1,209 research outputs found

    Beyond Bourdieu, Foucault and Habermas: Review and Assessment of Critical Information Systems Research

    Get PDF
    This paper presents a literature review of critical information systems (IS) research. Specifically, it focuses on how IS researchers have responded to Myers and Klein’s (2011) call to consider critical approaches and theorists in addition Bourdieu, Foucault and Habermas. The review identifies and discusses three types of critical IS research “beyond Bourdieu, Foucault and Habermas”: work based on a) (other) critical grand social theories, b) postcolonialism and c) data-focused critical methods (i.e., Capabilities Approach, Critical Discourse Analysis, Critical Heuristics and Design, Frame Analysis and Phronetic Enquiry). Based on the literature review, the paper maps the landscape of critical approaches and theories and identify their origins. This analysis is helpful for IS researchers interested in conducting critical IS research by charting the range of critical research approaches beyond Bourdieu, Foucault and Haberma

    An Assessment of security in critical information systems used by universities in Kenya

    Get PDF
    Paper presented at Strathmore University Research Week on 31 July 200

    An Assessment of security in critical information systems used by universities in Kenya

    Get PDF
    Paper presented at ICT conference of 2009.Paper presented at Strathmore University Research Week on 31st July 200

    Understanding the Sustainability Factors in Critical Information Systems for Disastrous Pandemics: A Knowledge-Based View

    Get PDF
    During the difficult time of coronavirus outbreaks, global environmental disasters, and financial turmoil, developing and deploying sustainable information systems is a crucial management task for ensuring the functionality of enterprise information processing and thus sustaining competitiveness. This study develops a set of criteria for sustainable information systems using the decision-making trial and evaluation laboratory (DEMATEL) method. By referring to the theory of knowledge-based view and sustainability, this study constructed a research framework in which the selection attributes reflect core knowledge elements of a sustainable information system. An empirical study was performed using the DEMATEL method with data collected from industry experts. The results conclude a cause and effect relationship of the knowledge factors influencing information system sustainability. The study discovered that the economical aspect is a causal factor of environmental aspect and social aspect for sustainability considerations. Furthermore, commercial IT solution knowledge, eco-design knowledge, and workplace safety and health knowledge are the most influential knowledge components for the economic, environmental, and social aspects of information system sustainability, respectively

    Sensors in your clothes: Design and development of a prototype

    Get PDF
    Wearable computing is fast advancing as a preferred approach for integrating software solutions not only in our environment, but also in our everyday garments to exploit the numerous information sources we constantly interact with. This paper explores this context further by showing the possible use of wearable sensor technology for information critical information systems, through the design and development of a proof-of-concept prototyp

    Impact of Digital Vehicle Identification Errors on Critical Information Systems

    Get PDF
    In commercial, technical, administrative, record-keeping and forensic practice, unambiguous, unique identification of all objects with which we work is important. Vehicles are identified using a VIN (Vehicle Identification Number), which is a key identifier in everyday practice. This identifier is inserted into information systems in different ways. Manual copying from paper documents to record systems prevails. In practice, however, it turns out that this method has an average error rate of up to 8%. In recent years, the digital VIN, which is physically stored in the vehicle in its electronic control units, has started to be used for vehicle identification. The contribution deals with the description and evaluation of various ways of VIN entries in information systems, especially critical infrastructure, and analyzes their shortcomings and benefits. In the article, a thorough analysis of frequent errors in VIN is carried out and ways to eliminate them are suggested

    cii Student Papers - 2021

    Get PDF
    In this collection of papers, we, the Research Group Critical Information Infrastructures (cii) from the Karlsruhe Institute of Technology, present nine selected student research articles contributing to the design, development, and evaluation of critical information infrastructures. During our courses, students mostly work in groups and deal with problems and issues related to sociotechnical challenges in the realm of (critical) information systems. Student papers came from four different cii courses, namely Emerging Trends in Digital Health, Emerging Trends in Internet Technologies, Critical Information Infrastructures, and Digital Health in the winter term of 2020 and summer term of 2021

    Design and Implementation of Highly Available Information Systems

    Get PDF
    Advances in information technology have created a broad spectrum of opportunities to increase uptime and reduce outages of critical information systems. Many applications are now designed with features that reduce the complexity of implementing redundancy. Advances in network technology have increased the availability and cost effectiveness of implementing geographic redundancy. Replication features are now commonly available in storage systems. Virtualization technologies have created opportunities to move servers electronically across the network, rather than physically. Cloud Computing services have become mature and abundant, creating opportunities to outsource strategic functions to a distributed ‘cloud’. With proper analysis and design, Highly Available Information Systems are within reach for most organizations

    cii Student Papers - 2022

    Get PDF
    In this collection of papers, we, the Research Group Critical Information Infrastructures (cii) from the Karlsruhe Institute of Technology, present eight selected student research articles contributing to the design, development, and evaluation of critical information infrastructures. During our courses, students mostly work in groups and deal with problems and issues related to sociotechnical challenges in the realm of (critical) information systems. Student papers came from five different cii courses, namely Emerging Trends in Internet Technologies, Emerging Trends in Digital Health, Digital Health, Critical Information Infrastructures, and Selected Issues on Critical Information Infrastructures: Collaborative Development of Innovative Teaching Concepts in summer term of 2021 and the winter term of 2021/2022

    The development of a biometric keystroke authentication framework to enhance system security

    Get PDF
    Computer systems have proven to be essential to achieving our daily tasks such as managing our banking accounts, managing our health information and managing critical information systems such as drinking water systems or nuclear power plant systems. Such distributed systems are networked and must be protected against cyber threats. This research presents the design and implementation of a stand alone web based biometric keystroke authentication framework that creates a user\u27s keystroke typing profile and use it as a second form of authentication. Several biometric models were then bench marked for their accuracy by computing their EER. By using keystroke biometrics as a second form of authentication the overall system\u27s security is enhanced without the need of extra peripheral devices and without interrupting a user\u27s work-flow
    • 

    corecore