224,008 research outputs found

    Hierarchical Model of Problems in Implementing Information Systems

    Get PDF
    There is a lot of literature about implementing information systems and numbers of papers describe failures and successes in implementations. Problems impede successful outcomes of information system projects, influencing e.g. on the interaction between project parties or on the learning process, slowing it down and killing time. Problems in implementing information systems are connected with risks and accident models can be used to describe causes of failure. This paper describes how a hierarchical accident model is a suitable framework when modeling information system failures. This study presents findings in literature and empirical experiences concerning problems. The empiric case comes from the university world where several universities acted as one client, taking into pilot use a common information system to support student mobility between the universities

    On Secure Workflow Decentralisation on the Internet

    Get PDF
    Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment

    Development of the Integrated Model of the Automotive Product Quality Assessment

    Get PDF
    Issues on building an integrated model of the automotive product quality assessment are studied herein basing on widely applicable methods and models of the quality assessment. A conceptual model of the automotive product quality system meeting customer requirements has been developed. Typical characteristics of modern industrial production are an increase in the production dynamism that determines the product properties; a continuous increase in the volume of information required for decision-making, an increased role of knowledge and high technologies implementing absolutely new scientific and technical ideas. To solve the problem of increasing the automotive product quality, a conceptual structural and hierarchical model is offered to ensure its quality as a closed system with feedback between the regulatory, manufacturing, and information modules, responsible for formation of the product quality at all stages of its life cycle. The three module model of the system of the industrial product quality assurance is considered to be universal and to give the opportunity to explore processes of any complexity while solving theoretical and practical problems of the quality assessment and prediction for products for various purposes, including automotive

    Towards Design Principles for Data-Driven Decision Making: An Action Design Research Project in the Maritime Industry

    Get PDF
    Data-driven decision making (DDD) refers to organizational decision-making practices that emphasize the use of data and statistical analysis instead of relying on human judgment only. Various empirical studies provide evidence for the value of DDD, both on individual decision maker level and the organizational level. Yet, the path from data to value is not always an easy one and various organizational and psychological factors mediate and moderate the translation of data-driven insights into better decisions and, subsequently, effective business actions. The current body of academic literature on DDD lacks prescriptive knowledge on how to successfully employ DDD in complex organizational settings. Against this background, this paper reports on an action design research study aimed at designing and implementing IT artifacts for DDD at one of the largest ship engine manufacturers in the world. Our main contribution is a set of design principles highlighting, besides decision quality, the importance of model comprehensibility, domain knowledge, and actionability of results

    Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration

    Get PDF
    There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems ‘expose’ relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT)
    corecore