28,294 research outputs found
Recommended from our members
The ownership of digital infrastructure: Exploring the deployment of software libraries in a digital innovation cluster
Boundary resources have been shown to enable the arm’s-length relationships between platform owners and third-party developers that underlie digital innovation in platform ecosystems. While boundary resources that are owned by open-source communities and smaller-scale software vendors are also critical components in the digital infrastructure, their role in digital innovation has yet to be systematically explored. In particular, software libraries are popular boundary resources that provide functionality without the need for continued interaction with their owners. They are used extensively by commercial vendors to enable customization of their software products, by communities to disseminate open-source software, and by big-tech platform owners to provide functionality that does not involve control. This paper reports on the deployment of such software libraries in the web and mobile (Android) contexts by 107 startup companies in London. Our findings show that libraries owned by big-tech companies, product vendors, and communities coexist; that the deployment of big-tech libraries is unaffected by the scale of the deploying startup; and that context evolution paths are consequential for library deployment. These findings portray a balanced picture of digital infrastructure as neither the community-based utopia of early open-source research nor the dystopia of the recent digital dominance literature
Security Vulnerabilities of the Web Based Open Source Information Systems: Adoption Process and Source Codes Screening
This paper exposes security vulnerabilities of the web based Open Source Information Systems (OSIS) from both system angle and human perspectives.It shows the extent of risk that can likely hinder adopting organization from attaning full intended benefits of using OSIS software. To undertake this study, a case study methodology was opted with fifteen public and private organizations being software companies and technology users. The respondents to this study were categorized as top management, software developers, systems administrators and end users. Apart from intensive documentary review, critical investigation of onsite servers running nine web based OSIS systems has been done. The studied systems are MOODLE, OrangeHRM, ATutor, Koha, WebERP, vTigerCRM, OpenDocMan, OpenSIS and Zalongwa software.The study reveals that there are security weaknesses in locally customized OSIS systems and freely downloadable information systems from internet repository. This has been a result of uncoordinated operations and ad hoc performance of key OSIS stakeholders ranging from early stages of sourcing the said software, OSIS selection, adoption, customization, installation, upgrading androutine management.Keywords – Open Source Software, Information System, Software Security
Using i* to represent OSS ecosystems for risk assessment
Open Source Software (OSS) is a strategic asset for organisations thanks to its short time-to-market, the opportunity for a reduced development effort and total cost of ownership, and its customization capabilities. OSS-based solutions include projects that are developed and co-evolve within the same organisation, OSS communities, companies, and regulatory bodies, forming an articulated strategic business ecosystem. The adoption of OSS in commercial projects leads to numerous challenges in the wide spectrum of available OSS solutions and risks emerging from the intrinsic structure of an OSS project. In this position paper we devise the use of i* models for understanding the strategic
perspective of OSS ecosystems, representing actors, intentional dependencies and responsibilities. We argue that these models can play a crucial role in the analysis of organisational risks inherent to OSS component adoption and in the definition of risk mitigation activities.Postprint (published version
Using Microservices to Customize Multi-Tenant SaaS: From Intrusive to Non-Intrusive
Customization is a widely adopted practice on enterprise software applications such as Enterprise resource planning (ERP) or Customer relation management (CRM). Software vendors deploy their enterprise software product on the premises of a customer, which is then often customized for different specific needs of the customer. When enterprise applications are moving to the cloud as mutli-tenant Software-as-a-Service (SaaS), the traditional way of on-premises customization faces new challenges because a customer no longer has an exclusive control to the application. To empower businesses with specific requirements on top of the shared standard SaaS, vendors need a novel approach to support the customization on the multi-tenant SaaS. In this paper, we summarize our two approaches for customizing multi-tenant SaaS using microservices: intrusive and non-intrusive. The paper clarifies the key concepts related to the problem of multi-tenant customization, and describes a design with a reference architecture and high-level principles. We also discuss the key technical challenges and the feasible solutions to implement this architecture. Our microservice-based customization solution is promising to meet the general customization requirements, and achieves a balance between isolation, assimilation and economy of scale
Modeling of system knowledge for efficient agile manufacturing : tool evaluation, selection and implementation scenario in SMEs
In the manufacturing world, knowledge is fundamental in order to achieve effective and efficient real time decision making. In order to make manufacturing system knowledge available to the decision maker it has to be first captured and then modelled. Therefore tools that provide a suitable means for capturing and representation of manufacturing system knowledge are required in several types of industrial sectors and types of company’s (large, SME). A literature review about best practice for capturing requirements for simulation development and system knowledge modeling has been conducted. The aim of this study was to select the best tool for manufacturing system knowledge modelling in an open-source environment. In order to select this tool, different criteria were selected, based on which several tools were analyzed and rated. An exemplary use case was then developed using the selected tool, Systems Modeling Language (SysML). Therefore, the best practice has been studied, evaluated, selected and then applied to two industrial use cases by the use of a selected opens source tool.peer-reviewe
Designing Scalable Business Models
Digital business models are often designed for rapid growth, and some relatively young companies have indeed achieved global scale. However despite the visibility and importance of this phenomenon, analysis of scale and scalability remains underdeveloped in management literature. When it is addressed, analysis of this phenomenon is often over-influenced by arguments about economies of scale in production and distribution. To redress this omission, this paper draws on economic, organization and technology management literature to provide a detailed examination of the sources of scaling in digital businesses. We propose three mechanisms by which digital business models attempt to gain scale: engaging both non- paying users and paying customers; organizing customer engagement to allow self- customization; and orchestrating networked value chains, such as platforms or multi-sided business models. Scaling conditions are discussed, and propositions developed and illustrated with examples of big data entrepreneurial firms
Why Customers Value Mass-customized Products: The Importance of Process Effort and Enjoyment
We test our hypotheses on 186 participants designing their own scarves with an MC toolkit. After completing the process, they submitted binding bids for "their" products in Vickrey auctions. We therefore observe real buying behavior, not merely stated intentions. We find that the subjective value of a self-designed product (i.e., one's bid in the course of the auction) is indeed not only impacted by the preference fit the customer expects it to deliver, but also by (1) the process enjoyment the customer reports, (2) the interaction of preference fit and process enjoyment, and (3) the interaction of preference fit and perceived process effort. In addition to its main effect, we interpret preference fit as a moderator of the valuegenerating effect of process evaluation: In cases where the outcome of the process is perceived as positive (high preference fit), the customer also interprets process effort as a positive accomplishment, and this positive affect adds (further) value to the product. It appears that the perception of the self-design process as a good or bad experience is partly constructed on the basis of the outcome of the process. In the opposite case (low preference fit), effort creates a negative affect which further reduces the subjective value of the product. Likewise, process enjoyment is amplified by preference fit, although enjoyment also has a significant main effect, which means that regardless of the outcome, customers attribute higher value to a self-designed product if they enjoy the process. The importance of the self-design process found in this study bears clear relevance for companies which offer or plan to offer MC systems. It is not sufficient to design MC toolkits in such a way that they allow customers to design products according to their preferences. The affect caused by this process is also highly important. Toolkits should therefore stimulate positive affective reactions and at the same time keep negative affect to a minimum. (authors' abstract
Knowledge Reuse for Customization: Metamodels in an Open Design Community for 3d Printing
Theories of knowledge reuse posit two distinct processes: reuse for
replication and reuse for innovation. We identify another distinct process,
reuse for customization. Reuse for customization is a process in which
designers manipulate the parameters of metamodels to produce models that
fulfill their personal needs. We test hypotheses about reuse for customization
in Thingiverse, a community of designers that shares files for
three-dimensional printing. 3D metamodels are reused more often than the 3D
models they generate. The reuse of metamodels is amplified when the metamodels
are created by designers with greater community experience. Metamodels make the
community's design knowledge available for reuse for customization-or further
extension of the metamodels, a kind of reuse for innovation
- …