36,236 research outputs found

    Improving Information Alignment and Distributed Coordination for Secure Information Supply Chains

    Get PDF
    Industries are constantly striving to incorporate the latest technology systems into their operations so that they can maintain a competitive edge in their respective markets. However, even when they are able to stay up to speed with technological advancement, there continues to be a gap between the workforce skill set and available technologies. Organizations may acquire advanced systems, yet end up spending extended periods of time in the implementation and deployment phases, resulting in lost resources and productivity. The primary focus of this research is on streamlining the implementation and integration of new information technology systems to avoid the dire consequences of the process being prolonged or inefficient. Specifically, the goal of this research is to mitigate business challenges in information sharing and availability for employees and managers interacting with business tools and each other. This was accomplished by first interviewing work professionals in order to identify gap parameters. Based on the interview findings, recommendations were made in order to enhance the usability of existing tools. At this point, the research setting was shifted from network operations to supply chain operations due to the restrictive nature of network operations. The research team succeeded in developing a user-centered methodology to implement and deploy new business systems to mitigate risk during integration of new systems as the transition is made from the classic way of performing tasks. While this methodology was studied in supply chain operations, it enabled the identification of a common trend of challenges in operations work settings, regardless of the business application. Hence the findings of this research can be extrapolated to any business setting, besides the ones actually studied by the team. In addition, this research ensures that operational teams are able to maximize their benefit out of the technology available, thus enabling them to keep up with the rapidly evolving world of technology while minimizing sacrifices in resources or productivity in the process

    Rational Cybersecurity for Business

    Get PDF
    Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your busines

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    Organizing emergency response in the European Arctic : a comparative study of Norway, Russia, Iceland and Greenland : MARPART Project Report 5

    Get PDF
    The report examines the emergency preparedness systems in Norway, Russia, and Iceland in the Fields of Search and rescue (SAR), oil spill response, firefighting and violent action at sea. Within each country and each Field, the report introduces the main maritime emergency preparedness and response institutions With their organizational models, responsibilities and main operational patterns

    DevOps for Digital Leaders

    Get PDF
    DevOps; continuous delivery; software lifecycle; concurrent parallel testing; service management; ITIL; GRC; PaaS; containerization; API management; lean principles; technical debt; end-to-end automation; automatio

    Critical Team Composition Issues for Long-Distance and Long-Duration Space Exploration: A Literature Review, an Operational Assessment, and Recommendations for Practice and Research

    Get PDF
    Prevailing team effectiveness models suggest that teams are best positioned for success when certain enabling conditions are in place (Hackman, 1987; Hackman, 2012; Mathieu, Maynard, Rapp, & Gilson, 2008; Wageman, Hackman, & Lehman, 2005). Team composition, or the configuration of member attributes, is an enabling structure key to fostering competent teamwork (Hackman, 2002; Wageman et al., 2005). A vast body of research supports the importance of team composition in team design (Bell, 2007). For example, team composition is empirically linked to outcomes such as cooperation (Eby & Dobbins, 1997), social integration (Harrison, Price, Gavin, & Florey, 2002), shared cognition (Fisher, Bell, Dierdorff, & Belohlav, 2012), information sharing (Randall, Resick, & DeChurch, 2011), adaptability (LePine, 2005), and team performance (e.g., Bell, 2007). As such, NASA has identified team composition as a potentially powerful means for mitigating the risk of performance decrements due to inadequate crew cooperation, coordination, communication, and psychosocial adaptation in future space exploration missions. Much of what is known about effective team composition is drawn from research conducted in conventional workplaces (e.g., corporate offices, production plants). Quantitative reviews of the team composition literature (e.g., Bell, 2007; Bell, Villado, Lukasik, Belau, & Briggs, 2011) are based primarily on traditional teams. Less is known about how composition affects teams operating in extreme environments such as those that will be experienced by crews of future space exploration missions. For example, long-distance and long-duration space exploration (LDSE) crews are expected to live and work in isolated and confined environments (ICEs) for up to 30 months. Crews will also experience communication time delays from mission control, which will require crews to work more autonomously (see Appendix A for more detailed information regarding the LDSE context). Given the unique context within which LDSE crews will operate, NASA identified both a gap in knowledge related to the effective composition of autonomous, LDSE crews, and the need to identify psychological and psychosocial factors, measures, and combinations thereof that can be used to compose highly effective crews (Team Gap 8). As an initial step to address Team Gap 8, we conducted a focused literature review and operational assessment related to team composition issues for LDSE. The objectives of our research were to: (1) identify critical team composition issues and their effects on team functioning in LDSE-analogous environments with a focus on key composition factors that will most likely have the strongest influence on team performance and well-being, and 1 Astronaut diary entry in regards to group interaction aboard the ISS (p.22; Stuster, 2010) 2 (2) identify and evaluate methods used to compose teams with a focus on methods used in analogous environments. The remainder of the report includes the following components: (a) literature review methodology, (b) review of team composition theory and research, (c) methods for composing teams, (d) operational assessment results, and (e) recommendations

    New ways of working in acute inpatient care: a case for change

    Get PDF
    This position paper focuses on the current tensions and challenges of aligning inpatient care with innovations in mental health services. It argues that a cultural shift is required within inpatient services. Obstacles to change including traditional perceptions of the role and responsibilities of the psychiatrist are discussed. The paper urges all staff working in acute care to reflect on the service that they provide, and to consider how the adoption of new ways of working might revolutionise the organisational culture. This cultural shift offers inpatient staff the opportunity to fully utilise their expertise. New ways of working may be perceived as a threat to existing roles and responsibilities or as an exciting opportunity for professional development with increased job satisfaction. Above all, the move to new ways of working, which is gathering pace throughout the UK, could offer service users1 a quality of care that meets their needs and expectations

    SOTER: a playbook for cyber security incident management

    Get PDF
    SOTER, a cyber security incident management playbook, is developed to provide a comprehensive model to manage cyber security incidents, particularly for the cyber security operations centre. The proposed playbook is adaptive, cross-sectorial, and process driven. Each key components of the incident management playbook are outlined and discussed. Further, a lexicon based on equivalence mapping is developed and used to map existing cyber security incident vocabulary and taxonomy into a common and consistent lexicon to aid understanding among incident management stakeholder communities – national, government and private sectors. A versatile workbook model has been explored which proves to be adaptable to serve a wide range of cases for successfully managing government and private sector security operations centre. Cyber security incident sharing partnership, formalism for metric and measurements of cyber security incident parameters, and cyber security incident classification and prioritisation schemes are presented, and finally, cyber security incident ‘plays’ and playbook templates are discussed

    How to Organize DevOps’ Teams in Customer Firms? A Comparative Case Analysis

    Get PDF
    The issue of DevOps’ team structures has been seldom addressed in prior literature. Some scholars underlined certain teams' characteristics and proposed structure taxonomies. However, they hardly considered the effect of the firm's context on a structure choice, by only focusing on project-level influences in few studies. To cover this gap, we propose an organizational model for DevOps’ implementation within a consulting configuration. This setting is frequent in the current digital era and is particular as the partners differ in terms of digital maturity, cognition, and goals. We explored three cases in the public administration, telecommunications, and banking sectors. Data was collected through participant observation and semi-structured interviews and thematically analyzed with Nvivo. As results, we identify the key components of DevOps’ teams and highlight their synergies. We also contribute to academic literature and managerial practice by raising customer firms’ awareness on the contextual factors inducing variability on DevOps’ team structure
    • 

    corecore