Production control and information systems

Author(s):  
A. -W. Scheer
Author(s):  
Anak Agung Nyoman Sukawati ◽  
Ivanna Handayani Widjaya ◽  
Alexander Uly ◽  
Heni Heni

The purpose of this study is to determine the extent to which the operational performance of information systems for inventory based on user perceptions of information systems. The research method used is survey method, descriptive techniques, and capture data using a questionnaire and before use, calibrated test item validity and reliability test. The technical data analysis used a range of criteria and methods of Pearson (Product Moment), and data processing with the help of SPSS version 12.0, and Microsoft Excel. The results of this study the overall average of 14.48 on a scale indicator from 10.6 to 15.0, where the network operating indicators, preparation and data entry, and production control showed less good. The conclusion shows that the perception of users on information systems for inventory runs poorly.Keywords: operational implementation, inventory information system, range criterion method, Pearson correlation method


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


Sign in / Sign up

Export Citation Format

Share Document