scholarly journals Trace data visualisation enquiry: a methodological coupling for studying information practices in relation to information systems

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Björn Ekström

PurposeThe purpose of this paper is to examine whether and how a methodological coupling of visualisations of trace data and interview methods can be utilised for information practices studies.Design/methodology/approachTrace data visualisation enquiry is suggested as the coupling of visualising exported data from an information system and using these visualisations as basis for interview guides and elicitation in information practices research. The methodology is illustrated and applied through a small-scale empirical study of a citizen science project.FindingsThe study found that trace data visualisation enquiry enabled fine-grained investigations of temporal aspects of information practices and to compare and explore temporal and geographical aspects of practices. Moreover, the methodology made possible inquiries for understanding information practices through trace data that were discussed through elicitation with participants. The study also found that it can aid a researcher of gaining a simultaneous overarching and close picture of information practices, which can lead to theoretical and methodological implications for information practices research.Originality/valueTrace data visualisation enquiry extends current methods for investigating information practices as it enables focus to be placed on the traces of practices as recorded through interactions with information systems and study participants' accounts of activities.

2015 ◽  
Vol 71 (6) ◽  
pp. 1119-1134 ◽  
Author(s):  
J. Tuomas Harviainen ◽  
Juho Hamari

Purpose – The purpose of this paper is to discuss the ways in which information acts as a commodity in massively multiplayer online role-playing games (MMORPGs), and how players pay for items and services with information practices. Design/methodology/approach – Through meta-theoretical analysis of the game environment as a set of information systems, one of retrieval and one social, the paper shows how players’ information practices influence their access to game content, organizational status and relationship to real-money trade. Findings – By showing how information trading functions in MMORPGs, the paper displays the importance of information access for play, the efficiency of real money trade and the significance of information practice -based services as a relatively regular form of payment in virtual worlds. Players furthermore shown to contribute to the information economy of the game with the way in which they decide not to share some information, so as to prevent others from a loss of game content value due to spoilers. Originality/value – The subject, despite the popularity of online games, has been severely understudied within library and information science. The paper contributes to that line of research, by showing how games function as information systems, and by explaining how they, as environments and contexts, influence and are influenced by information practices.


2021 ◽  
Vol 807 ◽  
pp. 140873
Author(s):  
F. Khodabakhshi ◽  
A.P. Gerlich ◽  
D. Verma ◽  
M. Nosko ◽  
M. Haghshenas

2018 ◽  
Author(s):  
Nicholas J. Roberts ◽  
Bernhard T. Rabus ◽  
John J. Clague ◽  
Reginald L. Hermanns ◽  
Marco-Antonio Guzmán ◽  
...  

Abstract. We characterize and compare creep preceding and following the 2011 Pampahasi landslide (∼ 40 Mm3 ± 50 %) in the city of La Paz, Bolivia, using spaceborne RADAR interferometry (InSAR) that combines displacement records from both distributed and point scatterers. The failure remobilised deposits of an ancient landslide in weakly cemented, predominantly fine-grained sediments and affected ∼ 1.5 km2 of suburban development. During the 30 months preceding failure, about half of the toe area was creeping at 3–8 cm/a and localized parts of the scarp area showed displacements of up to 14 cm/a. Changes in deformation in the 10 months following the landslide are contrary to the common assumption that stress released during a discrete failure increases stability. During that period, most of the landslide toe and areas near the headscarp accelerated, respectively, to 4–14 and 14 cm/a. The extent of deformation increased to cover most, or probably all, of the 2011 landslide as well as adjacent parts of the slope and plateau above. The InSAR-measured displacement patterns – supplemented by field observations and by optical satellite images – indicate that kinematically complex, steady-state creep along pre-existing sliding surfaces temporarily accelerated in response to heavy rainfall, after which the slope quickly achieved a slightly faster and expanded steadily creeping state. This case study demonstrates that high-quality ground-surface motion fields derived using spaceborne InSAR can help to characterize creep mechanisms, quantify spatial and temporal patterns of slope activity, and identify isolated small-scale instabilities. Characterizing slope instability before, during, and after the 2011 Pampahasi landslide is particularly important for understanding landslide hazard in La Paz, half of which is underlain by similar, large paleolandslides.


2017 ◽  
Vol 30 (2) ◽  
pp. 320-334 ◽  
Author(s):  
Bénédicte Branchet ◽  
Pierre-Yves Sanseau

Purpose Existing research infers that in the information systems (IS) and information technology (IT) fields, a shift may occur between technical and non-technical skills. However, relatively little research has focused on going changes in terms of key skills in the IS suppliers sector. The purpose of this paper is to address this gap by investigating these skills evolution in the IS suppliers domain and discusses their impacts on IS and IT curricula. Design/methodology/approach This paper uses a qualitative method based on 15 semi-structured face-to-face interviews, with highly dedicated operational managers in senior positions in the field. Findings This study identifies, for the IS suppliers, the critical skills, which are basically non-technical, and peripheral skills, which are primarily technical. It then considers the consequences of this change and the necessary adaptations it requires for businesses and training for this field. Practical implications The findings suggest the need to redesign the educational curricula for future managers, and the adaptations required to the work organization, human resource management and business models of firms in the field. Originality/value The paper’s value is twofold. First, it focuses on IS service suppliers, an understudied area (most research examines IS outsourcing from the customer’s standpoint); second, it reveals the shift away from technical toward non-technical skills in a field that is intrinsically technical – a change that may occur more slowly than in other less technical sectors – and the consequences of this change for firms, education and society.


2015 ◽  
Vol 21 (4) ◽  
pp. 771-790 ◽  
Author(s):  
Luay Anaya ◽  
Mohammed Dulaimi ◽  
Sherief Abdallah

Purpose – The purpose of this paper is to articulate clear understanding about the role of enterprise information systems (EIS) in developing innovative business practices. Particularly, it aims to explore the different ways that make EIS enables innovation development. Design/methodology/approach – The study adopted exploratory case study, based on qualitative approach. Investigations included two case studies each involved interviewing a number of senior information technology staff, working at these cases. Findings – The paper provides empirical insights about the EIS role in enabling innovation. The analysis of the case studies revealed that integrating an EIS with other system(s) or with digital devices can provide new practices that could not be easily available without these technologies. The study also found that applying data analytics tools into data accumulated from EIS, to extract new insights, lead to innovative practices. Practical implications – The study provides a set of recommendations for organizations interested to maximize the benefits from their investments in EIS. Originality/value – The paper provides evidences from cases in United Arab Emirates for the EIS role in enabling business innovation.


2017 ◽  
Vol 37 (3/4) ◽  
pp. 203-217 ◽  
Author(s):  
Jan Windebank ◽  
Ioana Alexandra Horodnic

Purpose France is a model of best practice in the European Union as regards policy to combat undeclared work. The purpose of this paper is to take the country as a case study to evaluate the competing explanations of why people engage in undeclared work which underpin such policy, namely, the dominant rational-economic-actor approach and the more recent social-actor approach. Design/methodology/approach To evaluate these approaches, the results of 1,027 interviews undertaken in 2013 with a representative sample of the French population are analysed. Findings The finding is that higher perceived penalties and risks of detection have no significant impact on the likelihood of conducting undeclared work in France. In contrast, the level of tax morale has a significant impact on engagement in the activity: the higher the tax morale, the lower is the likelihood of participation in the undeclared economy. Higher penalties and risks of detection only decrease the likelihood of participation in undeclared work amongst the small minority of the French population with very low tax morale. Practical implications Current policy in France to counter undeclared work is informed principally by the rational-economic-actor approach based on a highly developed infrastructure for detection and significant penalties alongside incentives to declare small-scale own-account work. The present analysis suggests that this approach needs to be supplemented with measures to improve citizens’ commitment to compliance by enhancing tax morale. Originality/value This case study of a country with a well-developed policy framework to combat undeclared work provides evidence to support the social-actor approach for informing policy change.


2014 ◽  
Vol 27 (2) ◽  
pp. 197-227 ◽  
Author(s):  
Demosthenes Akoumianakis

Purpose – The purpose of this paper is to investigate boundary spanning tactics in a cross-organizational virtual alliance and discuss the analytical value of “digging” into technology for excavating boundaries and understanding their dynamic and emergent features. Design/methodology/approach – Although boundaries, their role and implications have been extensively investigated across a variety of online settings, the results are inconclusive as to the features of technology that create, dissolve or re-locate boundaries. This is attributed to the fact that in most cases technology is addressed as a black box – a discrete artefact of practice – without seeking justification for the inscribed functions that enable or constrain use. The paper overcomes these shortcomings by analysing digital trace data compiled through a virtual ethnographic assessment of a cross-organizational tourism alliance. Data comprise electronic traces of online collaboration whose interpretive capacity is augmented using knowledge visualization techniques capable of revealing dynamic and emergent features of boundary spanning. Findings – Boundary spanning in virtual settings entails micro-negotiations around several types of boundaries. Some of them are either enforced by or inscribed into technology, while others are enacted in practice. Knowledge visualization of digital trace data allows “excavation” of these boundaries, assessment of their implications on distributed organizing of online ensembles and discovery of “hidden” knowledge that drives boundary spanning tactics of collaborators. Practical implications – In cross-organizational collaborative settings, boundary spanning represents an enacted capability stemming from the intertwining between material and social/collective agencies. Consequently, boundaries surface as first class design constructs, directing design attention not only to features inscribed in technology (i.e. user profiles, registration mechanisms, moderation policies) but also the way such features are appropriated to re-shape, re-locate or dissolve boundaries. Originality/value – An empirical data pool compiled through virtual ethnographic assessment of online collaboration is revisited and augmented with knowledge visualization techniques that enhance the interpretive capacity of the data and reveal “hidden” aspects of the collaborators’ boundary spanning behaviour and tactics.


2015 ◽  
Vol 7 (4) ◽  
pp. 425-440
Author(s):  
John M Parkinson ◽  
George K. Riro ◽  
Nelson M Waweru

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Susan Ramlo ◽  
John B. Nicholas

Purpose The purpose of this paper is to reveal and describe the divergent viewpoints about cybersecurity within a purposefully selected group of people with a range of expertise in relation to computer security. Design/methodology/approach Q methodology [Q] uses empirical evidence to differentiate subjective views and, therefore, behaviors in relation to any topic. Q uses the strengths of qualitative and quantitative research methods to reveal and describe the multiple, divergent viewpoints that exist within a group where individuals sort statements into a grid to represent their views. Analyses group similar views (sorts). In this study, participants were selected from a range of types related to cybersecurity (experts, authorities and uninformed). Findings Four unique viewpoints emerged such that one represents cybersecurity best practices and the remaining three viewpoints represent poor cybersecurity behaviors (Naïve Cybersecurity Practitioners, Worried but not Vigilant and How is Cybersecurity a Big Problem) that indicate a need for educational interventions within both the public and private sectors. Practical implications Understanding the divergent views about cybersecurity is important within smaller groups including classrooms, technology-based college majors, a company, a set of IT professionals or other targeted groups where understanding cybersecurity viewpoints can reveal the need for training, changes in behavior and/or the potential for security breaches which reflect the human factors of cybersecurity. Originality/value A review of the literature revealed that only large, nation-wide surveys have been used to investigate views of cybersecurity. Yet, surveys are not useful in small groups, whereas Q is designed to investigate behavior through revealing subjectivity within smaller groups.


Sign in / Sign up

Export Citation Format

Share Document