By Anna Sidorova, Nicholas Evangelopoulos, Russell Torres, Vess Johnson
The details structures (IS) self-discipline used to be based at the intersection of machine technology and organizational sciences, and produced a wealthy physique of study on themes starting from database layout and the strategic function of IT to web design and on-line shopper habit. during this e-book, the authors supply an advent to the self-discipline, its improvement, and the constitution of IS examine, at a degree that's acceptable for rising and present IS students. Guided by way of a bibliometric examine of all study articles released in 8 foremost IS learn journals over a 20-year interval, the authors establish and current the head fifty one IS learn issues. for every subject, they supply a quick assessment, time traits, and references to comparable influential examine works. the subjects are geared up into an IS learn framework that incorporates learn at the IT artifact and IS improvement, IT and firms, IT and participants, IT and markets, and IT for teamwork and collaboration.
Read Online or Download A Survey of Core Research in Information Systems PDF
Similar data processing books
Optimize high-scale facts via tuning and troubleshooting utilizing Cassandra assessment set up and arrange a multi datacenter Cassandra Troubleshoot and music Cassandra Covers CAP tradeoffs, physical/hardware boundaries, and is helping you realize the magic track your kernel, JVM, to maximise the functionality contains safety, tracking metrics, Hadoop configuration, and question tracing intimately Apache Cassandra is a vastly scalable open resource NoSQL database.
Bargains constructively with well-known software program difficulties. specializes in the unreliability of machine courses and provides cutting-edge ideas. Covers—software improvement, software program checking out, established programming, composite layout, language layout, proofs of software correctness, and mathematical reliability types.
Specialize in SAP enterprise analytics enterprise profits, key positive aspects, and implementation. The ebook contains instance implementations of SAP enterprise analytics, the demanding situations confronted, and the options applied. SAP enterprise Analytics explains either the tactic and technical implementation for accumulating and interpreting the entire details touching on a company.
Additional resources for A Survey of Core Research in Information Systems
Expert Systems: Expert systems are artificial intelligence systems which attempt to solve problems through processes which mimic the reasoning of human experts. Such systems are based on a set of rules, the knowledge base, which are used by the system to arrive at decisions. Expert systems have a long history of research by IS academics. Research streams related to expert systems include new development or expansion of expert system capabilities, knowledge extraction from human experts, and expert system use and guidance for practice.
Four innovation characteristics positively influence its adoption: relative advantage, compatibility, trialability, and observability. A fifth characteristic, complexity, has a negative impact on the rate of adoption. Building on the DOI model, Moore and Benbasat (1991) identified eight factors which affect the rate of IT adoption: relative advantage, compatibility, trialability, visibility, ease of use, result demonstrability, image, and voluntariness. A number of studies examined effects of additional IT-related factors on the IT adoption process.
Often implementation of IS security involves tradeoffs in terms of economic costs and benefits, business opportunities, and productivity. Companies must find a balance between minimizing security infrastructure expenses and providing the maximum amount of protection (Gupta et al. 2006). The value-at-risk approach focusses on estimating the level of risk and making security investment decisions matching the risk exposure and risk profile (Wang et al. 2008). Pursuing business opportunities may be associated with IS security risks, and companies must find a way to addresses such security risks while fully leveraging the new market opportunities.
A Survey of Core Research in Information Systems by Anna Sidorova, Nicholas Evangelopoulos, Russell Torres, Vess Johnson