15,834 research outputs found

    Towards a cloud migration decision support system for Small and Medium enterprises in Tamil Nadu

    Get PDF
    Cloud computing is a promising computing paradigm which has the potential to speed up Information Technology adoption among SMEs in developing economies like India. The user friendly, pay per use cloud computing model offers SMEs access to highly scalable and reliable cloud infrastructure without having to invest on buying and maintaining expensive Information Technology resources. However, moving data and application to a cloud infrastructure is not straightforward and can be very challenging as decision makers need to consider numerous aspects before deciding to adopt cloud infrastructure. A review of the literature reveals that there are frameworks available to support cloud migration. However, there are no frameworks, models or tools available to support the whole cloud migration process. This research aims to fill that gap by proposing a conceptual framework for cloud migration decision support system targeted for SMEs in Tamil Nadu

    Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems

    Get PDF
    SCADA and industrial control systems have been traditionally isolated in physically protected environments. However, developments such as standardisation of data exchange protocols and increased use of IP, emerging wireless sensor networks and machine-to-machine communication mean that in the near future related threat vectors will require consideration too outside the scope of traditional SCADA security and incident response. In the light of the significance of SCADA for the resilience of critical infrastructures and the related targeted incidents against them (e.g. the development of stuxnet), cyber security and digital forensics emerge as priority areas. In this paper we focus on the latter, exploring the current capability of SCADA operators to analyse security incidents and develop situational awareness based on a robust digital evidence perspective. We look at the logging capabilities of a typical SCADA architecture and the analytical techniques and investigative tools that may help develop forensic readiness to the level of the current threat environment requirements. We also provide recommendations for data capture and retention

    Smart City Readiness based on Smart City Council’s Readiness Framework

    Get PDF
    The level of urbanization which may impact on urban problems could be resolved through city development enabled and supported by the advanced ICT to build the city smart. To develop the city smart, the readiness of smart cities enablers should be assessed. The study was conducted based on pilot study through a survey on the smart city readiness. The analysis of smart city readiness in Yogyakarta showed that the evaluation of smart city projects implemented partially; only operational and asset optimization, and access to comprehensive device management implemented over 50%. Smart city readiness not only be measured by technological aspect but also need to be measured as non-technological aspects. Thus, measurement of readiness smart city can be more comprehensive

    Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems

    Get PDF
    Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor and control a wide range of safety-related functions. These include energy generation where failures could have significant, irreversible consequences. They also include the control systems that are used in the manufacture of safety-related products. In this case bugs in an ICS/SCADA system could introduce flaws in the production of components that remain undetected before being incorporated into safety-related applications. Industrial Control Systems, typically, use devices and networks that are very different from conventional IP-based infrastructures. These differences prevent the re-use of existing cyber-security products in ICS/SCADA environments; the architectures, file formats and process structures are very different. This paper supports the forensic analysis of industrial control systems in safety-related applications. In particular, we describe how forensic attack analysis is used to identify weaknesses in devices so that we can both protect components but also determine the information that must be analyzed during the aftermath of a cyber-incident. Simulated attacks detect vulnerabilities; a risk-based approach can then be used to assess the likelihood and impact of any breach. These risk assessments are then used to justify both immediate and longer-term countermeasures

    Preparing for a Digital Future: Cloud Strategy at Continental AG

    Get PDF
    This paper is directed towards IT executives aiming to promote the adoption of cloud computing (CC) within their company. We conducted a longitudinal case study on the evolving CC strategy and its implementation at the multi-national company Continental, based on a previous case study by Loebbecke et al. (2012). We narrate Continental\u27s pathway towards CC adoption, which comprised the experimentation, professionalization, and utilization of CC, and discuss current and previous barriers encountered during the implementation. We derive five lessons learned that can serve as practical guidance for executives aiming to accelerate CC adoption within their own organization: (1) differentiate the CC strategy by delivery model; (2) drive proof of concepts to generate reusable blueprints; (3) pre-invest in the integration of IaaS and PaaS providers; (4) implement CC gradually, transforming applications during the transition to the cloud; and (5) disseminate knowledge within the organization to enable change

    Artificial Intelligence for the Financial Services Industry: What Challenges Organizations to Succeed?

    Get PDF
    As a research field, artificial intelligence (AI) exists for several years. More recently, technological breakthroughs, coupled with the fast availability of data, have brought AI closer to commercial use. Internet giants such as Google, Amazon, Apple or Facebook invest significantly into AI, thereby underlining its relevance for business models worldwide. For the highly data driven finance industry, AI is of intensive interest within pilot projects, still, few AI applications have been implemented so far. This study analyzes drivers and inhibitors of a successful AI application in the finance industry based on panel data comprising 22 semi-structured interviews with experts in AI in finance. As theoretical lens, we structured our results using the TOE framework. Guidelines for applying AI successfully reveal AI-specific role models and process competencies as crucial, before trained algorithms will have reached a quality level on which AI applications will operate without human intervention and moral concerns

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    An exploration of the determinants for decision to migrate existing resources to cloud computing using an integrated TOE-DOI model

    Get PDF
    Migrating existing resources to cloud computing is a strategic organisational decision that can be difficult. It requires the consideration and evaluation of a wide range of technical and organisational aspects. Although a significant amount of attention has been paid by many industrialists and academics to aid migration decisions, the procedure remains difficult. This is mainly due to underestimation of the range of factors and characteristics affecting the decision for cloud migration. Further research is needed to investigate the level of effect these factors have on migration decisions and the overall complexity. This paper aims to explore the level of complexity of the decision to migrate the cloud. A research model based on the diffusion of innovation (DOI) theory and the technology-organization-environment (TOE) framework was developed. The model was tested using exploratory and confirmatory factor analysis. The quantitative analysis shows the level of impact of the identified variables on the decision to migrate. Seven determinants that contribute to the complexity of the decisions are identified. They need to be taken into account to ensure successful migration. This result has expanded the collective knowledge about the complexity of the issues that have to be considered when making decisions to migrate to the cloud. It contributes to the literature that addresses the complex and multidimensional nature of migrating to the cloud

    Readiness of IT organisations to implement Artificial Intelligence to support business processes in Gauteng Province, South Africa.

    Get PDF
    Artificial Intelligence (AI) has emerged as a research field and more particularly studies pertaining to the readiness of organisations to implement AI. Although AI implementation has proliferated across industries, many organisations still struggle to successfully achieve their business goals, associated with AI and Fourth Industrial Revolution (4IR). This study attempts to close this gap, by conducting a deductive case study, and thematic analysis into the readiness of a Gauteng-based IT organisation to implement AI towards achieving their business goals, in line with the benefits associated with 4IR. To achieve this, the researcher draws on the Technology-Organisation-Environment (TOE) framework to reflect on the dimensions and group them into strategy, perception and awareness, challenges, and organisational culture, related to contextual factors. This paper reports on the outcomes of open-ended interviews and focus group discussions involving 31 participants across IT management, senior-, and junior technical staff, about the enabling and hindering factors of AI readiness. The study further offers insights and a research agenda to support IT managers and staff to make informed decisions towards increasing their readiness to implement A

    Cloud Computing Adoption in the South African Public Sector

    Get PDF
    Scholars have touted a variety of benefits for adopting cloud computing solutions in the public sector. However, the  adoption of cloud computing has been low in the South African (SA) government context. This study investigates the factors influencing cloud computing adoption within the SA public sector. The study adopted a case study approach. The research was informed by the Technological Organisational Environmental (TOE) and the Diffusion of Innovation (DOI) theoretical frameworks to understand the trajectory of cloud computing adoption. Primary data was collected using a questionnaire and semi-structured interviews with respondents from government departments. Additionally, secondary data from government Information Technology (IT) policies and strategic documents was analysed. The results highlighted that the enablers that are critical for cloud adoption include cloud computing policy, skills, IT infrastructure and financial support. The barriers that are hindering cloud adoption are related to security risks, network connection, cloud computing policy, costs and budget availability, among others. The identified benefits that may be realised through cloud adoption include enhanced service improvement, cost savings, high system availability, green IT, centralised and shared services and accessibility. The study proposes several guiding principles for cloud computing adoption in the public sector
    corecore