212,014 research outputs found

    Determining Digital Transformation Success Factors

    Get PDF
    To understand what organizations do which brings about successful digital transformation (DX), a review of representative literature was performed. From a total of 89 articles, 16 single-case articles which sufficiently documented end-to-end DX success stories of 10 exemplar organizations we selected. Within case content analysis and asking the questions analytical procedure were employed to code each exemplar case, where a total of 174 attributes were found. Making the comparisons procedure was employed to build thematic higher-level categories by grouping similar attributes. Cross case content analysis was employed to determine presence strength of attributes in the category groupings. A list of 7 success factors and 23 subfactors emerged from the thematic groupings. These success factors constitute the initial steps towards building a DX framework which organizations seeking to embark on successful digital transformation journeys can adopt

    Determining Critical Success Factors of the Digital Transformation Using a Force-Directed Network Graph

    Get PDF
    Conducting a digital transformation is one of the major challenges for today’s companies as it is usually associated with a high risk. The reasons for this are manifold. Technologies are still evolving and there is no coherent standard for digital platforms enabling digitalization. Furthermore, it is not only about introducing new technology but also requires a fundamental change in an organization and its culture. Consequently, planning a digital transformation project (or program) requires a careful analysis of the company’s current situation and the envisioned objectives. This article investigates critical success factors for preparing and executing such a transformation. The success factors are identified by conducting a structured literature analysis. 13 scientific papers are identified and then analyzed quantitatively and qualitatively. The quantitative analysis is conducted by using force-directed network graphs. Both methods are then compared and discussed. The result shows that most critical success factors are related to the business change rather than to introducing technology. Leadership, strategy, vision, corporate culture, and customer centricity play a stronger role than a digital platform

    TRANSFORMASI MODEL PEMBELAJARAN UNTUK MENINGKATKAN KUALITAS PEMBELAJARAN DI MASA PANDEMI COVID-19 : Studi Kasus Mata Pelajaran Fikih Kelas XI MAN 2 Mojokerto

    Get PDF
    One of the determining factors for the success of teaching and learning is the right learning model or method. The Covid-19 pandemic has had a significant impact on the education and learning sector. This study aims to describe the phenomenon of the transformation of the fiqh learning model as well as the inhibiting and supporting factors in class XI MAN 2 Mojokerto. The research method uses qualitative research. The data used are primary data and secondary data. The results of the study resulted: The fiqh learning model during the covid-19 pandemic changed into an online learning model. Online fiqh learning is carried out with the help of several digital media such as e-learning, Google Meet, Google Classroom, Whatsapp group, Quizizz, Camtasia studio, and Renderforest as well as the availability of madrasa digital libraries to support maximum learning. The teacher provides materials and assignments through the application. Then students deposit the results of their assignments through the application or via e-mail. The application of this online learning model has supporting and inhibiting factors that must be addressed wisely by all authorized parties, in this case teachers, students, parents, and schools, so that learning objectives are achieved optimally

    Digital maturity variables and their impact on the enterprise architecture layers

    Get PDF
    This study examines the variables of digital maturity of companies. The framework for enterprise architectures Archimate 3.0 is used to compare the variables. The variables are assigned to the six layers of architecture: Strategy, Business Environment, Applications, Technology, Physical and Implementation and Migration. On the basis of a literature overview, 15 “digital maturity models” with a total of 147 variables are analyzed. The databases Scopus, EBSCO – Business Source Premier and ProQuest are used for this purpose

    spotlight no. 5, 2018 - #SmartHealthSystems Digitalization requires an effective strategy, compelling political leadership and a coordinating institution with a national mandate

    Get PDF
    In terms of digitalizing its healthcare sector, Germany trails far behind several other countries as the potential for quality and efficiency in German healthcare remains untapped ●● Countries that are succeeding in digitalizing their healthcare systems feature an effective strategy, political leadership and a coordinating institution with a national mandate ●● Taking pragmatic steps that are driven by the expected benefits for patients and the healthcare stem alike is key to shaping digital transformation positively ●● Promoting acceptance through strategies such as co-design measures is essential to success ●● German health politics must take on a stronger pro-active role and strengthen its leadership in this are

    Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Get PDF
    The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture

    Impacts for m-Internet applications and perspectives in agriculture

    Get PDF
    Mobile communication and the mobile Internet can provide important opportunities, economic advantages for enterprises end organisations and support their more efficient operating as they can use it anytime and anywhere. We can make their wide spread usage, innovation effect and advantages economical way if we consider the effect system of technologies and services. The technological, social and economical complex effect system puts pressure on spreading of business applications. The types of applicable equipment are increasing. There can be found four player groups according to social aspects: manufacturers, enterprises, customers and workers. The Internet technology and the Internet network have become essential communication tools in business processes recently. Using the Internet by means of mobile appliances increases the possibilities. If we study the business process the expenses, advantages, disadvantages can be seen well. Nowadays these applications are more and more successful in the following areas such as in agriculture, in different parts of food industry, in extension services, precision agriculture, logistics

    Insta-Appropriation: Finding Boundaries for the Second Circuit’s Fair Use Doctrine After Campbell

    Get PDF
    Copyright law’s current fair use landscape is riddled with unclear standards and old considerations forced upon new media. This is especially problematic in the context of digital appropriation of art from online social media platforms—an issue highlighted by Richard Prince’s exhibit “New Portraits,” in which he appropriated strangers’ Instagram photos for his own profit. Unless this situation is remedied, digital content creators will effectively lose their statutory copyright protections. Thus, when considering digital appropriation cases, courts should require a transformation of content rather than purpose, should elevate the weight of the fourth statutory factor, and should reinstate the “comment upon” standard for works of parody and satire. Other scholars have proposed changes to the fair use doctrine, but none adequately protect first-order digital content creators. As such, this Note proposes a reinterpretation of the fair use factors in light of digital appropriation and social media

    Insta-Appropriation: Finding Boundaries for the Second Circuit’s Fair Use Doctrine After Campbell

    Get PDF
    Copyright law’s current fair use landscape is riddled with unclear standards and old considerations forced upon new media. This is especially problematic in the context of digital appropriation of art from online social media platforms—an issue highlighted by Richard Prince’s exhibit “New Portraits,” in which he appropriated strangers’ Instagram photos for his own profit. Unless this situation is remedied, digital content creators will effectively lose their statutory copyright protections. Thus, when considering digital appropriation cases, courts should require a transformation of content rather than purpose, should elevate the weight of the fourth statutory factor, and should reinstate the “comment upon” standard for works of parody and satire. Other scholars have proposed changes to the fair use doctrine, but none adequately protect first-order digital content creators. As such, this Note proposes a reinterpretation of the fair use factors in light of digital appropriation and social media
    • 

    corecore