Skip to main content
Erschienen in: Information Systems Frontiers 3/2014

01.07.2014

Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript)

verfasst von: Anat Hovav

Erschienen in: Information Systems Frontiers | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Excerpt

Fifteen years ago, Paul Gray and I wrote the above article describing four potential trajectories technology may take (Gray and Hovav, 1999). The trajectories were developed based on a number of general assumptions and by using scenario building methodology. When I read the paper over in preparation for writing this postscript, it occurred to me that “had I known then what I know now…” I found our outlook somewhat naïve, techno centric and at points shortsighted. Hindsight is of course always 20/20. The key to good scenario building is not to try and describe a predictable future but to create a set of diverse futures and analyze the drivers and consequences of each. …

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
3
Technically e-cash is available as is apparent from the use of cyber money by game and SNS sites. The obstacles are mostly political. The implementation of a universal e-cash system requires financial agreements among participating countries.
 
5
One exception are the IEEE802 wireless network standards of which the most commonly used is the Wi-Fi.
 
8
OECD Science, Technology and Industry Scoreboard 2013: INNOVATION FOR GROWTH.
 
9
For more information see: http://​en.​wikipedia.​org/​wiki/​White_​hat_​(computer_​security) [last accessed 02/25/2014].
 
10
Zombies are computer that have been taken over by bots. Hackers can use to them to launch an attack unbeknown to the owner.
 
11
To clarify, Internet II refers to advances in the infrastructure the Internet uses, while Web 2.0 refers to the functions afforded by the Web.
 
12
For details see Oh et al. 2011.
 
Literatur
Zurück zum Zitat Gray, P., & Hovav, A. (1999). “Using scenarios to understand the frontiers of IS. Information Systems Frontiers, 1(1), 15–24.CrossRef Gray, P., & Hovav, A. (1999). “Using scenarios to understand the frontiers of IS. Information Systems Frontiers, 1(1), 15–24.CrossRef
Zurück zum Zitat Hovav, A., & Gray, P. (2014). The ripple effect of an information security breach event: a stakeholder analysis. Communications of the Association for Information Systems, 34(50), 893–912. Hovav, A., & Gray, P. (2014). The ripple effect of an information security breach event: a stakeholder analysis. Communications of the Association for Information Systems, 34(50), 893–912.
Zurück zum Zitat Hovav, A., Hemmert, M., & Kim, Y.-J. (2011). Determinants of internet standards adoption: the case of South Korea. Research Policy, 40(2), 253–262.CrossRef Hovav, A., Hemmert, M., & Kim, Y.-J. (2011). Determinants of internet standards adoption: the case of South Korea. Research Policy, 40(2), 253–262.CrossRef
Zurück zum Zitat Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants of computer-mediated transactions: a cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13–45.CrossRef Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants of computer-mediated transactions: a cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13–45.CrossRef
Zurück zum Zitat Kling, R., Lamb, R. (1996). Analyzing Alternate Visions of Electronic Publishing and Digital Libraries. Scholarly Publishing: The Electronic Frontier. R. Peek and G. Newby. Cambridge: The MIT Press, 1:17–54. Kling, R., Lamb, R. (1996). Analyzing Alternate Visions of Electronic Publishing and Digital Libraries. Scholarly Publishing: The Electronic Frontier. R. Peek and G. Newby. Cambridge: The MIT Press, 1:17–54.
Zurück zum Zitat Oh, O., Agrawal, M., & Rao, H. R. (2011). Information control and terrorism: tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers, 13(1), 33–43.CrossRef Oh, O., Agrawal, M., & Rao, H. R. (2011). Information control and terrorism: tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers, 13(1), 33–43.CrossRef
Zurück zum Zitat Olla, P., & Choudrie, J. (2014). Mobile technology utilization for social development in developing countries: an ethnographic futures research study. Information Systems Frontiers, 16(3). doi:10.1007/s10796-013-9477-y. Olla, P., & Choudrie, J. (2014). Mobile technology utilization for social development in developing countries: an ethnographic futures research study. Information Systems Frontiers, 16(3). doi:10.​1007/​s10796-013-9477-y.
Zurück zum Zitat Stone-Gross, B., Holz, T., Stringhini, G., & Vigna, G. (2011) The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns, Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, March 29, 2011, Boston, MA. Stone-Gross, B., Holz, T., Stringhini, G., & Vigna, G. (2011) The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns, Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, March 29, 2011, Boston, MA.
Zurück zum Zitat Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow’s ethics and today’s response: an investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3). doi:10.1007/s10796-014-9490-9. Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow’s ethics and today’s response: an investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3). doi:10.​1007/​s10796-014-9490-9.
Metadaten
Titel
Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript)
verfasst von
Anat Hovav
Publikationsdatum
01.07.2014
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 3/2014
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-014-9501-x

Weitere Artikel der Ausgabe 3/2014

Information Systems Frontiers 3/2014 Zur Ausgabe

Premium Partner