Since the launch of Napster in June 1999, peer-to-peer technology (P2P) has become synonymous with file sharing applications that are the bane of the recording industry due to copyright infringements and consequent re...Since the launch of Napster in June 1999, peer-to-peer technology (P2P) has become synonymous with file sharing applications that are the bane of the recording industry due to copyright infringements and consequent revenue losses. P2P promised a revolution in business computing which has not arrived. It has become synonymous with illegal file sharing and copyright violations. Meanwhile the information systems industry has undergone a paradigm change, and we are supposedly living in a world of cloud computing and mobile devices. It is pertinent to examine if P2P, as a revolutionary technology, is still relevant and important today and will be in future. One has to examine this question in the context of the fact that P2P technologies have matured but have however had limited adoption outside file sharing in the consumer space. This paper provides a detailed analysis of P2P computing and offers some propositions to answer the question of the relevancy of P2P. It is proposed that P2P is still a relevant technology but may be reshaped in the coming years in a different form as compared to what exists today.展开更多
The Petri Net Pareto method proposed in this study has the advantages of acting directly on computing results by assessment of workflow process information. Our study contributes to the literature because it has inves...The Petri Net Pareto method proposed in this study has the advantages of acting directly on computing results by assessment of workflow process information. Our study contributes to the literature because it has investigated an ISO 31000 workflow process approach to group decision making for reducing backorders in the supply chain, from an integrated perspective utilizing Pareto charts and Petri nets. The contribution to the literature is also enhanced by the L-Project illustrative example that presents an evaluation hierarchy of supply chain risk. The proposed method is appropriate for use in situations in which assessment information may be qualitative or precise quantitative information is either unavailable or too costly to compute.展开更多
Ontologies have emerged as an important tool in the Enterprise architecture discipline to provide the theoretical foundations for designing and representing the enterprise as a whole or a specific area or domain, in a...Ontologies have emerged as an important tool in the Enterprise architecture discipline to provide the theoretical foundations for designing and representing the enterprise as a whole or a specific area or domain, in a scientific fashion. This paper examines the domain of maintenance, repair, and overhaul (MRO) of the Sikorsky UH-60 helicopter involving multiple enterprises, and represents it through an ontology using the OWL Language and Protégé tool. The resulting ontology gives a formal and unambiguous model/representation of the MRO domain that can be used by multiple parties to arrive at a common shared conceptualization of the MRO domain. The ontology is designed to be conformant to ISO 13030 or the Product Life Cycle Support Standard (PLCS) standard, hence representing the state of being as per this standard especially at the interfaces between enterprises while incorporating existing reality to the greatest possible extent within the enterprises. As a result the ontology can be used to design Information Systems (IS) and their interfaces in all enterprises engaged in MRO to alleviate some of the issues present in the MRO area and to support business intelligence efforts.展开更多
Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a fir...Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a firm must be able to recover from both man-made and natural disasters. This is especially true for maintaining and recovering the lifeline of the organization and its data. Although the literature has discussed the importance of disaster recovery and business continuity, there is not much known about how Information System Data Analytics Resilience (ISDAR) and the organization’s ability to recover from lost information. In this research, we take a step in this direction and analyze the relationship of IS personnel expertise on ISDAR and investigate Information System (IS) personnel understanding of the firm’s competitive priorities, IS Personnel understanding of business policies and objectives, IS personnel’s ability to solve business problems, IS personnel initiatives in changing business processes and their determination and attentiveness to focus on achieving confident leadership in data and analytics resilience. We collected data through a survey of IS and business managers from 302 participants. Our results show that there is evidence to support our hypothesis and that there may indeed be a relationship between these variables.展开更多
Our research explored the effects of objects-first and objects-late methods on achievements of object-oriented pro-gramming (OOP) learners during a graduate course. The course’s scope was virtually identical for two ...Our research explored the effects of objects-first and objects-late methods on achievements of object-oriented pro-gramming (OOP) learners during a graduate course. The course’s scope was virtually identical for two groups, but the structure of the contents differed in sequence. The objects-first method emphasized the design and discussion of the object-oriented concepts from the very beginning while the objects-late deferred these concepts to the late lectures. The objects-first learners used all visual functionalities of BlueJ IDE. However, the objects-late learners started with only the text-based interfaces of BlueJ and they benefited its visual support in the last lectures. At the end of the study, we found that there was a statistically significant difference between OOP learner groups.展开更多
文摘Since the launch of Napster in June 1999, peer-to-peer technology (P2P) has become synonymous with file sharing applications that are the bane of the recording industry due to copyright infringements and consequent revenue losses. P2P promised a revolution in business computing which has not arrived. It has become synonymous with illegal file sharing and copyright violations. Meanwhile the information systems industry has undergone a paradigm change, and we are supposedly living in a world of cloud computing and mobile devices. It is pertinent to examine if P2P, as a revolutionary technology, is still relevant and important today and will be in future. One has to examine this question in the context of the fact that P2P technologies have matured but have however had limited adoption outside file sharing in the consumer space. This paper provides a detailed analysis of P2P computing and offers some propositions to answer the question of the relevancy of P2P. It is proposed that P2P is still a relevant technology but may be reshaped in the coming years in a different form as compared to what exists today.
文摘The Petri Net Pareto method proposed in this study has the advantages of acting directly on computing results by assessment of workflow process information. Our study contributes to the literature because it has investigated an ISO 31000 workflow process approach to group decision making for reducing backorders in the supply chain, from an integrated perspective utilizing Pareto charts and Petri nets. The contribution to the literature is also enhanced by the L-Project illustrative example that presents an evaluation hierarchy of supply chain risk. The proposed method is appropriate for use in situations in which assessment information may be qualitative or precise quantitative information is either unavailable or too costly to compute.
文摘Ontologies have emerged as an important tool in the Enterprise architecture discipline to provide the theoretical foundations for designing and representing the enterprise as a whole or a specific area or domain, in a scientific fashion. This paper examines the domain of maintenance, repair, and overhaul (MRO) of the Sikorsky UH-60 helicopter involving multiple enterprises, and represents it through an ontology using the OWL Language and Protégé tool. The resulting ontology gives a formal and unambiguous model/representation of the MRO domain that can be used by multiple parties to arrive at a common shared conceptualization of the MRO domain. The ontology is designed to be conformant to ISO 13030 or the Product Life Cycle Support Standard (PLCS) standard, hence representing the state of being as per this standard especially at the interfaces between enterprises while incorporating existing reality to the greatest possible extent within the enterprises. As a result the ontology can be used to design Information Systems (IS) and their interfaces in all enterprises engaged in MRO to alleviate some of the issues present in the MRO area and to support business intelligence efforts.
文摘Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a firm must be able to recover from both man-made and natural disasters. This is especially true for maintaining and recovering the lifeline of the organization and its data. Although the literature has discussed the importance of disaster recovery and business continuity, there is not much known about how Information System Data Analytics Resilience (ISDAR) and the organization’s ability to recover from lost information. In this research, we take a step in this direction and analyze the relationship of IS personnel expertise on ISDAR and investigate Information System (IS) personnel understanding of the firm’s competitive priorities, IS Personnel understanding of business policies and objectives, IS personnel’s ability to solve business problems, IS personnel initiatives in changing business processes and their determination and attentiveness to focus on achieving confident leadership in data and analytics resilience. We collected data through a survey of IS and business managers from 302 participants. Our results show that there is evidence to support our hypothesis and that there may indeed be a relationship between these variables.
文摘Our research explored the effects of objects-first and objects-late methods on achievements of object-oriented pro-gramming (OOP) learners during a graduate course. The course’s scope was virtually identical for two groups, but the structure of the contents differed in sequence. The objects-first method emphasized the design and discussion of the object-oriented concepts from the very beginning while the objects-late deferred these concepts to the late lectures. The objects-first learners used all visual functionalities of BlueJ IDE. However, the objects-late learners started with only the text-based interfaces of BlueJ and they benefited its visual support in the last lectures. At the end of the study, we found that there was a statistically significant difference between OOP learner groups.