12,171 research outputs found
Transmission losses cost allocation in restructed electricity market environment
During these recent decades, the restructuring system of electricity market
has been taken places around the whole world. Due to the restructuring
(deregulation), the electrical power system has been divided into three separates
categories according to the function. First stage of power system is the generation
companies (GENCOs), followed by transmission companies (TRANSCOs) and
distribution companies (DISCOs). The competitive environment will be handling by
a non-profit entity, independent system operator (ISO) that functioning as the system
securities that have to make sure that the power system continues to operate in a
stable and economical manner. However, restructuring system can give effect during
the energy transmission. One of the transmission issues is regarding the power
losses. To overcome the losses, generators must generate more power. The issue
regarding the transmission losses in deregulated system is how to allocate it to the
user and charge them in fair ways as in for instance the pool trading model, it is hard
to trace the power contribution and losses of each user in transmission line. In
addition, the users didn’t want to pay the losses, it means that the ISO have to
responsible for the losses and it will be unfair to put the responsible to ISO alone.
Therefore, in this project, the allocation of transmission losses and loss cost methods
which are the pro-rata and proportional sharing method will be investigated.
Comparison between those methods will be done in order to identify which types of
method that reflect an efficient and fair way to distribute the cost of the transmission
losses to the user. These chosen methods will be tested on IEEE bus system
Risks and Audit Objectives for IT Outsourcing
In the recent years, as a result of globalization, internet and IT progress, the outsourcing of IT services has seen an exponential growth. As a result more and more companies decide to outsource, partially or totally, their IT services. Nevertheless, the outsourcing process exposes both clients and service providers to a series of risks that can seriously affect their activities. Managing these risks by improving the quality and efficiency of internal control has made the ITO audit a necessary component for all the companies involved in this process. The goal of this paper is to identify analyze and map the influence areas of ITO risks in order to suggest a series of objectives for ITO audit.Information Technology, Outsourcing, Audit, Risks, Service Provider
Narratives of an outsourced information systems failure in a small enterprise
In this study we investigate a case of an outsourced information systems (IS) failure (OISF) within the collaborative partnership among asymmetric partners. A small and medium-sized enterprise (SME) is dealing with an independent software vendor (ISV) conducting a project of implementing an IS that fails. We used a narrative research methodology for our enquiry. In the construction of our narrative we followed the OISF framework as a theoretical touchstone. As a major conclusion we found that asymmetric collaborations with partners with inadequate managerial and technical IT capabilities are extremely prone to OISF’s. We showed that an outcome-based and fixed price contract is not an adequate instrument to conduct such a partnership and to avoid a failure
Narratives of an outsourced information systems failure in a small enterprise
In this study we investigate a case of an outsourced information systems (IS) failure (OISF) within the collaborative partnership among asymmetric partners. A small and medium-sized enterprise (SME) is dealing with an independent software vendor (ISV) conducting a project of implementing an IS that fails. We used a narrative research methodology for our enquiry. In the construction of our narrative we followed the OISF framework as a theoretical touchstone. As a major conclusion we found that asymmetric collaborations with partners with inadequate managerial and technical IT capabilities are extremely prone to OISF’s. We showed that an outcome-based and fixed price contract is not an adequate instrument to conduct such a partnership and to avoid a failure
Recommended from our members
Outsourcing information systems: Drawing lessons from a banking case study
Financial and costs benefits are often put forward as the reasons why organisations decide to outsource.
Emerging patterns and trends indicate that today’s outsourcing decisions are often motivated by factors
other than cost. Thus, the decision-making process is more complex than it may at first appear. This paper
presents findings from a case study from an organisation in the UK banking sector that was motivated to
outsource aspects of its information technology/information system (IT/IS). The underlying motives and
decision-making process that influenced the bank outsource its IT/IS are presented and discussed. Findings
from the case study suggest political perspectives, as well as human and organisational issues influenced
the bank’s strategic decision-making to outsource certain aspects of its business. An examination of the
case study findings suggests that cost alone is not always responsible for decisions to outsource, as it was
found the bank’s outsourcing decision was driven by a series of complex, interrelated motives in a bid to
reduce the risks and uncertainties of managing its own technology. Considering the complex nature of the
outsourcing process a frame of reference that can be used to assist managers with their decision to outsource
IT/IS is propagated. The case study is used to present an organisation’s experiences as to how and why it
decided to outsource its IS and thus offers a learning opportunity for other organisations facing similar
difficulties. In addition, the case study findings highlight the need to focus greater attention on discriminating
between the short and long-term consequences of IT/IS decision-makin
Managing the outsourcing of information security processes: the 'cloud' solution
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we discuss whether cloud computing is a valid alternative to in-house security processes and systems drawing on four mini-case studies of higher education institutions in New England, US. Our findings show that the organization’s IT spending capacity affects the choice to move to the cloud; however, the perceived security of the cloud and the perceived in-house capacity to provide high quality IT (and security) services moderate this relationship. Moreover, other variables such as (low) quality of technical support, relatively incomplete contracts, poor defined Service License Agreements (SLA), and ambiguities over data ownership affect the choice to outsource IT (and security) using the cloud. We suggest that, while cloud computing could be a useful means of IT outsourcing, there needs to be a number of changes and improvements to how the service is currently delivered
Internet of things security implementation using blockchain for wireless technology
Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform
Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin
A2THOS: Availability Analysis and Optimisation in SLAs
IT service availability is at the core of customer satisfaction and business success for today’s organisations. Many medium-large size organisations outsource part of their IT services to external providers, with Service Level Agreements describing the agreed availability of outsourced service components. Availability management of partially outsourced IT services is a non trivial task since classic approaches for calculating availability are not applicable, and IT managers can only rely on their expertise to fulfil it. This often leads to the adoption of non optimal solutions. In this paper we present A2THOS, a framework to calculate the availability of partially outsourced IT services in the presence of SLAs and to achieve a cost-optimal choice of availability levels for outsourced IT components while guaranteeing a target availability level for the service
- …