28,294 research outputs found

    Security Vulnerabilities of the Web Based Open Source Information Systems: Adoption Process and Source Codes Screening

    Get PDF
    This paper exposes security vulnerabilities of the web based Open Source Information Systems (OSIS) from both system angle and human perspectives.It shows the extent of risk that can likely hinder adopting organization from attaning full intended benefits of using OSIS software. To undertake this study, a case study methodology was opted with fifteen public and private organizations being software companies and technology users. The respondents to this study were categorized as top  management, software developers, systems administrators and end users. Apart from intensive documentary review, critical investigation of onsite servers running nine web based OSIS systems has been done. The studied systems are MOODLE, OrangeHRM, ATutor, Koha, WebERP, vTigerCRM, OpenDocMan, OpenSIS and Zalongwa software.The study reveals that there are security weaknesses in locally customized OSIS systems and freely downloadable information systems from internet repository. This has been a result of uncoordinated operations and ad hoc performance of key OSIS stakeholders ranging from early stages of sourcing the said software, OSIS selection, adoption, customization, installation, upgrading androutine management.Keywords – Open Source Software, Information System, Software Security

    Using i* to represent OSS ecosystems for risk assessment

    Get PDF
    Open Source Software (OSS) is a strategic asset for organisations thanks to its short time-to-market, the opportunity for a reduced development effort and total cost of ownership, and its customization capabilities. OSS-based solutions include projects that are developed and co-evolve within the same organisation, OSS communities, companies, and regulatory bodies, forming an articulated strategic business ecosystem. The adoption of OSS in commercial projects leads to numerous challenges in the wide spectrum of available OSS solutions and risks emerging from the intrinsic structure of an OSS project. In this position paper we devise the use of i* models for understanding the strategic perspective of OSS ecosystems, representing actors, intentional dependencies and responsibilities. We argue that these models can play a crucial role in the analysis of organisational risks inherent to OSS component adoption and in the definition of risk mitigation activities.Postprint (published version

    Using Microservices to Customize Multi-Tenant SaaS: From Intrusive to Non-Intrusive

    Get PDF
    Customization is a widely adopted practice on enterprise software applications such as Enterprise resource planning (ERP) or Customer relation management (CRM). Software vendors deploy their enterprise software product on the premises of a customer, which is then often customized for different specific needs of the customer. When enterprise applications are moving to the cloud as mutli-tenant Software-as-a-Service (SaaS), the traditional way of on-premises customization faces new challenges because a customer no longer has an exclusive control to the application. To empower businesses with specific requirements on top of the shared standard SaaS, vendors need a novel approach to support the customization on the multi-tenant SaaS. In this paper, we summarize our two approaches for customizing multi-tenant SaaS using microservices: intrusive and non-intrusive. The paper clarifies the key concepts related to the problem of multi-tenant customization, and describes a design with a reference architecture and high-level principles. We also discuss the key technical challenges and the feasible solutions to implement this architecture. Our microservice-based customization solution is promising to meet the general customization requirements, and achieves a balance between isolation, assimilation and economy of scale

    Modeling of system knowledge for efficient agile manufacturing : tool evaluation, selection and implementation scenario in SMEs

    Get PDF
    In the manufacturing world, knowledge is fundamental in order to achieve effective and efficient real time decision making. In order to make manufacturing system knowledge available to the decision maker it has to be first captured and then modelled. Therefore tools that provide a suitable means for capturing and representation of manufacturing system knowledge are required in several types of industrial sectors and types of company’s (large, SME). A literature review about best practice for capturing requirements for simulation development and system knowledge modeling has been conducted. The aim of this study was to select the best tool for manufacturing system knowledge modelling in an open-source environment. In order to select this tool, different criteria were selected, based on which several tools were analyzed and rated. An exemplary use case was then developed using the selected tool, Systems Modeling Language (SysML). Therefore, the best practice has been studied, evaluated, selected and then applied to two industrial use cases by the use of a selected opens source tool.peer-reviewe

    Designing Scalable Business Models

    Full text link
    Digital business models are often designed for rapid growth, and some relatively young companies have indeed achieved global scale. However despite the visibility and importance of this phenomenon, analysis of scale and scalability remains underdeveloped in management literature. When it is addressed, analysis of this phenomenon is often over-influenced by arguments about economies of scale in production and distribution. To redress this omission, this paper draws on economic, organization and technology management literature to provide a detailed examination of the sources of scaling in digital businesses. We propose three mechanisms by which digital business models attempt to gain scale: engaging both non- paying users and paying customers; organizing customer engagement to allow self- customization; and orchestrating networked value chains, such as platforms or multi-sided business models. Scaling conditions are discussed, and propositions developed and illustrated with examples of big data entrepreneurial firms

    Why Customers Value Mass-customized Products: The Importance of Process Effort and Enjoyment

    Get PDF
    We test our hypotheses on 186 participants designing their own scarves with an MC toolkit. After completing the process, they submitted binding bids for "their" products in Vickrey auctions. We therefore observe real buying behavior, not merely stated intentions. We find that the subjective value of a self-designed product (i.e., one's bid in the course of the auction) is indeed not only impacted by the preference fit the customer expects it to deliver, but also by (1) the process enjoyment the customer reports, (2) the interaction of preference fit and process enjoyment, and (3) the interaction of preference fit and perceived process effort. In addition to its main effect, we interpret preference fit as a moderator of the valuegenerating effect of process evaluation: In cases where the outcome of the process is perceived as positive (high preference fit), the customer also interprets process effort as a positive accomplishment, and this positive affect adds (further) value to the product. It appears that the perception of the self-design process as a good or bad experience is partly constructed on the basis of the outcome of the process. In the opposite case (low preference fit), effort creates a negative affect which further reduces the subjective value of the product. Likewise, process enjoyment is amplified by preference fit, although enjoyment also has a significant main effect, which means that regardless of the outcome, customers attribute higher value to a self-designed product if they enjoy the process. The importance of the self-design process found in this study bears clear relevance for companies which offer or plan to offer MC systems. It is not sufficient to design MC toolkits in such a way that they allow customers to design products according to their preferences. The affect caused by this process is also highly important. Toolkits should therefore stimulate positive affective reactions and at the same time keep negative affect to a minimum. (authors' abstract

    Knowledge Reuse for Customization: Metamodels in an Open Design Community for 3d Printing

    Full text link
    Theories of knowledge reuse posit two distinct processes: reuse for replication and reuse for innovation. We identify another distinct process, reuse for customization. Reuse for customization is a process in which designers manipulate the parameters of metamodels to produce models that fulfill their personal needs. We test hypotheses about reuse for customization in Thingiverse, a community of designers that shares files for three-dimensional printing. 3D metamodels are reused more often than the 3D models they generate. The reuse of metamodels is amplified when the metamodels are created by designers with greater community experience. Metamodels make the community's design knowledge available for reuse for customization-or further extension of the metamodels, a kind of reuse for innovation
    • …
    corecore