Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Values (2)
- Academic (1)
- Adoption (1)
- Decisions (1)
- Information systems (1)
-
- Interference from state (1)
- LCID variation (1)
- Laddering (1)
- Lifestyle decisions (1)
- Mobile services (1)
- Nanny state (1)
- Negative consequences (1)
- Obesity (1)
- Privacy (1)
- RFID (1)
- Rights (1)
- Safety (1)
- Security (1)
- Social marketing (1)
- Structuration Theory. Research Methodology (1)
- Super nanny state (1)
- Teaching and research (1)
- Universities (1)
Articles 1 - 6 of 6
Full-Text Articles in Business
Free To Be Obese In A 'Super Nanny State'?, Nadine Henley
Free To Be Obese In A 'Super Nanny State'?, Nadine Henley
Research outputs pre 2011
Should individuals be free to make lifestyle decisions (such as what, when and how much to eat and how much physical activity to take), without undue interference from the state, even when their decisions may lead to negative consequences (obesity, heart disease, diabetes)?
Values And M-Services Adoption, Craig Standing, Patricia Mcmanus, Susan Standing, Heikki Karjaluoto
Values And M-Services Adoption, Craig Standing, Patricia Mcmanus, Susan Standing, Heikki Karjaluoto
Research outputs pre 2011
The use of mobile services has increased rapidly in recent. Although research has been conducted on which services people use and the benefits they attach to those services, the values associated with the adoption and use of m-services at the individual level is still unclear. This formation systems field various technology adoption models have been proposed and validated in relation to technology adoption within an organisational setting but personal adoption and use of technology is less researched. To help uncover the values behind adoption of m-services we use means-end chains and laddering techniques. The analysis of the interviews shows that …
Developing A Positive Experience Of Introductory Information Systems For Women At Two Australasian Universities, Rosemary Stockdale, Susan Stoney
Developing A Positive Experience Of Introductory Information Systems For Women At Two Australasian Universities, Rosemary Stockdale, Susan Stoney
Research outputs pre 2011
This paper examines how academics can contribute to encouraging greater uptake of IS majors by women. Using a qualitative reflective approach we identify the perceptions and experiences of female undergraduates taking introductory IS courses in two universities, one in Australia and one in New Zealand, and discuss ways in which to improve their learning experience. We examine ways to improve the delivery of introductory IS courses in order to make information systems more relevant and less dreary to women undergraduates. The paper concludes with some recommendations for marketing courses and areas of further research.
Information Systems In Western Australian Universities, Craig Standing, Janice Burn, Chad Lin
Information Systems In Western Australian Universities, Craig Standing, Janice Burn, Chad Lin
Research outputs pre 2011
Systems (IS) teaching and research within Western Australia (WA). A brief overview of the WA environment is followed by an exploration of teaching and research in the four main Universities. This is examined against the framework for the study and, in particular, the impact of social processes (Ariav et al, 1987; Klein et al, 1991) and local contingencies (Culnan et al, 1993; Checkland and Howell, 1998), which are found to be of relevance to historic developments.
Producing Safety: Evaluating Structuration Theory As A Framework For Exploring The Values In Action Within The Civil Construction Industry In Wa, Susanne Bahn, Llandis Barratt-Pugh
Producing Safety: Evaluating Structuration Theory As A Framework For Exploring The Values In Action Within The Civil Construction Industry In Wa, Susanne Bahn, Llandis Barratt-Pugh
Research outputs pre 2011
In this paper we argue that occupational safety and health (OS&H) in the workplace is a production of values in action. We propose that such relations may best be explored through the structuration lens generated by Giddens (1984). We both use structuration theory to conceptualise the relations that produce safety and evaluate the utility of the theory as a research framework. We provide a detailed discussion of the context of, and rationale for a proposed study. The paper then analyses the components of structuration theory and frames the production of safety within these conceptual relations. The paper argues that the …
Low-Cost Rfid Identification Variation, Koong Lin, Tzu-Chang Yeh, Yao-Yuan Liu, Chad Lin
Low-Cost Rfid Identification Variation, Koong Lin, Tzu-Chang Yeh, Yao-Yuan Liu, Chad Lin
Research outputs pre 2011
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because of the contact-less type of RFID remote retrieval, the transmission of data in the air is very vulnerable to eavesdropping or appropriation. A primary security concern surrounding RFID technology is the illicit tracking of consumer location and analyzing of their shopping habits or behavior. This paper proposes a more secure and lightweight RFID variation protection protocol which enhances the …