71
MIS TOP RESEARCHERS AND KEY PAPERS by Chiening Lin, Dennis C. Wilson, Duffy Gillman, Gondy Leroy, H.Wayne Anderson, Karen Martin, Kimberly Brewer, Liming Zhang, Lin Lin, Marsha Ham, Paul Lowry, Taeha Kim, Yousub Hwang submitted to Dr. Jay Nunamaker MIS 696/797A GROUP December 15, 1999

Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

Embed Size (px)

Citation preview

Page 1: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

MIS TOP RESEARCHERS AND

KEY PAPERSby

Chiening Lin, Dennis C. Wilson, Duffy Gillman, Gondy Leroy, H.Wayne Anderson, Karen Martin, Kimberly Brewer, Liming Zhang, Lin Lin, Marsha

Ham, Paul Lowry, Taeha Kim, Yousub Hwang

submitted to Dr. Jay Nunamaker

M I S 6 9 6 / 7 9 7 A G R O U P

December 15 , 1999

Page 2: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

INTRODUCTION .......................................................................................................................... 5

OUR MODEL.....................................................................................................................................5MIS THEORY...................................................................................................................................6KEY CONTROVERSIES......................................................................................................................6ACADEMIC LEGITIMACY....................................................................................................................6METHODS AND METHODOLOGIES.....................................................................................................7

ECONOMICS/DECISION SCIENCE/OR ................................................................................... 9

INTRO................................................................................................................................................9TOP RESEARCHERS...........................................................................................................................9ERIC BRYNJOLFSSON.........................................................................................................................9MORRIS A COHEN.............................................................................................................................9HAU L LEE......................................................................................................................................10JAMES R. MARSDEN........................................................................................................................11HAIM MENDELSON..........................................................................................................................11TOP ARTICLES................................................................................................................................12

KM/AI/IR ...................................................................................................................................... 13

INTRO..............................................................................................................................................13TOP RESEARCHERS.........................................................................................................................14HSINCHUN CHEN.............................................................................................................................14THOMAS DAVENPORT.....................................................................................................................15GARY MARCHIONINI.......................................................................................................................15GERARD SALTON (1927-1995)........................................................................................................15HERBERT A. SIMON.........................................................................................................................16TOP ARTICLES................................................................................................................................16

HCI/PSYCHOLOGY/VISUALIZATION/COMMUNICATION ............................................ 17

INTRO..............................................................................................................................................17TOP RESEARCHERS.........................................................................................................................18DONALD NORMAN...........................................................................................................................18JAKOB NIELSEN...............................................................................................................................19PETER J. DENNING..........................................................................................................................19DAVID LIDDLE................................................................................................................................20TERRY ALLEN WINOGRAD..............................................................................................................20TOP ARTICLES................................................................................................................................21

2

Page 3: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

INTERNATIONAL (POLICY FOUNDATION) ....................................................................... 22

INTRO..............................................................................................................................................22TOP RESEARCHERS.........................................................................................................................22SY GOODMAN..................................................................................................................................22ELI NOAM........................................................................................................................................23LARRY PRESS..................................................................................................................................23TOP ARTICLES................................................................................................................................24

SOCIAL ISSUES/ETHICS .......................................................................................................... 24

INTRO..............................................................................................................................................24TOP RESEARCHERS.........................................................................................................................25MARY J. CULNAN............................................................................................................................25SARA KIESLER.................................................................................................................................25ROB KLING......................................................................................................................................25RICHARD O. MASON.......................................................................................................................26TOP ARTICLES................................................................................................................................26

DATABASES ................................................................................................................................ 28

INTRO..............................................................................................................................................28TOP RESEARCHERS.........................................................................................................................28PETER PIN-SHAN CHEN...................................................................................................................28E. F. CODD......................................................................................................................................29WON KIM........................................................................................................................................29SALVATORE T. MARCH...................................................................................................................30SUDHA RAM....................................................................................................................................30TOP ARTICLES................................................................................................................................31

GSS ................................................................................................................................................. 32

INTRO..............................................................................................................................................32TOP RESEARCHERS.........................................................................................................................33JERRY DESANCTIS...........................................................................................................................33R. BRENT GALLUPE.........................................................................................................................33SARA KIESLER.................................................................................................................................34JAY F. NUNAMAKER, JR. .................................................................................................................34JUDY OLSEN....................................................................................................................................35TOP ARTICLES................................................................................................................................35

3

Page 4: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

TELECOMMUNICATIONS/SECURITY ................................................................................. 37

INTRO ........................................................................................................................................... 37

TOP RESEARCHERS.........................................................................................................................37ROCH GUERIN.................................................................................................................................37AUREL A. LAZAR............................................................................................................................37THOMAS L. MAGNANTI...................................................................................................................38STEVE MCCANNE............................................................................................................................38DAVID WETHERALL........................................................................................................................38TOP ARTICLES................................................................................................................................39

SYSTEMS ANALYSIS AND DESIGN ....................................................................................... 41

INTRO..............................................................................................................................................41TOP RESEARCHERS.........................................................................................................................41GRADY BOOCH................................................................................................................................41PETER CHECKLAND.........................................................................................................................42WATTS HUMPHREY.........................................................................................................................42ROGER PRESSMAN...........................................................................................................................43EDWARD YOURDON........................................................................................................................43TOP ARTICLES................................................................................................................................43

E-COMMERCE ............................................................................................................................ 43

INTRO..............................................................................................................................................43TOP RESEARCHERS.........................................................................................................................44LYNDA APPLEGATE.........................................................................................................................44ALOK GUPTA...................................................................................................................................44RAVI KALAKOTA.............................................................................................................................44ANDREW B. WHINSTON..................................................................................................................45VLADIMIR ZWASS............................................................................................................................45TOP ARTICLES................................................................................................................................45

APPENDIX A: ALL RESEARCHERS (ALPHABETIC ORDER) ......................................... 48

APPENDIX B : BIBLIOGRAPHY ............................................................................................. 50

4

Page 5: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

5

Page 6: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

IntroductionDefinitions of MIS have been proposed in technical and business literature over the past four decades. Many refer to specific technologies and techniques that may not be broadly applicable to the practice and applications that researchers and IS professionals consider MIS. Widely received definitions include broad statements about the structure of management information systems as entities and as a subject of research. While debate continues within the academic MIS community as to the proper roles of reference disciplines and business practices, a survey of introductory MIS texts resoundingly agrees with the tenets of a definition offered by Brabb1, chosen here for its succinctness:

A management information system is the complement of people, machines, and procedures that develops the right information and communicates it to the right managers at the right time.

The inclusion of people, machines, procedures, information, communication and management in this definition serves to highlight the critical fact that MIS draws from a wide range of scholarly disciplines. Understanding this fact offers a unique challenge to students and researchers. It is the complexity of MIS, in part, that shapes our map of the prominent research and researchers within MIS.

Our ModelOur model of MIS flows from the multidisciplinary nature of MIS and includes some basic assumptions about the field. The first is that our model should reflect both research streams and historical literature for the field. Second, the model has to capture primary areas of research, their relation to each other, the reference disciplines and their theoretical differences, and trends in research.

This map of the field is intended for an academic audience, and reflects our need as beginning academics to understand this multidisciplinary field, and how our research interests are connected to MIS and to the key researchers in the field. It is not intended to be a complete and comprehensive picture of the MIS field, a review of all of the foundation articles for MIS academics, which would include reviews of the reference disciplines, or our judgement of methods and methodologies used by researchers.

The foundation articles and the list of key researchers have the same limitations and cautions. The articles were chosen because they provide the necessary foundation for understanding MIS research. The list of researchers is not intended to be comprehensive or exhaustive, but to act as an abbreviated directory of key MIS researchers who are influencing the direction of research. This excludes some very influential researchers who consider their primary research domain to be one of the reference disciplines.

Keeping the above precautions in mind, our model divides MIS into the following research focus areas:

Economics of IS /Decision Science/OR Knowledge Management/Artificial Intelligence/Information RetrievalHCI/Psychology/Visualization/Communication International IS (Policy Issues)Social Issues/EthicsDatabasesGSS

1 Brabb, George J. Computers and Information Systems in Business. Houghton Mifflin Co., Boston. 1976, pp. 26, 37.

6

Page 7: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Data Communication/Security

System Analysis and DesignElectronic Commerce

Each of these research areas is represented as a layer along three axes: 1. The Behavioral - Technical axis represents research according to its focus on the behavioral or

technical aspects of MIS.2. The Rigor - Relevance axis represents the research methodology and methods used to gain knowledge.

These labels are only convenient abstractions and do not reflect our judgements about the usefulness or theoretical content of the research: Rigor refers to the basis and methods of research. Dr. Dror's research, for example, relies heavily on mathematical proofs, which would place it on the rigor side of the axis. Rigor also includes the use of controlled laboratory experiments. Relevance, on the other hand, refers to the applicability of the research for practitioners. Dr. Nunamaker's system-building approach (if we ignore for a moment its theoretical underpinnings and implications) would be placed on the relevance side of this axis.

3. The third axis, Emerging, is intended to show changes in the direction of research over time and the growth of new streams within the research area.

The layers can be superimposed on each other to show overlaps, give an overview of the field, and show interrelationships among researchers and research streams.

Color, distance, and groupings aid in the interpretation of the model. New layers can be created as research areas are established and layers can be retired, as they become part of the core of the discipline.

MIS TheoryMIS theory is a reflection of the theoretical underpinnings of the reference disciplines and the emergence of a stream of IS research. With some philosophical reservations, we have accepted the IS research framework and terminology proposed in Marcus and Robey, 1988, as the common basis for our evaluation of theory of MIS. Because much IS research is grounded in the conflicting theories and methodologies of the reference disciplines, we limited ourselves to basic IS theory. There are three main schools of thought and research streams:

1. The Technological Imperative school assumes that information technology changes behavior. Researchers from this school often refer to the "impact of technology."

2. The Organizational Imperative school assumes that rational actors choose technologies and apply them to information needs.

3. The Emergent school assumes that the intersection of technologies and people creates complex interactions. 2

Key Controversies

Academic legitimacyMultidisciplinary programs are relatively new to postwar academia. Traditional disciplines view multidisciplinary programs as threats, competitors, atheoretical, unnecessary, nonacademic, or simply as research themes. These perceptions and characterizations of MIS (and other multidisciplinary programs)

2 Marcus, M. Lynne and Daniel Robey, "Information Technology and Organizational Change: Causal Structure in Theory and Research;" Management Science, Col. 34, No. 5, May 1988, pp. 583-598

7

Page 8: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

are held as strongly today as they were in 1980, when Peter Keen presented his paper at the 1st ICIS.3 The legitimacy of MIS as an academic discipline is still not established for the much of academe.This controversy is reflected within the discipline, too. In a pair of papers published back-to-back in 1996, Benbasat and Weber dispute Robey's claim that diversity in methods and methodologies is a source of strength for the MIS field. Benbasat and Weber call for common MIS research methodologies and methods because they see the continued dependence on the reference disciplines as a threat to IS. They point out that founding researchers have deserted the field, that reference disciplines are "poaching" on traditionally IS research themes, and that there are serious disputes within the field over the "validity" and "theoretical content" of different research methods.4 Robey argues that it is the nature of multidisciplinary studies that creates these disputes and also the opportunity to examine or even resolve them by including different perspectives.5

Methods and MethodologiesMIS research is characterized by the wholesale adoption of methods and methodologies from the reference disciplines. Some, however, have been adapted to the unique needs of IS research. One typical approach is to use survey methodology. Pinsonneault and Kraemer's critique of survey research in MIS includes suggestions for a uniquely MIS methodology to ensure the quality and validity of research.6 Their approach is an extension and expansion of Detmar Straub's call for validation of research instruments.7

At the same time, in order to address the concerns of researchers with a natural sciences background, Allen Lee proposes a case study methodology that "satisfies the standards of the natural science model of scientific research."8 In order to address concerns that case study research in general is atheoretical, Kathleen Eisenhardt describes a process for building testable, empirically valid theory using case study research.9

Reflecting the multidisciplinary nature of MIS, many researchers advocate the use of multiple methodologies and methods. Kaplan and Duchon's call to combine quantitative and qualitative methods and perspectives to a single research problem lets researchers gain insights that a single methodology or method cannot provide.10 Orlikowski and Baroudi found common threads among research methods and methodologies used and also call for a multidisciplinary and multi-methodological approach to IS research.11

3 Keen, Peter G. W., "MIS Research: Reference Disciplines and a Cumulative Tradition;" Proceeding of the First International Conference on Information Systems, December 8-10, 1980, Philadelphia, PA, pp. 9-184 Benbasat, Izak and Ron Weber, "Research Commentary: Rethinking "Diversity" in Information Systems Research;" Information Systems Research, Vol. 7, No. 4, December 1998, pp. 389-3995 Robey, Daniel, "Research Commentary: Diversity in Information Systems Research: Threat, Promise, and Responsibility;" Information Systems Research, Vol. 7, No. 4, December 1998, pp. 400-4086 Pinsonneault, Alain and Kenneth L. Kraemer, "Survey Research Methodology in Management Information Systems: An Assessment;" Journal of Management Information Systems, Vol. 10, No. 2, Fall 1993, pp.75-1057 Straub, Detmar W., "Validating Instruments in MIS Research;" MIS Quarterly, June 1989, pp. 147-1708 Lee, Allen S., "A Scientific Methodology for MIS Case Studies;" MIS Quarterly, March 1989, pp. 33-509 Eisenhardt, Kathleen M., "Building Theories form Case Study Research;" Academy of Management Review, Vol. 14, No. 4, 1989, pp. 532-55010 Kaplan, Bonnie and Dennis Duchon, "Combining Qualitative and Quantitative Methods in Information Systems Research: A Case Study;" MIS Quarterly, December 1988, pp. 571-58611 Orlikowski, Wanda J. and Jack J. Baroudi, "Studying Information Technology in Organizations: Research Approaches and Assumptions;" Information Systems Research 2: 1, 1991, pp. 1-28

8

Page 9: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Another important approach to MIS research is Jay Nunamaker's system-building approach, which is explicitly multi-methodological and provides a map for building systems that test assumptions, and includes observation, laboratory experimentation and case studies as necessary elements.12

12 Nunamaker, Jay F., Jr., "Future research in group support systems: needs, some questions and possible directions;" International Journal of Human-Computer Studies, 47, 1997, pp. 357-385

9

Page 10: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Economics/decision science/OR

introWe chose top researchers and key papers in economics of information systems and operation management field. This field can be called, in a word, the quantitative research of information systems. Key researchers are recognized most influential by the interview with our faculty members (Dr. Thatcher, Dr. Pingry, and Dr. Dror), Web of Science references, current academic positions, and current publication streams. As you quickly find out, they are all successful in their positions and most influential in their own specialties. Key papers are the significant cornerstones of this field, so that they must be read to understand this field. These papers are chosen by the interview with our faculty members and web of science reference. These articles are commonly used in most courses of quantitative research in IS.

top researchers

Eric Brynjolfsson

Contact Information:

Sloan School, 50 Memorial Dr. E53-313Massachusetts Institute of TechnologyCambridge, MA 02142(617) 253-4319, E-mail:[email protected]

Awards:

Time Magazine's Board of Economists

Current Research:

IT and the structures of markets and firms, the impact of IT investments on productivity and business value, Internet commerce and information goods

Morris A Cohen

Contact Information:

Matsushita Professor of Manufacturing and LogisticsProfessor of Operations and Information Management and Systems EngineeringCo-Director, Fishman Davidson Center for Service and Operations Management3209 Sh-Dh/6366 (215) 898-6431, E-mail:[email protected]

Awards:

S.J. Hardy Award for Best Paper in Operations Management, Decision Sciences Institute,

10

Page 11: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Lauder Institute Prize for Advances in Theory and Practice of International Management

Current Research:

Three-dimensional concurrent engineering for the design of products, processes and supply chains - develop an architectural framework that captures the interaction of these design decisions at a strategy/industry level.

Design for service - analysis of product design from the perspective of product life cycle performance and after-sales service support.

Global operations strategy - supply chain model of material and cash management in international manufacturing and service networks.

Supply chain coordination - development of incentives and information sharing policies to support material management in supplier/buyer relationships.

Hau L Lee

Contact Information:

TERMAN 346 Stanford, CA, 94305-4024 (650) 723-0514, E-mail: [email protected]

Awards:

Eugene Grant Award of Outstanding Teaching, Stanford University, 1996.Best Paper for the Lauder Institute Award for the Best Advances in the Theory and Practice of International Management Science, presented by the Lauder Institute of Management and International Studies and the Institute of Management Science, 19892nd Runner-Up, Edelman Practice Prize by the Institute of Management Science, 1989 Department Service Award, Department of Industrial Engineering and Engineering Management, Stanford University, 1988. Outstanding Teacher Award, Department of Industrial Engineering and Engineering Management, Stanford University, 1986. First place, Health Application Section Spotlight Prize, Operations Research Society of America, 1984 Sigma Xi Ph.D. Dissertation Grant Award, National Center for Health Services Research, U.S.A., 1981. M.I.S., Institute of Statisticians, United Kingdom, 1983

Current Research:

Supply chain management, global logistic system design and control, multi-echelon inventory systems, manufacturing and distribution strategy, design for supply chain management.

11

Page 12: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

James R. Marsden

Contact Information:

School of Business Administration, University of Connecticut368 Fairfield Road, U-41 IMStorrs, Connecticut 06269-2041(860) 486-5295, E-mail: [email protected]

Awards:

The founding Chair and Philip Morris Professor of Information Systems , Department of Decision Science and Information Systems, University of KentuckyDirector of the MIS and DSS Research Labs, University of Kentucky Departmental Editor (DSS Impacts and Evaluation) for Decision Support Systems Expert Systems Minitrack co-coordinator for HICSS. Phi Beta Kappa, Phi Mu Alpha, Evans Scholar, James Scholar National Science Foundation Post Doctoral Fellow

Current Research:

Management of information, decision support systems, legal issues in information technology, quantitative methods, and econometrics.

Haim Mendelson

Contact Information:

Graduate School of Business, Stanford UniversityStanford, CA 94305-5015(650) 725-8927,E-mail:[email protected]

Awards:

Co-Director, Center for the Study of Electronic Commerce, Strategic Uses of Information Technology, Strategy and Entrepreneurship in the Information Technology Industry, Stanford Business School Editorial Board, Information Systems ResearchAssociate Editor, Management Science, MIS Quarterly, Communications of the Association for Computing Machinery, Organizational Computing and Electronic Commerce

Current Research:

IT and Time-Based Competition in Financial Markets, Information and Organization for Horizontal Multi-market Coordination, A New Approach to the Regulation of Trading Across Securities Markets,

12

Page 13: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Information and Organization for Horizontal Multi-market Coordination,

Further Evidence on the Risk-Return Relationship, an Empirical Analysis of Software and Hardware Spending, Volatility, Efficiency and Trading: Evidence from the Japanese Stock Market, Liquidity, Maturity and the Yields on U.S. Treasury Securities.

top articles1. Barua, A., & Lee, C. S. (1996). The calculus of reengineering. Information Systems Research, 7(4), 409-428.

Advances in new Information Technologies (IT) and changes in the business environment such as globalization and competitive pressure have prompted organizations to embark on reengineering projects involving significant investments in IT and business process redesign. However, the evidence of payoff from such investments can be classified as mixed as' best, a problem we partly attribute to the absence of a strong theoretical foundation to assess and analyze reengineering projects. The authors seek to apply complementarity theory and a business value modeling approach to address some questions involving what, when, and how much to reengineer.

Complementarity theory is based on the notion that the value of having more of one factor increases by having more of another complementary factor. Further, related developments in the optimization of ''supermodular'' functions provide a useful way to maximize net benefits by exploiting complementary relationships between variables of interest.

Combining this theory with a multi-level business value model showing relationships between key performance measures and their drivers, the authors argue that organizational payoff is maximized when several factors relating to IT, decision authority, business processes and incentives are changed in a coordinated manner in the right directions by the right magnitude to move toward an ideal design configuration. The analysis further shows that when a complementary reengineering variable is left unchanged either due to myopic vision or self-interest, the organization will not be able to obtain the full benefits of reengineering due to smaller optimal changes in the other variables. This paper also shows that by increasing the cost of changing the levels of design variables, unfavorable preexisting conditions (e.g., too much heterogeneity in the computing environment) can lead to reengineering changes of smaller magnitude than in a setting with favorable conditions.

2. Brynjolfsson, E., & Hitt, L. (1996). Paradox lost? Firm-level evidence on the returns to information systems spending. Management Science, 42(4), 541-558.

The ''productivity paradox'' of information systems (IS) is that, despite enormous improvements in the underlying technology, the benefits of IS spending have not been found in aggregate output statistics. One explanation is that IS spending may lead to increases in product quality or variety which tend to be overlooked in the aggregate statistics, even if they increase output at the firm-level. Furthermore, the restructuring and cost-cutting that are often necessary to realize the potential benefits of IS have only recently been undertaken in many firms.

This study uses new firm-level data on several components of IS spending for 1987-1991. The dataset includes 367 large firms which generated approximately 1.8 trillion dollars in output in 1992. Authors supplemented the IS data with data on other inputs, output, and price deflators from other sources. As a result, they could assess several econometric models of the contribution of IS to firm-level productivity.

The results indicate that IS spending has made a substantial and statistically significant contribution to firm output. The authors find that the gross marginal product (MP) for computer capital averaged 81% for the

13

Page 14: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........firms in our sample. The authors find that the MP for computer capital is at least as large as the marginal product of other types of capital investment and that, dollar for dollar, IS labor spending generates at least

as much output as spending on non-IS labor and expenses. Because the models the authors applied were similar to those that have been previously used to assess the contribution of IS and other factors of production, the authors attribute the different results to the fact that our data set is more current and larger than others explored. The authors conclude that the productivity paradox disappeared by 1991, at least in our sample of firms.

3. Clemons, E. K., & Row, M. C. (1991). Sustaining IT Advantage - The Role of Structural Differences. MIS Quarterly, 15(3), 275-292.

Information systems are strategic business tools, frequently essential to a firm and central to its competitive strategy. Information technology (IT) can lead to sustainable competitive advantage when it is used to leverage differences in strategic resources. This may be true even in cases where duplication is relatively easy and there are few dynamic effects, such as first-mover advantages, to protect the innovation. An important characteristic of IT is its ability to manage interactions among economic activities; economic theory can be used to establish a link between this characteristic of IT and shifts in resource values. This permits the identification of opportunities for deploying IT to leverage structural resource differences among firms, including differences in vertical integration and diversification as well as differences in the quality and organization of key resources.

4. Gurvaxany, V., & Mendelson, H. (1992). An Empirical-Analysis of Software and Hardware Spending. Decision Support Systems, 8(1), 1-16.

The growth in information systems budgets and in their primary components, hardware and software effort, is analyzed empirically. It is demonstrated that while a large component of the growth is due to technology related factors, these expenditures, and in particular, hardware spending, are sensitive to the growth rate of the economy and fluctuate around the technology-driven growth path due to general business conditions. The validity of the popular belief that software effort (including both software-development and maintenance) represents a growing proportion of information systems expenditures is tested versus the competing view that software effort and hardware expenditures consume relatively constant budget shares. It is shown that after controlling for macroeconomic effects, hardware and software expenditures grow exponentially at the same rate. The analysis also suggests that in the aggregate, it is primarily the hardware outlays that adjust in response to unexpected business conditions.

5. Malone, T. W., Yates, J., & Benjamin, R. I. (1987). Electronic Markets and Electronic Hierarchies. Communications of the ACM, 30(6), 484-497.

By reducing the costs of coordination, information technology will lead to an overall shift toward proportionately more use of markets-rather than hierarchies-to coordinate economic activity.

KM/AI/IR

intro

An information system ideally provides users with the correct information at the right time. Research within MIS seeks to design systems that can meet this challenge with work in the areas of information retrieval (IR) and knowledge management (KM). The first of these topics deals with the design of techniques and algorithms for indexing, categorizing and finding information within databases and

14

Page 15: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........documents. IR has broadened form its base in keyword indexing to current efforts to use natural language processing techniques to uncover semantic relationships between texts. The second topic recognizes

something of value beyond information recorded in the documents already maintained within organizations. Instead KM seeks to help organizations recognize, cultivate and organize the tacit knowledge needed to develop and maintain a competitive advantage. MIS research hopes to provide systems to help monitor knowledge work within an organization to keep track of knowledge that is easily lost with staff and objective changes and to recognize synergies and similarities between tasks both past and present.

A third area of research was incorporated with the topics of IR and KM. While research in artificial intelligence (AI) has been conducted almost as long as has research in computer science, and while the stream is quite broad, for the purposes of MIS research AI is most often utilized to augment IR and KM systems. Both symbolic and connectionist AI techniques are employed in the analysis of information sources to uncover similarities between sources and the concepts they convey. Further work in AI also relates to the development of intelligent agent systems with task knowledge that can help coordinate the use of information with the performance of work.

Our sources for important researchers and papers in the areas of IR, KM and AI were initially faculty interviews. Lists of names, projects and institutions were used to locate central figures through research department and university Internet resources. A further aid in honing our list came from the use of Web of Science to gather a rough gauge of the importance of articles based upon the number of times each was cited by other works.

top researchers

Hsinchun Chen

Contact Information:

The University of Arizona,Management Information SystemsMcClelland Hall 430Z, Tucson, AZ 85721 (520) 621-2748, E-mail:[email protected]

Awards:

McClelland Endowed Professor in 1999 Andersen Consulting Professor in 1999 Senior Research Scientist, NCSANSF Research Initiation Award in 1992HICSS Conference Best Paper Award in 1994AT&T Foundation Award in Science and Engineering in 1995 and 1996SAP Award in Research/Applications in 1998Karl Eller Center Honored Entrepreneurial Fellow in 1998

Current Research:

Digital Libraries, Knowledge Management, multilingual and Distributed Information Retrieval

15

Page 16: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Thomas Davenport

Contact Information:

MSIS Department, CBA 5.202, University of Texas at AustinAustin, TX 78712 . Tel: (512) 471-8048

Current Research:

Knowledge Management

Gary Marchionini

Contact Information:

The School of Information and Library Science; 100 Manning Hall, CB#3360, UNC-CH;Chapel Hill, NC 27599-3360(919) 966-3611, E-mail:[email protected]

Awards:

Cary C. Boshamer Professor

Current Research:

Information seeking, human-computer interaction, digital libraries, information design, information policy.

Gerard Salton (1927-1995)

Gerard Salton, Professor of Computer Science at Cornell University, arguably the preeminent figure in the field of Information Retrieval, died of cancer on 28 August, in Ithaca, NY.

Awards:

Guggenheim Fellow in 1962German "Alexander Humboldt Senior Scientist Award" in 1988 ASIS Award of merit in 1989ACM Fellow in 1995.ACM Award for Outstanding Contributions in 1983 (The first such award was given to G. Salton)

16

Page 17: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Past Research:

Natural language processing, information retrieval.

Herbert A. Simon

Contact Information:Computer Science and Psychology, Carnegie Mellon University, 5000 Forbes AvenuePittsburgh, PA 15213-3891(412) 268-2787

Awards:

Richard King Mellon University ProfessorAlfred Nobel Memorial Prize in Economic Sciences in 1978 for "pioneering research into the decision-making process within economic organizations”National Medal of Science in 1986

Current Research:

Building and testing theories of human cognition, using computer simulation models. The usage of different representations to draw inferences from information, especially reasoning from diagrammatically and pictorially presented information, and comparing the effectiveness for communication purposes of different representations.

top articlesIR

1. Chen, H., & Lynch, K. J. (1992). Automatic Construction of Networks of Concepts Characterizing Document Databases. Paper presented at the IEEE Transactions on Systems, Man, and Cybernetics.

The results of a study that involved the creation of knowledge bases of concepts from large, operational textual databases are reported. Two East-bloc computing knowledge bases, both based on a semantic network structure, were created automatically from large, operational textual databases using two statistical algorithms. The knowledge bases were evaluated in detail in a concept-association experiment based on recall and recognition tests. In the experiment, one of the knowledge bases, which exhibited the asymmetric link property, outperformed four experts in recalling relevant concepts in East-bloc computing. The knowledge base, which contained 20000 concepts (nodes) and 280000 weighted relationships (links), was incorporated as a thesaurus-like component in an intelligent retrieval system. The system allowed users to perform semantics-based information management and information retrieval via interactive, conceptual relevance feedback.

2. Davenport, T. H., Jarvenpaa, S. L., & Beers, M. C. (1996). Improving knowledge work processes. Sloan Management Review, 37(4), 53-65.

17

Page 18: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Are traditional reengineering approaches appropriate for improving knowledge work processes? In a study of thirty organizations, the authors found that improvement methods for knowledge work ranged from the

classical top-down approach to a more laissez-faire philosophy that allowed professionals to design and execute their own work. Companies should probably choose an intermediate approach that reflects the type of knowledge work, the organizational culture, and the project's business requirements. They must recognize that the nature of knowledge work is different from administrative and operational work and that the people who perform it resist structured approaches.

3. Marchionini, G., Plaisant, C., & Komlodi, A. (1998). Interfaces and tools for the Library of Congress National Digital Library Program. Information Processing & Management, 34(5), 535-555.

This paper describes a collaborative effort to explore user needs in a digital library, develop interface prototypes for a digital library and suggest and prototype tools for digital librarians and users at the Library of Congress (LC). Interfaces were guided by an assessment of user needs and aimed to maximize interaction with primary resources and support both browsing and analytical search strategies. Tools to aid users and librarians in overviewing collections, previewing objects and gathering results were created and

serve as the beginnings of a digital librarian toolkit. The design process and results are described and suggestions for future work are offered.

4. Salton, G., Yang, C., & Yu, C. (1975). Theory of term importance in automatic text analysis. Journal Am. Soc. Inform. Sci., 26(1), 33-44.

This paper describes a new technique for automatic text analysis known as discrimination value analysis, ranks the text words in accordance with how well they are able to discriminate the documents of a collection from each other; that is, the value of a term depends on how much the average separation between individual documents changes when the given term is assigned for content identification. The best words are those which achieve the greatest separation. The discrimination value analysis is computationally simple, and it assigns a specific role in content analysis to single words, juxtaposed words and phrases and word groups

5. Simon, H. A. (1991). Artificial Intelligence: Where has it been and Where is it going? IEEE Transactions on Knowledge and Data Engineering, 3(2), 128-136.

The directions for near-future development of artificial intelligence (AI) can be described in terms of four dichotomies: the use of reasoning versus the use of knowledge; the roles of parallel and of serial systems; systems that perform and systems that learn to perform; and programming languages derived from the search metaphor versus languages derived from the logical reasoning metaphor. Although the author believes that there are reasons for emphasizing knowledge systems (production systems) that are serial, capable of expert performance, and designed in terms of the search metaphor, the other pathways are also important and should not be ignored. In particular, empirical work is needed in the construction and empirical testing of the performance of large systems to explore all of these branching pathways.

HCI/psychology/visualization/communication

Intro

18

Page 19: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........With the increasing amount of information available and the increasing complexity of the software tools today, the role of human-computer interface (HCI) has become more and more pivotal in IS research. It is no longer good enough to just have the right information at the right time. We also need to have the

information presented in a right way so that it is easy for users to understand, accept, and make good use of the information.

Several top researchers in the area of HCI came from a psychological background. Considering the fact that a good interface design demands thorough understanding of human habit, behavior, and cognitive psychology, this is not surprising. It is also the reason that we categorize psychology and communication together with HCI.

Information visualization is the two-way and interactive interface between humans and their information resources. We deem it as part of the HCI research. However, due to the big part it plays in HCI research and its ability to meld the human’s capacity with the computational capacity for analytical computing, we separate it as a specific research area.

In general, HCI and visualization’s goal is to relieve the cognitive overload brought to human by information systems, and provide human with insight from the information. We categorized research in these areas into three classes:

PERCEPTION AND COGNITION: Focuses on the behavioral and cognitive psychology side of HCI research

DESIGN APPROACH: Focuses on the methodology and the guiding principles for HCI design, including some of the visualization researches.

TECHNOLOGY & INTERFACE AFFORDANCES: The implementation and designing of HCI.

top researchers

Donald Norman

Contact Information:

Apple Computer, Inc. MS 301-4UE 1 Infinite Loop , Cupertino, CA 95014 USA Phone: 408 862-5515 Fax: 408 255-7045 Email: [email protected] Web Site: http://www.jnd.org/

Awards:

President, UNext Learning Systems.1999 - present.Co-founder, the Nielsen Norman Group: executive consulting on human-centered design, 1998 - present.Head, Appliance Design Center, Consumer Products Group, Hewlett-Packard. 1997 - 1998.Vice President and Apple Fellow, Advanced technology Group, Apple Computer Inc.1995 - 1997.Apple Fellow, Apple Computer Inc., 1993 - 1997

19

Page 20: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Professor Emeritus, Department of Cognitive Science, University of California, San Diego, 1993 - present

Lecturer and Research Fellow, Department of Psychology and Center for Cognitive Studies, Harvard University, 1963-1966.National Science Foundation Postdoctoral Fellow at Center for Cognitive Studies, Harvard University, 1962-1964.Assistant Instructor and Instructor, Moore School of Electrical Engineering, University of Pennsylvania, 1957-1959.

Current Research:

Currently working as the president of UNext Learning Systems to create powerful learning communities that marry the world's most respected academic scholars and institutions with the global reach and interactive capabilities of the Internet.

Jakob Nielsen

Contact Information:

Jakob Nielsen , 2704 Fairbrook Dr. Mountain View, CA 94040 Email: [email protected] , Web Site: http://www.useit.com

Awards:

Number 6 of The Web's 10 Most Influential People (AnchorDesk) 41 United States patents, mainly on ways of making the Internet easier to useProfessional journal editorial board memberships: ACM interactions magazine, ACM netWorker magazine, Behaviour & Information Technology, Interacting with Computers, International Journal of Human-Computer Interaction

Current Research:Currently working on usability of the web and designing of web sites. Research topics include usability as barrier of entry for new web sites and changing the standards for Information Architecture and Task Design

Peter J. Denning

Contact Information:

Computer Science, 4A5, George Mason UniversityFairfax, VA 22030voice 703-993-1525 , Fax 703-992-1710 E-Mail:[email protected] Homepage: http://cs.gmu.edu/faculty/denning

Awards:

20

Page 21: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Professor of Computer Science and University Coordinator for Process Reengineering , George Mason University,Founding director emeritus of the Hyperlearning Center, GMU.

Founding director of the Research Institute for Advanced Computer Science at the NASA Ames Research Center (1983-90), Co-founder of CSNET, First chair of the CSNET executive committee (1981-86)Head of the computer science department at Purdue(1979-83)President of the Association for Computing Machinery(1980-82) Chair of the ACM publications board (1992-98) Editor-in-Chief of the monthly ACM Communications magazine (1983-92), Chairs of the ACM Education Board and the ACM Information Technology Profession InitiativeTwo honorary degrees, Three professional society fellowshipsTwo best-paper awards, the ACM Outstanding Contribution Award, the ACM SIGCSE Outstanding CS Educator Award, the ACM Karl Karlstrom Outstanding Educator Award.

Current Research:

Workflow Management, High Performance Computing, Security, Performance Modeling

David Liddle

Contact Information: Not Found

Awards:

Co-Founder and Chief Executive Officer of Interval Research Corporation.Consulting Professor of Computer Science and Electrical Engineering at Stanford University. Chair of the Board of Trustees at the Santa Fe Institute Director at both Sybase, Inc. and Broderbund Software, Inc. Founder and president of Metaphor, Inc., Vice president of new systems business development, Personal Systems, at IBM Corporation.

Terry Allen Winograd

Contact Information: Home Address: 746 Esplanada Way, Stanford CA 94305 Phone: (650)494-1716 Business Address: Computer Science Department, Stanford University, Stanford, California 94305-9035 Phone: (650)723-2780 , Fax (650)723-0033 Email: [email protected]

21

Page 22: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Awards:

1996 Founders Award, Computer Professionals for Social Responsibility

1987 Understanding Computers and Cognition named as the Best Information Science Book of 1987 by American Society for Information Science 1986 Honorary D.Sc., The Colorado College. 1977Mellon Junior Faculty Fellowship. 1977 Dean's award for excellence in teaching, Stanford.

Current research:

Dr. Winograd works on developing the theoretical background and conceptualmodels for designing human-computer interaction. He is developing teaching programs in HCI-Design. and is a P.I of the Stanford Digital Libraries Project.

top articlesPERCEPTION AND COGNITION:

1. Donald Norman, Chapter 1, Psychology of the Everyday Things, pp. 1-33 in the Design of Everyday Things (1988)

The Design (Psychology) of Everyday Things is a must read in many HCI programs. Chapter 1 introduces the concept of affordances which refers to perceived and actual properties of things. Don Norman is big on making affordances visible, natural mappings (taking advantage of physical analogies and cultural understandings), and user feedback.

2. C. Wickens, Chapter 3, Attention in Perception and Display Space, from Engineering Psychology and Human Performance (1992) 74-115

An excellent article on the limitations of human attention and resulting failures, this article looks at the 1) limits of selective attention, 2) limits of focused attention (e.g. distraction) and 3) limits of divided attention. Within this framework the author discusses searching models and the Gestalt principles of display organization and the practical implications to interface design.

3. Jakob Nielsen, Chapter 2 (What is Usability) and Chapter 5, Usability Heuristics, (through section 5.9) in Usability Engineering, (1993) pp. 23-48 and 115-148

In Chapter 2 of this book, Jakob Nielson provides a model of system acceptability and defines concepts such as learnability, efficiency, memorability, errors, and satisfaction. Chapter 5 Nielsen outlines some do's and don'ts of design that include: 1)simple and natural language, 2) the use of metaphors and other ways to speak in the user's language, 3 ) minimizing user memory load, 4) consistency, 5) feedback, 6) shortcuts, 7) exits, 8) error messages and 9) error prevention.

DESIGN APPROACH:

22

Page 23: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........4. P Denning and P. Dargan, Chapter 6, Action-Centered Design, from Bringing Design to Software. (1996) 105-127

This article explores how successful software designers had managed to create software that users found usable and well suited to their needs. The article overviews traditional engineering approaches to software design(e.g. waterfall and spiral) and recommends the action-centered design approach. The action-centered

design approach emphasizes the observing of the ontology of a domain, then constructing a workflow map, a process man, and the connections between them.

TECHNOLOGY & INTERFACE AFFORDANCES:

5. William Gaver, Technology Affordances, CHI 91 Conference Proceedings, ACM Press, 1991, p. 79-84.

This paper suggests that considering affordances explicitly in design may help suggest ways to improve the usability of new artifacts. Graver's focus is on the interaction between computers and people - not exclusively the focus on technology or cognition. The paper lays out a framework for applying the notion of design and ways to think about transparent interfaces.

International (policy foundation)

intro

Dr. Sy Goodman in MIS, University of Arizona is the top person in this field. We collected the researchers and papers mainly from the interview with Will Foster, his student in our department. We only could identify three top researchers in academics.

top researchers

Sy Goodman

Contact Information:

Department of Management Information Systems, Eller College of Business and Public AdministrationThe University of ArizonaTucson, Arizona 85721Phone: (520) 621-2684, Fax: (520) 621-2433E-mail: [email protected]

Awards:

Contributing Editor for International Perspectives for the Communications of the ACM service with many government, academic, professional society, and industry advisory and study groups. testimony before legislative bodies and Ministerial-level briefings.

23

Page 24: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Current Research:

International developments in the information technologies (IT), technology diffusion, IT and national security, and related public policy issues. Areas of geographic interest include the former

Soviet Union and Eastern Europe, Latin America, the Middle East, Southeast Asia, and parts of Africa.

Eli Noam

Contact Information:

Professor Finance & EconomicsDirector Columbia Institute for Tele-InformationOffice: 801 UrisPhone: 212-854-4222, FAX: 212-662-8474Email: [email protected]

Awards:

New York State Public Service Commissioner, regulating the telecommunications and energy industries. His books and articles include a series on global telecommunications and volumes on international film and television, media concentration, electronic banking and the cybermedia of the future.

Larry Press

Contact Information:

Professor, Department Chairman California State University, Dominguez Hillsemail: [email protected]

Awards:

Lyle Gibson Distinguished TeacherUniversity Outstanding ProfessorHyundai Outstanding Professor Performance-Based Salary Step Increases.

Current Research:

Computer Support of Cooperative Work, Global Diffusion of the Internet Electronic Commerce, Networking in Developing Nations History of Computing, IT in Education Social Implications, Industry and Technology Analysis

24

Page 25: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

top articles

1. Goodman, S.E., Mehrer, A.L., Lynch, K.J. , International Development in the Information Technologies: The MOSAIC Group, Working paper. The MOSAIC research program at the University of Arizona is a unique effort combining foreign-area studies, technology assessment and application of MIS research methods to the study of national-level computerization policies.

2. Goodman, S.E. and Lyytinen, K., Finland: The Unknown Soldier on the IT Front, CACM 42:3, March 1999, 13 – 17.

The reason why Finland was able to be so successful requires an understanding of the changes in the institutional and technical environment.

3. Goodman, S.E. and Burkhart, G.E., The Internet Gains Acceptance in the Persian Gulf, CACM 41:3, March 1998, 19 – 23.

This article introduces the status of Internet use in Persian gulf countries. National security concerns is a major factors of national Internet acceptance.

4. Press, L., Burkhart, G.E, Foster, W., Goodman, S.E., Wolcott, P., Woodard, J., An Internet Diffusion Framework, CACM 41:10, October 1998, 21 - 26.

This column describes a project tracking global diffusion of the Internet and provides multidimensional framework to compare the Internet diffusion in several nations.

social issues/ethics

introSocial Issues

Social Issues or Informatics (SI) refers to the body of research and study that examines social aspects of computerization -- including the roles of information technology in social and organizational change and the ways that the social organization of information technologies are influenced by social forces and social practices. SI includes studies and other analyses that are labeled as social impacts of computing, social analysis of computing, studies of computer-mediate communication (CMC), information policy, "computers and society," organization informatics, and interpretive informatics.

Ethics

The subject of ethics in information systems has moved to the forefront in recent years as the Internet continues its unprecedented expansion. At issue are privacy concerns and the misuse of sensitive information. “One of Washington's most prominent privacy attorneys stated that when the use of information is not compatible with the purpose for which it was collected, the prospect of misinterpretation or crass exploitation usually follows. The most common form of secondary use is targeted marketing.” (Mary Culnan, professor, McDonough School of Business, Georgetown University, before the House Banking Committee's Subcommittee on Financial Institutions and Consumer Credit).

25

Page 26: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

top researchers

Mary J. Culnan

Contact Information:

The McDonough School of Business, Georgetown UniversityWashington, D.C. 20057-1008202-687-3802, E-mail: [email protected]

Current Research:

Specializes in the social and public policy impacts of information technology. Her research focuses on information privacy. She is currently addressing consumer attitudes toward privacy and electronic marketing. She teaches courses on information systems, the impact of information technology on business strategy, and electronic commerce.

Sara Kiesler

Contact Information:

Department of Social & Decision ScienceCarnegie Mellon University5000 Forbes AvenuePittsburgh, PA 15213(412) 268-2888, E-mail: [email protected]

Current Research:

Computer-supported cooperative work (CSCW), E-mail related issues, social impacts of computing

Rob Kling

Contact Information:

Professor of Information Systems and Information ScienceSchool of Library and Information ScienceAdjunct Professor of Computer ScienceIndiana University at Bloomington107 S. Indiana AvenueBloomington, IN 47405-7000(812) 855-9763, E-mail:[email protected]

26

Page 27: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Awards:

Editor-in-Chief, The Information Society

Current Research:

Social consequences of computerization and social choices available to people in and around organizations that have invested in various information systems, desktop computing, computerized manufacturing environments, digital libraries, and instructional computing. He believes that “we have to understand information technologies in terms of their associated social structures and politics, and in meaningful social contexts -- not just as ‘information tools.’”

Richard O. Mason

Contact Information:

Carr P. Collins Distinguished Professor of ISOMDirector, Maguire Center for Ethics and Public ResponsibilityEdwin L Cox School Of BusinessSouthern Methodist UniversityDallas, Texas 75275E-mail: [email protected]

Awards:

Named among the top 35 MIS Consultants in Information Week's survey of the top 50 MIS Consultants (1988). Elected as a foreign member of the Russian Academy of Natural Sciences in the Information and Cybernetics section. Awarded a Fulbright Fellowship in 1993 to do research at Umea University in Sweden.

Current Research:

Social and ethical implications of information systems, business strategy and information systems, and the history of information systems.

top articlesEthics and Social Issues

1. Culnan, M. J. (1993). How did they get my name?': An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341-362.

Strategic uses of information technology based on personal information may raise privacy concerns among consumers if these applications do not reflect a common set of values. This study addresses what differentiates consumers who object to certain uses of personal information from those who do not object.

27

Page 28: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Data collected by questionnaire from young consumers are used to identify a research approach for investigating attitudes toward the secondary use of personal information for direct marketing. Secondary information use occurs when personal information collected for one purpose is subsequently used for a different purpose. While secondary information use is both widespread and legal, it may be viewed as an invasion of privacy when it occurs without the knowledge or consent of the consumer. The setting for the study is the use of point, of-sale data from a supermarket frequent shopper program to generate direct mail solicitations.

2. Kling, R., & McKim, G. (1999). Scholarly communication and the continuum of electronic publishing. Journal of the American Society for Information Science, 50(10), 890-906.

Electronic publishing opportunities, manifested today in a variety of electronic journals and Web-based compendia, have captured the imagination of many scholars. These opportunities have also destabilized norms about the character of legitimate scholarly publishing in some fields. An analytical approach for evaluating disciplinary conventions and for proposing policies about scholarly e-publishing is presented. Three dimensions of scholarly publishing as a communicative practice are characterized - publicity, access, and trustworthiness - and several forms of paper and electronic publications are examined in this framework. This analysis shows how the common claim that e-publishing substantially expands access is oversimplified. It also indicates how peer reviewing (whether in paper or electronically) provides valuable functions for scholarly communications that are not effectively replaced by self-posting articles in electronic media.

3. Kling, R., Wegner, P., Rice, J. R., & Weiss, E. A. (1993). Forum Source. : Communications of the ACM, 36(2), 15-20.

Statements concerning the report "Computing the Future: A Broader Agenda of Computer Science and Engineering" are presented. "Computing the Future" encourages computer scientists to envision new

technologies in the social context in which they will be used and requires that the computer science community develop reliable knowledge, based in systematic research, to support effective social analysis. The report also proposes broadening the base of computer science research by encompassing computer engineering and computing applications. The proposed paradigm shift is a response to a perceived change in funding patterns that places greater emphasis on practical impact as the primary evaluation criterion. Four responses to the proposals made by "Computing the Future" are presented.

4. Kraut, R., Kiesler, S., Mukhopadhyay, T., Scherlis, W., & Patterson, M. (1998). Social impact of the Internet: What does it mean? Communications of the ACM(41), 12.

Using the Internet at home causes small but reliable declines in social and psychological well-being, according to findings from a study examining the domestication of the Internet - the integration of the Internet into the home. The HomeNet project studied a sample of 169 people in Pittsburgh during their first year or two online. As people in this sample used the Internet more, they reported keeping up with fewer friends, spending less time talking with their families, experiencing more daily life stresses, and feeling lonelier and more depressed. These results occurred even though interpersonal communication was their most important reason for using the Internet. Other important issues concerning the results of the research are addressed. Control emerges as a clear theme in differentiating individuals with positive overall attitudes toward secondary information use from those with negative attitudes. Study participants with positive attitudes are less concerned about privacy (measured as control over personal information), perceive shopping by mail as beneficial, and have coping strategies for dealing with unwanted mail. The results also suggest that theory related to categorization of strategic issues as positive-negative with outcomes that are

28

Page 29: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

controllable/uncontrollable provides a basis for understanding differences in the ways individuals perceive practices involving personal information. Future research should focus on the specific characteristics of secondary use practices, including the sensitivity of the information, its source, its perceived relevance to the original transaction, and whether disclosure reflects informed consent or results in a potentially harmful outcome to the individual.

5. Mason, R. O., & McKenney, J. L. (1997). Developing an historical tradition in MIS research. MIS Quarterly, 21(3), 257-279.

MIS as a discipline has not yet developed a tradition of historical research. Historical analyses broaden our understanding of the processes by which information technology is introduced into organizations and of the forces that shape its use. Paramount among these processes are those Schumpeter called "creative destruction." These are events that change entire organizations and industries. The end product of a Schumpeterian process is called a "dominant design," a new configuration of an organization's technology, strategy, and structure. A dominant design is manifested in several ways: a new organizational infrastructure, new functionality, new products, new services, new production functions, or new cost structures. By changing the basis of competition in the industry, a firm that institutes a dominant design secures an initial competitive edge. Although the understanding of these processes is central to the concerns of many researchers and practitioners in the field, the information systems research literature contains very few examples of historical analyses of this type. A contingency framework is developed for conducting a class of information technology-based historical studies that focuses on innovation and competition within an industry.

Databases

intro

The database is now such an integral part of our day-day life that often we are not aware we are using one. The database is the underlying framework of the information system, and has fundamentally changed the way many organizations operate. Therefore, it is an obvious fact that database research area must be one of the most important research areas in MIS research fields.

At the initial stage of our project, we had over twenty research areas in database. In order to select top five of the most influential people in database research field, we narrowed down five the most important research areas: Relational Database Model, Database Design, Object-Oriented Database Systems, Distributed Database Systems with Mathematical Approach, and Heterogeneous Distributed Database Systems. Among the picked top five research areas, we select the five researchers based on their publications.

top researchers

Peter Pin-Shan Chen

Contact Information:

Computer Science Department

29

Page 30: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Louisiana State University

Awards:

Editor-in-Chief of Data & Knowledge EngineeringAssociate Editor for the Journal of Intelligent Robotic SystemsAssociate Editor for IEEE ComputerAssociate Editor for Information SciencesMember of the Airlie Software Council, which consists of software visionaries/gurus and very-high-level software organization executives, organized by Department of Defense (DoD).Data Resource Management Technology Award from the Data Administration Management Association (NY) in 1990

Current Research:

Dr. Chen is the originator of the Entity-Relationship Model (ER Model), which serves as the foundation of many systems analysis and design methodologies, computer-aided software engineering (CASE) tools, and repository systems including IBM's Repository Manager/MVS and DES's CDD/Plus. 

E. F. Codd

Contact Information:

IBM Research LaboratorySan Jose, California

Current Research:

Multiprogramming, Self reproducing computers, Development of RDBMS

Won Kim

Contact Information:

CEOCyber Database Solutions, Inc., [email protected]

Awards:

Endowed-Chair Professorship in the Computer Science and Engineering Department at Ewha Women's University of Seoul, KoreaChairman of ACM SIGKDD, the premier professional society of professionals and students specializing in knowledge discovery in data and data miningEditor-in-Chief and Associate Editor of ACM Transactions on Database SystemsChairman of ACM SIGMOD

30

Page 31: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Current Research:

In 1990 he founded UniSQL, Inc., and successfully managed the company as CEO and Chairman for six years, when he turned the company over to long-time investor, NTT Data of Japan, in late 1996. In UniSQL, he conceived and architected the first commercial object-relational database server and the first commercial object-relational multi-database server, ushering in the era of object-relational database systems. Prior to founding UniSQL, he headed the object-oriented database research lab within the MCC R&D Consortium for six years.

Salvatore T. March

Contact Information:

Carson School of ManagementUniversity of [email protected]

Awards:

Entity-Relationship Conference Steering Committee Distinguished Teaching Award, 1990, 1991, 1992IDS Ph.D. Coordinator Carlson School Curriculum Committee

Current Research:

Database design Information system development Distributed systems

Sudha Ram

Contact Information:

Management Information Systems College of Business and Public AdministrationUniversity of [email protected]

Awards:

General chair for the 1997 ACM SIGMOD International Conference on Management of Data.  Program Co-Chair for the 17th International Conference on Conceptual Modeling (ER'98).

31

Page 32: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Current Research:

Deals with modeling and analysis of database and knowledge based systems for manufacturing, scientific and business applications. Specifically, the research deals with Interoperability among Heterogeneous Database Systems, Semantic Modeling, Data Allocation, Schema and View Integration, Intelligent Agents for Data Management, and Tools for database design. 

top articles

1. Chen, P. P. (1976). The Entity-Relationship model -Toward a unified view of data. ACM Trans. Database Systems, 1(1), 9-36.

A data model called the entity-relationship model is proposed. This model incorporates some of the important semantic information about the real world. A special diagrammatic technique is introduced as a tool for database design. An example of database design and description using the model and the diagrammatic technique is given. Some implications for data integrity, information retrieval, and data manipulation are discussed. The entity-relationship model can be used as basis for unification of different views of data, the network model, the relational model, and the entity set model. Semantic ambiguities in case models are analyzed. Possible ways to derive their views of data from the entity-relationship model are presented.

2. Codd, E. F. (1970). A relational model of data for large shared data banks. Communications of the ACM, 12(6), 377-387.

Future users of large data banks must be protected from having to know how the data is organized in the machine (the internal representation). A prompting service which supplies such information is not a satisfactory solution. Activities of users at terminals and most application programs should remain unaffected when the internal representation of data is changed and even when some aspects of the external representation are changed. Changes in data representation will often be needed as' a result of changes in query, update, and report traffic and natural growth in the types of stored information.. Existing non inferential, formatted data systems provide users with tree-structured files or slightly more general network models of the data. In Section 1, inadequacies of these models are discussed. A model based on n-ary relations, a normal form for data base relations, and the concept of a universal data sub language is introduced. In Section 2, certain operations on relations (other than logical inference) are discussed and applied to the problems of redundancy and consistency in the user's model.

3. Kim, W., Ballou, N., F.Garza, J., & Woelk, D. (1991). A distributed object-oriented database system support shared and private databases. ACM Transactions on Information Systems, 9(1), 31-51.

ORION-2 is a commercially available, federated, object-oriented database management system designed and implemented at MCC. One major architectural innovation in ORION-2 is the coexistence of a shared database and a number of private databases. The shared database is accessible to all authorized users of the system, while each private database is accessible to only the user who owns it. A distributed database system with a shared database and private databases for individual users is a natural architecture for data-intensive application environments on a network of workstations, notably computer-aided design and engineering systems. This paper discusses the benefits and limitations of such a system and explores the

32

Page 33: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........impact of such architecture on the semantics and implementation of some of the key functions of a database system, notably queries, database schema, and versions. Although the issues are discussed in the context of

an object-oriented data model, the results (at least significant portions thereof) are applicable to database systems supporting other data models.

4. March, S. T., & Rho, S. (1995). Allocating Data and Operations to Nodes in Distributed Database Design. IEEE Transactions in Knowledge and Data Engineering, 72, 305-317.

The allocation of data and operations to nodes in a computer communication network is critical issue in distributed database design. An efficient distributed database design must trade off performance and cost among retrieval and update activities at the various nodes. It must consider the concurrency control mechanism used as well as capacity constraints at nodes and on links in the network It must determine where data will be allocated, the degree of data replication, which copy of the data will be used for each retrieval activity, and where operations such as select, project, join and union will be performed. We develop a comprehensive mathematical modeling approach for this problem. The approach first generates units of data (file fragments) to be allocated from a logical data model representation and a characterization of retrieval and update activities. Retrieval and update activities are then decomposed into relational operations on these fragments. Both fragments and operations on them are then allocated to nodes using a mathematical modeling approach. The mathematical model considers network, communication, local processing, and data storage costs. A genetic algorithm is developed to solve this mathematical formulation.

5. Ram, S. (1991). Heterogeneous Distributed Database Systems. IEEE Computer, 24(12), 7-11.

Research and development in the field of database systems has culminated in its widespread use. As usage has grown, the desire to link separate databases has resulted in substantial effort being directed towards the design of distributed databases systems. A major research issue in designing such systems is the definition of a formal model that can be used to capture the semantics of the individual databases. This paper presents a semantic model called the Unifying Semantic Model (USM) and a software tool using it. The USM can be used for modeling the complex interrelationships and semantics found in manufacturing environment. It is based on enhancements to existing semantic models. It can serve as a formal specification and documentation tool for databases. It can provide a means of specifying the Universe of Discourse for any interchange of information.

GSS

intro

Group Support Systems (GSS) are a combination of systems and methods that facilitate successful group work. These technologies go beyond the generic concept of GroupWare, which usually focuses on email, and asynchronous group information sharing (e.g. Lotus Notes). In particular, GSS allow groups to work in parallel, typically under anonymous conditions; which allows for high volume and high quality of deliverable output. GSS has been used to benefit to many group processes such as brain storming, SA&D, JAD, and process modeling. As a result, GSS research is a field of great breadth that involves not only technological aspects, but also facts such as teaming, facilitation, and group dynamics. The important researchers and papers in this field reflect the diversity that encompasses GSS.

33

Page 34: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

top researchers

Jerry DeSanctis

Contact Information:

Fuqua School of Business, Duke UniversityBox 90120Durham, NC 27708(919) 660-7848, E-mail: [email protected]

Awards:

Outstanding teacher award, Texas Tech University, 1980 Award for Distinguished Contributed Paper in MIS at the National meeting of the American Institute for Decision Sciences, 1983 Top Three paper at the Annual Meeting of the International Communication Association, Human Communication Technology Interest Group, May 1988 (with R. Watson & M. S. Poole) Invited member of the doctoral consortium faculty, International Conference on Information Systems, December 1988 Top Three paper in the Annual Meeting of the International Communication Association, Human Communication Technology Interest Group, May 1989 (with M.S. Poole) Invited Chair of the Doctoral Consortium, Thirteenth International Conference on Information Systems, 1992 Received Best Paper Award, 24th Annual Hawaii International Conference on System Sciences Collaboration Technology Track, "Using Computing to Improve the Quality Team Process: Preliminary Observations from the IRS-Minnesota Project," 1991

Current Research:

Organizational computing, computer-supported cooperative work and management of information systems

R. Brent Gallupe

Contact Information:

Queens University, School of BusinessQueen's UniversityKingston, OntarioK7L 3N6 (613) 545-2361, E-mail: [email protected]

34

Page 35: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Current Research:

Electronic brainstorming, the history of information systems, E-commerce management issues, Knowledge management systems, Evaluation of information systems.

Sara Kiesler

Contact Information:

Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 (412) 268-2848 , E-mail: [email protected]

Current Research:

During the last decade, Dr. Kiesler has been doing research on the social and behavioral aspects of computers and computer-based communication technologies. Much of her work involves how computer networking changes group dynamics and communication in organizations. Using both laboratory experiments and research in the field, she and her colleagues have made a number of discoveries and that have contributed to the literature on the causes of "flaming," the conditions for social equalization on computer networks, the benefits and costs of open communication on networks, the illusion of electronic privacy, the uses and misuses of electronic surveys, the formation and conduct of electronic groups, information sharing on networks, and the impact of computer communication on peripheral or marginal organizational groups.

She also studies the emotional and social effects of computing technology on individuals, teams, and families. Her current projects include investigations of household technologies and e-commerce, an NSF-sponsored study on interdisciplinary collaboration, and HomeNet, a field study of families using the Internet

Jay F. Nunamaker, Jr.

Contact Information:

Center for the Management of Information , University of Arizona McClelland Hall, Room 430GG Tucson, Arizona 85721 (520) 621-4105 Voice, E-mail: [email protected]

Awards:

Regents Professor / Soldwedel Chair, 1994 - Present.Received the DPMA EDSIG Distinguished IS Educator Award. GroupSystems software received the Editor's Choice Award from PC Magazine, June 14, 1994.

35

Page 36: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........GroupWare Achievement Award, GroupWare Conference, San Jose, 1993 GroupSystems :best of show in the GDSS category, GroupWare Conference, San Jose, 1993

Arthur Andersen Consulting Professor of the Year award, 1992

Current Research:

Computer supported collaboration and decision support to improve productivity and communication.

Judy Olsen

Contact Information:

School of Information ,University of Michigan303 A West Hall 1092 School of Business Admin (734) 763-0164, E-mail:[email protected]

Awards:

Amoco Award for Outstanding Teaching, 1980 Administrative Internship, University of Michigan, Office of the President, 1980Council: Association for Computing Machinery National Research Council Committee on Human Factors, 1982-89 Editorial Board: Journal of Experimental Psychology: Applied, 1994-present Editorial Board: Management of Information Systems Quarterly, 1990-94 Editorial Board: Organizational Computing, 1990-present Editorial Board: Human Computer Interaction, 1982-present Editorial Board: Psychological Review, 1980-82 Editorial Board: Memory and Cognition, 1977-78

Current Research:

Collaboration technology, Human-computer interaction, software design process Applications of cognitive psychology to business computing and communication

top articlesGSS

1. DeSanctis, G., & Gallupe, R. B. (1987). A Foundation for the Study of Group Decision Support Systems. Management Science, 33(5), 589-609.

Technical developments in electronic communication, computing, and decision support, coupled with new interest on the part of organizations to improve meeting effectiveness, are spurring research in the area of group decision support systems (GDSS). A GDSS combines communication, computing, and decision support technologies to facilitate formulation and solution of unstructured problems by a group of people.

36

Page 37: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........The paper presents a conceptual overview of GDSS based on an information-exchange perspective of decision making. Three levels of systems are described, representing varying degrees of intervention into

the decision process. Research on GDSS is conceived as evolving over time from the study of simple 'shell' systems, consisting of menus of features available for selection by a group, to consideration of sophisticated rule-based systems that enable a group to pursue highly structured and novel decision paths. A multidimensional taxonomy of systems is proposed as an organizing framework for research in the area. Three environmental contingencies are identified as critical to GDSS design: group size, member proximity, and the task confronting the group. Potential impacts of GDSS on group processes and outcomes are discussed, and important constructs in need of study are identified.

2. Gallupe, R. B., Dennis, A. R., Cooper, W. H., Valacich, J. S., Bastianutti, L. M., & Nunamaker, J. F. (1992). Electronic Brainstorming and Group Size. Academy of Management Journal, 35(2), 350-369.

This article summarizes research to determine whether or not group size has an effect on electronic brainstorming, compared to various sizes of groups that don't use electronic brainstorming. The authors found that larger groups using GSS indeed generated more, high-quality ideas and experienced higher levels of satisfaction than groups that did not use technology. However, in small groups (e.g. 2 group members) technology did not act as a catalyst for higher productivity; primarily because there was no anonymity and not much production blocking (two primary reasons larger GSS group succeeded).

3. Nunamaker, J. F., Briggs, R. O., Mittleman, D. D., Vogel, D. R., & Balthazard, P. A. (1997). Lessons from a Dozen Years of Group Support Systems Research: A Discussion of Lab and Field Findings. Journal of Management Information Systems, 13(3), 163-207.

Researchers at the University of Arizona have built 6 generations of group support systems software, conducted over 150 research studies and facilitated over 4,000 projects. Lessons learned through that experience are reported. A theoretical foundation for the Groupware Grid, a tool for designing and evaluating GSS, is presented. Lessons are presented from 9key domains: 1. GSS in organizations, 2. cross-cultural and multicultural issues, 3. designing GSS software, 4. collaborative writing, 5. electronic polling, 6. GSS facilities and room design, 7. leadership and facilitation, 8. GSS in classroom and 9. business process reengineering.

4. Nunamaker, J. F., Dennis, A. R., Valacich, J. S., Vogel, D. R., & George, J. F. (1991). Electronic Meeting Systems to Support Group Work. Communications of the ACM, 34(7), 40-61.

This is a "classic" GSS article written by Dr. Nunamaker, et al, that is one of the fundamental, early guides to GSS. In this article they discuss the potential benefits of GSS, and its theoretical supports for process support, process structure, task support, and task structure - the four mechanisms by which a GSS supports a meeting. The article also discusses potential gains and losses by GSS. It then discussion the specific implementation of GSS through GroupSystems, a GSS developed at the University of Arizona. In this context, a discussion of the facilitator's role is presented, the tools for group interaction, and how GSS strongly supports an integrative facilitation style (over a less advisable chauffeured style). Finally, case studies of field experience with GSS are presented to demonstrate the gains and issues with GSS.

37

Page 38: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Telecommunications/security

intro

Telecommunications is a very broad area which covers from the fundamental data communications (cables and signals) to computer networking. Most of the courses and research are conducted in electronic engineering or computer science department. It was not easy to define the key topics of telecommunications from MIS perspective. By searching the faculty directory in IS World web sites, we found about 9 topics that MIS researchers are currently involved in. Then we ranked those topics by thenumber of researchers. This helped us narrow the topics down to five: telecommunications and network design, telecommunications policy, multimedia telecommunications, telecommunications market trends and communication security. For searching the topic five researchers and papers, we used three strategies. First, we listed the committee members of IEEE Sigcom and selected three of them by their contribution and achievement. Second, we searched Web Of Science citation database for the most cited research papers by the five topics. Last, we selected five key researchers and five key papers from our list by comparing their achievements, awards and research papers.

top researchers

Roch Guerin

Contact Information:

University of Pennsylvania, Department of Electronic Engineering, Rm. 367 200 South 33rd Street Philadelphia, PA 19104 [email protected]

Awards:

Alfred Fitler Moore Professor of Telecommunications Networks

Current Research:

Networking and Quality-of-Service, in particular the intersection of the two.

Aurel A. Lazar

Contact Information:

Department of Electrical Engineering 1312 S.W. Mudd , 500 West 120th Street New York, NY 10027 Tel: (212) 854 – 3105

38

Page 39: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Current Research:

Networking games and pricing, Architectures, Network Management and Control, Broadband Networking with QOS Guarantees, Multimedia Networking, Resource Allocation and Networking Games

Thomas L. Magnanti

Contact Information:

MIT Sloan School of Management50 Memorial Drive, Room 1-206Cambridge, MA 02142(617) 253-6604, E-mail: [email protected]

Current Research:

Communication systems, production planning and scheduling, transportation planning.

Steve McCanne

Contact information:

633 Soda Hall Electrical Engineering and Computer Science University of California, Berkeley (510) 642-0865, E-mail: [email protected]

Current Research:

Multimedia networking, multicast communication protocols, application-specific transport protocols, signal compression and digital signal processing, remote collaboration technologies, domain-specific languages and compilers for networking, and network simulation and visualization.Facility location, logistics, and network design

David Wetherall

Contact information:

David WetherallDept. of Computer Science and EngineeringUniversity of Washington

39

Page 40: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Box 352350, 210 Sieg HallSeattle WA 98195-2350, E- mail: [email protected]

Current Research:

Distributed systems, protocol design and implementation, programming languages, and mobile code.

top articles

1. Guerin, R. (1999). Intradomain Qos Routing In IP Networks: A Feasibility And Cost/Benefit Analysis. IEEE Network, 42-54.

Constraint-based routing gradually becomes an essential enabling mechanism for a variety of emerging network services such as virtual private networking and QoS support. A number of previous works have recognized its significance and investigated many aspects of the operation of constraint-based routing and in particular its variant concerned with determining paths for requests with specific QoS requirements, known as QoS routing. In this work we build on previous results on the cost of QoS routing and investigate the performance/cost trade-offs involved in the operation of a representative QoS routing architecture, elaborate on the constituents of this cost, and identify the main methods for containing the cost that QoS routing incurs on routers. Our results show that the cost of QoS routing is not excessive and that there indeed exist operational configurations, which can achieve reasonable performance gains with only a minimal increase in processing cost when compared to conventional best-effort routing.

2. Lazar, A. A. (1997). Programming telecommunication networks. IEEE Network, 11(8), 8-18.

The recent move toward market deregulation and open competition has sparked a wave of serious introspection in the telecommunications service industry. Telecom providers and operators are now required to open up their primary revenue channels to competing industries. The competition for product differentiation increasingly depends on the level of sophistication, degree of flexibility, and speed of deployment of services that a future provider can offer. These factors in turn depend heavily on the flexibility of the software architecture in place in a provider's operational infrastructure. Within this context, we examine the service architecture of two major global communication networks - the Telephone Network and the Internet and explore their weaknesses and strengths. We discuss the realization of an open programmable networking environment based on a new service architecture for advanced telecommunication services that overcomes the limitations of the existing networks. Our approach to network programmability stems from two angles - one conceptual, the other implementational. In the first, we attempt to develop a service model-that is open and reflects the economic market structure of the future telecommunications service industry. We believe that investigating such a model will help clarify some of the pertinent issues confronting the telecommunications service industry today as it comes of age. Furthermore, we introduce an extended reference model for realizing the service marketplace and present it as a vehicle for creating multimedia services with QoS guarantees. In the second, we investigate the feasibility of engineering the reference model from an implementation standpoint. We describe a realization of the open programmable networking environment as a broadband kernel. Called xbind, the broadband kernel incorporates IP and CORBA technologies for signaling, management, and service creation, and ATM for transport. We address some of the important QoS, performance, scalability, and implementation issues, fully aware that our work has opened new vistas that call for additional research.

40

Page 41: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........3. McCanne, S. (1999). Scalable multimedia communication using IP Multicast and lightweight sessions. IEEE Internet Computing, 3(2), 33-45.

This survey describes the roots of IP Multicast, the evolution of the Internet Multicast Backbone, or Mbone, and the technologies that have risen around the Mbone to support large-scale Internet-based multimedia conferencing. The author explains the technical rationale for design decisions that underlay the Mbone tools, describes the evolution of this work from early prototypes into Internet standards, and outlines the open challenges that remain and must be overcome to realize a ubiquitous multicast infrastructure.

4. Short, K. M. (1994). Steps Toward Unmasking Secure Communications. International Journal Of Bifurcation And Chaos, 4(4), 959-977.

This work tests the level of security in secure communication systems based on nonlinear dynamics (NLD), or chaos. In these systems, a chaotic carrier signal is used in a type of spread-spectrum signaling system, with the added benefit that the hidden information signal is buried at something of the order of -30 dB with respect to the chaotic carrier. To investigate the level of security in such systems, an examination was conducted on a test set of chaotic carriers and hidden information signals prepared by the NLD research group at the Naval Research Lab. The hidden signals included a triangle wave, a period doubled signal, and a chaotic signal that was different from the chaotic carrier. The analysis process was to use NLD forecasting to predict the carrier dynamics, and then subtract away the predicted values to reveal the hidden signal or at least increase its signal-to-noise ratio with respect to the carrier. In each case, it was a simple task to determine the power spectrum of the hidden signal once the prediction of the carrier was removed. This was then used to create a ''comb'' filter to extract the correct frequencies from the FFT of the first two signals. When this was done, the hidden signals were recreated with almost perfect accuracy. In the third case, the hidden chaotic signal had a broadband component, so the spectrum was used to develop a Weiner filter which enabled the hidden signal to be reconstructed with only moderate accuracy, where the overall structure of the hidden chaotic signal was preserved, but the fine structure was lost. As a further test, the processing approach was applied to a voice signal hidden in one-dimensional Lorenz data at -35 dB. After subtracting away the carrier model, the voice signal was reconstructed with reasonable accuracy, and had the same characteristic structure. In this case, no secondary filtering was applied. The forecasting approach was then extended to allow for dynamic signal estimation using threshold detection, so that whenever a signal was detected, multiple predictions of the carrier behavior were made into the future. This was tested on a square wave embedded at -42 dB in Lorenz data. The extended approach was able to reveal the square wave with almost perfect precision, except in a few regions where it temporarily lost synchrony with the carrier. This allowed for the elimination of the secondary filtering requirement entirely. The final conclusion is that the secure communications systems based on chaotic carriers may be useful to increase privacy, but are not yet capable of providing a high level of security. The paper concludes with a discussion of measures which may be taken to improve the security of such systems so that they may be applicable to areas where higher security is required.

5. Wetherall, D. (1998). ANTS: a toolkit for building and dynamically deploying network protocols. Paper presented at the Open Architectures and Network Programming, IEEE.

The authors present a novel approach to building and deploying network protocols. The approach is based on mobile code, demand loading, and caching techniques. The architecture of the system allows new protocols to be dynamically deployed at both routers and end systems, without the need for coordination and without unwanted interaction between co-existing protocols. They describe the architecture and its realization in a prototype implementation. To demonstrate how to exploit the architecture, they present two

41

Page 42: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........simple protocols that operate within the prototype to introduce multicast and mobility services into a network that initially lacks them.

Systems analysis and design

intro

We compiled our list of key researchers and key books for Systems Analysis and Design based on conversations with Dr. Meader. Dr. Meader identified the following four distinct categories of SA&D research:

Traditional--the Engineering approachStarted by IBM veterans such as Frederick Brooks and Watts Humphrey, this approach recognizes that software systems can be engineered through disciplined, structured software development processes. Roger Pressman is another main contributor in the structured systems analysis and design field.

Soft Systems--Sociology/Psychology ApproachIn contrast to researchers from the traditional SA&D field, Peter Checkland is taking a more sociology/psychology approach to software development.

Object-oriented SA&DWe need to know the Amigos of Object-orientation: Grady Booch—known for his Booch Method Ivar Jacobson—known for his OOSE approach and the introduction of Use Case James Rumbaugh—known for his Object Modeling Technique (OMT) method

Rapid Development--Practitioner's viewThis is the practitioner’s approach summarized by consultants such as Steve McConnell and Steve Maguire.

top researchers

Grady Booch

Contact Information:Chief Scientist, Rational Software Corporation 18880 Homestead Rd Cupertino, CA 95014

Awards:

Member of AAAS, IEEE, and CPSR, and is both an ACM Fellow and Rational Fellow.

Current Research:

42

Page 43: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Pioneered the development of object-oriented analysis and design methods. His work centers primarily on complex software systems. Since joining Rational Rose, he’s been working on the Unified Modeling Language (UML) and the Rational Unified Process.

Peter Checkland

Contact Information:

Professor of Systems, Department of Management ScienceThe Management School, Lancaster UniversityLancaster, LA1 4YXUKTel: +44 (0) 1524 593867, E-mail: [email protected]

Awards:

Recipient of the 'Most Distinguished and Outstanding Contributor' Award of the British Computer Society Methodologies Group, 1994. Recipient of the Gold Model of the UK Systems Society for 'Outstanding Contribution to Systems Thinking', 1997. Recipient of a Leverhulme Emeritus Fellowship, 1998-2000.

Current Research:

The nature of information systems, further development of Soft Systems Methodology, and information provision in the NHS.

Watts Humphrey

Contact Information:

Software Engineering InstituteCarnegie Mellon UniversityPittsburgh, PA 15213-3890, E-mail: [email protected]

Awards:

Member of the Association for Computing Machinery, Fellow of the Institute for Electrical and Electronics Engineers (IEEE), Past member of the Malcolm Baldridge National Quality Award Board of Examiners.

Current Research:

Responsible for developing improved software engineering process methods and working with industry and government to gain their acceptance. In addition to promoting the renowned

43

Page 44: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Capability Maturity Model (CMM), his current research centers on the Person Software Process (PSP) and Team Software Process (TSP).

Roger Pressman

Contact Information:

R.S. Pressman & Associates, Inc6425 Via Rosa DriveBoca Raton, Florida 33433

Current Research:

Specialized in helping companies establish effective software engineering practices. He is the developer of Process Advisor, the industry's first self-directed software process improvement product and Essential Software Engineering, a comprehensive video curriculum.

Edward Yourdon

Contact Information:

Cutter Consortium37 Broadway, Arlington, Massachusetts 02474888-814-7605

Current Research:

Widely known as the lead developer of the structured analysis/design methods of the 1970s. He was a co-developer of the Yourdon/Whitehead method of object-oriented analysis/design and the popular Coad/Yourdon OO methodology. He has been working on the Y2K problem of late.

top articlesSA&D

1. Booch, G. (1994). Object Oriented Analysis and Design: Addison-Wesley.2. Brooks, F. (1995). The Mythical Man-Month: Addison-Wesley.3. Humphrey, W. (1989). Managing the Software Process: Addison-Wesley.4. McConnell, S. C. (1996). Rapid Development: Taming Wild Software Schedules: Microsoft Press.5. Pressman, R. S. (1997). Software Engineering: A Practitioner's Approach: McGraw-Hill.

44

Page 45: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........E-commerce

intro

Since the field of electronic commerce is an emerging field, we conducted our search for key papers and key people by selecting papers and people that would expose a MIS student to e-commerce. We are not claiming that these papers and people are key; however, we feel that these people are the people to watch in

the future. We started our search by talking to two faculty members, Dr. Meader and Dr. Zeng. From them, we obtained information on where we could start looking for information on the internet. Our search led mainly to centers for electronic commerce.

top researchers

Lynda Applegate

Contact Information:

Harvard UniversityGraduate School of Business AdministrationBaker 183Boston, MA 02163 (617) 495-6362, E-mail:[email protected]

Current Research:

Focuses on the influence of information technology on markets and organizations. Her findings on the evolution of electronic commerce and on the role of information technology as an enabler of flexible and adaptive organizational designs and innovative management control systems have been widely published.

Alok Gupta

Contact Information:

Department of Operations and Information ManagementRoom 210, School of Business AdministrationUniversity of Connecticut368 Fairfield Road, U-41OPIMStorrs, CT 06269-2041(860) 486-6416, E-mail: [email protected]

Current Research:

Focuses on estimating internet user’s demand characteristics and on on-line auctions.

45

Page 46: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........Ravi Kalakota

Contact Information:

Director, Center for Digital Commerce, Georgia State University35 Broad Street, 9th Floor, Georgia State UniversityAtlanta, Georgia 30303(404) 651-0933, E-mail: [email protected]

Current Research:

Examines the next generation of business models that are emerging to take advantage of electronic commerce.

Andrew B. Whinston

Contact Information:

DirectorCenter for Research in Electronic CommerceCollege and Graduate School of BusinessUniversity of Texas at Austin Austin, Texas (512) 471-8879, E-mail: [email protected]

Current Research:

Spans various realms of electronic commerce, its impact on business protocols and processes, on organizational structure and corporate networks, electronic publishing, electronic education, complementarity of convergent computational paradigms and business value of IT. Through diverse initiatives, various aspects and consequences of the emergent economies over the Internet and corporate Intranets are studied.

Vladimir Zwass

Contact Information:

School of Computer Science and Information SystemsFairleigh Dickinson UniversityTeaneck, NJ 07666(201) 692-2119, E-mail: [email protected]

Current Research:

Serves as Editor-in-Chief of the International Journal of Electronic Commerce, the premier scholarly journal in the area of E-commerce.

46

Page 47: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........top articlesE-Commerce

1. Applegate, L. M., Holsapple, C. W., Kalakota, R., Radermacher, F. J., & Whinston, A. B. (1996). Electronic commerce: building blocks of new business opportunity. Journal of Organizational Computing and Electronic Commerce, 6(1), 1-10.

There is much uncertainty in the emerging world of electronic commerce. This uncertainty spans a variety of areas-management, consumer behavior and technology-but this is good news. History provides

numerous examples where market uncertainty has created potential for shaping new products, creating markets, and building a loyal customer base. A good case study of uncertainty management is Microsoft, which in the turbulent days of the early PC software market shaped an entire industry and continues to reap the benefits. We are on the brink of changes that are projected to rival in impact the Industrial Revolution of the 18th and 19th Centuries. Much more than making entirely new knowledge-based products possible, it is clear that electronic commerce will lead to a fundamental redefinition of the way business is conducted. All participants in the business community need to wake up to, understand and adapt to electronic commerce. They need to redefine their business philosophies and approaches so as to position their organizations to rise with the tide.

2. Gupta, A., Stahl, D. O., & Whinston, A. B. (1999). The economics of network management. Communications of the ACM, 42(9), 57-63.

Why are pricing issues the key to infrastructure investment and future growth of the Internet? Pricing computer network traffic is essential to manage that traffic and to control and provide the different QoS required by different applications and users. This article outlines the requirements, characteristics and performance of an ideal price-setting mechanism. These prices can be computed in a completely decentralized manner. Decentralized price computation provides a high degree of protection against disruption due to network failure and congestion. Furthermore, with decentralized computing, the informational and computational requirements of price-computing mechanisms are minimal. One of the most significant benefits of this approach is that it provides an economic rationale for multiple levels of QoS. It also provides incentives to maintain required QoS levels and prevents misuse of the network by redistributing user demand patterns. Such a pricing mechanism can be used when the network is using different protocols for different types of applications. Finally, public policy issues need to be addressed in the context of e-commerce. We have proposed a comprehensive model to analyze e-commerce and multiple ownership that could enhance our understanding and anticipate the problems and/or opportunities in e-commerce. This model is also useful in analyzing the effects of taxation and regulation.

3. Kalakota, R., & Whinston, A. B. (1997). Electronic Commerce: A Manager's Guide: Addison-Wesley.

4. Sulin, B., Kalakota, R., & Whinston, A. B. (1997). Using client-broker-server architecture for intranet decision support. Decision Support Systems, 19(3), 171-192.

Electronic commerce is emerging as a key enabler in changing the way companies do business. The paper focuses on the aspects of electronic commerce that are pertinent to intranet decision support and tries to develop the theory and technical requirements that will drive the implementation of such a decision support system. The main objective is to achieve information integration using the brokers, World Wide Web, and structured documents. The implementation of a prototype system is described and results from its usage are presented.

47

Page 48: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........5. Zwass, V. (1996). Electronic commerce: structures and issues. International Journal of Electronic Commerce, 1(1), 3-23.

Electronic commerce (E-commerce) is sharing business information, maintaining business relationships, and conducting business transactions by means of telecommunications networks. Traditional E-commerce, conducted with the use of information technologies centering on electronic data interchange (EDI) over proprietary value-added networks, is rapidly moving to the Internet. The Internet's World Wide Web has become the prime driver of contemporary E-commerce. This paper presents a hierarchical framework of E-commerce, consisting of three meta-levels: infrastructure, services, and products and structures, which, in turn, consist of seven functional levels. These levels of E-commerce development, as well as of analysis, range from the wide-area telecommunications infrastructure to electronic marketplaces and electronic

hierarchies enabled by E-commerce. Several nodal problems are discussed that will define future development in E-commerce, including integrating electronic payment into the buying process, building a consumer marketplace, the governance of electronic business, and the new intermediation. The paper also introduces the International Journal of Electronic Commerce, which will provide an integrated view of the new E-commerce.

48

Page 49: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Appendix A: All Researchers (Alphabetic Order)

Name Field Rigor-Relevance Rank Behavior-Technical Rank

Applegate, Linda E-commerce 4 2 Booch, Grady System Analysis & Design 3 5 Brynjolfsson, Eric Economics 4 4

Checkland, Peter System Analysis & Design 4 1 Chen, Hsinchun KM/AI/IR 3 4

Chen, Pin-Shan Peter Database 4 3

Codd, F. E. Database 3 4

Cohen, A Morris Economics 3 5

Culnan, Mary, J. Ethics 4 1

Davenport, Thomas KM/AI/IR 5 2 Denning, J. Peter HCI 2 4

DeSanctis Jerry GSS 1 1 Gallupe, Brent GSS 3 3

Goodman, Sy International (Policy Foundation) 5 1

Guerin, Roch Telecommunications 5 5

Gupta, Alok E-commerce 2 4 Humphrey, Watts System Analysis & Design 3 3 Kalakota, Ravi E-commerce 5 1 Kiesler, Sarah GSS 1 1

Social Issues 3 2

Kim, Won Database 4 5

Kling, Rob Social Issues/Ethics 4 1

49

Page 50: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Name Field Rigor-Relevance Rank Behavior-Technical Rank

Lazar, A. Aurel Telecommunications 4 5

Lee, L Hau Economics/Decision Science 4 4

Liddle, David HCI/Visualization 2 3

Magnanti, Thomas L. Telecommunications 2 4

March, Salvatore T. Database 2 2

Marchionini, Gary KM/AI/IR 5 2

Marsden R. James Economics 2 4

Mason, O. Richard Ethics 4 1

McCanne, Steven Telecommunications 4 4

Mendelson, Haim Economics 2 5

Nielsen, Jakob HCI / Psychology 3 2

Noam, Eli International (Policy Foundation) 5 1

Norman,Donald HCI / Psychology 3 1

Nunamaker, F. Jay Jr. GSS 3 3 Olsen Judy GSS 2 2

Press, Larry International (Policy Foundation) 5 1

Pressman, Roger System Analysis and Design 4 4 Ram, Sudha Database 5 5

Salton, Gerard KM/AI/IR 3 5

Simon, Herbert KM/AI/IR 2 4

Wetherall, David Telecommunations 4 4

Whinston, Andrew E-commerce 3 3

Winograd, Terry A. HCI 2 3

Yourdon, Edward System Analysis and Design 3 5

Zwasss, Vladimir E-Commerce 3 3

50

Page 51: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

Appendix B : Bibliography

Applegate, L. M., Holsapple, C. W., Kalakota, R., Radermacher, F. J., & Whinston, A. B. (1996). Electronic commerce: building blocks of new business opportunity. Journal of Organizational Computing and Electronic Commerce, 6(1), 1-10.

1. Barua, A., & Lee, C. S. (1996). The calculus of reengineering. Information Systems Research, 7(4), 409-428.

2. Booch, G. (1994). Object Oriented Analysis and Design: Addison-Wesley.3. Brooks, F. (1995). The Mythical Man-Month: Addison-Wesley.4. Brynjolfsson, E., & Hitt, L. (1996). Paradox lost? Firm-level evidence on the returns to information

systems spending. Management Science, 42(4), 541-558.5. Chen, H., & Lynch, K. J. (1992). Automatic Construction of Networks of Concepts Characterizing

Document Databases. Paper presented at the IEEE Transactions on Systems, Man, and Cybernetics.6. Chen, P. P. (1976). The Entity-Relationship model -Toward a unified view of data. ACM Trans.

Database Systems, 1(1), 9-36.7. Clemons, E. K., & Row, M. C. (1991). Sustaining IT Advantage - The Role of Structural Differences.

MIS Quarterly, 15(3), 275-292.8. Codd, E. F. (1970). A relational model of data for large shared data banks. Communications of the

ACM, 12(6), 377-387.9. Culnan, M. J. (1993). How did they get my name?': An exploratory investigation of consumer attitudes

toward secondary information use. MIS Quarterly, 17(3), 341-362.10. Davenport, T. H., Jarvenpaa, S. L., & Beers, M. C. (1996). Improving knowledge work processes.

Sloan Management Review, 37(4), 53-65.11. Denning, P., & Dargan, P. (1996). Action-Centered Design, Bringing Design to Software (pp. 105-

127).12. DeSanctis, G., & Gallupe, R. B. (1987). A Foundation for the Study of Group Decision Support

Systems. Management Science, 33(5), 589-609.13. Gallupe, R. B., Dennis, A. R., Cooper, W. H., Valacich, J. S., Bastianutti, L. M., & Nunamaker, J. F.

(1992). Electronic Brainstorming and Group Size. Academy of Management Journal, 35(2), 350-369.14. Gaver, W. (1991). Technology Affordances. Paper presented at the CHI 91 Conference Proceedings.15. Goodman, S. E., & Burkhart, G. E. (1998). The Internet Gains Acceptance in the Persian Gulf. CACM,

41(3), 19-23.16. Goodman, S. E., & Lyytinen, K., Finland. (1999). The Unknown Soldier on the IT Front. CACM,

42(3), 13-17.17. Goodman, S. E., Mehrer, A. L., & Lynch, K. J. International Development in the Information

Technologies: The MOSAIC Group (Working paper ).18. Guerin, R. (1999). Intradomain Qos Routing In IP Networks: A Feasibility And Cost/Benefit Analysis.

IEEE Network, 42-54.19. Gupta, A., Stahl, D. O., & Whinston, A. B. (1999). The economics of network management.

Communications of the ACM, 42(9), 57-63.20. Gurvaxany, V., & Mendelson, H. (1992). An Empirical-Analysis of Software and Hardware Spending.

Decision Support Systems, 8(1), 1-16.21. Humphrey, W. (1989). Managing the Software Process: Addison-Wesley.22. Kalakota, R., & Whinston, A. B. (1997). Electronic Commerce: A Manager's Guide: Addison-Wesley.23. Kim, W., Ballou, N., F.Garza, J., & Woelk, D. (1991). A distributed object-oriented database system

support shared and private databases. ACM Transactions on Information Systems, 9(1), 31-51.24. Kling, R., & McKim, G. (1999). Scholarly communication and the continuum of electronic publishing.

Journal of the American Society for Information Science, 50(10), 890-906.

51

Page 52: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........25. Kling, R., Wegner, P., Rice, J. R., & Weiss, E. A. (1993). Forum Source. : Communications of the

ACM, 36(2), 15-20.26. Kraut, R., Kiesler, S., Mukhopadhyay, T., Scherlis, W., & Patterson, M. (1998). Social impact of the

Internet: What does it mean? Communications of the ACM(41), 12.27. Lazar, A. A. (1997). Programming telecommunication networks. IEEE Network, 11(8), 8-18.28. Malone, T. W., Yates, J., & Benjamin, R. I. (1987). Electronic Markets and Electronic Hierarchies.

Communications of the ACM, 30(6), 484-497.29. March, S. T., & Rho, S. (1995). Allocating Data and Operations to Nodes in Distributed Database

Design. IEEE Transactions in Knowledge and Data Engineering, 72, 305-317.30. Marchionini, G., Plaisant, C., & Komlodi, A. (1998). Interfaces and tools for the Library of Congress

National Digital Library Program. Information Processing & Management, 34(5), 535-555.31. Mason, R. O., & cKenney, J. L. (1997). Developing an historical tradition in MIS research. MIS

Quarterly, 21(3), 257-279.32. Mason, R. O., & McKenney, J. L. (1997). An Historical Method for MIS Research: Steps and

Assumptions. MIS Quarterly, 21(3), 307-322.33. McCanne, S. (1999). Scalable multimedia communication using IP Multicast and lightweight sessions.

IEEE Internet Computing, 3(2), 33-45.34. McConnell, S. C. (1996). Rapid Development: Taming Wild Software Schedules: Microsoft Press.35. Nielsen, J. (1993). What is Usability, Usability Heuristics, Usability Engineering (pp. 23-48 and 115-

148).36. Norman, D. (1988). Psychology of the Everyday Things, Design of Everyday Things (pp. 1-33).37. Nunamaker, J. F., Briggs, R. O., Mittleman, D. D., Vogel, D. R., & Balthazard, P. A. (1997). Lessons

from a Dozen Years of Group Support Systems Research: A Discussion of Lab and Field Findings. Journal of Management Information Systems, 13(3), 163-207.

38. Nunamaker, J. F., Dennis, A. R., Valacich, J. S., Vogel, D. R., & George, J. F. (1991). Electronic Meeting Systems to Support Group Work. Communications of the ACM, 34(7), 40-61.

39. Press, L., Burkhart, G. E., Foster, W., Goodman, S. E., Wolcott, P., & Woodard, J. (1998). An Internet Diffusion Framework. CACM, 41(10), 21-26.

40. Pressman, R. S. (1997). Software Engineering: A Practitioner's Approach: McGraw-Hill.41. Ram, S. (1991). Heterogeneous Distributed Database Systems. IEEE Computer, 24(12), 7-11.42. Salton, G., Yang, C., & Yu, C. (1975). Theory of term importance in automatic text analysis. Journal

Am. Soc. Inform. Sci., 26(1), 33-44.43. Short, K. M. (1994). Steps Toward Unmasking Secure Communications. International Journal Of

Bifurcation And Chaos, 4(4), 959-977.44. Simon, H. A. (1991). Artificial Intelligence: Where has it been and Where is it going? IEEE

Transactions on Knowledge and Data Engineering, 3(2), 128-136.45. Sulin, B., Kalakota, R., & Whinston, A. B. (1997). Using client-broker-server architecture for intranet

decision support. Decision Support Systems, 19(3), 171-192.46. Wetherall, D. (1998). ANTS: a toolkit for building and dynamically deploying network protocols.

Paper presented at the Open Architectures and Network Programming, IEEE.47. Wickens, C. (1992). Attention in Perception and Display Space, Engineering Psychology and Human

Performance (pp. 74-115).48. Zwass, V. (1996). Electronic commerce: structures and issues. International Journal of Electronic

Commerce, 1(1), 3-23.

52

Page 53: Paper outline - National Center for Border Security and ...borders.arizona.edu/classes/mis696a/projects/final... · Web viewBoth symbolic and connectionist AI techniques are employed

.........

53