Towards Internal Modelling of the Information Systems Application Domain

Informatica ◽  
2016 ◽  
Vol 27 (1) ◽  
pp. 1-29 ◽  
Author(s):  
Saulius Gudas ◽  
Audrius Lopata
2018 ◽  
Vol 2 (2) ◽  
pp. 76 ◽  
Author(s):  
Deogratius Mathew Lashayo ◽  
Md Gapar Md Johar

Current studies show that there is no comprehensive adoption model in e-learning systems in universities. This problem opens up to too much debates about which models and frameworks fit well in an e-learning environment particularly in universities in Tanzania. This paper answers the two debatable questions, which are:(1) what are the factors that affect adoption of e-learning systems in Tanzania’s universities, (2) what is the comprehensive e-learning adoption model in universities in Tanzania. This research study adapts DeLone and McLean (2003) IS model after an extensive literature reviews conducted in information systems and in e-learning systems. The findings from this research will add up to literature of limited factors’ model and it will open it up for validation in a different universities’ application domain.


2018 ◽  
Vol 7 (2) ◽  
Author(s):  
Jonás Montilva C ◽  
Judith Barrios A

An important premise of most of the contemporary methods for developing Software and Information Systems is that a good understanding of the application domain is essential for a comprehensive definition of its requirements. However, when these methods are applied to the enterprise context, it is very unclear what an application domain means. To solve this problem, we elaborate the notion of business system and propose a method based on such notion for modeling application domains of Enterprise Information Systems (EIS). This method helps EIS development teams to get comprehensive knowledge about EIS application domains. This knowledge is expressed in terms of the fundamental concepts of a business system: goals, technologies, business rules, business processes, business objects, actors, job structure, and events. The method is described in terms of three methodological components: a product model, a process model, and a team model. This structure facilitates the explanation, understanding and application of the method.


Author(s):  
Marie-Noella Terrasse ◽  
George Becker ◽  
Marinette Savonnet

Metamodeling, which is extensively used in information system analysis & design, provides modelers with two complementary mechanisms for abstraction: abstraction by projection and abstraction by conceptualization. Metamodeling architectures are becoming a backbone of modeling environments in which modeling is carried out through a two-stage process: first, defining a convenient metamodel for the application domain, and second, describing the model of the application as an instantiation of the application-domain metamodel. We propose to use metamodeling —and its abstraction mechanisms— for modeling of web-enabled information systems and achieving their interoperability. Abstraction by projection allows us to describe user-specific features of web-enableb information systems and their security aspects more accurately. Abstraction by conceptualization allows us to define abstract bases of agreement for interoperability of web-based information systems.


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


1993 ◽  
Vol 38 (10) ◽  
pp. 1094-1095
Author(s):  
Scott P. Robertson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document