fulfilment process. This paper considers different variants of probabilistic assessment of a perfect order and proposes an approach to assess the impact of changes in parameter probabilities and number of parameters on the value of a perfect order. The proposed models are based on an analytical approach using discrete distributions of random variables. We illustrate the applicability of our approach to several numerical examples to confirm the adequacy of the proposed method. Our approach can be immediately applied in practice to assess supply and order fulfilment process reliability and to evaluate the effectiveness of various operational policies (safety stock levels or modes of transportation) to achieve some planned values of a perfect order in the supply chain.  相似文献   

15.
16.
Information technology has dramatically increased online business opportunities; however these opportunities have also created serious risks in relation to information security. Previously, information security issues were studied in a technological context, but growing security needs have extended researchers' attention to explore the management role in information security management. Various studies have explored different management roles and activities, but none has given a comprehensive picture of these roles and activities to manage information security effectively. So it is necessary to accumulate knowledge about various managerial roles and activities from literature to enable managers to adopt these for a more holistic approach to information security management. In this paper, using a systematic literature review approach, we synthesised literature related to management's roles in information security to explore specific managerial activities to enhance information security management. We found that numerous activities of management, particularly development and execution of information security policy, awareness, compliance training, development of effective enterprise information architecture, IT infrastructure management, business and IT alignment and human resources management, had a significant impact on the quality of management of information security. Thus, this research makes a novel contribution by arguing that a more holistic approach to information security is needed and we suggest the ways in which managers can play an effective role in information security. This research also opens up many new avenues for further research in this area.  相似文献   

17.
Information architecture (IA) is an essential component of a website, and its design significantly impacts the user experience. Within complex, large-scale organizational settings, the practice of IA must address a number of critical management issues. This paper describes a pilot action research project whose aim was to develop and test a model for designing the IAs of complex institutional websites. The resulting model is based on the strategic use of news content organized in accordance with a faceted classification approach. The model was piloted during the redevelopment of the website of the Istituto Zooprofilattico Sperimentale delle Venezie (IZSVe), a large Italian healthcare and research organization. Based on the collected data, the proposed IA model was found to effectively manage the website and to greatly reduce the need for structural changes in the 12 months after the intervention. The model also permits the collection of web analytics data that can be useful for web content editors and organization managers. Further research will be needed to validate or improve the model.  相似文献   

18.
信息网关可以根据某些标准对网络信息进行筛选,允许通过合法的信息和阻止非法信息的通过。本文从信息网关的基本系统结构、工作流程等方面,阐述了信息网关的主要工作原理,并给出了一个基于本体的信息网关的设计思路。  相似文献   

19.
学校信息设备管理与使用有3个参与方:财务部门、信息设备管理部门和使用者,账务部门侧重于资产管理,使用者不参与管理,因此信息设备管理的主角是设备管理部门(通常是信息中心)。设备管理部门的工作包括设备需求规划、设备选型、设备采购、安装调试、日常使用、日常维护、故障维修、报废处理等环节。建立信息设备管理信息系统需要确定信息设备管理的基本流程、构建信息设备基本信息库、编制信息设备管理应用程序。在介绍学校信息设备管理内容的基础上,建立了信息设备管理基本流程,并构建了信息设备基本数据集,以期为建立信息设备管理信息系统提供基础。  相似文献   

20.
The study explores the relationship between value attribution and information source use of 17 Chinese business managers during their knowledge management (KM) strategic decision-making. During semi-structured interviews, the Chinese business managers, half in the telecommunications sector and half in the manufacturing sector, were asked to rate 16 information sources on five-point Likert Scales. The 16 information sources were grouped into internal–external and personal–impersonal types. The participants rated the information sources according to five value criteria: relevancy, comprehensiveness, reliability, time/effort, and accessibility. Open-ended questions were also asked to get at how and why value attribution affected the participants’ use of one information source over another during decision-making. Findings show that the participants preferred internal–personal type of information sources over external–impersonal information sources. The differences in value ratings per information source were striking: Telecommunications managers rated customers, newspapers/magazines, and conferences/trips much lower than the manufacturing managers but they rated corporate library/intranet and databases much higher than manufacturing managers. The type of industrial sector therefore highly influenced information source use for decision-making by the study’s Chinese business managers. Based on this conclusion, we added organizational and environmental categories to revise the De Alwis, Majid, and Chaudhry’s (2006) typology of factors affecting Chinese managers’ information source preferences during decision-making.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号