A systematic assessment of rigor in information systems ranking-type Delphi studies

2013 ◽  
Vol 50 (5) ◽  
pp. 207-217 ◽  
Author(s):  
Guy Paré ◽  
Ann-Frances Cameron ◽  
Placide Poba-Nzaou ◽  
Mathieu Templier
Author(s):  
Ayman Alarabiat ◽  
Isabel Ramos

After almost 30 years of being used in the information system (IS) discipline, only a few studies have focused on how IS scholars apply the method's guidelines to design Delphi studies. Thus, this paper focuses on the use of the Delphi method in IS research. To do so, articles published between 2004 and 2017 in the Senior IS Scholars' collection of journals of the Association of Information Systems (AIS), describing Delphi studies, were analised. Based on analysis of sixteen (16) retrieved IS studies, we concluded that IS researchers have applied the method’s most important phases and the procedural recommendations to promote rigor were considered in the majority of the analised studies. Nonetheless, IS researchers still need to include detailed information about (1) the steps taken to ensure the validity of the achieved results, (2) better describe the process of selecting and recruiting the experts, and (3) experiment with innovative techniques to keep participants involved in the Delphi process.


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


Crisis ◽  
2010 ◽  
Vol 31 (6) ◽  
pp. 303-310 ◽  
Author(s):  
Bas Verwey ◽  
Jeroen A. van Waarde ◽  
Molla A. Bozdağ ◽  
Iris van Rooij ◽  
Edwin de Beurs ◽  
...  

Background: Assessment of suicide attempters in a general hospital may be influenced by the condition of the patient and the unfavorable circumstances of the hospital environment. Aims: To determine whether the results of a reassessment at home shortly after discharge from hospital differ from the initial assessment in the hospital. Methods: In this prospective study, systematic assessment of 52 suicide attempters in a general hospital was compared with reassessment at home, shortly after discharge. Results: Reassessments at home concerning suicide intent, motives for suicide attempt, and dimensions of psychopathology did not differ significantly from the initial hospital assessment. However, patients’ motives for the suicide attempt had changed to being less impulsive and more suicidal, worrying was significantly higher, and self-esteem was significantly lower. A third of the patients had forgotten their aftercare arrangements and most patients who initially felt no need for additional help had changed their mind at reassessment. Conclusions: Results from this group of suicide attempters suggest that a brief reassessment at home shortly after discharge from hospital should be considered.


1993 ◽  
Vol 38 (10) ◽  
pp. 1094-1095
Author(s):  
Scott P. Robertson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document