212,014 research outputs found
Determining Digital Transformation Success Factors
To understand what organizations do which brings about successful digital transformation (DX), a review of representative literature was performed. From a total of 89 articles, 16 single-case articles which sufficiently documented end-to-end DX success stories of 10 exemplar organizations we selected. Within case content analysis and asking the questions analytical procedure were employed to code each exemplar case, where a total of 174 attributes were found. Making the comparisons procedure was employed to build thematic higher-level categories by grouping similar attributes. Cross case content analysis was employed to determine presence strength of attributes in the category groupings. A list of 7 success factors and 23 subfactors emerged from the thematic groupings. These success factors constitute the initial steps towards building a DX framework which organizations seeking to embark on successful digital transformation journeys can adopt
Determining Critical Success Factors of the Digital Transformation Using a Force-Directed Network Graph
Conducting a digital transformation is one of the major challenges for todayâs companies as it is usually associated with a high risk. The reasons for this are manifold. Technologies are still evolving and there is no coherent standard for digital platforms enabling digitalization. Furthermore, it is not only about introducing new technology but also requires a fundamental change in an organization and its culture. Consequently, planning a digital transformation project (or program) requires a careful analysis of the companyâs current situation and the envisioned objectives. This article investigates critical success factors for preparing and executing such a transformation. The success factors are identified by conducting a structured literature analysis. 13 scientific papers are identified and then analyzed quantitatively and qualitatively. The quantitative analysis is conducted by using force-directed network graphs. Both methods are then compared and discussed. The result shows that most critical success factors are related to the business change rather than to introducing technology. Leadership, strategy, vision, corporate culture, and customer centricity play a stronger role than a digital platform
TRANSFORMASI MODEL PEMBELAJARAN UNTUK MENINGKATKAN KUALITAS PEMBELAJARAN DI MASA PANDEMI COVID-19 : Studi Kasus Mata Pelajaran Fikih Kelas XI MAN 2 Mojokerto
One of the determining factors for the success of teaching and learning is the right learning model or method. The Covid-19 pandemic has had a significant impact on the education and learning sector. This study aims to describe the phenomenon of the transformation of the fiqh learning model as well as the inhibiting and supporting factors in class XI MAN 2 Mojokerto. The research method uses qualitative research. The data used are primary data and secondary data. The results of the study resulted: The fiqh learning model during the covid-19 pandemic changed into an online learning model. Online fiqh learning is carried out with the help of several digital media such as e-learning, Google Meet, Google Classroom, Whatsapp group, Quizizz, Camtasia studio, and Renderforest as well as the availability of madrasa digital libraries to support maximum learning. The teacher provides materials and assignments through the application. Then students deposit the results of their assignments through the application or via e-mail. The application of this online learning model has supporting and inhibiting factors that must be addressed wisely by all authorized parties, in this case teachers, students, parents, and schools, so that learning objectives are achieved optimally
Digital maturity variables and their impact on the enterprise architecture layers
This study examines the variables of digital maturity of companies. The framework for enterprise architectures Archimate 3.0 is used to compare the variables. The variables are assigned to the six layers of architecture: Strategy, Business Environment, Applications, Technology, Physical and Implementation and Migration. On the basis of a literature overview, 15 âdigital maturity modelsâ with a total of 147 variables are analyzed. The databases Scopus, EBSCO â Business Source Premier and ProQuest are used for this purpose
spotlight no. 5, 2018 - #SmartHealthSystems Digitalization requires an effective strategy, compelling political leadership and a coordinating institution with a national mandate
In terms of digitalizing its healthcare sector, Germany trails far behind
several other countries as the potential for quality and efficiency in German
healthcare remains untapped
ââ Countries that are succeeding in digitalizing their healthcare systems feature
an effective strategy, political leadership and a coordinating institution with
a national mandate
ââ Taking pragmatic steps that are driven by the expected benefits for patients
and the healthcare stem alike is key to shaping digital transformation
positively
ââ Promoting acceptance through strategies such as co-design measures is
essential to success
ââ German health politics must take on a stronger pro-active role and strengthen
its leadership in this are
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge
The Internet of Things (IoT) triggers new types of cyber risks. Therefore,
the integration of new IoT devices and services requires a self-assessment of
IoT cyber security posture. By security posture this article refers to the
cybersecurity strength of an organisation to predict, prevent and respond to
cyberthreats. At present, there is a gap in the state of the art, because there
are no self-assessment methods for quantifying IoT cyber risk posture. To
address this gap, an empirical analysis is performed of 12 cyber risk
assessment approaches. The results and the main findings from the analysis is
presented as the current and a target risk state for IoT systems, followed by
conclusions and recommendations on a transformation roadmap, describing how IoT
systems can achieve the target state with a new goal-oriented dependency model.
By target state, we refer to the cyber security target that matches the generic
security requirements of an organisation. The research paper studies and adapts
four alternatives for IoT risk assessment and identifies the goal-oriented
dependency modelling as a dominant approach among the risk assessment models
studied. The new goal-oriented dependency model in this article enables the
assessment of uncontrollable risk states in complex IoT systems and can be used
for a quantitative self-assessment of IoT cyber risk posture
Impacts for m-Internet applications and perspectives in agriculture
Mobile communication and the mobile Internet can provide important opportunities,
economic advantages for enterprises end organisations and support their more efficient
operating as they can use it anytime and anywhere.
We can make their wide spread usage, innovation effect and advantages economical way if
we consider the effect system of technologies and services. The technological, social and
economical complex effect system puts pressure on spreading of business applications. The
types of applicable equipment are increasing.
There can be found four player groups according to social aspects: manufacturers, enterprises,
customers and workers. The Internet technology and the Internet network have become
essential communication tools in business processes recently. Using the Internet by means of
mobile appliances increases the possibilities.
If we study the business process the expenses, advantages, disadvantages can be seen well.
Nowadays these applications are more and more successful in the following areas such as in
agriculture, in different parts of food industry, in extension services, precision agriculture,
logistics
Insta-Appropriation: Finding Boundaries for the Second Circuitâs Fair Use Doctrine After Campbell
Copyright lawâs current fair use landscape is riddled with unclear standards and old considerations forced upon new media. This is especially problematic in the context of digital appropriation of art from online social media platformsâan issue highlighted by Richard Princeâs exhibit âNew Portraits,â in which he appropriated strangersâ Instagram photos for his own profit. Unless this situation is remedied, digital content creators will effectively lose their statutory copyright protections. Thus, when considering digital appropriation cases, courts should require a transformation of content rather than purpose, should elevate the weight of the fourth statutory factor, and should reinstate the âcomment uponâ standard for works of parody and satire. Other scholars have proposed changes to the fair use doctrine, but none adequately protect first-order digital content creators. As such, this Note proposes a reinterpretation of the fair use factors in light of digital appropriation and social media
Insta-Appropriation: Finding Boundaries for the Second Circuitâs Fair Use Doctrine After Campbell
Copyright lawâs current fair use landscape is riddled with unclear standards and old considerations forced upon new media. This is especially problematic in the context of digital appropriation of art from online social media platformsâan issue highlighted by Richard Princeâs exhibit âNew Portraits,â in which he appropriated strangersâ Instagram photos for his own profit. Unless this situation is remedied, digital content creators will effectively lose their statutory copyright protections. Thus, when considering digital appropriation cases, courts should require a transformation of content rather than purpose, should elevate the weight of the fourth statutory factor, and should reinstate the âcomment uponâ standard for works of parody and satire. Other scholars have proposed changes to the fair use doctrine, but none adequately protect first-order digital content creators. As such, this Note proposes a reinterpretation of the fair use factors in light of digital appropriation and social media
- âŠ