× خانه ژورنال ها پست ها ثبت نام ورود

managing user capabilities in information systems life cycle: conceptual modeling

نویسندگان

harekrishna misra professor, department of it & systems institute of rural management anand, india

چکیده

information systems (is) acquisition prescribes induction of information technologies (it) in the organization. at times, is is used for managing broader enterprise level issues like implementing e-business, e-commerce. enterprise level issues are addressed through adequate involvement of people in the organization which are termed as “user capabilities”. managing user capabilities is critical since their roles are very important in the entire systems development life cycle (sdlc). it is seen that failures in it acquisition are not because of the technology, but failure in choosing it rightly, and poor user capabilities. if planned properly, user capabilities can contribute effectively to sdlc. sdlc works in stages with different sets of users and insensitivities to users contribute to the gap between satisfying organizational needs and end-user deliveries. this problem can be addressed by carefully integrating user capability issues in the sdlc process. in this paper a framework is suggested to capture user capabilities in an it acquiring organization. user capabilities are identified in two categories: it users who are it experts and involved in design, development, and implementation of sdlc driven projects, and, second, non-it users who, despite having inadequate or no exposure to it, contribute to sdlc driven projects. the framework is implemented through unified modelling language (uml) based approach. a case discusses the utility of this approach.

جستجوی کلمه کلیدی


برای دسترسی به متن کامل این مقاله و 10 میلیون مقاله دیگر ابتدا ثبت نام کنید.


ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

ورود

منابع مشابه

This paper provides new ways to explore the old problem of failure of information systems development in an organisation. Based on the theory of cognitive dissonance, information systems (IS) failure is defined as a gap between what the users expect from an information system and how well these expectations are met by the perceived performance of the delivered system. Bridging the expectation-p...

This paper provides new ways to explore the old problem of failure of information systems development in an organisation. Based on the theory of cognitive dissonance, information systems (IS) failure is defined as a gap between what the users expect from an information system and how well these expectations are met by the perceived performance of the delivered system. Bridging the expectation-p...

The requirements imposed on information retrieval systems are increasing steadily. The vast number of documents in today’s large databases and especially on the World Wide Web causes problems when searching for concrete information. It is difficult to find satisfactory information that accurately matches user information needs even if it is present in the database. One of the key elements when ...

The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users.  From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...

Information systems built using standards‐based distributed services have become the default computing paradigm adopted by the geospatial community for building information infrastructures also known as Spatial Data Infrastructures (SDI). Government mandates such as the INSPIRE European Directive recommend standards for sharing resources (e.g. data and processes) with the goa...

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...