Evaluating Evolutionary Information Systems: A Post- Modernist Perspective

نویسنده

  • Nandish V. Patel
چکیده

INTRODUCTION Until the beginning of the 1990s, information systems (IS) were generally viewed as largely a support for business activity and were justified using cost accounting techniques. A proposed system would be developed if it could be shown that it would reduce operating costs or result in other productivity increases. No consideration was given to other benefits of an intangible or even strategic nature. As the deployment of information technology (IT) spread from operational to tactical support, the need to assess or evaluate its contribution to organisational performance and organisational reconfiguration attracted researchers’ interests. Yet the same genre of cost accounting based evaluation techniques were used. Now, as we enter the new century, IS are regarded as an essential feature of doing business, and many new kinds of businesses, such as Web-based ones, organise their business activity around IT, rather than organise the IT around the business. Executives especially regard IS as strategic tools. We are in an era of Internet-based businesses, reconfiguration of business processes with integrated IT/IS, and traditional businesses which now have to use the World Wide Web to remain viable. In this new era, the approach to IT/IS evaluation is still typically controlled using budgets and year-to-year comparisons, and by comparisons with other business costs such as human resource or production costs. With this plethora of IT/IS deployment, the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluating evolutionary information systems

Most information technology evaluation research and practice is either done before the decision to invest or after it. This type of evaluation is suitable for methodological information system development, where a system is developed using business projects and methods with set budgets and time scales, and where the system is regarded as completed. However, it is now recognised that systems dev...

متن کامل

Constructions of Active Womanhood and New Femininities: From a Feminist Linguistic Perspective, is Sex and the City a Modernist or a Post-Modernist TV Text?

Sex and the City has been the subject of close scrutiny within feminist scholarship in terms of whether it is considered to be a reactionary or progressive text. While this debate is valuable within a modernist feminist paradigm, it makes less sense from a post-modernist feminist perspective. Using both semiotic and feminist post-structuralist methods of textual analysis, this paper shows that ...

متن کامل

Crypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems

In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age.  To locate the issue in a historical perspective and in line with this strand of thought, we consid...

متن کامل

Beyond the "Mythical Centre": An Affirmative Post-Modern View of SERVQUAL Research in Information Systems

Conventional approaches to literature reviews tend to perform a meta-analysis of previous literature, based on a modernist, normal science paradigm. These reviews typically seek a ‘mythical centre’ based on synthesis and consensus. This is not always appropriate for research areas that have been characterised by heterogeneous and inconsistent studies. In this paper, we examine the discourse ass...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016