• Title/Summary/Keyword: information systems theories

Search Result 240, Processing Time 0.024 seconds

Theories, Strategies and Elements of Gamified MOOCs: A Systematic Literature Review

  • Alexandros Papadimitriou
    • Asia pacific journal of information systems
    • /
    • v.34 no.1
    • /
    • pp.248-291
    • /
    • 2024
  • A few years before, MOOCs appeared and developed at a rapid pace. Various MOOC methods, theories, strategies, elements, and techniques were used to improve distance education. In their development, their weaknesses like dropout, low participation, low completion rate, low engagement, and others have emerged that are addressed by recent studies including that of gamified and adaptive gamified MOOCs. This article presents the most important theories, strategies, and elements used in gamification and their usefulness and contribution to MOOCs, with the ultimate goal of proving rich information to researchers, application designers, and practitioners of gamified and adaptive gamified MOOCs.

ISRI - Information Systems Research Constructs and Indicators: A Web Tool for Information Systems Researchers

  • Varajao, Joao;Trigo, Antonio;Silva, Tiago
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.54-67
    • /
    • 2021
  • This paper presents the ISRI (Information Systems Research Indicators) Web tool, publicly and freely available at isri.sciencesphere.org. Targeting Information Systems (IS) researchers, it compiles and organizes IS adoption and use theories/models, constructs, and indicators (measuring variables) available in the scientific literature. Aiming to support the IS theory development process, the purpose of ISRI is to gather and systematize information on research indicators to help researchers and practitioners' work. The tool currently covers eleven theories/models: DeLone and McLean's IS Success Model (D&M ISS); Diffusion of Innovations Theory (DOI); Motivational Model (MM); Social Cognitive Theory (SCT); Task-Technology Fit (TTF); Technology Acceptance Model (TAM); Technology-Organization-Environment Framework (TOE); Theory of Planned Behavior (TPB); Decomposed Theory of Planned Behavior (DTPB); Theory of Reasoned Action (TRA); and Unified Theory of Acceptance and Use of Technology (UTAUT). It also includes currently over 400 constructs, nearly 2,500 indicators, and about 60 application contexts related to the models. For the creation of the tool's database, nearly 580 references were used.

A Study on Factors causing the employer's Resistance (정보시스템 사용에 대한 종업원들의 저항에 관한 연구)

  • Lee, Jae-Jin;Park, Jong-Hyuk
    • Management & Information Systems Review
    • /
    • v.23
    • /
    • pp.233-260
    • /
    • 2007
  • Now a day, Information and its related system has been more important in our competitive environment. In this situation, there is also an important thing that we must take into consideration, that's the employer's resistance. Until now we have little material concerning the issue, user's resistance. Owing to that, it's a little hard to study the user's resistance against the IS. Dealing with the resistance effectively helps companies save a great deal of cost and build the information system successfully. This paper takes the Markus's theories about user's resistance. According to the theories, there are three keys theories affecting resistance. To sum this, people-oriented theory, system-oriented theory and Interaction theory. To complement the theories, this paper includes another theories related with resistance and takes total seven factors causing user's resistance. Among these seven factors, four factors have a meaningful effect on the user's resistance, that is, Self-efficacy, System Complexity, Threat of the one's status and politics and System Staff's service quality. Managers and system-related company should keep it in mind very carefully, and I hope they make the best use of the result of this study.

  • PDF

Deep Lexical Semantics: The Ontological Ascent

  • Hobbs, Jerry R.
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2007.11a
    • /
    • pp.29-41
    • /
    • 2007
  • Concepts of greater and greater complexity can be constructed by building systems of entities, by relating other entities to that system with a figure-ground relation, by embedding concepts of figure-ground in the concept of change, by embedding that in causality, and by coarsening the granularity and beginning the process over again. This process can be called the Ontological Ascent. It pervades natural language discourse, and suggests that to do lexical semantics properly, we must carefully axiomatize abstract theories of systems of entities, the figure-ground relation, change, causality, and granularity. In this paper, I outline what these theories should look like.

  • PDF

THEORIES OF SET AND LOGIC : COMPUTING WITH WORDS AND NUMBERS

  • Turksen, I.B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.1-19
    • /
    • 1998
  • In this Kdynote address, two types of information granules are considered : (ⅰ) one for set assignments of a concept descriptor and (ⅱ) the other for truthood assignment to the concept description verifier. The first is, the process which specifies the assignment of an object to a clump, a class, a group, etc., and hence defines the set membership with a relational constraint. the second is the assignment of the degree of truthood or the membership specification of the abstract concept of truthood which specifies the " veristic" constraint associated with the concept descriptor. The combination of these two distinct assignments let us generate four set and logic theories. This then leads to the concern of normal forms and their derivation from truth tables for each of these theories. In this regard, some of the fundamental issues arising in this context are discussed and certain preliminary answers are provided in order to highlight the consequences of these theories.

  • PDF

An Overall Review of the Research on the Complex Information Systems Technology Acceptance Model

  • Zhao, Kun
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.174-180
    • /
    • 2007
  • This paper provides an overview of the development and progress of research on information technology acceptance model, and tries to figure out the importance of this research to the development of information theories and its applications. Focused on the detailed discuss on the research on complex information systems, this paper tempts to outline directions for research on this field.

  • PDF

Information Technology Continuance Research: Current State and Future Directions

  • Bhattacherjee, Anol;Barfar, Arash
    • Asia pacific journal of information systems
    • /
    • v.21 no.2
    • /
    • pp.1-18
    • /
    • 2011
  • Contemporary research on information technology (IT) continuance is plagued by inadequate understanding of the continuance concept and inappropriate use of theories for studying this phenomenon. Following a review of the IT continuance literature, this paper identifies some of the extant misconceptions about continuance research and suggests theoretical avenues for advancing this research in a meaningful manner. Based on these insights, an extended expectation-confirmation theoretic model of IT continuance is proposed.

A Study on Factors Influencing Privacy Decision Making on the Internet: Focus on Dual-Calculus Model (온라인 환경에서 프라이버시 의사결정에 영향을 미치는 요인에 관한 연구: 이중계산모델을 중심으로)

  • Kim, Sanghee;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.197-215
    • /
    • 2016
  • Purpose This study aims to investigate the factors that influence decision making in relation to providing personal information on the internet with respect to the integration of the privacy calculus theory and protection motivation theory based on the dual-calculus model proposed by Li(2012). Design/methodology/approach The privacy calculus theory and protection motivation theory have been applied to explain privacy behavior to a certain degree but few studies have been conducted to explain privacy behavior based on the integration of these two theories. Although Li(2012) proposed the dual-calculus model, he only proposed its framework and did not carry out an empirical study. Therefore, this study proposes a research model that integrates these two theories and examines the relationship between the two theories through an empirical study. Findings According to the results of empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between coping appraisal and privacy risk in the risk calculus process. Thus, the results verify that external threat played a decisive role in increasing the risk level of a consumer's privacy. It can be discussed the ways to enhance the privacy behavior of consumer on the internet through these findings.

Theoretical Grounding of Perceived Risk in Adoption of Mobile Payment System and Behavioural Intention

  • Bharti Ramtiyal;Deepak Verma;Ajay Pal Singh Rathore
    • Asia pacific journal of information systems
    • /
    • v.31 no.4
    • /
    • pp.543-574
    • /
    • 2021
  • This study focuses on a better understanding of the importance of risk perception in adopting Mobile Payment Systems (MPS) by conducting a systematic literature review. From the social science field (using Scopus and Web of Science database) articles were selected. Overall, forty-four significant pieces were determined using a systematic methodology. In addition to providing a summary of the most used theories used to address perceived risk in MPS this paper also investigates the definition for the perceived risk in MPS literature. The study is performed through the identification of dominant theories used to explain perceived risk in the literature. The article gives a thematic analysis of theories and the relation of perceived risk with behavioural intention. As far as we know, this is the first effort of its kind to give a holistic, systematic literature review in light of perceived risk in MPS. Consequently, it is a crucial first step in establishing a solid theoretical framework involving the constructs of perceived risk and laying the groundwork for future research in this area.

The Factors Influencing Information Technology Non-Acceptance: Approach by Grounded Theory (정보기술 비수용에 영향을 미치는 요인: 근거이론에 의한 접근)

  • Lee, Woong-Kyu;Park, Jin-Hoon
    • The Journal of Information Systems
    • /
    • v.24 no.4
    • /
    • pp.83-97
    • /
    • 2015
  • Purpose: Traditionally, information technology acceptance have been considered one of the most important research issues. However non-acceptance, which was main objective of acceptance theories, have not been included in main research area by communities of information systems. This study is to identify the factors influencing non-acceptance of information technology and suggest a total research model for explaining the phenomena of non-acceptance. Design/methodology/approach: Grounded theory was adopted as a principal research method. which is an inductive technique of interpreting qualitative data about a social phenomenon to build theories about that phenomenon. Data were collected by depth interview and open question on potential non-adopters during 3 months. The collected data were coded by two main coding paradigm in ground theory, open coding and axis coding. Findings: Factors influencing non-acceptance, status quo, imitation, value evaluation, and concerning risk were extracted from open coding. These factors were integrated into system 1 thinking and system 2 thinking, which were from axis coding. More specifically, status quo and imitation are system 1 thinking which are more responsive and emotional thinking and value evaluation and concerning risk are system 2 thinking which are more rational and reasoning thinking.