Management Information Systems for the Information Age (4th ed.)

2004 ◽  
Vol 17 (4) ◽  
Author(s):  
Adriane B. Davis
Author(s):  
Youcef Baghdadi

This chapter introduces the concept-oriented course architecture (COCA); an architecture that utilizes IS concept as a fundamental building block to guide a methodology for designing and teaching IS courses. COCA aims at supporting rapid composition of IS course/curriculum out of a sound and complete set of IS concepts provided by well-specified business models, market or standardization organizations such as ACM and IEEE. COCA is defined, composed of three roles: (R1) concept providers, (R2) a concepts registry, and (R3) IS course/curriculum designers. These roles interact through four operations in order to design/teach an IS course/curriculum: (O1) publish, (O2) consider, (O3) validate, and (O4) teach. This methodology, based on a flexible, scalable, well-specified architecture of the IS concepts and their organization, will assist the complex and resource-consuming task of designing and teaching IS courses in the information age, where the IS tools, including management information systems (MIS) and information technology (IT) are rapidly evolving.


2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


10.1596/28261 ◽  
2017 ◽  
Author(s):  
Namrata Saraogi ◽  
Diana Katharina Mayrhofer ◽  
Husein Abdul-Hamid

Ubiquity ◽  
2006 ◽  
Vol 2006 (October) ◽  
pp. 2-2
Author(s):  
Jose L. Salmeron

Sign in / Sign up

Export Citation Format

Share Document