The Electronic Journal of Information Systems Evaluation provides critical perspectives on topics relevant to Information Systems Evaluation, with an emphasis on the organisational and management implications
For general enquiries email administrator@ejise.com
Click here to see other Scholarly Electronic Journals published by API
For a range of research text books on this and complimentary topics visit the Academic Bookshop

Information about the European Conference on Information Management and Evaluation is available here

linkedin-120 

twitter2-125 

fb_logo-125 

 

Journal Article

Mobile Access to Information Systems in law Enforcement: An Evaluation of its Implications for Data Quality  pp143-152

Rachael Lindsay, Thomas Jackson, Louise Cooke

© Oct 2010 Volume 13 Issue 2, ICIME 2010, Editor: Shaun Pather and Corrie Uys, pp97 - 196

Look inside Download PDF (free)

Abstract

A recent UK government initiative enables police officers to input information directly into policing information systems via mobile devices. However, the impact and implications on data quality have not been assessed. The events of 9/11 and the Soham murders in the UK in 2002 may reflect high profile incidents of failure in information management practice within police forces that have amplified the need to scrutinise the monitoring of data quality. The tragedy of the Soham murders was partly caused by poor quality information regarding the offender, Ian Huntley, being held on disparate information systems. Consequently, intelligence and information held on people must be fully accurate, and therefore data quality plays a pivotal role. Despite the apparent severe impact of poor data quality on organisational effectiveness and decision‑making, previous research appears to have addressed these issues only within non‑policing sectors. The paper investigates what measures are used to monitor data quality via an empirical study within a UK police force, the Leicestershire Constabulary. It also evaluates the design of the interface of the crime‑input form and the impact this has on inputting quality information into the crime recording system, along with the implications of this for modern‑day law enforcement. Measurement of data quality was investigated by mapping aspects of the data quality monitoring process identified via qualitative data from semi‑structured interviews against the key attributes of data quality derived from a literature review. The design of the crime‑recording interface was evaluated via a series of focus groups with operational users of mobile technology prior to and following implementation of mobile devices. The research found that there are some processes in place to check that data follows specific standards, such as the recording of dates of birth. However, these processes only take into consideration the structural completeness of data, and other measurements of data quality, such as accuracy, timeliness, relevance, understandability and consistency are not considered. It also found that the existing interface is inefficient for a mobile environment, as there are numerous free‑text fields and duplication of data entry caused by a lack of system integration. The paper contributes to the existing small body of knowledge on data quality within a mobile policing environment. This knowledge can be applied by other law enforcement organisations looking to provide mobile access to their information and knowledge environment without reducing the level of data quality as a result of direct input of information.

 

Keywords: mobile working, law enforcement, evaluation, data quality interface design

 

Share |

Journal Article

Exploring the SME Quandary: Data Governance in Practise in the Small to Medium‑Sized Enterprise Sector  pp3-13

Carolyn Begg, Tom Caira

© Jan 2012 Volume 15 Issue 1, ECIME 2011, Editor: Walter Castelnovo and Elena Ferrari, pp1 - 148

Look inside Download PDF (free)

Abstract

The purpose of this paper is to explore how small to medium‑sized enterprises (SMEs) perceive data and data governance and investigates whether current data governance frameworks are applicable to SMEs. Enterprises of all sizes and complexity have had to learn how to operate in an increasingly digital business environment. Such an environment demands that an enterprise equips itself with the ability to use its data effectively both internally and when dealing with external partners such as suppliers and customers. Enterprises now recognise that both their survival and success requires taking control of all aspects of their data as a critical business resource. In recognition of the demands placed on enterprises in this digital age, a discipline has emerged called data governance. Although the definition of data governance is still evolving, current usage describes this discipline as being a facilitator for enterprises to take control over all aspects of their data resource from the setting of integrity constraints for data quality to the creation of enterprise‑wide policies on data access and security. Large enterprises are often better placed to absorb the necessary demands that data governance places on resources. However, for the resource‑poor SME, the investment in data governance is far more challenging but nevertheless critical in the digital business environment. This paper reviews examples of published data governance frameworks to establish whether these frameworks are applicable to SMEs. A data governance framework (Khatri & Brown, 2010) is assessed using ten SMEs that have differing data requirements. This research is further enhanced by reviewing the results of a project which audited technology use in SMEs. This paper finds that although many data governance frameworks claim to be adaptable and scalable, there is little published evidence by industry or academics on the application of data governance to SMEs. Furthermore, our research revealed that the optimal use of data governance frameworks requires that those with authority and res

 

Keywords: data governance, SME, data management, data quality, framework

 

Share |

Journal Issue

Volume 13 Issue 2, ICIME 2010 / Oct 2010  pp97‑196

Editor: Shaun Pather, Corrie Uys

View Contents Download PDF (free)

Editorial

We have pleasure in presenting this special issue of EJISE.  As Information and Communications Technologies and the related Information Systems become ever more pervasive across all spheres of business, government and community based organizations, the scope of this journal has flexed to accommodate these varied settings in which pertinent research problems are located.   Consequently, in this special issue wide‑ranging problems related to the broad ambit of IS evaluation is reported on: 

As many countries continue to develop policies to enhance and sustain the growth of the SME sector, so too does the expenditure and consumption of IT amongst this category of business grow at an ever increasing rate thus warranting the attention of evaluation research. Avraam Papastathopoulos and Christina Beneki investigate an important concern with regards to the factors which are associated with the benefits from the adoption of ICTs amongst SMEs. In a study of the Greek SME sector the paper provides evidence that strategy plays a major role in the adoption and the appropriate use of ICTs.  Importantly their research also finds that prior entrepreneurial experience‑knowledge of ICT is significantly associated with the ICT performance. 

RFID technologies are increasingly used in a number of organisational settings for inventory control and management. Paul Golding and Vanesa Tennant contribute to our understanding of evaluation by proposing a methodology to evaluate the RFID inventory reader in a library.  Whilst the findings of this paper hone in on the application of RFID in a specific environment, the findings provide a basis for which evaluation of RFID in other similar contexts can take place, and thus adds to the conceptual base on RFID performance testing.

Notwithstanding many years of case studies and an increasing body of literature on ERP implementation and evaluation thereof questions continue to arise in respect of successful outcomes.  Brian O’Donovan and his co‑authors argue that during the ERP usage stage the intended efficiencies from ERP systems are not always realised. Having studied organisational memory mismatches and the resultant coping strategies their research posits that mismatches and short‑term coping strategies were found to contribute to ERP underperformance. 

In their paper Peter Weimann and co authors investigate the role of communications culture in a distributed team environment.  In assessing the role of ICTs in such an environment the paper argues that team member satisfaction and team success can only be accomplished if the communication culture in the company takes into account the technologies used and the distributed work setting. 

From amongst the various IS evaluation approaches, those apporaches which focus on the role of human stakeholders  are  worthy of a deeper understanding. Jeffrey Bagraim examines the multiple commitments of information technology knowledge workers and the related outcomes of such commitment. The results of his study challenges managers to review their assumptions about the organizational commitments of information technology knowledge workers.

Web 2.0 applications also receive attention in this issue.  Hooper and Evans investigate the value congruence of social networking services in New Zealand, and make an assessment of ethical information handling.  Their findings demonstrate significant shortcomings in the contractual relationships between the users and social networking services and they argue that this could be exploited in order to misuse personally identifiable data.

The paper by Racheal Lindsay and co‑authors discusses measures which are used to monitor data quality in the context of mobile devices in the UK police force.  Their findings show that whilst there are processes in place to verify data standards, these processes only take into consideration the structural completeness of data, and not other measurements of data quality, such as accuracy, timeliness, relevance, understandability and consistency.

Robbert in't Hout and coauthors studied how a wiki could be used to improve knowledge sharing.  The paper reports on a case study in which a consulting company was able to improve knowledge sharing amongst consultants during the devleopment of a Municipal Traffic and Transport Plan.  The findings  suggest that wikis need to be tuned to the learning styles that are available within the community that will use the tool.  In the context of knowledge sharing impolrtant lessons for wiki design are offered.

Finally, in a study of e‑government adoption, Rangarirai Matavire and co‑authors report on factors which inhibit the successful implementation of e‑government in South Africa. The findings of their research demonstrate that leadership, project fragmentation, perceived value of Information Technology, citizen inclusion and task co‑ordination are among the key inhibitors of e‑government success.

Shaun Pather and Corrie Uys

South Africa, October 2010

 

Keywords: affective commitment, boosting behaviour, communication culture, communication pattern, communication technology, data quality, e-Government, enterprise systems, entrepreneurial experience, ERP customising, ERP systems, ERP training, ERP usage, evaluation, grounded theory, helping behaviour, ICT-adoption, ICT-performance, ICT-strategy, interface design , knowledge management , law enforcement, library, mobile working, Municipal Traffic and Transport Planning, New Zealand Privacy Act 1993, ordinal regression, organisational memory, performance , personal security, personally identifiable information, privacy policies, RFID, social networking services , social software, South Africa, turnover intentions, value congruence, virtual teams, Wiki

 

Share |

Journal Issue

Volume 15 Issue 1, ECIME 2011 / Jan 2012  pp1‑148

Editor: Walter Castelnovo, Elena Ferrari

View Contents Download PDF (free)

Editorial

The papers in this issue of EJISE have been selected from those presented at the 5th European Conference on Information Management and Evaluation (ECIME 2011) at the Dipartimento di Informatica e Comunicazione, Università dell'Insubria, Como, Italy on 8‑9 September 2011.

 

The issue has been guest edited bythe Conference Chair, Professor Walter Castelnovo, and the Programme Chair, Professor Elena Ferrari, both from University of Insubria, Como, Italy.

 

walter_castelnovo    elena_ferrari 

 

Keywords: crime analysis, GIS, geostatistics, intelligence-led policing, predictive dissemination, data mining, boundary spanning, IS outsourcing, relationships management, accountability, enterprise records management, organizational memory, records auditing, knowledge economy, measuring effectiveness, performance indicator, assess of knowledge, enterprise information systems, enterprise recourse planning systems, customer relations management systems, supply chain management systems, community informatics, requirements engineering, microenterprise, technology adoption, indigenous business, socio-technical system, SMEs, IT/IS, lemon market theory, ISV, ambient assisted living, field trials, ageing technology users, enterprise architecture, architectural alignment, Zachman framework, TOGAF, GERAM, E2AF, payments, framework, mobile, value, data governance, data management, data quality, framework, business model, business case, strategy, operations, management, implementation

 

Share |