SlideShare a Scribd company logo
EUROPEAN JOURNAL
                    OF INFORMATION SYSTEMS




John, Nourin, Tibletse

                Current Editors:
                Dov Te'eni
                Frantz Rowe
INTRODUCTION
The Professional Source:


The European Journal of Information Systems provides viewers with a
distinctive European perspective on information systems and their practice
and theory.
The source contains an archive of articles and editorials related to the issues
and development of social media within the European domain. Each new
volume contains articles relating to a major issue that is present and
analysed throughout the contained articles.
The source is the official journal of the Operational Research Society, which
is an international society that caters to the profession and interest of
operational Research and its social media influence. This is done through a
number of social media sources, including Facebook, Twitter and LinkedIn.
THE ISSUES
• Practical Deconstruction

• Standardized IS literature Constructs

• Gov 2.0 Compatibility

• Individual Privacy Policy

• Social Networking Privacy

• Social Media

• Quality Changes

• Responsible Research/Innovation
The Chosen Article
Individual information system as a research arena
• Richard Baskerville


Deals with Social Networking Privacy
• States uses and issues
• Provides key points on the subject
• Details the major advantages of the individual information system
'Individual information system as a
research arena'
• The article explains how individual information systems (smartphones, laptop
  computers etc.) can be used to interact with other people and to help
  business processes.
• The development of personal computers into devices such as smartphones
  and laptops among other devices, has made individual organization grow
  exponentially through faster data communication processes.
• Key points discussed include how information systems and social media have
  developed into society and the home/work environments. An increase of
  productiveness in our social lives due to social media advances has seen the
  need for an increased individual thought and action from the users.
• The main argument presented by the author is that the role of information
  systems has changed the way that users interact with social media and with
  other people/work.
• Development of information systems has increased in complexity as the
  available processing power to the individual has seen improvements.
The Issue
• Social Networking Privacy
• The article describes the increasing danger of privacy and security
  relating to our interaction with information systems and social media.
• Personal information and secure data is at risk of being taken by
  unauthorized users.
• Communication between businesses and employees may result in
  classified data being posted over non-secure social media sources.
• GPS on smartphone photos
• General hacking or unsecured sources and accounts may lead to personal
  information being released.
• Most businesses/organizations utilize social media (Facebook, Twitter) in
  some way
• Identity Theft
Social Networking Privacy




Brandon Roudebush - 2009
Critical Analysis
• Gov 2.0 – Digital Business
 •   Aiming to have more businesses operating online
 •   Increased international competitiveness
 •   Engaging the online client


• In relation to the goals of the Gov 2.0 Digital Business Plan, the issues
  raised in the article regarding privacy and social media use, present a
  clear risk in the deployment of the plan.
• An increase in online business communication/interaction may lead to
  users not familiar with social media policies/procedures posting secure
  and personal information on a non-secure source. This will lead to the
  theft of that data, resulting in identity theft or business record tampering.
Critical Analysis
• Government interactions and social media set-ups may see private
  information being viewed and exploited for personal gain by
  unauthorized users present in social media sources.
• Identity theft of government employees may result in hackers obtaining
  secure documents etc.
• A lack of awareness of privacy dangers in social media among the users
  may lead to inappropriate use of social media sources and the
  exploitation of users by hackers.
• The article makes a good point to be aware of the growing dangers of
  individual privacy policy.
• Individual information systems must be secured to ensure sensitive data
  is not taken or viewed by unauthorized users.
References
Video – Copyright Brandon Roudebush

•   http://www.youtube.com/watch?v=ki5xxqpFNLg



Articles

•   Mike Chiasson, 2011, ‘Reconsidering Deconstruction in Information Systems Research’, EJIS, 21, pp. 192 -206.

•   Rob Kling, 1994, ‘Reading "All About" Computerization: How Genre Conventions Shape Non-Fiction Social
    Analysis’, The Information Society, 10, pp. 147.172.

•   Kumar, Krishan, 1987, ‘Utopia and Anti-Utopia in Modern Times’, New York: Basil Blackwell.

•   Jones, 2003, ‘In Organization Theory and Postmodern Thought’, Sage Publications, pp34 -69.

•   Cooper, 1989, ‘Modernism, post modernism and organizational analysis’, Organization Studies, 4, pp. 479 –502.

•   Greta Polites, 2012, ‘Conceptualizing models using multidimensional constructs: a review and guidelines for their
    use’, EJIS, 21, pp. 22-48.

•   Richard Baskerville, 2011, 'Individual information system as a research arena', EJIs, 20, pp. 251-254.

•   Dov Ten'eni, (2011)'What is communication got to do with IT', EJIS, 21, pp 341-344.

•   Steve Sawyer, and Andrea Tapia, 2007, 'From Finding to Theories: Institutionalizing Social Informatics', The
    Information Society, 23, pp. 263-275

•   Bernd Carsten Stahl, 2012, ‘Responsible Research And Innovation In Information Systems’, EJIS, 21, pp. 207-211.

•   Ray J. Paul, 2011, ‘Quality Changes’, EJIS, 20, pp. 625-628.

More Related Content

PDF
Two tales of privacy in online social networks
PDF
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
PPTX
Social Network Analysis with NodeXL Part 1
PPTX
اخلاقيات الثالث
PPTX
The political influence of social medias
PPTX
The issues of security and privacy in social network
PPTX
Interdisciplinary IT Security
Two tales of privacy in online social networks
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Social Network Analysis with NodeXL Part 1
اخلاقيات الثالث
The political influence of social medias
The issues of security and privacy in social network
Interdisciplinary IT Security

What's hot (20)

PPTX
Faculty presentation 21 st december 2015
PPTX
Behavior Change Using Social Influences
PPT
Pala jc presentation_2011
PPTX
Cybersecurity: Increased Transparency and the Role of Civil Society
PPTX
Social media and Security: How to Ensure Safe Social Networking
PPTX
Gr 3 Societal Issues of Information System Design and Use
PPTX
RIM On The Social Side
PPT
Privacy and Social Networks
PPTX
Social Network Theory
PPT
Social Governance: Social Media & Public Authorities
PPT
Mark Zuckerberg,Founder, CEO & President of Facebook
PPTX
Reflecting on the ICT Learning Process
PPTX
Social Media Analytics
PPT
Polinter07
PDF
Accessible Privacy and Security
PDF
Pennsylvania Rules on Lawyers Using Cloud Computing
PDF
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PPTX
Bd & privacy issues in social media
Faculty presentation 21 st december 2015
Behavior Change Using Social Influences
Pala jc presentation_2011
Cybersecurity: Increased Transparency and the Role of Civil Society
Social media and Security: How to Ensure Safe Social Networking
Gr 3 Societal Issues of Information System Design and Use
RIM On The Social Side
Privacy and Social Networks
Social Network Theory
Social Governance: Social Media & Public Authorities
Mark Zuckerberg,Founder, CEO & President of Facebook
Reflecting on the ICT Learning Process
Social Media Analytics
Polinter07
Accessible Privacy and Security
Pennsylvania Rules on Lawyers Using Cloud Computing
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
Bd & privacy issues in social media
Ad

Viewers also liked (9)

PDF
Rfid roi-sme pilots presentation and results ueapme august 2012
PDF
письмо министра
PPT
375648 634074781095393750
PPTX
Eduberry admission & enrollment
PPT
375648 634074781095393750
PPTX
Présentation de l’expérimentation Mobile à Madagascar au colloque Tice éducat...
PPT
Democracy
PPTX
Présentation de l’expérimentation Mobile à Madagascar à la conférence e-learn...
PPTX
Meat balls final
Rfid roi-sme pilots presentation and results ueapme august 2012
письмо министра
375648 634074781095393750
Eduberry admission & enrollment
375648 634074781095393750
Présentation de l’expérimentation Mobile à Madagascar au colloque Tice éducat...
Democracy
Présentation de l’expérimentation Mobile à Madagascar à la conférence e-learn...
Meat balls final
Ad

Similar to Ejis Analysis (20)

PPTX
Ethical_and_Social_Issues_in_Information_Systems.pptx
PPTX
3 - Social Media and Enterprise
PDF
Riseptis report 1
PPTX
G-12 UNIT -1.pptx information system and thier application
PDF
Social Networking Information Security
PPTX
PP Lec9n10 Sp2020.pptx
PDF
Interop 2011 las vegas - session se31 - rothke
PPT
1 - Social Informatics Meaning and Televance.ppt
PDF
Ethical issues and social issues related to systems upload
PPTX
Presentation on Information Privacy
PDF
Revolution Or Evolution Exec Summary
PPTX
Information-Technology-Cyber-crime-Privacy-and-Internet-Ethics.pptx
PPTX
3. w.cellary privacy stockholm_v5
PDF
Trust Computing and Society 1st Edition Richard H. R. Harper (Ed.)
PPTX
information system issues, digital identity, collaboration tools and intellec...
DOCX
Discussion Questions The difficulty in predicting the future is .docx
DOCX
Social Media & Enterprise Security Whitepaper
PDF
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
PDF
Trust Computing and Society 1st Edition Richard H. R. Harper (Ed.)
Ethical_and_Social_Issues_in_Information_Systems.pptx
3 - Social Media and Enterprise
Riseptis report 1
G-12 UNIT -1.pptx information system and thier application
Social Networking Information Security
PP Lec9n10 Sp2020.pptx
Interop 2011 las vegas - session se31 - rothke
1 - Social Informatics Meaning and Televance.ppt
Ethical issues and social issues related to systems upload
Presentation on Information Privacy
Revolution Or Evolution Exec Summary
Information-Technology-Cyber-crime-Privacy-and-Internet-Ethics.pptx
3. w.cellary privacy stockholm_v5
Trust Computing and Society 1st Edition Richard H. R. Harper (Ed.)
information system issues, digital identity, collaboration tools and intellec...
Discussion Questions The difficulty in predicting the future is .docx
Social Media & Enterprise Security Whitepaper
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Trust Computing and Society 1st Edition Richard H. R. Harper (Ed.)

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Types and Its function , kingdom of life
PDF
RMMM.pdf make it easy to upload and study
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Institutional Correction lecture only . . .
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial disease of the cardiovascular and lymphatic systems
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
VCE English Exam - Section C Student Revision Booklet
STATICS OF THE RIGID BODIES Hibbelers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Types and Its function , kingdom of life
RMMM.pdf make it easy to upload and study
Supply Chain Operations Speaking Notes -ICLT Program
O7-L3 Supply Chain Operations - ICLT Program
Week 4 Term 3 Study Techniques revisited.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial diseases, their pathogenesis and prophylaxis
Institutional Correction lecture only . . .
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Ejis Analysis

  • 1. EUROPEAN JOURNAL OF INFORMATION SYSTEMS John, Nourin, Tibletse Current Editors: Dov Te'eni Frantz Rowe
  • 2. INTRODUCTION The Professional Source: The European Journal of Information Systems provides viewers with a distinctive European perspective on information systems and their practice and theory. The source contains an archive of articles and editorials related to the issues and development of social media within the European domain. Each new volume contains articles relating to a major issue that is present and analysed throughout the contained articles. The source is the official journal of the Operational Research Society, which is an international society that caters to the profession and interest of operational Research and its social media influence. This is done through a number of social media sources, including Facebook, Twitter and LinkedIn.
  • 3. THE ISSUES • Practical Deconstruction • Standardized IS literature Constructs • Gov 2.0 Compatibility • Individual Privacy Policy • Social Networking Privacy • Social Media • Quality Changes • Responsible Research/Innovation
  • 4. The Chosen Article Individual information system as a research arena • Richard Baskerville Deals with Social Networking Privacy • States uses and issues • Provides key points on the subject • Details the major advantages of the individual information system
  • 5. 'Individual information system as a research arena' • The article explains how individual information systems (smartphones, laptop computers etc.) can be used to interact with other people and to help business processes. • The development of personal computers into devices such as smartphones and laptops among other devices, has made individual organization grow exponentially through faster data communication processes. • Key points discussed include how information systems and social media have developed into society and the home/work environments. An increase of productiveness in our social lives due to social media advances has seen the need for an increased individual thought and action from the users. • The main argument presented by the author is that the role of information systems has changed the way that users interact with social media and with other people/work. • Development of information systems has increased in complexity as the available processing power to the individual has seen improvements.
  • 6. The Issue • Social Networking Privacy • The article describes the increasing danger of privacy and security relating to our interaction with information systems and social media. • Personal information and secure data is at risk of being taken by unauthorized users. • Communication between businesses and employees may result in classified data being posted over non-secure social media sources. • GPS on smartphone photos • General hacking or unsecured sources and accounts may lead to personal information being released. • Most businesses/organizations utilize social media (Facebook, Twitter) in some way • Identity Theft
  • 8. Critical Analysis • Gov 2.0 – Digital Business • Aiming to have more businesses operating online • Increased international competitiveness • Engaging the online client • In relation to the goals of the Gov 2.0 Digital Business Plan, the issues raised in the article regarding privacy and social media use, present a clear risk in the deployment of the plan. • An increase in online business communication/interaction may lead to users not familiar with social media policies/procedures posting secure and personal information on a non-secure source. This will lead to the theft of that data, resulting in identity theft or business record tampering.
  • 9. Critical Analysis • Government interactions and social media set-ups may see private information being viewed and exploited for personal gain by unauthorized users present in social media sources. • Identity theft of government employees may result in hackers obtaining secure documents etc. • A lack of awareness of privacy dangers in social media among the users may lead to inappropriate use of social media sources and the exploitation of users by hackers. • The article makes a good point to be aware of the growing dangers of individual privacy policy. • Individual information systems must be secured to ensure sensitive data is not taken or viewed by unauthorized users.
  • 10. References Video – Copyright Brandon Roudebush • http://www.youtube.com/watch?v=ki5xxqpFNLg Articles • Mike Chiasson, 2011, ‘Reconsidering Deconstruction in Information Systems Research’, EJIS, 21, pp. 192 -206. • Rob Kling, 1994, ‘Reading "All About" Computerization: How Genre Conventions Shape Non-Fiction Social Analysis’, The Information Society, 10, pp. 147.172. • Kumar, Krishan, 1987, ‘Utopia and Anti-Utopia in Modern Times’, New York: Basil Blackwell. • Jones, 2003, ‘In Organization Theory and Postmodern Thought’, Sage Publications, pp34 -69. • Cooper, 1989, ‘Modernism, post modernism and organizational analysis’, Organization Studies, 4, pp. 479 –502. • Greta Polites, 2012, ‘Conceptualizing models using multidimensional constructs: a review and guidelines for their use’, EJIS, 21, pp. 22-48. • Richard Baskerville, 2011, 'Individual information system as a research arena', EJIs, 20, pp. 251-254. • Dov Ten'eni, (2011)'What is communication got to do with IT', EJIS, 21, pp 341-344. • Steve Sawyer, and Andrea Tapia, 2007, 'From Finding to Theories: Institutionalizing Social Informatics', The Information Society, 23, pp. 263-275 • Bernd Carsten Stahl, 2012, ‘Responsible Research And Innovation In Information Systems’, EJIS, 21, pp. 207-211. • Ray J. Paul, 2011, ‘Quality Changes’, EJIS, 20, pp. 625-628.