Search results

1 – 3 of 3
Article
Publication date: 1 January 1992

Reinhard Budde, Karlheinz Kautz, Karin Kuhlenkamp and Heinz Züllighoven

Explains and defines prototyping in terms of its character, actorsand types. Examines four aspects: its use in the software developmentprocess, its goals, horizontal and vertical…

3671

Abstract

Explains and defines prototyping in terms of its character, actors and types. Examines four aspects: its use in the software development process, its goals, horizontal and vertical and the relationship between prototype and application system. Clarifies the distinction between breadboard and prototype.

Details

Information Technology & People, vol. 6 no. 2/3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 January 1992

Reinhard Budde and Heinz Züllighoven

Overviews the history of prototyping. Illustrates trends which havesupported the emergence of it. Comments on methods which are in linewith prototyping. Suggests future areas of…

Abstract

Overviews the history of prototyping. Illustrates trends which have supported the emergence of it. Comments on methods which are in line with prototyping. Suggests future areas of research and development. Explores the integration of prototyping into systems development which incorporates pre‐existing software.

Details

Information Technology & People, vol. 6 no. 2/3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 June 2015

Ann-Marie Nienaber, Marcel Hofeditz and Philipp Daniel Romeike

Vulnerability is a concept that lies at the core of the most prevalent academic trust definitions. Accordingly, a vast amount of scholars refers to vulnerability when studying…

5073

Abstract

Purpose

Vulnerability is a concept that lies at the core of the most prevalent academic trust definitions. Accordingly, a vast amount of scholars refers to vulnerability when studying trust. Surprisingly, there is almost no conceptual nor empirical work explicitly directed at understanding vulnerability itself. The purpose of this paper is to summarize and critique the existing base of knowledge of vulnerability with a particular focus on the leader-follower relationship and to open avenues for future research.

Design/methodology/approach

In the process of a very systematic literature search, the authors identified 49 studies that refer to vulnerability when studying trust at the interpersonal level. The authors coded the literature into conceptualizations, antecedents and consequences of vulnerability – with a particular focus on the leader-follower relationship.

Findings

The authors introduce a theoretical framework which allows the authors to structure the rather fuzzy discussed concept of vulnerability. The development of such a theoretical framework allows the authors to distinguish between trusting beliefs and actual trusting behaviour so that it is possible to separate the constructs of willingness-to-be-vulnerable and actual vulnerability.

Research limitations/implications

With the help of the developed framework, the authors point to the need for more work on vulnerability in order to take the study of trust to the next level. In this respect, the authors formulate several propositions that should be tested in future research.

Practical implications

Practitioners are made aware of the need to risk willingness to be vulnerable as a base for trusting behaviour. There is no way around being willing to be vulnerable.

Originality/value

This literature review provides a holistic understanding of the concept of vulnerability. The intention is to show the different understandings and interpretations of this term within the literature and identify which antecedents and consequences are related to the concept of vulnerability.

Details

Personnel Review, vol. 44 no. 4
Type: Research Article
ISSN: 0048-3486

Keywords

1 – 3 of 3