Scielo RSS <![CDATA[JISTEM - Journal of Information Systems and Technology Management]]> http://www.scielo.br/rss.php?pid=1807-177520160003&lang=en vol. 13 num. 3 lang. en <![CDATA[SciELO Logo]]> http://www.scielo.br/img/en/fbpelogp.gif http://www.scielo.br <![CDATA[USING RESEARCH METHODS IN HUMAN COMPUTER INTERACTION TO DESIGN TECHNOLOGY FOR RESILIENCE]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300363&lng=en&nrm=iso&tlng=en ABSTRACT Research in human computer interaction (HCI) covers both technological and human behavioural concerns. As a consequence, the contributions made in HCI research tend to be aware to either engineering or the social sciences. In HCI the purpose of practical research contributions is to reveal unknown insights about human behaviour and its relationship to technology. Practical research methods normally used in HCI include formal experiments, field experiments, field studies, interviews, focus groups, surveys, usability tests, case studies, diary studies, ethnography, contextual inquiry, experience sampling, and automated data collection. In this paper, we report on our experience using the evaluation methods focus groups, surveys and interviews and how we adopted these methods to develop artefacts: either interface's design or information and technological systems. Four projects are examples of the different methods application to gather information about user's wants, habits, practices, concerns and preferences. The goal was to build an understanding of the attitudes and satisfaction of the people who might interact with a technological artefact or information system. Conversely, we intended to design for information systems and technological applications, to promote resilience in organisations (a set of routines that allow to recover from obstacles) and user's experiences. Organisations can here also be viewed within a system approach, which means that the system perturbations even failures could be characterized and improved. The term resilience has been applied to everything from the real estate, to the economy, sports, events, business, psychology, and more. In this study, we highlight that resilience is also made up of a number of different skills and abilities (self-awareness, creating meaning from other experiences, self-efficacy, optimism, and building strong relationships) that are a few foundational ingredients, which people should use along with the process of enhancing an organisation's resilience. Resilience enhances knowledge of resources available to people confronting existing problems. <![CDATA[IMPROVING IT PROCESS MANAGEMENT THROUGH VALUE STREAM MAPPING APPROACH: A CASE STUDY]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300389&lng=en&nrm=iso&tlng=en ABSTRACT Value-Stream mapping (VSM) is a helpful tool to identify waste and improvement areas. It has emerged as a preferred way to support and implement the lean approach. While lean principles are well-established and have broad applicability in manufacturing, their extension to information technology is still limited. Based on a case study approach, this paper presents the implementation of VSM in an IT firm as a lean IT improvement initiative. It involves mapping the current activities of the firm and identifying opportunities for improvement. After several interviews with employees who are currently involved in the process, current state map is prepared to describe the existing problem areas. Future state map is prepared to show the proposed improvement action plans. The achievements of VSM implementation are reduction in lead time, cycle time and resources. Our finding indicates that, with the new process change, total lead time can be reduced from 20 days to 3 days - 92% reduction in overall lead time for database provisioning process. <![CDATA[ENTREPRENEURSHIP IN PROJECT MANAGEMENT SYSTEMS: PROPOSAL OF A MODEL AND PRELIMINARY EMPIRICAL EVIDENCE]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300405&lng=en&nrm=iso&tlng=en ABSTRACT This study analyzes the manifestation of the dimensions of Entrepreneurial Orientation (EO) and Project Management Systems (PMS). We used a qualitative approach to conduct exploratory research through a study in literature and a pilot case in a software company. Data was collected from semi structured interviews, documents, and records on file, then triangulated and treated with content analysis. The model proposed for the relationship between the types of PMS (ad hoc, Classic PM, innovation, entrepreneurship/ intrapreneurship) and the dimensions of EO (innovativeness, risk-taking, proactiveness, competitive aggressiveness, and autonomy), was partially corroborated by empirical studies. New studies are suggested to validate the applicability and setup of the model. <![CDATA[THE INTERNET OF THINGS APPLIED TO BUSINESS: A BIBLIOMETRIC STUDY]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300423&lng=en&nrm=iso&tlng=en RESUMO A Internet das Coisas é uma inovação tecnológica, baseada em artefatos já consolidados como a Internet e objetos inteligentes. A crescente aplicação da Internet das Coisas nos negócios torna necessária uma avaliação de estratégias, benefícios e dificuldades enfrentadas na aplicação da tecnologia. O principal objetivo deste artigo é apresentar as diversas definições de Internet das Coisas, a partir dos artigos mais citados, e como objetivo secundário, apresentar estatísticas de publicação por ano e termos correlatos, como computação ubíqua. Uma das conclusões é que os artigos relacionados à temática de negócios correspondem a apenas 5% dentre todos os artigos recuperados por essa pesquisa, considerando apenas os artigos publicados em periódicos, o que demonstra que existe um grande campo de pesquisa em Administração.<hr/>ABSTRACT The Internet of Things is a technological innovation, based on artifacts and consolidated concepts like Internet and Smart Objects. The growing business application of the Internet of Things makes it necessary to evaluate the strategy, benefits and challenges associated to the application of this technology. The main objective of this paper is to present the definition of the Internet of Things, based on the most cited articles and as a secondary objective, present publication statistics classified by year and related terms, like ubiquitous computation. One of the conclusions is that papers related to business represent only 5% of all the papers analyzed by this research, considering just the papers published on journals. It shows that there is a great Business Administration field to research. <![CDATA[FAVORABILITY CONDITIONS IN THE ADOPTION OF AGILE METHOD PRACTICES FOR SOFTWARE DEVELOPMENT IN A PUBLIC BANKING]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300439&lng=en&nrm=iso&tlng=en ABSTRACT The main purpose of this paper is to propose and test a model to assess the degree of conditions favorability in the adoption of agile methods to develop software where traditional methods predominate. In order to achieve this aim, a survey was applied on software developers of a Brazilian public retail bank. Two different statistical techniques were used in order to assess the quantitative data from the closed questions in the survey. The first, exploratory factorial analysis validated the structure of perspectives related to the agile model of the proposed assessment. The second, frequency distribution analysis to categorize the answers. Qualitative data from the survey opened question were analyzed with the technique of qualitative thematic content analysis. As a result, the paper proposes a model to assess the degree of favorability conditions in the adoption of Agile practices within the context of the proposed study. <![CDATA[APPLICABILITY OF AN ASSESSMENT MODEL FOR HEALTHCARE INFORMATION SYSTEMS IN A PUBLIC HOSPITAL]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300459&lng=en&nrm=iso&tlng=en ABSTRACT Assessment processes are essential to guarantee quality and continuous improvement of software in healthcare, as they measure software attributes in their lifecycle, verify the degree of alignment between the software and its objectives and identify unpredicted events. This article analyses the use of an assessment model based on software metrics for three healthcare information systems from a public hospital that provides secondary and tertiary care in the region of Ribeirão Preto. Compliance with the metrics was investigated using questionnaires in guided interviews of the system analysts responsible for the applications. The outcomes indicate that most of the procedures specified in the model can be adopted to assess the systems that serves the organization, particularly in the attributes of compatibility, reliability, safety, portability and usability. <![CDATA[WHAT INFLUENCES INFORMATION SECURITY BEHAVIOR? A STUDY WITH BRAZILIAN USERS]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300479&lng=en&nrm=iso&tlng=en ABSTRACT The popularization of software to mitigate Information Security threats can produce an exaggerated notion about its full effectiveness in the elimination of any threat. This situation can result reckless users behavior, increasing vulnerability. Based on behavioral theories, a theoretical model and hypotheses were developed to understand the extent to which human perception of threat, control and disgruntlement can induce responsible behavior. A self-administered questionnaire was created and validated. The data were collected in Brazil, and complementary results regarding similar studies conducted in USA were found. The results show that there is an influence of information security orientations provided by organizations in the perception about severity of the threat. The relationship between threat, effort, control and disgruntlement, and the responsible behavior towards information security was verified through linear regression. The results also point out the significant influence of the analyzed construct on Safe Behavior. The contributions involve relatively new concepts in the field and a new research instrument as well. For the practitioners, this study highlights the importance of Perceived Severity and Perceived Susceptibility in the formulation of the content of Information Security awareness guidelines within organizations. Moreover, users' disgruntlement with the organization, colleagues or superiors is a factor to be considered in the awareness programs. <![CDATA[A NOVEL LATENT FACTOR MODEL FOR RECOMMENDER SYSTEM]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300497&lng=en&nrm=iso&tlng=en ABSTRACT Matrix factorization (MF) has evolved as one of the better practice to handle sparse data in field of recommender systems. Funk singular value decomposition (SVD) is a variant of MF that exists as state-of-the-art method that enabled winning the Netflix prize competition. The method is widely used with modifications in present day research in field of recommender systems. With the potential of data points to grow at very high velocity, it is prudent to devise newer methods that can handle such data accurately as well as efficiently than Funk-SVD in the context of recommender system. In view of the growing data points, I propose a latent factor model that caters to both accuracy and efficiency by reducing the number of latent features of either users or items making it less complex than Funk-SVD, where latent features of both users and items are equal and often larger. A comprehensive empirical evaluation of accuracy on two publicly available, amazon and ml-100 k datasets reveals the comparable accuracy and lesser complexity of proposed methods than Funk-SVD. <![CDATA[FACTORS INFLUENCIG SOFTWARE MIGRATION DECISION: CASE STUDIES OF ACERLORMITTAL TUBARÃO AND THE CITY GOVERNMENT OF SERRA, ESPIRITO SANTO]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300515&lng=en&nrm=iso&tlng=en ABSTRACT The objective of this research is to identify the factors that influence the migration of free software to proprietary software, or vice-versa. The theoretical framework was developed in light of the Diffusion of Innovations Theory (DIT) proposed by Rogers (1976, 1995), and the Unified Theory of Acceptance and Use of Technology (UTAUT) proposed by Venkatesh, Morris, Davis and Davis (2003). The research was structured in two phases: the first phase was exploratory, characterized by adjustments of the revised theory to fit Brazilian reality and the identification of companies that could be the subject of investigation; and the second phase was qualitative, in which case studies were conducted at ArcelorMittal Tubarão (AMT), a private company that migrated from proprietary software (Unix) to free software (Linux), and the city government of Serra, in Espírito Santo state, a public organization that migrated from free software (OpenOffice) to proprietary (MS Office). The results show that software migration decision takes into account factors that go beyond issues involving technical or cost aspects, such as cultural barriers, user rejection and resistance to change. These results underscore the importance of social aspects, which can play a decisive role in the decision regarding software migration and its successful implementation. <![CDATA[INFORMATION SYSTEMS SECURITY AND USERS' BEHAVIOR]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752016000300533&lng=en&nrm=iso&tlng=en RESUMO Numa sociedade cada vez mais global e em constante mutação, onde as organizações necessitam ter sempre disponível a informação necessária e útil para desenvolver, de uma forma rápida e eficaz, as suas atividades no dia-a-dia, garantir a segurança da informação é um fator fundamental para sustentar a sua continuidade e sucesso.Neste estudo procura-se saber em que medida os comportamentos e as atitudes dos usuários dos sistemas de informação constituem um risco ou uma proteção para a segurança destes sistemas. Para alcançar este objetivo foi primeiramente realizada uma revisão bibliográfica baseada em fontes secundárias, que permitiu desenvolver o questionário para coleta de dados; seguidamente, e usando um questionário online, foram recolhidas respostas de 780 sujeitos, que maioritariamente trabalham em Portugal. Os dados obtidos foram objeto de um tratamento estatístico simples, nomeadamente análise de frequências e médias. A principal conclusão do estudo revela que os usuários, de uma forma geral, constituem uma proteção para a segurança dos sistemas de informação nas organizações.<hr/>ABSTRACT To guarantee their continuity and success in an increasingly global and changing society, where organizations need to have useful and necessary information always available in a fast and efficient manner in order to develop their daily activities, information security becomes a key factor. This study is meant to know whether the behavior and actions of Information Systems users are a risk or a protection to these systems security. In order to reach this objective we carried out a bibliographical review based on secondary sources that allowed us to develop a questionnaire for data collection. Secondly we used an online questionnaire to gather answers from 780 subjects who worked mainly in Portugal. The collected data were subject to a simple statistical treatment, specially frequency and analysis of means. The main conclusion derived from this study shows that in general users are considered to be a protection for the information systems security in organizations.