Key user roles on web-based information systems requirements

被引:11
作者
Yang, HL
Tang, JH
机构
[1] Natl Chengchi Univ, Dept Management Informat Syst, Taipei 11623, Taiwan
[2] Natl Dong Hwa Univ, Dept Informat Management, Hualien, Taiwan
关键词
information systems; Internet; computer networks;
D O I
10.1108/02635570510599968
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose - To investigate the relationship between key users (defined as their influence) in "information", "purchase", "communication" or "entertainment" networks, and the number of elicited requirements in web-based information systems (WIS). Design/methodology/approach - A lab experiment was designed and conducted to investigate the relationship between college students' elicited requirements for two WIS cases and their social networks. Findings - The individual centrality in "information" networks has a significant positive relationship with the numbers of elicited "information" requirements and total requirements; however, the individual centrality in other social networks has no significant relationship with the number of the elicited requirements. Research limitations/implications - The requirements collected from "key users" may account for most requirements, which is similar to the results predicted by Pareto's rule. Practical implications - The origin of a WIS depends on a few influential users. These key users possess more power than others, and they define not only the "requirements" of the site but also its content or knowledge. The WIS designers may take advantage of this fact. Originality/value - This paper fills the information requirement elicitation gap, while transferring the conventional IS development experiences to WIS.
引用
收藏
页码:577 / 595
页数:19
相关论文
共 53 条
  • [11] A relational view of information seeking and learning in social networks
    Borgatti, SP
    Cross, R
    [J]. MANAGEMENT SCIENCE, 2003, 49 (04) : 432 - 445
  • [12] Improving information requirements determination: a cognitive perspective
    Browne, GJ
    Ramesh, V
    [J]. INFORMATION & MANAGEMENT, 2002, 39 (08) : 625 - 645
  • [13] An empirical investigation of user requirements elicitation: Comparing the effectiveness of prompting techniques
    Browne, GJ
    Rogich, MB
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2001, 17 (04) : 223 - 249
  • [14] A SYNTHESIS OF RESEARCH ON REQUIREMENTS ANALYSIS AND KNOWLEDGE ACQUISITION TECHNIQUES
    BYRD, TA
    COSSICK, KL
    ZMUD, RW
    [J]. MIS QUARTERLY, 1992, 16 (01) : 117 - 138
  • [15] CAMPBELL N, 2001, USABILITY ASSESSMENT
  • [16] Toxicological characteristics of endocrine-disrupting chemicals: Developmental toxicity, carcinogenicity, and mutagenicity
    Choi, SM
    Yoo, SD
    Lee, BM
    [J]. JOURNAL OF TOXICOLOGY AND ENVIRONMENTAL HEALTH-PART B-CRITICAL REVIEWS, 2004, 7 (01): : 1 - 32
  • [17] Beyond answers: dimensions of the advice network
    Cross, R
    Borgatti, SP
    Parker, A
    [J]. SOCIAL NETWORKS, 2001, 23 (03) : 215 - 235
  • [18] WSDM: a user centered design method for Web sites
    De Troyer, OMF
    Leune, CJ
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7): : 85 - 94
  • [19] Tools and approaches for developing data-intensive Web applications: A survey
    Fraternali, P
    [J]. ACM COMPUTING SURVEYS, 1999, 31 (03) : 227 - 263
  • [20] FUCCELLA J, 1998, CREATING WEB SITE DE