5,549 research outputs found

    Every Cloud Has a Push Data Lining: Incorporating Cloud Services in a Context-Aware Application

    Get PDF
    We investigated context-awareness by utilising multiple sources of context in a mobile device setting. In our experiment we developed a system consisting of a mobile client, running on the Android platform, integrated with a cloud-based service. These components were integrated using pushmessaging technology.One of the key featureswas the automatic adaptation of smartphones in accordance with implicit user needs. The novelty of our approach consists in the use of multiple sources of context input to the system, which included the use of calendar data and web based user configuration tool, as well as that of an external, cloud-based, configuration file storing user interface preferences which, pushed at log-on time irrespective of access device, frees the user from having to manually configure its interface.The systemwas evaluated via two rounds of user evaluations (n = 50 users), the feedback of which was generally positive and demonstrated the viability of using cloud-based services to provide an enhanced context-aware user experience

    Cloud Computing Adoption: A Cross-Continent Overview of Challenges

    Get PDF
    Cloud computing continues to dominate information and  communication technology (ICT) strategies globally through the provision of remote access to computing resources via the internet. With its inherent pay-per usage model, flexibility,  scalability and other features, cloud computing is also set to transform economic activities around the world. This paper  analyses and compares the challenges facing the adoption of cloud computing from a geo-regional context; Europe and sub-Saharan Africa. An institutional theory perspective is used as framework for analysis. Findings from Norway in Europe and Nigeria in sub-Saharan Africa show that there are several challenges to cloud computing adoption in both places that are similar but impact on adoption decisions in different ways. For instance, the key adoption issues used as bases for comparison in Norway viz.  security, privacy and trust, cost, Service Level Agreements (SLAs), government policies and regulations, and loss of control over data can all inhibit or pose as hindrances to cloud computing adoption. Contrarily, in Nigeria, these issues are not seen as inhibiting cloud computing adoption. Furthermore, the findings show the profound effect of normative and coercive pressures in Norway that can impact negatively on adoption decisions and theabsence of such pressures in Nigeria which seem to have a  positive influence on adoption at present.Keywords: Cloud Computing; Adoption; Europe; Sub-saharan Africa; Institutional Theor

    A multiple-case study of Cloud ERP in the Norwegian public sector: From adoption to implementation

    Get PDF
    Cloud computing (CC) technology has emerged as a favorable solution for organizations due to the urgent need for complex IT infrastructures. Hence, organizations across various sectors have moved their attention toward outsourcing computing platforms. Enterprise-resource planning (ERP) systems aid organizations in obtaining an understanding of business practices by allowing seamless integration of business accurate data for decision-making. Cloud ERP has the potential to deliver the same system functionalities as on-premise systems, at lower costs and effort. However, the uptake of such technologies has been reported as particularly low for public sector organizations (PSOs) when compared with private firms. This study aims to explore factors influencing Norwegian PSOs intention to adopt cloud ERP, and which critical success factors are considered vital for a successful implementation. Furthermore, we illustrate the dynamic relationship between barriers at distinct phases. The research questions have been studied in a multiple case study, where the data has been collected through individual semi-structured interviews with Norwegian PSO representatives who either plan to adopt or have already implemented cloud ERP. The findings align with previous research regarding factors such as availability, reduced costs, updates, and maintenance. The findings also support that there is a link between organizational size and the desire to adopt. Contradictory, the findings reveal previously reported barriers such as security, vendor lock-in, lack of customization, and data ownership not to be perceived as direct barriers. Accordingly, our findings indicate more willingness among Norwegian PSOs to embrace cloud ERP than previously reported. In the implementation stage, the findings closely resemble previous research. Factors such as user training, vendor selection, system integrations, and functionality are considered critical success factors among the Norwegian PSOs. One contradiction was discovered regarding project management, as the findings indicate that PSOs put more emphasis on a project team, rather than project management in isolation. Lastly, the results add to current research by identifying the dynamic interrelationship between barriers within distinct phases. Our findings suggest that open lines of communication amongst all parties involved are crucial throughout the entire process. The establishment of a solid contract is also considered vital

    Cloud adoption and cyber security in public organizations: an empirical investigation on Norwegian municipalities

    Get PDF
    The public sector in Norway, particularly municipalities, is currently transforming through the adoption of cloud solutions. This multiple case study investigates cloud adoption and is security challenges that come along with it. The objective is to identify the security challenges that cloud solutions present and techniques or strategies that can be used to mitigate these security challenges. The Systematic Literature Review (SLR) provided valuable insights into the prevalent challenges and associated mitigation techniques in cloud adoption. The thesis also uses a qualitative approach using Semi-Structured Interviews (SSI) to gather insight into informants’ experiences regarding cloud adoption and its security challenges. The study’s empirical data is based on interviews with six different Norwegian municipalities, providing a unique and broad perspective. The analysis of the empirical findings, combined with the literature, reveals several security challenges and mitigation techniques in adopting cloud solutions. The security challenges encompass organizational, environmental, legal, and technical aspects of cloud adoption in the municipality. Based on the findings, it is recommended that Norwegian municipalities act on these issues to ensure a more secure transition to cloud solutions

    Banking on Green Information Systems: An exploratory case study of a Norwegian bank facilitating sustainability accounting and reporting

    Get PDF
    The purpose of this dissertation is to explore how an incumbent financial institution intend to overcome inhibiting legacy systems to facilitate sustainability accounting and reporting, a relatively new phenomenon in its infancy in IS research. In doing so, this study focuses on two underlying sub-questions covering drivers and inhibitors of Green IS adoption within the Norwegian banking industry, in addition to the facilitation of sustainability accounting and reporting from an IS perspective. The research into these topics is addressed by interviewing six industry-experts within a Norwegian bank, resulting in two aggregated analytical dimensions with valuable empirical outcomes. Findings from this study indicate that regulatory pressure is the most significant driver of Green IS adoption with varying degree of emphasis on stakeholder pressure, economic incentives, and manual processes. Whereas inherent limitations with IT infrastructure and current ESG data deficiencies are identified as inhibiting factors, which subsequently explains the making of an ESG data task force initiative tasked with building an ESG data hub to facilitate sustainability accounting and reporting. The bank’s proposed ESG data hub architecture leveraging a PaaS solution provide valuable managerial implications for practitioners in other financial institutions that could opt for a similar Green IS approach

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    Implementing Cloud Computing. A Study of the Impact on the IT Department

    Get PDF
    Master's thesis in Information systems (IS501)Cloud Computing (CC)has become an area of interestamongmany organizations. Manyhave started to prioritize the development of both public and private Cloudsfor storing the increased volumes of data,andto exploit the benefits of the phenomena.With the new benefits of publicCloud, it is inevitable that some of thetasks the traditional IT departments have provisionedare being outsourced to a third party, and will be contributing to some sort of organizational and managerial change for them.Based on this, the study has its purpose of researchinghow the IT department is impacted in organizations based on CC adoption. Toinvestigatethis topic,wedevelopedthe following research question; “What impactdoes Cloud Computing have on the IT department andits IT governance mechanisms?”. Answering the proposed RQwill help us identifyhow the IT department has been impacted, as well as identifying the change in its IT governance mechanisms. To assist in answering the question above, we developed two sub-questions;“How will the role of the IT department within an organization change after adopting CC services?”and “How will CC affect the managerial responsibilities within the IT department?”. Thesewill provide further informationandanswer ourpresented RQ, as well as providing a broaderspecter of information

    IoT for Diabetics: Exploring IoT Adoption Issues

    Get PDF
    An increasing problem worldwide is the number of people living with and dying of critical, chronic diseases. One of these diseases is type 1 diabetes, which, as of today, is uncurable yet treatable through careful and precise monitoring. Using the Internet of Things (IoT) is one of the most efficient ways to monitor diabetes and is also said to improve the life-quality of people with diabetes. However, the great potential of IoT in diabetes treatment is followed by various challenged factors regarding privacy and security. Cyberattacks can affect not only the individual patient but everyone connected to the IT infrastructure of the hacked device. Existing reports show cyberattacks against the Norwegian healthcare sector have increased by 72% over the last year, resulting in about 450 attacks each week. Still, diabetic patients tend to trust their devices to be safe and are willing to take the risk as they consider their medical data as not interesting to cybercriminals. Healthcare personnel's lack of knowledge about information security and privacy best practice is reported to be an entry point for cybercriminals to gain access to critical IT systems. This study aimed to investigate the relationship between the potentially improved life-quality from using diabetes IoT and the challenges regarding privacy and cyberthreats, including the perspective of three different Norwegian stakeholder groups: diabetic patients (type 1), healthcare personnel working with diabetes patients, and industry representatives within healthcare and security. Findings suggest that neither patients nor healthcare personnel is concerned about patient privacy or threats against diabetes IoT, despite the increased cyberthreats in the healthcare sector. It further indicates a pressing matter for a discussion about data ownership generated by IoT and a revision of privacy regulations that make it easier for all Norwegian healthcare regions to interpret, comply, and act upon equally, to utilize the technology available and ensure diabetes patients all over the country have the same opportunities when it comes to patient care

    Benefits Realization with a cloud-based ERP system: A perspective for SME Manufacturers

    Get PDF

    IoT-technological maturity model development and maturity assessment of Norwegian manufacturing companies

    Get PDF
    Confidential until 24. May 202
    corecore