are The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel By Published On :: 2020-07-02 Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter. Full Article
are Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem By Published On :: 2021-07-27 Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. Full Article
are Software as a Service (SaaS) Cloud Computing: An Empirical Investigation on University Students’ Perception By Published On :: 2021-05-07 Aim/Purpose: This study aims to propose and empirically validate a model and investigates the factors influencing acceptance and use of Software as a Services cloud computing services (SaaS) from individuals’ perspectives utilizing an integrative model of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM) with modifications to suit the objective of the study. Background: Even though SaaS cloud computing services has gained the acceptance in its educational and technical aspects, it is still expanding constantly with emerging cloud technologies. Moreover, the individual as an end-user of this technology has not been given the ample attention pertaining to SaaS acceptance and adoption (AUSaaS). Additionally, the higher education sector needs to be probed regarding AUSaaS perception, not only from a managerial stance, but also the individual. Hence, further investigation in all aspects, including the human factor, deserves deeper inspection. Methodology: A quantitative approach with probability multi-stage sampling procedure conducted utilizing survey instrument distributed among students from three public Malaysian universities. The valid collected responses were 289 Bachelor’s degree students. The survey included the demographic part as well as the items to measure the constructs relationships hypothesized. Contribution: The empirical results disclosed the appropriateness of the integrated model in explaining the individual’s attitude (R2 = 57%), the behavior intention (R2 = 64%), and AUSaaS at the university settings (R2 = 50%). Also, the study offers valuable findings and examines new relationships that considered a theoretical contribution with proven empirical results. That is, the subjective norms effect on attitude and AUSaaS is adding empirical evidence of the model hypothesized. Knowing the significance of social effect is important in utilizing it to promote university products and SaaS applications – developed inside the university – through social media networks. Also, the direct effect of perceived usefulness on AUSaaS is another important theoretical contribution the SaaS service providers/higher education institutes should consider in promoting the usefulness of their products/services developed or offered to students/end-users. Additionally, the research contributes to the knowledge of the literature and is considered one of the leading studies on accepting SaaS services and applications as proliferation of studies focus on the general and broad concept of cloud computing. Furthermore, by integrating two theories (i.e., TPB and TAM), the study employed different factors in studying the perceptions towards the acceptance of SaaS services and applications: social factors (i.e., subjective norms), personal capabilities and capacities (i.e., perceived behavioral control), technological factors (i.e., perceived usefulness and perceived ease of use), and attitudinal factors. These factors are the strength of both theories and utilizing them is articulated to unveil the salient factors affecting the acceptance of SaaS services and applications. Findings: A statistically positive significant influence of the main TPB constructs with AUSaaS was revealed. Furthermore, subjective norms (SN) and perceived usefulness (PU) demonstrated prediction ability on AUSaaS. Also, SN proved a statically significant effect on attitude (ATT). Specifically, the main contributors of intention are PU, perceived ease of use, ATT, and perceived behavioral control. Also, the proposed framework is validated empirically and statistically. Recommendation for Researchers: The proposed model is highly recommended to be tested in different settings and cultures. Also, recruiting different respondents with different roles, occupations, and cultures would likely draw more insights of the results obtained in the current research and its generalizability Future Research: Participants from private universities or other educational institutes suggested in future work as the sample here focused only on public sector universities. The model included limited number of variables suggesting that it can be extended in future works with other constructs such as trialability, compatibility, security, risk, privacy, and self-efficacy. Comparison of different ethnic groups, ages, genders, or fields of study in future research would be invaluable to enhance the findings or reveal new insights. Replication of the study in different settings is encouraged. Full Article
are A Decision Support System and Warehouse Operations Design for Pricing Products and Minimizing Product Returns in a Food Plant By Published On :: 2021-01-28 Aim/Purpose: The first goal is to develop a decision support system for pricing and production amounts for a firm facing high levels of product returns. The second goal is to improve the management of the product returns process. Background: This study was conducted at a food importer and manufacturer in Israel facing a very high rate of product returns, much of which is eventually discarded. The firm’s products are commonly considered to be a low-cost generic alternative and are therefore popular among low-income families. Methodology: A decision support module was added to the plant’s business information system. The module is based on a supply chain pricing model and uses the sales data to infer future demand’s distribution. Ergonomic models were used to improve the design of the returns warehouse and the handling of the returns. Contribution: The decision support system allows to improve the plant’s pricing and quantity planning. Consequently, it reduced the size of product returns. The new design of the returns process is expected to improve worker’s productivity, reduces losses and results in safer outcomes. This study also demonstrates a successful integration and of a theoretical economical model into an information system. Findings: The results show the promise of incorporating pricing supply chain models into informing systems to achieve a practical business task. We were able to construct actual demand distributions from the data and offer actual pricing recommendations that reduce the number of returns while increasing potential profits. We were able to identify key deficiencies in the returns operations and added a module to the decisions support system that improves the returns management and links it with the sales and pricing modules. Finally, we produced a better warehouse design that supports efficient and ergonomic product returns handling. Recommendations for Practitioners: This work can be replicated for different suppliers, manufacturers and retailers that suffer from product returns. They will benefit from the reduction in returns, as well as the decrease in the losses associated with these returns. Recommendation for Researchers: It is worthwhile to research whether decision support systems can be applied to other aspects of the organizations’ operations. Impact on Society: Product returns is a lose-lose situation for producers, retailers and customers. Moreover, mismanagement of these returns is harmful for the environment and may result in the case of foods, in health hazards. Reducing returns and improving the handling improves sustainability and is beneficial for society. Future Research: The decision support system’s underlying pricing model assumes a specific business setting. This can be extended using other pricing models and applying them in a similar fashion to the current application. Full Article
are Predicting Software Change-Proneness From Software Evolution Using Machine Learning Methods By Published On :: 2023-10-08 Aim/Purpose: To predict the change-proneness of software from the continuous evolution using machine learning methods. To identify when software changes become statistically significant and how metrics change. Background: Software evolution is the most time-consuming activity after a software release. Understanding evolution patterns aids in understanding post-release software activities. Many methodologies have been proposed to comprehend software evolution and growth. As a result, change prediction is critical for future software maintenance. Methodology: I propose using machine learning methods to predict change-prone classes. Classes that are expected to change in future releases were defined as change-prone. The previous release was only considered by the researchers to define change-proneness. In this study, I use the evolution of software to redefine change-proneness. Many snapshots of software were studied to determine when changes became statistically significant, and snapshots were taken biweekly. The research was validated by looking at the evolution of five large open-source systems. Contribution: In this study, I use the evolution of software to redefine change-proneness. The research was validated by looking at the evolution of five large open-source systems. Findings: Software metrics can measure the significance of evolution in software. In addition, metric values change within different periods and the significance of change should be considered for each metric separately. For five classifiers, change-proneness prediction models were trained on one snapshot and tested on the next. In most snapshots, the prediction performance was excellent. For example, for Eclipse, the F-measure values were between 80 and 94. For other systems, the F-measure values were higher than 75 for most snapshots. Recommendations for Practitioners: Software change happens frequently in the evolution of software; however, the significance of change happens over a considerable length of time and this time should be considered when evaluating the quality of software. Recommendation for Researchers: Researchers should consider the significance of change when studying software evolution. Software changes should be taken from different perspectives besides the size or length of the code. Impact on Society: Software quality management is affected by the continuous evolution of projects. Knowing the appropriate time for software maintenance reduces the costs and impacts of software changes. Future Research: Studying the significance of software evolution for software refactoring helps improve the internal quality of software code. Full Article
are How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia By Published On :: 2023-09-07 Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors. Full Article
are Agile Practices and Their Impact on Agile Maturity Level of Software Companies in Nepal By Published On :: 2023-03-16 Aim/Purpose: Using the Agile Adoption Framework (AAF), this study aims to examine the agile potential of software development companies in Nepal based on their agile maturity level. In addition, this study also examines the impact of various basic agile practices in determining the maturity level of the agile processes being implemented in the software industry of Nepal. Background: Even if most organizations in the software sector utilize agile development strategies, it is essential to evaluate their performance. Nepal’s software industry did not adopt agile techniques till 2014. The Nepalese industry must always adapt to new developments and discover ways to make software development more efficient and beneficial. The population of the study consists of 1,500 and 2,000 employees of software companies in Nepal implementing agile techniques. Methodology: The sample size considered was 150 employees working in software companies in Nepal. However, only 106 respondents responded after three follow-ups. The sample was collected with purposive sampling. A questionnaire was developed to gain information on Customer Adaptive, Customer Collaboration, Continuous Delivery, Human Centric, and Technical Excellence related to agile practices along with the Agile Maturity Level. Contribution: This research contributes to the understanding of agile practices adopted in software companies in developing countries like Nepal. It also reveals the determinants of the agility of software companies in developing countries. Findings: The results suggest that some of the basic principles of agile have a very significant role in Agile Maturity Level in the Nepali context. In the context of Nepal, human-centered practices have a very high level of correlation, which plays a vital role as a major predictor of the agile maturity level. In addition, Technical Excellence is the variable that has the highest level of association with the Agile Maturity Level, making it the most significant predictor of this quality. Recommendations for Practitioners: As Nepali software companies are mostly offshore or serve outsourcing companies, there is a very thin probability of Nepali developers being able to interact with actual clients and this might be one of the reasons for the Nepali industry not relying on Customer Adaptation and Collaboration as major factors of the Agile methodologies. Continuous Delivery, on the other hand, has a significant degree of correlation with Agile Maturity Level. Human-centric practices have a very high level of correlation as well as being a major predictor in determining the Agile Maturity Level in the context of Nepal. Technical Excellence is the most significant predictor and the variable which has the highest level of correlation with Agile Maturity Level. Practitioners should mainly focus on technical excellence as well as human-centric practices to achieve a higher level of Agile Maturity. Recommendation for Researchers: There has not been any such research in the Nepali context that anyone could rely on, to deep dive into their organizational concerns regarding agile strategies and plans. Researchers will need to focus on a more statistical approach with data-driven solutions to the issues related to people and processes. Researchers will need to cover freelancers as well as academics to get a different perspective on what can be the better practices to achieve a higher level of agile maturity. Impact on Society: This study on Agile work is accessible not only to the software industry but also to the general public. The Agile technique has had a huge impact on society’s project management. It has revolutionized how teams approach project planning, development, and execution. The paper’s findings will further information regarding the Agile methodology, which emphasizes collaboration and communication, fosters teamwork and higher quality work, and promotes the exchange of knowledge, ideas, and the pursuit of common goals. Future Research: Owing to the limitations of this study, it is necessary to analyze agile practices in the Nepalese software sector using additional factors that influence agile maturity. The conclusion that years of agile experience do not serve as a balancing factor for both agile practices and the Agile Maturity Level requires additional research. Whether a software outsourcing firm or not, the organization type had no bearing on the degree of maturity of agile methods; this leaves space for further research. Full Article
are Factors Influencing Adoption of Blockchain Technology in Jordan: The Perspective of Health Care Professionals By Published On :: 2024-05-16 Aim/Purpose: This paper investigates the user acceptability of blockchain technology in the healthcare sector, with a specific focus on healthcare professionals in Jordan. Background: The study seeks to identify the factors that affect healthcare professionals’ use and acceptance of blockchain technology in Jordan. Methodology: The study’s research framework integrates factors from the Technology Acceptance Model (TAM) and the Unified Theory of Acceptance and Use of Technology (UTAUT). A questionnaire was distributed to collect data from 372 healthcare professionals in Jordan, and the results were analyzed using structural equation modeling based on the Partial Least Square (PLS) technique. Contribution: While only a few previous studies have explored blockchain technology acceptance in the healthcare sector using either the TAM or the UTAUT, this study uniquely integrates elements from both models, offering a novel approach that provides a comprehensive understanding of the factors that influence the acceptance of blockchain technology among healthcare professionals in Jordan. The findings can assist decision-makers in developing strategies to enhance the adoption rate of blockchain technology in the Jordanian healthcare sector. Findings: The study revealed that usability, convenience, privacy and security, cost, and trust significantly impact the perceived usefulness of blockchain technology. The findings also suggest that healthcare professionals are more likely to have a positive attitude towards blockchain-based healthcare systems if they perceive them as useful and easy to use. Attitude, social influence, and facilitating conditions were found to significantly impact behavioral intention to use. Recommendations for Practitioners: Stakeholders should focus on developing blockchain-based healthcare systems that are easy to use, convenient, efficient, and effort-free. Recommendation for Researchers: Researchers may compare the acceptance of blockchain technology in the healthcare sector with other industries to identify industry-specific factors that may influence adoption. This comparative analysis can contribute to a broader understanding of technology acceptance. Impact on Society: Successful adoption of blockchain technology in the healthcare sector can lead to improved efficiency, enhanced protection of healthcare data, and reduced administrative burdens. This, in turn, can positively impact patient care and lead to cost savings, which contributes to more sustainable and accessible healthcare services. Future Research: Future research may explore integrating blockchain technology with other emerging technologies, such as artificial intelligence and sidechain, to create more comprehensive and innovative healthcare solutions. Full Article
are Reading in A Digital Age: e-Books Are Students Ready For This Learning Object? By Published On :: Full Article
are BILDU: Compile, Unify, Wrap, and Share Digital Learning Resources By Published On :: Full Article
are Experiences and Opinions of E-learners: What Works, What are the Challenges, and What Competencies Ensure Successful Online Learning By Published On :: Full Article
are Teaching and Learning with Clickers: Are Clickers Good for Students? By Published On :: Full Article
are An Approach toward a Software Factory for the Development of Educational Materials under the Paradigm of WBE By Published On :: Full Article
are What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability? By Published On :: Full Article
are Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language By Published On :: 2015-09-10 In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8) and security (derived from CERT Secure Coding Standards). We use a multi-view, data-driven approach, by (a) using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b) building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751). Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels). The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed. Full Article
are Communicating and Sharing in the Semantic Web: An Examination of Social Media Risks, Consequences, and Attitudinal Awareness By Published On :: 2015-05-22 Empowered by and tethered to ubiquitous technologies, the current generation of youth yearns for opportunities to engage in self-expression and information sharing online with personal disclosure no longer governed by concepts of propriety and privacy. This raises issues about the unsafe online activities of teens and young adults. The following paper presents the findings of a study examining the social networking activities of undergraduate students and also highlights a program to increase awareness of the dangers and safe practices when using and communicating, via social media. According to the survey results, young adults practice risky social networking site (SNS) behaviors with most having experienced at least one negative consequence. Further, females were more likely than males to engage in oversharing as well as to have experienced negative consequences. Finally, results of a post-treatment survey found that a targeted program that includes flyers, posters, YouTube videos, handouts, and in-class information sessions conducted at a Mid-Atlantic Historically Black College or University (HBCU) increased student awareness of the dangers of social media as well as positively influenced students to practice more prudent online behaviors. Full Article
are The Characteristics of Successful MOOCs in the Fields of Software, Science, and Management, According to Students’ Perception By Published On :: 2016-12-26 The characteristics of successful MOOCs were explored in this study. Thousands of student reviews regarding five xMOOCs (Massive Open Online Course) in the fields of software, science, and management were extracted from the Coursetalk website and analyzed by quantitative and qualitative methods using the Garrison, Anderson, and Archer (2000) Community of Inquiry (CoI) model. The 14 characteristics found to contribute to the success of MOOCs (e.g., teacher, atmosphere, exercise) were partitioned into the teaching, social, and cognitive presence elements. In addition, cluster analysis revealed five types of learners, based on the characteristics they mentioned for course success: atmosphere, exercise, teacher, exam, and unspecified. This divides learners into groups that may prefer social, cognitive, or teaching presence. The findings of this study negate the perception that xMOOCs mostly contain teaching presence elements. This research contributes to the understanding of characteristics that contribute to successful MOOCs and sheds light on the students, too. Listening to the voices of the students and the types of characteristics that they chose to mention, enables further exploration of their preferences and expectations regarding MOOCs and, accordingly, to future adaptation between students’ preferences and MOOC characteristics. Full Article
are Undergraduate Haredi Students Studying Computer Science: Is Their Prior Education Merely a Barrier? By Published On :: 2017-12-25 Aim/Purpose: Our research focuses on a unique group a students, who study CS: ultra-orthodox Jewish men. Their previous education is based mostly on studying Talmud and hence they lacked a conventional high-school education. Our research goal was to examine whether their prior education is merely a barrier to their CS studies or whether it can be recruited to leverage academic learning. Background: This work is in line with the growing interest in extending the diversity of students studying computer science (CS). Methodology: We employed a mixed-methods approach. We compared the scores in CS courses of two groups of students who started their studies in the same college in 2015: 58 ultraorthodox men and 139 men with a conventional background of Israeli K-12 schooling. We also traced the solution processes of ultraorthodox men in tasks involving Logic, in which their group scored significantly better than the other group. Contribution: The main contribution of this work lies in challenging the idea that the knowledge of unique cultures is merely a barrier and in illustrating the importance of further mapping such knowledge. Findings: The ultraorthodox group’s grades in the courses never fell below the grades of the other group for the duration of the five semesters. Due to their intensive Talmud studies (which embeds Logic), we hypothesized they would have leverage in subjects relating to Logic; however this hypothesis was refuted. Nevertheless, we found that the ultraorthodox students tended to recruit conceptual knowledge rather than merely recalling a procedure to solve the task, as novices often do. Recommendations for Practitioners: We concluded that these students’ unique knowledge should not be viewed merely as a barrier. Rather, it can and should be considered in terms of what and how it can anchor and leverage learning; this could facilitate the education of this unique population. Impact on Society: This conclusion has an important implication, given the growing interest in diversifying higher education and CS in particular, to include representatives of groups in society that come from different, unique cultures. Future Research: Students’ unique previous knowledge can and should be mapped, not only to foresee weaknesses that are an outcome of “fragile knowledge” , but also in terms of possible strengths, knowledge, values, and practices that can be used to anchor and expand the new knowledge. Full Article
are Work-Based Learning and Research for Mid-Career Professionals: Two Project Examples from Australia By Published On :: 2018-02-17 Aim/Purpose: Most research on work-based learning and research relates to theory, including perspectives, principles and curricula, but few studies provide contemporary examples of work-based projects, particularly in the Australian context; this paper aims to address that limitation. Background: The Professional Studies Program at University of Southern Queensland is dedicated to offering advanced practice professionals the opportunity to self-direct organizational and work-based research projects to solve real-world workplace problems; two such examples in the Australian context are provided by this paper. Methodology: The paper employs a descriptive approach to analyzing these two work-based research projects and describes the mixed methods used by each researcher. Contribution: The paper provides examples of work-based research in (a) health, safety, and wellness leadership and its relation to corporate performance; and (b) investigator identity in the Australian Public Service; neither topic has been examined before in Australia and little, if anything, is empirically known about these topics internationally. Findings: The paper presents the expected outcomes for each project, including discussion of the ‘triple dividend’ of personal, organizational, and practice domain benefits; as importantly, the paper presents statements of workplace problems, needs and opportunities, status of the practice domain, background and prior learning of the researchers, learning objectives, work-based research in the practice domain, and lessons learned from research which can be integrated into a structured framework of advanced practice. Recommendations for Practitioners: This is a preliminary study of two work-based research projects in Australia; as these and other real-world projects are completed, further systematic and rigorous reports to the international educational community will reveal the granulated value of conducting projects designed to change organisations and concordant practice domains. Recommendation for Researchers: While introducing the basic elements of research methods and expected out-comes of work-based projects, examples in this paper give only a glimpse into the possible longer-term contributions such research can make to workplaces in Australia. Researchers, as a consequence, need to better understand the relationship between practice domains, research as a valuable investigative tool in workplaces, and organizational and social outcomes. Impact on Society: Work-based learning and research have been developed to not only meet the complex and changing demands of the global workforce but have been implemented to address real-world organizational problems for the benefit of society; this paper provides two examples where such benefit may occur. Future Research: Future research should focus on the investigation of triple-dividend outcomes and whether they are sustainable over the longer term. Full Article
are Work-Based Learning and Research for Mid-Career Professionals: Professional Studies in Australia By Published On :: 2018-02-17 Aim/Purpose: Work-based learning has been identified in the literature, and is established in academia and in the global worlds of work; however, an examination of work-based research, particularly at the doctoral level, has been less well articulated. Moreover, a paucity of published literature on either work-based research or Professional Studies means little is known about the dynamics and drivers of these domains. This study aims to begin addressing the shortfall in literature on work-based research and Professional Studies programs, using the program at University of Southern Queensland as an example Background: This paper examines work-based research in the context of the Professional Studies program at University of Southern Queensland in Australia, with which the authors are affiliated. Methodology: Analysis of work-based research includes discussion of ‘messy’ research environments and the changing nature of workplaces, along with the opportunities and challenges such environments pose for action researchers. Contribution: In addition to addressing a shortfall in the published literature on work-based research, the paper also contributes insight into the mechanisms used to promote reflective practice and the generation of professional artefacts. Findings: Often driven by altruism, work-based research as implemented in the Professional Studies program results in a so-called ‘triple dividend’, designed to benefit the individual researcher, work environment, and community of practice. Recommendations for Practitioners: To be successful contributors to work-based research, practitioners need to reflect carefully and deeply on experience, planning and outcomes, using what in this paper we call ‘micro-reflective’ (personal) and ‘macro-reflective’ (program) cycles of reflection. Recommendation for Researchers: In addition to generating new knowledge and expanding the frontiers of workplaces, work-based research is often motivated by complicated and wide-reaching imperatives; work-based researchers therefore need to consider the goals, objectives, priorities and vision of their work environments, as well as understand issues related to bias, ethical practice and the nature of insider research. Impact on Society: Work-based learning and research address the complexities, challenges and future demands of Australian workplaces along with the work, mobility and personal development needs of mid- to senior-career professionals. Future Research: In addition to the multitude of action research programs possible in work-places in Australia, more research is needed to understand higher education work-based learning and its relation to, and impact on, work-based research, particularly when applying mixed methods research to work environments. Full Article
are How Good Are Students at Assessing the Quality of Their Applications? By Published On :: Full Article
are Salvaging Information Engineering Techniques in the Data Warehouse Environment By Published On :: Full Article
are Operationalizing Context in Context-Aware Artifacts: Benefits and Pitfalls By Published On :: Full Article
are Young Women’s Misinformation Concerning IT Careers: Exchanging One Negative Image for Another By Published On :: Full Article
are A Model for Mandatory Use of Software Technologies: An Integrative Approach by Applying Multiple Levels of Abstraction of Informing Science By Published On :: Full Article
are Are We Really Having an Impact? A Comprehensive Approach to Assessing Improvements in Critical Thinking in an MBA Program By Published On :: Full Article
are Culture, Complexity, and Informing: How Shared Beliefs Can Enhance Our Search for Fitness By Published On :: Full Article
are Social Networks in which Users are not Small Circles By Published On :: 2015-06-16 Understanding of social network structure and user behavior has important implications for site design, applications (e.g., ad placement policies), accurate modeling for social studies, and design of next-generation infrastructure and content distribution systems. Currently, characterizations of social networks have been dominated by topological studies in which graph representations are analyzed in terms of connectivity using techniques such as degree distribution, diameter, average degree, clustering coefficient, average path length, and cycles. The problem is that these parameters are not completely satisfactory in the sense that they cannot account for individual events and have only limited use, since one can produce a set of synthetic graphs that have the exact same metrics or statistics but exhibit fundamentally different connectivity structures. In such an approach, a node drawn as a small circle represents an individual. A small circle reflects a black box model in which the interior of the node is blocked from view. This paper focuses on the node level by considering the structural interiority of a node to provide a more fine-grained understanding of social networks. Node interiors are modeled by use of six generic stages: creation, release, transfer, arrival, acceptance, and processing of the artifacts that flow among and within nodes. The resulting description portrays nodes as comprising mostly creators (e.g., of data), receivers/senders (e.g., bus boys), and processors (re-formatters). Two sample online social networks are analyzed according to these features of nodes. This examination points to the viability of the representational method for characterization of social networks. Full Article
are Information Gatekeepers – Aren't We All? By Published On :: 2015-08-02 In today’s knowledge environment, individuals and groups who gather relevant information about the organization’s external environment and distribute that information for use by their colleagues receive increasing attention and are viewed with great importance. These individuals have been named Information Gatekeepers. Thus far, researchers have not established a unanimous and interdisciplinary definition regarding the human information gatekeeper. Nonetheless, a recurrent theme in previous papers regards gatekeepers as a select few throughout the organization. This approach creates two kinds of employees based on a specific set of criteria – those who are gatekeepers and those who are not. The main goal of this research is to examine whether gate keeping is an individual attribute that exists or does not exist within the organization, or whether gate keeping is a continuous attribute that exists within every member and throughout the organization in varying intensity subject to differences in personal characteristics and other factors. We find that evidence to the existence of latter approach is significant and suggest practical recommendations that arise from these findings. Full Article
are KnoWare: A System for Citizen-based Environmental Monitoring By Published On :: 2016-05-30 Non-expert scientists are frequently involved in research requiring data acquisition over large geographic areas. Despite mutual benefits for such “citizen science”, barriers also exist, including 1) difficulty maintaining user engagement with timely feedback, and 2) the challenge of providing non-experts with the means to generate reliable data. We have developed a system that addresses these barriers. Our technologies, KnoWare and InSpector, allow users to: collect reliable scientific measurements, map geo-tagged data, and intuitively visualize the results in real-time. KnoWare comprises a web portal and an iOS app with two core functions. First, users can generate scientific ‘queries’ that entail a call for information posed to a crowd with customized options for participant responses and viewing data. Second, users can respond to queries with their GPS-enabled mobile device, which results in their geo- and time-stamped responses populating a web-accessible map in real time. KnoWare can also interface with additional applications to diversify the types of data that can be reported. We demonstrate this capability with a second iOS app called InSpector that performs quantitative water quality measurements. When used in combina-tion, these technologies create a workflow to facilitate the collection, sharing and interpretation of scientific data by non-expert scientists. Full Article
are Organizing Information Obtained From Literature Reviews – A Framework for Information System Area Researchers By Published On :: 2022-01-12 Aim/Purpose: A literature review is often criticized for the absence of coherent construction, synthesis of topics, and well-reasoned analysis. A framework is needed for novice researchers to organize and present information obtained from the literature review. Background: Information and communication technologies advancement have yielded overwhelming information. The massive availability of information poses several challenges, including storage, processing, meaningful organization, and presentation for future consumption. Information System Researchers have developed frameworks, guidelines, and tools for gathering, filtering, processing, storing, and organizing information. Interestingly, information system researchers have vast information that needs meaningful organization and presentation to the research fraternity while conducting a literature review on a research topic. Methodology: This paper describes a framework called LACTiC (Location, Author, Continuum, Time, and Category) that we adapted from another framework called LATCH (Location, Alphabetical, Time, Category, and Hierarchy). LATCH was used to organize and present information on e-commerce websites for seamless navigation. We evaluated the LACTiC framework. Contribution: Information System Researchers can use the LACTiC framework to organize information obtained from literature review. Findings: The evaluation reveals that most researchers from information systems organize information obtained from the literature review category-wise, followed by continuum, author, time, and location. Recommendation for Researchers: Overall, the framework works well and can be helpful for researchers for an initial idea for organizing information obtained from the literature review. Future Research: To conceptualize the framework, the study was carried out using Information Systems related literature. To generalize the proposed framework, we may suggest that the study can be extended to other areas of business management, such as marketing, finance, operation, decision sciences, accounting, and economics. Full Article
are Transdisciplinary Issues of the United States Healthcare Delivery System By Published On :: 2024-09-20 Aim/Purpose: This paper applies informing science principles to analyze the evolution of United States (U.S.) healthcare delivery, exploring how policy shifts, technological advancements, and changing practices have transformed informing processes within this complex system. By examining healthcare delivery through a transdisciplinary lens, we aim to enhance the understanding of intricate informing environments and their dynamics. Background: The U.S. healthcare system epitomizes a complex, evolving transdisciplinary domain intersecting information systems, policy, economics, and public health. Recent transformations in stakeholder information flow necessitate an informing science perspective to comprehend these changes fully. Methodology: We synthesize literature on U.S. healthcare delivery changes, employing informing science frameworks such as Cohen’s “informing environment” concept to analyze the evolution of healthcare informing processes. Contribution: This study expands informing science theory by examining how changes in a complex transdisciplinary system impact information flow, decision-making, and stakeholder interactions. The results provide insights into challenges and opportunities within evolving informing environments. Findings: Our analysis reveals significant alterations in the U.S. healthcare informing landscape due to policy, regulatory, and technological changes. We identify key transformations in client-sender-delivery system relationships, shifts in information asymmetry, and the emergence of novel informing channels and barriers. Recommendation for Researchers: Future studies should develop informing science models capable of capturing the complexity and dynamism of healthcare delivery systems, particularly amidst rapid technological and policy changes. Future Research: Further investigation is needed into how emerging technologies reshape healthcare informing processes and their impact on care quality, accessibility, and cost-effectiveness. Full Article
are Critical Review of Stack Ensemble Classifier for the Prediction of Young Adults’ Voting Patterns Based on Parents’ Political Affiliations By Published On :: 2024-03-02 Aim/Purpose: This review paper aims to unveil some underlying machine-learning classification algorithms used for political election predictions and how stack ensembles have been explored. Additionally, it examines the types of datasets available to researchers and presents the results they have achieved. Background: Predicting the outcomes of presidential elections has always been a significant aspect of political systems in numerous countries. Analysts and researchers examining political elections rely on existing datasets from various sources, including tweets, Facebook posts, and so forth to forecast future elections. However, these data sources often struggle to establish a direct correlation between voters and their voting patterns, primarily due to the manual nature of the voting process. Numerous factors influence election outcomes, including ethnicity, voter incentives, and campaign messages. The voting patterns of successors in regions of countries remain uncertain, and the reasons behind such patterns remain ambiguous. Methodology: The study examined a collection of articles obtained from Google Scholar, through search, focusing on the use of ensemble classifiers and machine learning classifiers and their application in predicting political elections through machine learning algorithms. Some specific keywords for the search include “ensemble classifier,” “political election prediction,” and “machine learning”, “stack ensemble”. Contribution: The study provides a broad and deep review of political election predictions through the use of machine learning algorithms and summarizes the major source of the dataset in the said analysis. Findings: Single classifiers have featured greatly in political election predictions, though ensemble classifiers have been used and have proven potent use in the said field is rather low. Recommendation for Researchers: The efficacy of stack classification algorithms can play a significant role in machine learning classification when modelled tactfully and is efficient in handling labelled datasets. however, runtime becomes a hindrance when the dataset grows larger with the increased number of base classifiers forming the stack. Future Research: There is the need to ensure a more comprehensive analysis, alternative data sources rather than depending largely on tweets, and explore ensemble machine learning classifiers in predicting political elections. Also, ensemble classification algorithms have indeed demonstrated superior performance when carefully chosen and combined. Full Article
are Measuring Mental Workload of Software Developers Based on Nasal Skin Temperature By search.ieice.org Published On :: Keitaro NAKASAI,Shin KOMEDA,Masateru TSUNODA,Masayuki KASHIMA, Vol.E107-D, No.11, pp.1444-1448To automatically measure the mental workload of developers, existing studies have used biometric measures such as brain waves and the heart rate. However, developers are often required to equip certain devices when measuring them, and can therefore be physically burdened. In this study, we evaluated the feasibility of non-contact biometric measures based on the nasal skin temperature (NST). In the experiment, the proposed biometric measures were more accurate than non-biometric measures. Publication Date: 2024/11/01 Full Article
are Advancements in the DRG system payment: an optimal volume/procedure mix model for the optimisation of the reimbursement in Italian healthcare organisations By www.inderscience.com Published On :: 2024-08-06T23:20:50-05:00 In Italy, the reimbursement provided to healthcare organisations for medical and surgical procedures is based on the diagnosis related group weight (DRGW), which is an increasing function of the complexity of the procedures. This makes the reimbursement an upper unlimited function. This model does not include the relation of the volume with the complexity. The paper proposes a mathematical model for the optimisation of the reimbursement by determining the optimal mix of volume/procedure, considering the relation volume/complexity and DRGW/complexity. The decreasing, linear, and increasing returns to scale have been defined, and the optimal solution found. The comparison of the model with the traditional approach shows that the proposed model helps the healthcare system to discern the quantity of the reimbursement to provide to health organisations, while the traditional approach, neglecting the relation between the volume and the complexity, can result in an overestimation of the reimbursement. Full Article
are Healthcare industry input parameters for a deterministic model that optimally locates additive manufacturing hubs By www.inderscience.com Published On :: 2024-08-06T23:20:50-05:00 Recent innovations in additive manufacturing (AM) have proven its efficacy for not only the manufacturing industry but also the healthcare industry. Researchers from Cal Poly, San Luis Obispo, and California State University Long Beach are developing a model that will determine the optimal locations for additive manufacturing hubs that can effectively serve both the manufacturing and healthcare industries. This paper will focus on providing an overview of the healthcare industry's unique needs for an AM hub and summarise the specific inputs for the model. The methods used to gather information include extensive literature research on current practices of AM models in healthcare and an inclusive survey of healthcare practitioners. This includes findings on AM's use for surgical planning and training models, the workflow to generate them, sourcing methods, and the AM techniques and materials used. This paper seeks to utilise the information gathered through literature research and surveys to provide guidance for the initial development of an AM hub location model that locates optimal service locations. Full Article
are International Journal of Healthcare Technology and Management By www.inderscience.com Published On :: Full Article
are Why are Abusive Supervisors Abusive? A Dual-System Self-Control Model By amj.aom.org Published On :: Thu, 14 May 2015 16:10:52 +0000 Building on prior work showing that abusive supervision is a reaction to subordinates' poor performance, we develop a self-control framework to outline when and why supervisors abuse poor performing subordinates. In particular, we argue poor performing subordinates instill in supervisors a sense of hostility towards the subordinate, which in turn leads to engaging in abusive supervision. Within this self-control framework, poor performance is more likely to lead to abusive supervision when (a) the magnitude of the hostility experienced is higher (e.g., for those with a hostile attribution bias), or (b) the translation of hostility into abusive supervision is unconstrained (e.g., for those who are low in trait mindfulness). In two experimental studies with full-time supervisors where we manipulated the independent variable (Study 1) and the mediator (Study 2), and in a multi-wave and multi-source field study with data collected from supervisor-subordinate teams (50 supervisors and 206 subordinates) at two time points (Study 3), we found overall support for our predictions. Implications for how to reduce the occurrence of abusive supervision in the workplace are discussed. Full Article
are Financial Regulation and Social Welfare: The Critical Contribution of Management Theory By amr.aom.org Published On :: Wed, 27 May 2015 19:06:18 +0000 While many studies explain how social science theories shape social reality, few reflect critically on how such theories should shape social reality. Drawing on a new conception of social welfare and focusing on financial regulation, we assess the performative effects of theories on public policy. We delineate how research that focuses narrowly on questions of efficiency and stability reinforces today's technocratic financial regulation that undermines social welfare. As a remedy, we outline how future management research can tackle questions of social justice and thereby promote an inclusive approach to financial regulation that better serves social welfare. Full Article
are STAKEHOLDER RELATIONSHIPS AND SOCIAL WELFARE: A BEHAVIORAL THEORY OF CONTRIBUTIONS TO JOINT VALUE CREATION By amr.aom.org Published On :: Mon, 01 Jun 2015 15:38:05 +0000 Firms play a crucial role in furthering social welfare through their ability to foster stakeholders' contributions to joint value creation, i.e., value creation that involves a public-good dilemma due to high task and outcome interdependence - leading to what economists have labeled the 'team production problem'. We build on relational models theory to examine how individual stakeholders' contributions to joint value creation are shaped by stakeholders' mental representations of their relationships with the other participants in value creation, and how these mental representations are affected by the perceived behavior of the firm. Stakeholder theory typically contrasts a broadly-defined 'relational' approach to stakeholder management with a 'transactional' approach based on the price mechanism - and has argued that the former is more likely to contribute to social welfare than the latter. Our theory supports this prediction for joint value creation, but also implies that the dichotomy on which it is based is too coarse-grained: there are three distinct ways to trigger higher contributions to joint value creation than through a 'transactional' approach. Our theory also helps explain the tendency for firms and their stakeholders to converge on 'transactional' relationships, despite their relative inefficiency in the context of joint value creation. Full Article
are The Transition from the Soviet Higher Education System to the European Higher Education Area: The Case of Estonia By amle.aom.org Published On :: Tue, 16 Jun 2015 22:47:52 +0000 The interview questions deal with the means by which Estonia and other republics of the former Soviet Union managed to transform their educational systems and the impact of the Soviet heritage on this transformation. An interview was conducted with Professor Olav Aarna. In 1991 Professor Olav Aarna became the rector of TUT. From 2000 to 2003 he held the position of rector of the first private university in Estonia - Estonian Business School (EBS). From 2003 to 2007 Olav Aarna was member of the Estonian Parliament, serving also as Chairman of the Committee for Cultural Affairs responsible for education, research, culture and sports affairs. From 1998-2000 he was Vice Chairman of Estonian National Council for Research and Development. His experience in the field of educational legislation stems from his advisory position to the Minister of Education of Estonia from 1990 to1992. His competence in the field of the Bologna process results from the development of higher education legislation in Estonia (2002-...) and the development of a higher education quality assurance system for Estonia (2008-...). Olav Aarna has consulted third countries in the national qualifications framework (NQF) development as a European Training Foundation (ETF) expert. Full Article
are Stakeholder Agency and Social Welfare: Pluralism and Decision Making in the Multi-Objective Corporation By amr.aom.org Published On :: Mon, 06 Jul 2015 14:51:22 +0000 Social welfare, or the good society, is of central concern to the Academy of Management. In this paper, we review the concept of social welfare, suggesting that regardless of discipline, social welfare is defined as a multi-dimensional phenomenon. We then review the literature on the corporate objective within a market economy, where the dominant view is that of a single-objective function. Analyzing this view, we argue for a multi-dimensional objective for organizations in order to meet social welfare objectives: where decision making within a market economy better utilizes the benefits of markets. We suggest that improvements in social welfare are possible where markets are better-enabled to operate among stakeholders unconstrained by some single-valued objective. In doing so, we respond to the critics of stakeholder theory who argue that it is an untenable theory due to its inability to specify how stakeholder objectives are to be prioritized. Full Article
are Devolution of Researcher Care in Organization Studies and the Moderation of Organizational Knowledge By amle.aom.org Published On :: Tue, 28 Jul 2015 14:46:07 +0000 In this paper, we critically assess how the devolution of researcher care moderates knowledge development in organization studies. Defining researcher care as what scholars are concerned and passionate about, we consider the extent to which individuals researchers lose their personal voice in researching organizations. This bounding of care by the research community is a reflection of the way that researchers knowingly alter their care in researching organizations to gain associated career and reputational benefits. We describe how the field's institutional logic for researching organizations enables this devolution to take hold and how larger institutional forces reinforce how it progressively moderates organizational knowledge. We offer preliminary suggestions for addressing the devolution of researcher care in organization studies and ameliorating its threat to knowledge development. Full Article
are Creative, Rare, Entitled, and Dishonest: How Commonality of Creativity in One's Group Decreases an Individual's Entitlement and Dishonesty By amj.aom.org Published On :: Thu, 03 Sep 2015 15:06:26 +0000 We examine when and why creative role identity causes entitlement and unethical behaviors and how this relationship can be reduced. We found that the relationships among the creative identity, entitlement, and dishonesty are contingent on the perception of creativity being rare. Four experiments showed that individuals with a creative identity reported higher psychological entitlement and engaged in more unethical behaviors. Additionally, when participants believed that their creativity was rare compared to common, they were more likely to lie for money. Moreover, manipulation of rarity of creative identity, but not practical identity, increased psychological entitlement and unethical acts. We tested for the mediating effect of psychological entitlement on dishonesty using both measurement of mediation and experimental causal chain approaches. We further provide evidence from organizations. Responses from a sample of supervisor-subordinate dyads demonstrated that employees reporting strong creative identities who perceived creativity as rare in their work-group rather than common were rated as engaging in more unethical behaviors by their supervisors. This paper extends prior theory on negative moral consequences of creativity by shedding new light on assumption regarding the prevalence of creativity and the role psychological entitlement plays. Full Article
are Magnification and Correction of the Acolyte Effect: Initial Benefits and Ex Post Settling up in NFL Coaching Careers By amj.aom.org Published On :: Mon, 28 Sep 2015 14:36:41 +0000 What are the long-term consequences of initially beneficial high-reputation workplace ties? Under uncertainty, acolytes (i.e., subordinates with work connections to high-reputation industry leaders) are likely to benefit in terms of signaling fitness for promotion in the external job market. Analysis of promotion outcomes of coaches in the NFL over 31 years showed that the acolyte effect was reduced for individuals for whom uncertainty was the least (acolytes with considerable industry experience or high centrality in the co-worker industry network). There was no support for either a knowledge-transfer or an intrinsic quality explanation for why acolytes initially gained advantage. Rather, the evidence supported the idea that ties to high-reputation leaders were somewhat randomly distributed so that acolytes faced ex post settling up consequences after their promotions: fewer further promotions or lateral moves, more demotions. Thus, acolytes initially benefited from a loose-linkage between their unobservable quality and signals offered by their industry-leader ties, but they also suffered as the unreliability of social network signals became evident. The results suggest that a competitive job market may exhibit self-correction over time. We offer countervailing theory and evidence to the prevailing view that high-reputation third-party endorsements perpetuate a rich-get-richer social structure resistant to performance outcomes. Full Article
are Ethical and legal aspects of computing: a professional perspective from software engineering By www.computingreviews.com Published On :: Thu, 17 Oct 2024 12:00:00 PST With this book, O’Regan efficiently addresses a wide range of ethical and legal issues in computing. It is well crafted, organized, and reader friendly, featuring many recent, relevant examples like tweets, fake news, disinformation Full Article
are Free and open source software and other market failures from Communications of the ACM By www.computingreviews.com Published On :: Mon, 02 Sep 2024 12:00:00 PST Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history, explaining its undeniable success throughout the 1990s, and why the Full Article