Naast de vele publicaties in de media en het materiaal, dat de leveranciers van EIS-pakketten verspreiden, hebben vorig twee onafhankelijk van elkaar opererende werkgroepen onderzoeksrapportages uitgebracht over de praktijkervaringen met Executive Information Systems (EIS) in Nederland.
DOCUMENT
Creating adaptive systems becomes increasingly attractive in the context of specific groups of users, such as agricultural users. This group of users seems to differ with respect to information processing, knowledge management and learning styles. In this work we aim to offer directions toward increasing decision support systems usability, by tailoring toward user learning styles. The results show that decision support systems need to be redesigned toward providing agricultural users with a more efficient time management and study environment, and facilitating group interaction.
LINK
This study explores how journalists in highspeed newsrooms gather information, how gathering activities are temporally structured and how reliability manifests itself in information-gathering activities.
DOCUMENT
De bestuurlijke informatievoorziening voor het tactische en strategische management kan tegenwoordig tot stand komen op basis geavanceerde Executive Information Systems (EIS). Maar 'bestuurlijke informatievoorziening met EIS' vraagt om essentiele basiskennis omtrent besturen en bestuurlijke informatie binnen organisaties. In dit artikel staan met name de toepassing van de tools centraal.
DOCUMENT
Currently, promising new tools are under development that will enable crime scene investigators to analyze fingerprints or DNA-traces at the crime scene. While these technologies could help to find a perpetrator early in the investigation, they may also strengthen confirmation bias when an incorrect scenario directs the investigation this early. In this study, 40 experienced Crime scene investigators (CSIs) investigated a mock crime scene to study the influence of rapid identification technologies on the investigation. This initial study shows that receiving identification information during the investigation results in more accurate scenarios. CSIs in general are not as much reconstructing the event that took place, but rather have a “who done it routine.” Their focus is on finding perpetrator traces with the risk of missing important information at the start of the investigation. Furthermore, identification information was mostly integrated in their final scenarios when the results of the analysis matched their expectations. CSIs have the tendency to look for confirmation, but the technology has no influence on this tendency. CSIs should be made aware of the risks of this strategy as important offender information could be missed or innocent people could be wrongfully accused.
DOCUMENT
Dat niet alleen bedrijven een steeds sterkere belangstelling voor Executive Information Systems krijgen, bewijst de door de Technische Universiteit Eindhoven georganiseerde themadag over EIS. De vakgroep Informatica & Technologie binnen de Faculteit Technische Bedrijfskunde verzorgde op 25 november 1994 deze themadag waarbij naast een aantal praktijksituaties ook concrete onderzoeksresultaten op dit gebied naar voren kwamen.
DOCUMENT
This paper essentially presents an exploration of the relationship between organizational culture and information systems management. Three contributions are offered namely the findings of a study of the organizational culture and information management competencies of five organizations in the Netherlands, with particular reference to the reliability of the measurements tool that was used, as well as an exploratory study of the relationship between organizational culture and the ability of an organization to manage its information systems. A brief review of the literature reveals that these two concepts in combination have been studied extensively, but that their conceptualization are somewhat fragmented in nature. In an effort to study the relationship using a more inclusive frame of reference the paper then presents a description of two models that were used the foundation for the design of a measurement tool to investigate the topic. The results provides a description of the general culture and information systems management abilities of the organizations and also suggest that the measurement tool is indeed reliable. Further analysis reveals that several variables from within each of the two main concepts, organizational culture and information systems management, are correlated.
DOCUMENT
In today’s world, information security is a trending as well as a crucial topic for both individuals and organizations. Experts believe that nothing can guarantee any system’s security unless humans’ information security behavior is taken under consideration. Opening an e-mail attachment without checking its source, sharing account information with other people and browsing websites without checking its reliability can be considered as common mistakes in information security behavior. This study examines the factors affecting information security behavior by scrutinising its relationship with different variables which are information knowledge sharing, information security organization policy, the intention of attending information security training and self-efficacy. The present study extensively analyses the data collected from a survey of 630 people ranging from students to managers aged between 15 to 79 in order to generalize the Turkish context. The results of reliability measures and confirmatory factor analysis support the scale of the study. The present study’s findings show that there is a positive relationship between the factors mentioned above and information security behavior.
DOCUMENT
De bestuurlijke informatievoorziening voor het tactische en strategische management kan tegenwoordig tot stand komen op basis geavanceerde Executive Information Systems (EIS). Maar 'bestuurlijke informatievoorziening met EIS' vraagt om essentiele basiskennis omtrent besturen en bestuurlijke informatie binnen organisaties. In dit artikel komt met name de organisatorische vereisten en inbedding aan bod.
DOCUMENT
The research described in this paper provides insights into tools and methods which are used by professional information workers to keep and to manage their personal information. A literature study was carried out on 23 scholar papers and articles, retrieved from the ACM Digital Library and Library and Information Science Abstracts (LISA). The research questions were: - How do information workers keep and manage their information sources? - What aims do they have when building personal information collections? - What problems do they experience with the use and management of their personal collections? The main conclusion from the literature is that professional information workers use different tools and approaches for personal information management, depending on their personal style, the types of information in their collections and the devices which they use for retrieval. The main problem that they experience is that of information fragmentation over different collections and different devices. These findings can provide input for improvement of information literacy curricula in Higher Education. It has been remarked that scholar research and literature on Personal Information Management do not pay a lot of attention to the keeping and management of (bibliographic) data from external documentation. How people process the information from those sources and how this stimulates their personal learning, is completely overlooked. [The original publication is available at www.elpub.net]
DOCUMENT