855 research outputs found

    Outcomes of Enterprise Resource Planning System on Organizational Productivity

    Get PDF
    Leaders within local government organizations do not understand how to achieve expected and desired benefits from the implementation of enterprise resource planning (ERP) systems. The lack of alignment between social and technical elements in ERP implementation continues to depress organizational productivity. The prime objective of our quantitative correlational study was to examine whether social and technical elements increase use and productivity in ERP implementation. Sociotechnical systems theory provided the theoretical basis for our study. We examined six dimensional variables relating to ERP implementation. Our key findings indicated positive significant relationships between ERP and information sharing, between ERP system quality and ease of ERP use, and between ERP system quality and organizational productivity. Further studies could examine other dimensions that could ensure ERP sustainability in other government organizations

    Relationship Between Enterprise Resource Planning System and Organizational Productivity in Local Government

    Get PDF
    Organizations experience challenges despite efforts to increase productivity through implementing large-scale enterprise systems. Leaders of local government institutions do not understand how to achieve expected and desired benefits from the implementation of enterprise resource planning (ERP) systems. Lack of alignment between social and technical elements in ERP implementation depresses organizational productivity. The purpose of this quantitative correlational study was to examine whether social and technical elements increase use and productivity in ERP implementation. The research questions addressed the relationship between ERP and organizational efficiency, cross-functional communication, information sharing, ease of ERP use, and ERP usefulness. Sociotechnical systems theory provided the theoretical basis for the study. Data were collected from online surveys completed by 61 ERP users and analyzed using Wilcoxon matched pairs statistics and Spearman\u27s correlation coefficient. Findings indicated a positive significant relationship between ERP and information sharing, a positive significant relationship between ERP system quality and ease of ERP use, and a positive significant relationship between ERP system quality and organizational productivity. Findings may be used by local government leaders, technology managers, and chief information officers to ensure ERP sustainability and increase productivity

    IMPLEMENTASI OCTAVE-S DAN STANDAR PENGENDALIAN ISO 27001:2013 PADA MANAJEMEN RISIKO SISTEM INFORMASI PERGURUAN TINGGI

    Get PDF
    In higher education, information systems become a strategic tool for the continuity of universities or institutions themselves, especially in the running business processes. The disruption of information systems in higher education will have a bad impact, especially for the continuity of business processes, information systems that initially as a tool will then turn into a threat and even become a risk if it is not properly addressed and mitigated. The problem that arises is that University of Muhammadiyah Tangerang has never conducted a system risk analysis assessment of existing information, including policies relating to information technology security. This study aims to provide information to the University of Muhammadiyah Tangerang regarding the risks, threats and weaknesses of information technology found and recommendations that can be applied to mitigate risks that can arise. This study uses the octave-s risk analysis method combined with ISO 27001: 2013 control standards. The results of this study are in the form of a final document that can be used as a guideline and help in the future development of a risk analysis assessment at UMT. The results of the evaluation obtained, it is known that risk management is in the MEDIUM position, meaning that UMT does not experience risks that can stop / damage information systems that have an impact on the cessation of teaching and learning, but risks and weaknesses in universities can have an impact on decreasing university performance immediately

    Information security risk management model for Peruvian PYMES

    Get PDF
    Hoy en día, las empresas tratan de proteger su activo muy valioso, la información, para lo que recurren a la gestión de sus riesgos, tratando de evitar situaciones negativas tales como pérdidas financieras significativas, violación de la confidencialidad de información sensible, pérdida de integridad o disponibilidad de datos confidenciales. En organizaciones como las PYMES no se implementan modelos de gestión de riesgos debido a que estas organizaciones no consideran relevante la seguridad de la información, ya que no se encuentra dentro de lo presupuestado. Existen diferentes enfoques de riesgos, pero, generalmente dirigidos a grandes empresas; para las PYMES es más adecuado emplear un enfoque cualitativo. Este trabajo presenta un modelo de gestión de riesgos basado en la metodología OCTAVE-S y la norma ISO/IEC 27005, consta de las 3 fases de OCTAVE al que se le añade la lista de vulnerabilidades y escenarios en la fase 1, además el cálculo y tratamiento del riesgo de la ISO/IEC 27005 en la última fase. Asimismo, el modelo adopta un enfoque cuantitativo que permite calcular el riesgo residual con base en la efectividad de los controles otorgados, de este modo se logra brindar un modelo adecuado para las organizaciones. El modelo propuesto fue implementado en el proceso de ventas de una PYME peruana del sector cerámicos, demostrando un fácil uso, y logrando identificar los controles necesarios para reducir el riesgo, cuya implementación podría reducir el riesgo en un 53%.Nowadays, companies seek to protect their information because it is a very valuable asset. In order to protect it, it is necessary to manage the risks, which will prevent scenarios that generate a negative impact such as significant financial losses, violation of the confidentiality of sensitive information, loss of integrity, or the availability of confidential information. Organizations such as SMEs do not implement risk management models because they do not care about allocating a budget for information security. There are different approaches that are used to manage the risks, but, in general, these focus on big companies. However, those that target SMEs have a qualitative approach. This paper presents a suitable risk management model, based on the OCTAVE-S methodology and the standard ISO/IEC 27005, it consists of the 3 phases of OCTAVE to which is added the list of vulnerabilities and scenarios in phase 1, as well as the calculation and treatment of the risk of ISO/IEC 27005 in the last phase. Likewise, the model takes a quantitative approach that allows to calculate the residual risk based on the effectiveness of the controls given, creating a suitable model for the organizations, in order to and, therefore, to facilitate decision making. This model has been applied in a Peruvian clay-ceramic industry SME in its sales process, showing its easy use and managing to identify the necessary controls to reduce the risk, whose implementation could reduce the risk by 53%

    Medical Devices, Support Networks, and their Vulnerabilities: A Case Study of the Integration of Medical Networks into the Air Force Information Network

    Get PDF
    With the implementation of one Air Force, one network under way it is important to look at how the Air Force plans to incorporate the medical field and its unique systems, networks, and mission. The medical field presents distinctive problems not seen in other areas. Open network vulnerabilities in the medical information systems not only pose a problem for the individual, but to the military service also. Possible security holes provide both access to vital military & personal information (end strength numbers, current status of personnel, social security), and a door way into the network . Intruders now can possibly access command & control systems and other weapon systems. This research provides insight into the current & future information initiatives dealing with the Air Force\u27s medical field and the Department of Defense\u27s approach to system security. This research additionally looks at the laws and regulations dealing with privacy and ethical issues. This purview starts with the recently enacted Healthcare Insurance Portability and Accountability ACT (HIPPA), and concludes with the Laws of Armed Conflict. The research questions were answered through the use of a Case Study and a comprehensive literature review. The medical and network support teams from two Air Force medical facilities were the basis of this study

    Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique

    Get PDF
    This paper describes proposed methodology for evaluation of critical systems and prioritization of critical risks and assets identified in highly secured information systems. For different types of information assets or security environments it is necessary to apply different techniques and methods for their prioritization and evaluation. In this article, VECTOR matrix method for prioritization of critical assets and critical risks is explained and integrated into AHP (Analytic Hierarchy Process) technique as a set of fixed criteria for evaluation of defined alternatives. Bitcoin cryptocurrency was compared and evaluated along with other common Internet transaction systems by information security professionals according to defined VECTOR criteria. Also, the newly proposed hybrid AHP model is presented with potential case studies for future research. This article tries to discover security posture of Bitcoin cryptocurrency in the context of information security risks related to the existing most common online payment systems like e-banking, m-banking, and e-commerce

    Online Novelty Detection System: One-Class Classification of Systemic Operation

    Get PDF
    Presented is an Online Novelty Detection System (ONDS) that uses Gaussian Mixture Models (GMMs) and one-class classification techniques to identify novel information from multivariate times-series data. Multiple data preprocessing methods are explored and features vectors formed from frequency components obtained by the Fast Fourier Transform (FFT) and Welch\u27s method of estimating Power Spectral Density (PSD). The number of features are reduced by using bandpower schemes and Principal Component Analysis (PCA). The Expectation Maximization (EM) algorithm is used to learn parameters for GMMs on feature vectors collected from only normal operational conditions. One-class classification is achieved by thresholding likelihood values relative to statistical limits. The ONDS is applied to two different applications from different application domains. The first application uses the ONDS to evaluate systemic health of Radio Frequency (RF) power generators. Four different models of RF power generators and over 400 unique units are tested, and the average robust true positive rate of 94.76% is achieved and the best specificity reported as 86.56%. The second application uses the ONDS to identify novel events from equine motion data and assess equine distress. The ONDS correctly identifies target behaviors as novel events with 97.5% accuracy. Algorithm implementation for both methods is evaluated within embedded systems and demonstrates execution times appropriate for online use

    Au nom du Bon Dieu et du Buffalo: Metis Lived Catholicism on the Northern Plains

    Get PDF
    This dissertation argues that Metis lived Catholicism was a tool of identity formation, resistance to colonialism, and political action among bison hunters of the northern plains in the long nineteenth century. The Catholicity of Metis bison hunters quotidian is highlighted through the extensive Michif French written legacy of Turtle Mountain historian ChWeUm (William Jr.) Davis (1845-1937). Daviss biography anchors a Metis national memory, weaving stories and events from both sides of the Medicine Line. His life story and the religious experiences of his relatives come together to explain why some Metis people adhered to Catholicism and its practices. Sustained experiences of the divine helped Metis families adapt and resist the effects of settler colonialism on the northern plains, including the end of organized bison-hunting expeditions. This dissertation blends several methodologies social history, biography, ethnohistory, and social network analysis from the digital humanities to interrogate the history of Catholicism among Metis peoples

    Weaving Social Change(s) or Changes of Weaving? The Ethnographic Study of Andean Textiles in Cusco and Bolivia

    Get PDF
    Through a comparative and multi-sited ethnography in Cusco (Peru) and Bolivia, the article shows how, by mobilizing Andean textiles, local actors are weaving social change(s) while also changing the way of weaving. These two ideas are interwoven: 1) Andean textiles contribute to local population to weave social change(s) by bringing alternative economic opportunities; 2) weaving practices are changing, since new fashionable, industrial, and “hybrid” production has been created and adapted to an urban-oriented/tourist-oriented market which provides money to make the social change(s) possible
    corecore