241 research outputs found

    The Lumpkin Letter (Fall 2022)

    Get PDF

    Benefits and Risks of Big Data

    Get PDF
    Big data is one of the most prevalent topics in information systems today. The purpose of this paper is to explore big data, its past uses, legal history, current and potential security risks, and potential future uses. This literature review primarily focuses on the benefits of big data as well as the risks associated with big data. The research provides a general overview of big data and some of the technologies related to big data. The authors conclude with suggestions for future research of big data

    Revisiting Cybersecurity Awareness in the Midst of Disruptions

    Get PDF
    The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to gain feedback about perceptions on cybersecurity knowledge and awareness. The analysis of schools’ organizational security postures related to all levels of education, recommending in raising awareness of the underlying and unprecedented security vulnerabilities. One area of greatest need is in protecting the wellbeing of people in securing private or protected assets and sensitive information, most valuable and vulnerable amid disruption. The possible lack of cybersecurity awareness in online settings could increase an organizational vulnerability to risks of threats and outsider attempts to install malware during a variety of cyber-attacks. Organizations with online ambiguity face a threat from botnets to infect networks. This qualitative exploratory single case-study into perceptions of teachers and leaders, information technology (IT) experts, and parents of elementary school children about cybersecurity awareness level of children in elementary schools helped to reinforce the important role of education in building foundational cyber-safety practices

    A Look Toward the Future: Decision Support Systems Research is Alive and Well

    Get PDF
    This commentary examines the historical importance of decision support to the information systems (IS) field from the viewpoint of four researchers whose work spans the several decades of decision support systems (DSS) research. Given this unique “generational” vantage point, we present the changes in and impact of DSS research as well as future considerations for decision support in the IS field. We argue that the DSS area has remained vital as technology has evolved and our understanding of decision-making processes has deepened. DSS work over the last several years has contributed both breadth and depth to decision-making research; the challenge now is to make sense of it all by placing it in an understandable context and by applying our analysis to the relevant issues looming in the future. One major outcome of this commentary is the identification of future trends in DSS research and what the users of these new DSS outlets can learn from the past. Trends include the increasing impact of social and mobile computing on DSS research, as well as knowledge management DSS and negotiation support systems that shift the focus to delivering more customer-centric and marketplace support

    The Strategic Balance of Centralized Control and Localized Flexibility in Two-Tier ERP Systems

    Get PDF
    Two-tier ERP systems are an increasingly popular technology strategy for large, multinational enterprises. This paper examines how two-tier ERP enables organizations to balance centralized control and coordination at the corporate level with localized flexibility and responsiveness at the division/subsidiary level. The tier 1 ERP system handles core tasks like HR, finance, and IT using highly customized solutions tailored to the large corporate entity's needs, scale, and sophistication. This promotes enterprise-wide process standardization and centralized control. Meanwhile, the tier 2 ERP systems utilized by smaller subsidiaries and regional offices are less resource intensive and more configurable to address localized requirements. Tier 2 gives local divisions more control over their ERP to enable flexibility and responsiveness. This research analyzes the key drivers pushing large multinationals towards two-tier ERP, including managing complexity across global operations, enabling centralized coordination while allowing localization, integrating dispersed IT infrastructures, and controlling implementation costs. The paper explores the unique characteristics and benefits of tier 1 and tier 2 ERP systems in depth, providing concrete examples. Critical considerations for successfully deploying two-tier ERP are also examined, such as integration, change management, and striking the right balance between standardization and localization. The conclusion reached is that two-tier ERP delivers important synergistic benefits for large enterprises through its centralized/decentralized dual structure. The tier 1/tier 2 approach balances the key needs for coordination and control at the center with flexibility at the edges. However, careful planning is required for effective two-tier ERP implementation. The optimal balance between standardization and localization must be struck to fully realize the strategic potential. This research provides important insights for both academic study and real-world application of two-tier ERP systems

    Cloud Computing and Cloud Automata as A New Paradigm for Computation

    Get PDF
    Cloud computing addresses how to make right resources available to right computation to improve scaling, resiliency and efficiency of the computation. We argue that cloud computing indeed, is a new paradigm for computation with a higher order of artificial intelligence (AI), and put forward cloud automata as a new model for computation. A high-level AI requires infusing features that mimic human functioning into AI systems. One of the central features is that humans learn all the time and the learning is incremental. Consequently, for AI, we need to use computational models, which reflect incremental learning without stopping (sentience). These features are inherent in reflexive, inductive and limit Turing machines. To construct cloud automata, we use the mathematical theory of Oracles, which include Oracles of Turing machines as its special case. We develop a hierarchical approach based on Oracles with different ranks that includes Oracle AI as a special case. Discussing a named-set approach, we describe an implementation of a high-performance edge cloud using hierarchical name-oriented networking and Oracle AI-based orchestration. We demonstrate how cloud automata with a control overlay allows microservice network provisioning, monitoring and reconfiguration to address non-deterministic fluctuations affecting their behavior without interrupting the overall evolution of computation

    Special Issue Editorial

    Get PDF

    The Effects of Computer Crimes on the Management of Disaster Recovery

    Get PDF
    The effects of a technology disaster on an organization can include a prolonged disruption, loss of reputation, monetary damages, and the inability to remain in business. Although much is known about disaster recovery and business continuance, not much research has been produced on how businesses can leverage other technology frameworks to assist information technology disaster recovery. The problem was the lack of organizational knowledge to recover from computer crime interruptions given the maturity level of existing disaster recovery programs. The purpose of this Delphi study was to understand how disaster recovery controls and processes can be modified to improve response to a computer crime caused business interruption. The overarching research question in this study was to understand what factors emerge relative to the ability of disaster recovery programs to respond to disasters caused by computer crimes. The conceptual framework included a maturity model to look at how programs might be improved to respond to the computer crimes threat. Research data were collected from a 3 round Delphi study of 22 disaster recovery experts in the fields of disaster recovery and information security. Results from the Delphi encompass a consensus by the panel. Key findings included the need for planning for cyber security, aligning disaster recovery with cyber security, providing cyber security training for managers and staff, and applying lessons learned from experience. Implications for positive social change include the ability for organizations to return to an acceptable level of operation and continue their service benefiting employees, customers, and other stakeholders

    Opnet, Arne, and the Classroom

    Get PDF
    This paper examines OPNET Technology, Inc\u27s management programs, and Regis University\u27s Academic Research Network (ARNe) needs to find out which OPNET programs can meet the needs of ARNe. The method used was to examine ARNe\u27s needs, and research Microsoft\u27s SMF/MOF management framework, research OPNET\u27s program and module offerings, research OPNET\u27s University Program, and research how OPNET\u27s programs are used at some other universities. The research was used to create a match up between Microsoft\u27s Service Management Functions and OPNET\u27s programs and modules. And it was used to create a list of textbooks, labs, and lab manuals that would work with OPNET\u27s IT Guru and Modeler in a classroom to help teach networking theory. The examination was combined with the research to create an evaluation criteria matrix from which project recommendations could be drawn. The conclusion was that the following OPNET Technology programs and modules could be of benefit to Regis University\u27s ARNe - ACE, Automation module, Commander, DAC module, Flow Analysis module, IT Sentinel, IT Guru, NetDoctor, Report Server, and VNE Server

    Networking vendor strategy and competition and their impact on enterprise network design and implementation

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A
    • …
    corecore