Repository logo
 

2010, Volume XV, nº 2

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 6 of 6
  • Benefits management for an e-invoice process
    Publication . Almeida, José Carlos P.; Romão, Mário J. B.
    This paper presents the application of a Benefits Management (BM) Methodology to an e-lnvoice project, and analyzes the results brought forth by the application of the methodology to the project and its contribution towards a wider adoption in the targeted Organization. A Case Study research method has been used which began with a gathering and treatment of data related to the emission and reception of the invoices, continued with the identification of the type of investment and ended with the application of the chosen BM approach. The methodology demonstrated the financial viability of the project, identified and structured the resulting benefits and facilitated the understanding and preparation for the required transformations in the Organization, including processes, competencies/skills and technologies. The BM approach brings to the Organization a more wide and consolidated vision for the projects, a greater foresight and support for a rational decision on IS/IT investments and the strategic alignment of resources with the company objectives and priorities.
  • Assessing benefits and risks of online shopping in Spain and Scotland
    Publication . Santana, Susana; Loureiro, Sandra
    The use of the Internet for shopping is increasing worldwide. Therefore, it has become very important to understand how consumers perceive its benefits and risks. In this paper, we address perceived benefits and risks of online shopping in Spain and Scotland. Building upon previous work done by others, a three-factor scale of perceived benefits and a four-factor scale of perceived risks were estimated. Women tend to perceive the enjoyment and adventure of online shopping more and are also more concerned with risks than men. Frequency of online searching correlates with perceived benefits and risks but its impact is different in the two countries. It is urgent to research the roles of emotion, interpersonal relationships and social involvement in conducting purchases online- an effort that will certainly require new models of consumer behavior and methodologies beyond the traditional quantitative techniques.
  • Towards corporate data quality management
    Publication . Lucas, Ana
    Today, it is a well known fact that poor quality data is costing large amounts of money to corporations all over the world. Despite the increasing research on methods, concepts, and tools for data quality (DQ) assessment and improvement, little has been done about corporate DQ management. The purpose of this research is to understand the nature and complexity of corporate DQ management, through various perspectives. These include the various kind of sponsorship, type and level of collaboration between business and IS/IT, organizational position of the DQ management team, scope of the DQ initiatives, roles, services provided, DQ methodologies, techniques and tools in use, etc. This paper presents, analyzes and discusses a single pilot exploratory case study, undertaken in a fixed and mobile telecommunications company in a European Union Country. The purpose of this case study is to check the validity of some initial propositions, and eventually find new ones, to be used in a subsequent multiple-case study, in order to provide an in-depth understanding of the corporate DQ management phenomenon.
  • The missing link : theoretical reflections on decision reconstruction
    Publication . Antunes, Francisco; Costa, João Paulo
    In this paper, we address theoretical considerations on the problem of decision reconstruction, which is defined as the process that allows an individual or group of individuals, whether internal or external to the organization, to understand how a group, using a GSS, reached a previous decision. We also analyze the implications of decision reconstruction with regard to both group support systems (GSS) research and knowledge management We present an information model, whose constituting elements are not only concerned with GSS decision-making, but also towards GSS decision reconstruction. Using a GSS prototype based on the proposed model, we made a preliminary test in order to analyze how different people act when reconstructing decisions. In the process, we have exposed and detected limitations and present a solution proposal to overcome these limitations.
  • Outsourcing and offshore : an analysis of the academic literature
    Publication . Oliveira, Mírian; Hartung, Kaytson; Wendling, Marcelo
    Outsourcing and offshore are strategies adopted by businesses to manage their Information Sys­tems. There has been an increase in the volume of literature devoted to outsourcing and offshore during the past years. This paper provides a review of articles about outsourcing and offshore published in various journals. This list of journals was obtained by consulting the Journal Citation Report with an impact factor of over 3.0 in the last five years. This research was a survey with data collection from the following journals: Information & Management, Information Systems Journal, Information Systems Research, Journal of Information Technology, Journal of Management Information Systems and MIS Quarterly. The results obtained are: the majority of articles have two or three authors (83,9%); the majority of co-authors work in different universities (73,8%); the majority of the authors are associated with a USA-based uni­versity (54,5%). The result of this research assists in the identification of researchers and research gaps in this subject.
  • Injecting security into information systems development
    Publication . Lapke, Michael
    This paper will attempt to reconcile the apparent developmental duality (Baskerville, 1992) be­tween Information Systems (IS) development and IS security development IS Development and IS Security Development each have a substantial foundation of literature on their respective approaches and methodologies. Livari, Hirschheim and Klein (2001) provide a dynamic framework for classifying IS development approaches and methodologies. Besides providing a method for classification, this framework demonstrates the rich history behind IS Development. Baskerville (1993) likewise provides a valuable literature history for IS security development. We believe part of the cause of the security problems that continue to plague organizations (Dhillon, 2001) is ad hoc security implementation (Baskerville, 1993). This "security after the fact" can lead to an incompatibility between the system and the security of the system. Our argument is that a theoretically grounded and methodological approach is lacking for integrating security with Information Systems Development.