In this paper, we discuss the nature and use of the Delphi methodology in information systems research. More specifically, we explore how and why it may be used. We discuss criteria for evaluating Delphi research and define characteristics useful for categorizing the studies. We review Delphi application use in IS research over the last 23 years, summarize lessons learned from prior studies, offer suggestions for improvement, and present guidelines for employing this distinctly useful qualitative method in future information systems research studies.
E-Health systems include applications of information communication technologies topromote healthcare services support, delivery and education. The success of an E-Health system is very much dependent on the success of EHR systems, as EHR forms the core of any E-Health system. Readiness assessment has been identified as an essential requirement for the success of EHR in terms of adoption rate and/or acceptance. Through a literature review of current E-Health readiness frameworks, it is observed that most studied components reflect healthcare providers' and organisational perspectives but there is an inconsistent coverage of the evaluation components. Further, an unclear measure of readiness levels poses another problem for E-Health readiness assessment. This paper presents an E-Health readiness assessment framework by integrating components of each reviewed framework and quantifying constructs (a graph-based approach) within the new framework.
Privacy has become the key concern of many users when they are confronted with friend requests on online social networking websites. Nonetheless, users' responses to friend requests seem at times inconsistent with their concerns about potential privacy implications. They accept friend requests and expose their personal profiles to largely unfamiliar others even though they are aware of the risks involved. Drawing on impression formation theory and the privacy calculus perspective, this paper elucidates the intriguing roles of privacy risks and expected social capital gains in social connectivity management by examining the key types of social information that users consider and their behavioral responses to online friend requests. We conducted a scenariobased experiment with 141 subjects. Our results indicate that individuals utilize two key types of social information; namely, network mutuality and profile diagnosticity in evaluating privacy risks and expected social capital gains. In addition, we find that privacy risks and expected social capital gains powerfully predict the likelihood of no-action and the likelihood of accepting friend requests on online social networking websites. In sum, this study contributes to the information systems literature by integrating impression formation theory and the privacy calculus perspective to identify the key types of social information that influence privacy tradeoff and predict individuals' behavioral responses toward establishing new online social connections.
Software inspection is often seen as a technique to produce quality software. It has been claimed that expertise is a key determinant in inspection performance particularly in individual detection and group meetings [38]. Uncertainty among reviewers during group meetings due to lack of expertise is seen as a weakness in inspection performance. One aspect of achieving expertise is through education or formal training. Recent theoretical frameworks in software inspection also support the idea of possible effects of training on inspection performance [38]. To investigate this further, two laboratory experiments were conducted to test the effects of training using defect examples. Our findings show conflicting results between the two experiments, indirectly highlighting the importance of an effective inspection process. The results have implications for the use of a repository of defect examples for training reviewers.
Electronic health (e-health) is probably one of the most significant contributions of Information Communication Technology (ICT) in present day's healthcare. ICT efficiently bridges healthcare sector and technology for e-health implementation, which is a costly affair due to involvement of considerable amount of planning and investment. Preparedness, on the other hand can be defined as a state of readiness prior taking any action and applicable for implementing any e-health project.
Study of preparedness essentially i) renders insight to the existing resources, ii) specifies the requirements for successful implementation of a project, and iii) helps set up strategies for the said implementation. Preparedness may be assessed at various levels of e-health implementations, such as ICT, Application, Service, Process and Government or Organizational levels. The present work focuses at the very initial level i.e. ICT and proposes an ICT-preparedness-framework for e-health implementation. The proposed ICT-preparedness framework is a conceptual one and is based on two different applications -A)connected graph-based approach to capture and in turn quantify some of the ICT constructs (Hardware, Connectivity, Software and Skills) and their respective indicators and B) a fuzzy setbased technique to assess the preparedness levels of these constructs. Finally the framework is discussed with an e-health scenario on Tele-cardiology.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.