Work system theory: overview of core concepts, extensions, and challenges for the future

S Alter - Journal of the Association for Information Systems, 2013 - repository.usfca.edu
This paper presents a current, accessible, and overarching view of work system theory. WST
is the core of an integrated body of theory that emerged from a long-term research project to …

[PDF][PDF] Requirements elicitation problems: a literature analysis

B Davey, KR Parker - Issues in Informing Science and Information …, 2015 - iisit.org
Requirements elicitation is the process through which analysts determine the software
requirements of stakeholders. Requirements elicitation is seldom well done, and an …

[图书][B] Essentials of management information systems

KC Laudon, JP Laudon - 2017 - thuvienso.hoasen.edu.vn
Essentials of MIS takes an in-depth look at how today's businesses use information
technologies and systems to achieve corporate objectives. Current real-world business …

Designing a requirement mining system

H Meth, B Mueller, A Maedche - Journal of the Association for …, 2015 - aisel.aisnet.org
The success of information systems (IS) development strongly depends on the accuracy of
the requirements gathered from users and other stakeholders. When developing a new IS …

[PDF][PDF] NeuroIS-alternative or complement to existing methods? Illustrating the holistic effects of neuroscience and self-reported data in the context of technostress …

S Tams, K Hill, AO de Guinea, J Thatcher, V Grover - 2014 - ore.exeter.ac.uk
Recent research has made a strong case for the importance of NeuroIS methods for IS
research. It has suggested that NeuroIS contributes to an improved explanation and …

[HTML][HTML] How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy

S Tams, JB Thatcher, K Craig - The Journal of Strategic Information …, 2018 - Elsevier
Since the underutilization of technology often prevents organizations from reaping expected
benefits from IT investments, an increasing body of literature studies how to elicit value …

Boundary interactions and motors of change in requirements elicitation: A dynamic perspective on knowledge sharing

C Rosenkranz, H Vranešić, R Holten - Journal of the Association for …, 2014 - aisel.aisnet.org
The building of shared understanding between project stakeholders in the requirements
elicitation phase is necessary for knowledge sharing and a key factor for successful …

Representing crowd knowledge: Guidelines for conceptual modeling of user-generated content

R Lukyanenko, J Parsons, Y Wiersma… - Journal of the …, 2017 - aisel.aisnet.org
Organizations' increasing reliance on externally produced information, such as online user-
generated content (UGC) and crowdsourcing, challenges common assumptions about …

INCLUSION BY DESIGN: REQUIREMENTS ELICITATION WITH DIGITALLY MARGINALIZED COMMUNITIES.

I Faik, A Sengupta, Y Deng - MIS Quarterly, 2024 - search.ebscohost.com
A more equal and sustainable digital future depends on the inclusion of digitally
marginalized communities in the socioeconomic opportunities created by digital …

Accountability mobilization, guanxi and social media‐induced polarization: Understanding the bystander's prosocial punishment to misinformation spreader

Z Zhu, N Zhang, M Ding, L Chen - Information Systems Journal, 2024 - Wiley Online Library
Prosocial punishments by social media bystanders could block the path from misinformation
spread to social media‐induced polarization (SMIP). However, prosocial punishments are …