Search results

1 – 10 of 26
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 6 September 2011

Ronan Fox, James Cooley and Manfred Hauswirth

The purpose of this paper is to identify the gap that currently exists between enterprise and consumer‐focused mashup tools in terms of personalized, trusted collaboration. The…

367

Abstract

Purpose

The purpose of this paper is to identify the gap that currently exists between enterprise and consumer‐focused mashup tools in terms of personalized, trusted collaboration. The authors describe how Sqwelch, a semantically enabled mashup maker, addresses this gap during the design of mashups and in their execution.

Design/methodology/approach

Sqwelch enables the composition of mashups based on the concept of trust explicitly specified by users through a visual interface. Taxonomies are used to enable lightweight mediation of payloads delivered through a publish/subscribe mechanism.

Findings

The authors demonstrate the use of Sqwelch as a proof of concept in the remote delivery of healthcare, and how Sqwelch has been used to address areas of trust and collaboration in the delivery of telehealth services.

Originality/value

Integrating trust and collaboration across the boundaries of enterprises is required where sensitive data are transferred across those boundaries in the expectation of the delivery of a service. Across these boundaries, the authors find variations in users' skills, their expectations, and their responsibilities. The prototype described here enables users to discover, compose, share and collaborate in the day‐to‐day use of systems that match personalized requirements.

Details

International Journal of Pervasive Computing and Communications, vol. 7 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Available. Content available
Article
Publication date: 6 September 2011

Ismail Khalil

429

Abstract

Details

International Journal of Pervasive Computing and Communications, vol. 7 no. 3
Type: Research Article
ISSN: 1742-7371

Access Restricted. View access options
Article
Publication date: 6 July 2015

Chris Awre, Jim Baxter, Brian Clifford, Janette Colclough, Andrew Cox, Nick Dods, Paul Drummond, Yvonne Fox, Martin Gill, Kerry Gregory, Anita Gurney, Juliet Harland, Masud Khokhar, Dawn Lowe, Ronan O'Beirne, Rachel Proudfoot, Hardy Schwamm, Andrew Smith, Eddy Verbaan, Liz Waller, Laurian Williamson, Martin Wolf and Matthew Zawadzki

The purpose of this paper is to explore the usefulness of the concept to thinking about Research Data Management (RDM). The concept of “wicked problems” seeks to differentiate…

3314

Abstract

Purpose

The purpose of this paper is to explore the usefulness of the concept to thinking about Research Data Management (RDM). The concept of “wicked problems” seeks to differentiate very complex, intractable challenges from tamer issues where approaches to problem solving are well-understood.

Design/methodology/approach

The paper is based on and co-authored by a collaboration of practitioners from libraries, information technology and research administration, with facilitators from the Sheffield Information School. Participants worked together in two-day-long workshops to understand the wicked problem concept and advice on leadership in wicked problem contexts.

Findings

Participants concurred that RDM had many features of a wicked problem and most of Grint’s advice on leadership for wicked problems also resonated. Some elements of the issue were simple; participants were optimistic about improving the situation over time. Participants were resistant to the more negative or fatalistic connotations of the phrase “wicked problem”. Viewing RDM as a wicked problem is an interesting way of looking at it as a challenge for support professionals.

Practical implications

The notion of a wicked problem is a generative concept that can be usefully added to professional vocabulary.

Originality/value

The paper captures an in-depth response from practitioners to the notion of wicked problems as a lens for examining RDM.

Details

Library Review, vol. 64 no. 4/5
Type: Research Article
ISSN: 0024-2535

Keywords

Access Restricted. View access options
Book part
Publication date: 25 May 2021

Alessandra Girlando, Simon Grima, Engin Boztepe, Sharon Seychell, Ramona Rupeika-Apoga and Inna Romanova

Purpose: Risk is a multifaceted concept, and its identification requires complex approaches that are often misunderstood. The consequence is that decisions are based on limited…

Abstract

Purpose: Risk is a multifaceted concept, and its identification requires complex approaches that are often misunderstood. The consequence is that decisions are based on limited perception rather than the full value and meaning of what risk is, as a result, the way it is being tackled is incorrect. The individuals are often limited in their perceptions and ideas and do not embrace the full multifaceted nature of risk. Regulators and individuals want to follow norms and checklists or overuse models, simulations, and templates, thereby reducing responsibility for decision-making. At the same time, the wider use of technology and rules reduces the critical thinking of individuals. We advance the automation process by building robots that follow protocols and forget about the part of risk assessment that cannot be programed. Therefore, with this study, the objective of this study was to discover how people define risk, the influencing factors of risk perception and how they behave toward this perception. The authors also determine how the perception differed with age, gender, marital status, education level and region. The novelty of the research is related to individual risk perception during COVID-19, as this is a new and unknown phenomenon. Methodology: The research is based on the analysis of the self-administered purposely designed questionnaires we distributed across different social media platforms between February and June 2020 in Europe and in some cases was carried out as a interview over communication platforms such as “Skype,” “Zoom” and “Microsoft Teams.” The questionnaire was divided into four parts: Section 1 was designed to collect demographic information from the participants; Section 2 included risk definition statements obtained from literature and a preliminary discussion with peers; Section 3 included risk behavior statements; and Section 4 included statements on risk perception experiences. A five-point Likert Scale was provided, and participants were required to answer along a scale of “1” for “Strongly Agree” to “5” for “Strongly Disagree.” Participants also had the option to elaborate further and provide additional comments in an open-ended box provided at the end of the section. 466 valid responses were received. Thematic analysis was carried out to analyze the interviews and the open-ended questions, while the questionnaire responses were analyzed using various quantitative methods on IBM SPSS (version 23). Findings: The results of the analysis indicate that individuals evaluate the risk before making a decision and view risk as both a loss and opportunity. The study identifies nine factors influencing risk perception. Nevertheless, it must be emphasized that we can continue to develop models and rules, but as long as the risk is not understood, we will never achieve anything.

Details

Contemporary Issues in Social Science
Type: Book
ISBN: 978-1-80043-931-3

Keywords

Access Restricted. View access options
Article
Publication date: 14 June 2011

Ronan Hegarty and Judith Wusteman

The purpose of the evaluation described in this paper is to determine the usability of the services provided by the EBSCOhost Mobile application.

2920

Abstract

Purpose

The purpose of the evaluation described in this paper is to determine the usability of the services provided by the EBSCOhost Mobile application.

Design/methodology/approach

The methodology employed was usability testing, comprising pre‐ and post‐usability test questionnaires and “think out‐loud” usability tests.

Findings

Recommendations are made concerning changes to the interface to ensure greater usability.

Research limitations/implications

In this study, the only mobile device used in the testing of EBSCOhost Mobile was the iPhone 3GS. None of the participants had used or owned a smartphone previously.

Originality/value

Libraries are increasingly turning to the Mobile Web to offer new services to their patrons. Smartphones are likely to become central to the future delivery of information services.

Details

Library Hi Tech, vol. 29 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Access Restricted. View access options
Book part
Publication date: 15 July 2009

Jerel E. Slaughter and Edgar E. Kausel

In this chapter, we argue that despite the fact that empirical research on trait neuroticism has shown fairly weak relations between the broad neuroticism trait and overall job…

Abstract

In this chapter, we argue that despite the fact that empirical research on trait neuroticism has shown fairly weak relations between the broad neuroticism trait and overall job performance, organizational research can benefit by increased attention to the neuroticism construct. This is because the influence of neuroticism on work behavior can be best understood by separating the more general neuroticism domain into its lower level facets. We discuss various conceptualizations of neuroticism and then review existing research on the relation between the facets of neuroticism and job performance. Next, we turn our attention to a theoretical framework that suggests that the relations between neuroticism facets and job performance outcomes are explained by the social, cognitive, and behavioral effects of having varying levels of neuroticism-based traits. In so doing, we not only focus on mediated relationships between facets of neuroticism and job performance dimensions but also recognize some important moderators, as well as some expected direct relations between the facets and job performance. Finally, we discuss implications for further conceptual development, offer some suggestions for testing the propositions, and discuss potential practical implications of finding support for this model.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-84855-056-8

Available. Content available
Book part
Publication date: 30 August 2019

Ellis Cashmore

Abstract

Details

Kardashian Kulture
Type: Book
ISBN: 978-1-78743-706-7

Access Restricted. View access options
Article
Publication date: 7 March 2016

Ronan McIvor

The purpose of this paper is to enhance the understanding of the application of process improvement techniques (PITs) in the business process outsourcing (BPO) process. The paper…

1756

Abstract

Purpose

The purpose of this paper is to enhance the understanding of the application of process improvement techniques (PITs) in the business process outsourcing (BPO) process. The paper focuses on how PITs impact the BPO process, and identifies a number of key enablers of applying PITs in the BPO process.

Design/methodology/approach

The paper employs a case study approach. In-depth case study analysis of a number of organisations that have employed a number of PITs in BPO is carried out.

Findings

The findings support current literature that highlights the importance of formal contracting, relational contracting, and vendor capabilities for applying PITs in BPO. However, the findings also highlight the importance of additional factors, not widely considered in the current literature. The client must possess internal capabilities in PITs and change management to ensure process improvement occurs. Moreover, the findings here have shown that the client must invest in and develop the resources that enhance its capability to employ PITs in BPO.

Originality/value

The findings highlight the importance and relevance of process improvement to BPO, and identify a number of important issues for further research in order to bridge the gap between these two complementary areas.

Details

International Journal of Quality & Reliability Management, vol. 33 no. 3
Type: Research Article
ISSN: 0265-671X

Keywords

Access Restricted. View access options
Article
Publication date: 16 January 2007

Thomas N. Garavan, Ronan Carbery and Eamonn Murphy

The purpose of this article is to explore strategies used by communities of practice (CoPs) managers when managing intentionally created CoPs.

3171

Abstract

Purpose

The purpose of this article is to explore strategies used by communities of practice (CoPs) managers when managing intentionally created CoPs.

Design/methodology/approach

Four intentionally created CoPs in Ireland are explored, using a qualitative research design with data from observation, interviews and analysis of documents.

Findings

The study identified a number of specific strategies CoP managers use to develop trust, facilitate collaboration, facilitate the negotiation of shared meaning and manage power issues within the CoP. These strategies were shared by the four managers who participated in the study.

Research limitations/implications

The study is based on a small sample of managers in Ireland. The context and process imposed constraints and the findings are context specific which implications for the application of findings to other CoPs.

Originality/value

The study highlights the concept of CoP is not confined to traditional understandings but includes intentionally created highly structured time‐bound groupings of individuals who work in a collaborative manner to share knowledge. The paper offers learning from CoP managers and highlights the practical implications of their experiences.

Details

The Learning Organization, vol. 14 no. 1
Type: Research Article
ISSN: 0969-6474

Keywords

Available. Content available
Book part
Publication date: 25 November 2024

Ahmet Yıldırım

Free Access. Free Access

Abstract

Details

Behavioral Economics in Healthcare
Type: Book
ISBN: 978-1-83662-081-5

1 – 10 of 26
Per page
102050