44 research outputs found

    Software Development for Mobile Computing, the Internet of Things and Wearable Devices: Inspecting the Past to Understand the Future

    Get PDF
    Currently a convergence in software development for mobile computing (including mobile devices and special technology such as wearables) and the Internet of Things (IoT) can be observed. Devices from the fields are becoming part of a joint ecosystem and share the same infrastructure. Moreover, development processes have changed and user requirements have become very heterogeneous. We have been studying this development for a while, also by offering the fitting HICSS minitrack. In this article, we look into the past of software development for mobile devices, in the context of IoT, and for wearables. We analyse joint characteristics and show differences. Then we invite to a discussion that leads to a research outlook. While neither for industry nor for academia the journey is over, the convergence of fields should offer many new possibilities, prevent problems we faced in the past, but also introduce novel challenges

    Literature Review on Blockchain with focus on Supply Chain

    Get PDF
    In order to understand the applicability of Blockchain technology to Supply Chain, this paper reviews the available literature published within the AISNET’s basket of eight journals on the topic Blockchain and a list of selected top IS conferences. One observation in the results is that authors have been giving more importance to areas related to either fintech or cryptocurrencies. Nevertheless, other applications of blockchain technologies are being approached by these authors. Since the area of focus of this paper relates to Supply Chain, the refinement process of the results, consisted on filtering out those observations. Hence the approach consists on the research and review of all available publications with the utilization of a unique interpretation framework and focus on the avenues of research provided by these articles. Gathering information in order to create discussion debates, grouped by the unit of analysis identified, within Supply Chain

    A model for describing and maximising Security Knowledge Sharing to enhance security awareness

    Get PDF
    Employees play a crucial role in enhancing information security in the workplace, and this requires everyone having the requisite security knowledge and know-how. To maximise knowledge levels, organisations should encourage and facilitate Security Knowledge Sharing (SKS) between employees. To maximise sharing, we need first to understand the mechanisms whereby such sharing takes place and then to encourage and engender such sharing. A study was carried out to test the applicability of Transactive Memory Systems Theory in describing knowledge sharing in this context, which confirmed its applicability in this domain. To encourage security knowledge sharing, the harnessing of Self-Determination Theory was proposed— satisfying employee autonomy, relatedness and competence needs to maximise sharing. Such sharing is required to improve and enhance employee security awareness across organisations. We propose a model to describe the mechanisms for such sharing as well as the means by which it can be encouraged

    Psychological Profiling of Hacking Potential

    Get PDF
    This paper investigates the psychological traits of individuals’ attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. We examine the role of the Dark Triad, Opposition to Authority and Thrill-Seeking traits as regards the propensity of an individual to be interested in White Hat, Black Hat, and Grey Hat hacking. A new set of scales were developed to assist in the delineation of the three hat categories. We also developed a scale to measure each subject’s perception of the probability of being apprehended for violating privacy laws. Engaging in criminal activity involves a choice where there are consequences and opportunities, and individuals perceive them differently, but they can be deterred if there is a likelihood of punishment, and the punishment is severe. The results suggest that individuals that are White Hat, Grey Hat and Black Hat hackers score high on the Machiavellian and Psychopathy scales. We also found evidence that Grey Hatters oppose authority, Black Hatters score high on the thrill-seeking dimension and White Hatters, the good guys, tend to be Narcissists. Thrill-seeking was moderately important for White Hat hacking and Black hat hacking. Opposition to Authority was important for Grey Hat hacking. Narcissism was not statistically significant in any of the models. The probability of being apprehended had a negative effect on Grey Hat and Black Hat hacking. Several suggestions will be made on what organizations can do to address insider threats

    From Hype to Reality: A Taxonomy of Blockchain Applications

    Get PDF
    Blockchain is a decentralized digital ledger that challenges existing business models and theories by shifting the trust from institutions towards algorithms. However, the number of successfully developed blockchain-based systems remains low. This points towards a research gap between blockchain applications and technical blockchain characteristics. We answer the research question: What application areas fit blockchains with what technical characteristics? We develop a taxonomy, which comprises six blockchain application areas that are classified across eight technical dimensions. We demonstrate the utility of the taxonomy on ninety-nine blockchain-based systems. We contribute to the scientific literature by delimiting blockchain application areas, identifying new technical dimensions, and linking application and technical knowledge on blockchain to guide development of blockchain-based systems. For practitioners, we present an overview of current blockchain-based systems

    Examining potential benefits and challenges associated with the Internet of Things integration in supply chains

    Get PDF
    Purpose The Internet of Things (IoT) is expected to have a huge impact on businesses and, especially, the way we think about supply chain management. However, there is still a paucity of studies on the impact of IoT adoption on supply chains and on different aspects of the business in general. The research aims to examine the perception of the academic community of the impact of the Internet of Things (IoT) adoption in organizational supply chains with a view to verify potential key benefits and challenges existent in the literature. The research presents the impact on an organization along with the impact across its entire supply chain. Design/methodology/approach Data was collected through the use of an online survey and 87 participants completed the survey. Participants were mainly from the academic community and were university scholars based in different countries located in six continents. Participants were authors, or co-authors, of academic papers published in the Decision Science Institute 2015 and 2016 annual conference proceedings, the 21st International Symposium of Sustainable Transport and Supply Chain Innovations, the Supply Chain Management : An International Journal 2016 issues, and the Operations and Supply Chain Management : an International Journal 2016 issues. Findings We were able to confirm the significance of some of the examined potential benefits to individual organizations and their entire supply chains. However, the study identified other potential benefits that were not seen as a direct impact of IoT adoption. Most of the examined potential benefits were found to contribute to a number of critical success factors for implementing successful supply chain management. We were also able to confirm that some of the examined potential challenges were still perceived as key hinders to IoT adoption but examined potential challenges were not seen as hurdles to IoT adoption. Originality/value To our best knowledge, this is the first study of its kind. Although some literature attempted to provide an overview about the IoT management, no study has specifically explored potential benefits and challenges related to the adoption of IoT in supply chains and ranked them based on their significance. The results can be beneficial to; academic scholars interested in the researched topic, business professionals, organizations within different sectors, and any other party interested in understanding more about the impact of adopting IoT on supply chain management

    Identifying the drivers of blockchain adoption within supply chains

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Data Science and Advanced AnalyticsIn order to understand the applicability of blockchain technology to Supply Chains, this thesis intends to deliver insights on its adoption with a two-part study, that combines a literature review and a theoretical framework where adoption drivers are identified. The approach consists on the research and review of all available publications published within the AISNET’s basket of eight journals on the topic Blockchain and a list of selected top IS conferences, with the utilization of a unique interpretation framework and focus on the avenues of research provided by these articles, gathering information in order to create discussion debates, grouped by the unit of analysis identified, within Supply Chain. Following the Design Science Research (DSR) methodology and focusing on defining, validating and reducing a myriad of factors, derived from the literature review, with the aid of experts on both blockchain and supply chain fields, through means of questionnaires, factors were rated and refuted according to the relevance given. Two rounds narrowed the results, and upon consensus 9 drivers were identified fitting under two categories: Challenges and Incentives. Overall, providing academics with a theoretical framework that combines existing literature into a set of drivers, and providing insights to vendors on how their reputation may influence clients' adoption, whilst fulfilling a literature gap in the supply chain area
    corecore