Empowering communities: A method for the legitimate user-driven specification of network information systems

A. de Moor

    Research output: ThesisDoctoral Thesis

    266 Downloads (Pure)

    Abstract

    Collaborative work is increasingly being mediated by distributed information technologies such as the Internet. However, it is difficult to make the virtual professional communities, in which this collaboration takes place, operate successfully. One of the reasons is that users are not sufficiently in control of the ongoing specification process of their continuously changing network information systems. Furthermore, changes in such an information system need to be legitimate, in the sense that they are both meaningful and acceptable to all members of the community. The focus of this thesis is on developing an approach to assist virtual professional communities in the legitimate user-driven specification of their network information systems. The main results of the research are a theoretical framework that can be used to describe and analyze legitimate user-driven system specification. Furthermore, the RENISYS (REsearch Network Information SYstem Specification) method has been developed in which these theoretic insights are used to support the actual specification process. Two cases have been analyzed using this method: one case concerned the Global Research Network on Sustainable Development, the other was about the development of an electronic law journal. The thesis is concluded with a description of a prototype tool implementing the RENISYS method.
    Original languageEnglish
    QualificationDoctor of Philosophy
    Awarding Institution
    • Tilburg University
    Supervisors/Advisors
    • Meersman, R.A., Promotor
    • Weigand, Hans, Co-promotor
    Award date1 Oct 1999
    Place of PublicationTilburg
    Publisher
    Print ISBNs9056680552
    Publication statusPublished - 1999

    Fingerprint

    Dive into the research topics of 'Empowering communities: A method for the legitimate user-driven specification of network information systems'. Together they form a unique fingerprint.

    Cite this