5,549 research outputs found
Every Cloud Has a Push Data Lining: Incorporating Cloud Services in a Context-Aware Application
We investigated context-awareness by utilising multiple sources of context in a mobile device setting. In our experiment we developed a system consisting of a mobile client, running on the Android platform, integrated with a cloud-based service. These components were integrated using pushmessaging technology.One of the key featureswas the automatic adaptation of smartphones in accordance with implicit user needs. The novelty of our approach consists in the use of multiple sources of context input to the system, which included the use of calendar data and web based user configuration tool, as well as that of an external, cloud-based, configuration file storing user interface preferences which, pushed at log-on time irrespective of access device, frees the user from having to manually configure its interface.The systemwas evaluated via two rounds of user evaluations (n = 50 users), the feedback of which was generally positive and demonstrated the viability of using cloud-based services to provide an enhanced context-aware user experience
Cloud Computing Adoption: A Cross-Continent Overview of Challenges
Cloud computing continues to dominate information and communication technology (ICT) strategies globally through the provision of remote access to computing resources via the internet. With its inherent pay-per usage model, flexibility, scalability and other features, cloud computing is also set to transform economic activities around the world. This paper analyses and compares the challenges facing the adoption of cloud computing from a geo-regional context; Europe and sub-Saharan Africa. An institutional theory perspective is used as framework for analysis. Findings from Norway in Europe and Nigeria in sub-Saharan Africa show that there are several challenges to cloud computing adoption in both places that are similar but impact on adoption decisions in different ways. For instance, the key adoption issues used as bases for comparison in Norway viz. security, privacy and trust, cost, Service Level Agreements (SLAs), government policies and regulations, and loss of control over data can all inhibit or pose as hindrances to cloud computing adoption. Contrarily, in Nigeria, these issues are not seen as inhibiting cloud computing adoption. Furthermore, the findings show the profound effect of normative and coercive pressures in Norway that can impact negatively on adoption decisions and theabsence of such pressures in Nigeria which seem to have a positive influence on adoption at present.Keywords: Cloud Computing; Adoption; Europe; Sub-saharan Africa; Institutional Theor
A multiple-case study of Cloud ERP in the Norwegian public sector: From adoption to implementation
Cloud computing (CC) technology has emerged as a favorable solution for organizations due to the urgent need for complex IT infrastructures. Hence, organizations across various sectors have moved their attention toward outsourcing computing platforms. Enterprise-resource planning (ERP) systems aid organizations in obtaining an understanding of business practices by allowing seamless integration of business accurate data for decision-making. Cloud ERP has the potential to deliver the same system functionalities as on-premise systems, at lower costs and effort. However, the uptake of such technologies has been reported as particularly low for public sector organizations (PSOs) when compared with private firms.
This study aims to explore factors influencing Norwegian PSOs intention to adopt cloud ERP, and which critical success factors are considered vital for a successful implementation. Furthermore, we illustrate the dynamic relationship between barriers at distinct phases. The research questions have been studied in a multiple case study, where the data has been collected through individual semi-structured interviews with Norwegian PSO representatives who either plan to adopt or have already implemented cloud ERP. The findings align with previous research regarding factors such as availability, reduced costs, updates, and maintenance. The findings also support that there is a link between organizational size and the desire to adopt. Contradictory, the findings reveal previously reported barriers such as security, vendor lock-in, lack of customization, and data ownership not to be perceived as direct barriers. Accordingly, our findings indicate more willingness among Norwegian PSOs to embrace cloud ERP than previously reported.
In the implementation stage, the findings closely resemble previous research. Factors such as user training, vendor selection, system integrations, and functionality are considered critical success factors among the Norwegian PSOs. One contradiction was discovered regarding project management, as the findings indicate that PSOs put more emphasis on a project team, rather than project management in isolation. Lastly, the results add to current research by identifying the dynamic interrelationship between barriers within distinct phases. Our findings suggest that open lines of communication amongst all parties involved are crucial throughout the entire process. The establishment of a solid contract is also considered vital
Cloud adoption and cyber security in public organizations: an empirical investigation on Norwegian municipalities
The public sector in Norway, particularly municipalities, is currently transforming through the adoption of cloud solutions. This multiple case study investigates cloud adoption and is security challenges that come along with it. The objective is to identify the security challenges that cloud solutions present and techniques or strategies that can be used to mitigate these security challenges. The Systematic Literature Review (SLR) provided valuable insights into the prevalent challenges and associated mitigation techniques in cloud adoption. The thesis also uses a qualitative approach using Semi-Structured Interviews (SSI) to gather insight into informants’ experiences regarding cloud adoption and its security challenges. The study’s empirical data is based on interviews with six different Norwegian municipalities, providing a unique and broad perspective. The analysis of the empirical findings, combined with the literature, reveals several security challenges and mitigation techniques in adopting cloud solutions. The security challenges encompass organizational, environmental, legal, and technical aspects of cloud adoption in the municipality. Based on the findings, it is recommended that Norwegian municipalities act on these issues to ensure a more secure transition to cloud solutions
Banking on Green Information Systems: An exploratory case study of a Norwegian bank facilitating sustainability accounting and reporting
The purpose of this dissertation is to explore how an incumbent financial institution intend to overcome inhibiting legacy systems to facilitate sustainability accounting and reporting, a relatively new phenomenon in its infancy in IS research. In doing so, this study focuses on two underlying sub-questions covering drivers and inhibitors of Green IS adoption within the Norwegian banking industry, in addition to the facilitation of sustainability accounting and reporting from an IS perspective. The research into these topics is addressed by interviewing six industry-experts within a Norwegian bank, resulting in two aggregated analytical dimensions with valuable empirical outcomes. Findings from this study indicate that regulatory pressure is the most significant driver of Green IS adoption with varying degree of emphasis on stakeholder pressure, economic incentives, and manual processes. Whereas inherent limitations with IT infrastructure and current ESG data deficiencies are identified as inhibiting factors, which subsequently explains the making of an ESG data task force initiative tasked with building an ESG data hub to facilitate sustainability accounting and reporting. The bank’s proposed ESG data hub architecture leveraging a PaaS solution provide valuable managerial implications for practitioners in other financial institutions that could opt for a similar Green IS approach
Big Data Privacy Context: Literature Effects On Secure Informational Assets
This article's objective is the identification of research opportunities in
the current big data privacy domain, evaluating literature effects on secure
informational assets. Until now, no study has analyzed such relation. Its
results can foster science, technologies and businesses. To achieve these
objectives, a big data privacy Systematic Literature Review (SLR) is performed
on the main scientific peer reviewed journals in Scopus database. Bibliometrics
and text mining analysis complement the SLR. This study provides support to big
data privacy researchers on: most and least researched themes, research
novelty, most cited works and authors, themes evolution through time and many
others. In addition, TOPSIS and VIKOR ranks were developed to evaluate
literature effects versus informational assets indicators. Secure Internet
Servers (SIS) was chosen as decision criteria. Results show that big data
privacy literature is strongly focused on computational aspects. However,
individuals, societies, organizations and governments face a technological
change that has just started to be investigated, with growing concerns on law
and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions
and the only consistent country between literature and SIS adoption is the
United States. Countries in the lowest ranking positions represent future
research opportunities.Comment: 21 pages, 9 figure
Implementing Cloud Computing. A Study of the Impact on the IT Department
Master's thesis in Information systems (IS501)Cloud Computing (CC)has become an area of interestamongmany organizations. Manyhave started to prioritize the development of both public and private Cloudsfor storing the increased volumes of data,andto exploit the benefits of the phenomena.With the new benefits of publicCloud, it is inevitable that some of thetasks the traditional IT departments have provisionedare being outsourced to a third party, and will be contributing to some sort of organizational and managerial change for them.Based on this, the study has its purpose of researchinghow the IT department is impacted in organizations based on CC adoption. Toinvestigatethis topic,wedevelopedthe following research question; “What impactdoes Cloud Computing have on the IT department andits IT governance mechanisms?”. Answering the proposed RQwill help us identifyhow the IT department has been impacted, as well as identifying the change in its IT governance mechanisms. To assist in answering the question above, we developed two sub-questions;“How will the role of the IT department within an organization change after adopting CC services?”and “How will CC affect the managerial responsibilities within the IT department?”. Thesewill provide further informationandanswer ourpresented RQ, as well as providing a broaderspecter of information
IoT for Diabetics: Exploring IoT Adoption Issues
An increasing problem worldwide is the number of people living with and dying of critical,
chronic diseases. One of these diseases is type 1 diabetes, which, as of today, is uncurable yet
treatable through careful and precise monitoring. Using the Internet of Things (IoT) is one of
the most efficient ways to monitor diabetes and is also said to improve the life-quality of people
with diabetes. However, the great potential of IoT in diabetes treatment is followed by various
challenged factors regarding privacy and security. Cyberattacks can affect not only the
individual patient but everyone connected to the IT infrastructure of the hacked device. Existing
reports show cyberattacks against the Norwegian healthcare sector have increased by 72% over
the last year, resulting in about 450 attacks each week. Still, diabetic patients tend to trust their
devices to be safe and are willing to take the risk as they consider their medical data as not
interesting to cybercriminals. Healthcare personnel's lack of knowledge about information
security and privacy best practice is reported to be an entry point for cybercriminals to gain
access to critical IT systems. This study aimed to investigate the relationship between the
potentially improved life-quality from using diabetes IoT and the challenges regarding privacy
and cyberthreats, including the perspective of three different Norwegian stakeholder groups:
diabetic patients (type 1), healthcare personnel working with diabetes patients, and industry
representatives within healthcare and security. Findings suggest that neither patients nor
healthcare personnel is concerned about patient privacy or threats against diabetes IoT, despite
the increased cyberthreats in the healthcare sector. It further indicates a pressing matter for a
discussion about data ownership generated by IoT and a revision of privacy regulations that
make it easier for all Norwegian healthcare regions to interpret, comply, and act upon equally,
to utilize the technology available and ensure diabetes patients all over the country have the
same opportunities when it comes to patient care
IoT-technological maturity model development and maturity assessment of Norwegian manufacturing companies
Confidential until 24. May 202
- …