Research quality, project failure, and privacy threats: spitting, yelling, and cussing
نویسنده
چکیده
European Journal of Information Systems (2008) 17, 321–323. doi:10.1057/ejis.2008.36 I am delighted to bring you the fourth issue of EJIS for 2008. It is packed with useful information, powerful opinions, and exciting new research findings. While I am sure you will find the issue provocative, interesting, and good reading, its theme revolves around our struggle with fundamental new barriers. Part of the issue is dedicated to rising issues in measuring research quality. Part of the issue explores new features in the continuing flood of information systems (IS) project failures. One article explains the intractable privacy roadblocks to new mobile IS applications. It seems clear that while IS as a practical and academic field emerges stronger each year, the problems seem to be getting tougher. My grandmother used to say that it may feel good to spit, yell, and cuss, but the time to fix your troubles is always now. Happily, each article advances on solutions to these tough problems. Still, somehow it seems appropriate to conclude this issue with research on ‘flaming,’ the virtual version of spitting, yelling, and cussing. This year, our most senior editor, Ray Paul, was heavily engaged in the Research Assessment Exercise (RAE) process. This exercise is not only a mystery to many of our readers outside of the U.K., but sometimes seems impenetrable to those subject to its results. It is increasingly important globally because so many other countries have adopted research assessment practices based on the U.K. RAE. I asked Ray to explain how it works, to the degree he is allowed ‘from the inside.’ Ray’s report, ‘Measuring research quality: The United Kingdom Government’s research assessment exercise (RAE)’ follows this editorial. Because of his official role in the RAE, Ray was bounded in his latitude to critically reflect on this year’s process. Consequently, I invited Bob Galliers of Bentley College, who has held senior administrative appointments in major research universities on both sides of the Atlantic, for his reflections on Ray’s report. Bob’s broad response follows in ‘A discipline for a stage? A Shakespearean reflection on the research plot and performance of the information systems field.’ Following the two opinion pieces, this issue of EJIS includes a brief research note from Zahir Irani and Tony Elliman, ‘Creating social entrepreneurship in local government,’ which presents their new process model for e-Government. We are glad to lead off this issue of EJIS with a paper that garnered the best paper award at this year’s European Conference on Information Systems held at The National University of Ireland in Galway, June of this year. We all know that the various contact points between an organization and its customers are critical for revenue-impact factors like customer satisfaction, repeat business, etc. If we are planning to introduce a new technology into this customer contact point (like a self-scanning supermarket checkout), will our customers love it or hate it? Can we predict who will love it, who will hate it, and can we do this in a way that the resulting customer contact is an overall improvement for all the European Journal of Information Systems (2008) 17, 321–323 & 2008 Operational Research Society Ltd. All rights reserved 0960-085X/08
منابع مشابه
Legal Safeguards for Ambient Intelligence
To take a full benefit of Ambient Intelligence, it is necessary to anticipate and react upon possible drawbacks and threats of the new emerging environment. The risks of new technologies should be examined in order to devise appropriate safeguards. This precautionary approach has been taken by SWAMI project which reflected on possible negative implications of AmI by constructing ‘dark scenarios...
متن کاملMalumfashi Endemic Diseases Research Project, XIII. Epidemiology of human encounters with the spitting cobra, Naja nigricollis, in the Malumfashi area of northern Nigeria.
متن کامل
Privacy - Preserving Data Publishing
The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves person-specific and sensitive information like medical records, the public has expressed a deep concern about their privacy. Privacy-preserving data publishi...
متن کاملDeveloping a Risk Management Model for Banking Software Development Projects Based on Fuzzy Inference System
Risk management is one of the most influential parts of project management that has a major impact on the success or failure of projects. Due to the increasing use of information technology (IT) systems in all fields and the high failure rate of IT projects in software development and production, it is essential to effectively manage these projects is essential. Therefore, this study is aimed t...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EJIS
دوره 17 شماره
صفحات -
تاریخ انتشار 2008