11 research outputs found

    Internet of Things (IoT) and Changing Face of Project Management

    Get PDF
    Internet of Things (IoT) or Industrial Internet is a modern day catchword, which over the past few years has tremendously impacted numerous aspects of almost-all the advanced technology fields. IoT framework envisions transforming the everyday objects into intelligent systems, while working under a common infrastructure and by connecting the global network of devices and machines over the internet. Based on many underlying interdisciplinary ecosystems, like sensor network, embedded systems, big data platforms, cloud computing and service-oriented architecture; IoT projects are non-traditional in many ways. Such projects involve research and development phase, more technical work, are lengthy, require advanced skill sets and lacks well-defined business models. A recent alarming rate of IoT project failures provide incentive to look for project management philosophies, which would emphasize on more flexibility, agility, teamwork and a developing a strong technical framework. This thesis work provides overview of IoT concepts and through a systematic review of scholarly research papers, blogs, review articles, and other literature available online, it addresses the current managerial challenges for such projects. Finally, to solve this issue a focused survey was conducted and collected data was analyzed. Based on the responses from IoT professionals various suggestions are made, which can be used to improve management of such projects

    A Review of Scaling Agile Methods in Large Software Development

    Full text link

    Parental Perspectives on Twenty-First Century Learning Environments in Private Middle Schools: A Phenomenological Study

    Get PDF
    Over the last decade instructional technology has experienced tremendous growth in adoption and implementation throughout K-12 schools; pedagogy has shifted to keep pace. Within this growth of technological and pedagogical adoption and implementation a lag has emerged. While teachers and administrators have worked hard to maintain the pace with regard to changes, a major stakeholder (i.e. the parents), have struggled to keep up. The purpose of this transcendental phenomenological study was to better understand the experiences of parents with middle school students enrolled in private, twenty-first century learning model/technology-rich ACSI schools in South Florida. The theory guiding this study was Schlossberg’s transition theory as it addresses the progression of parents from elementary through middle school and on to high school. Participants in this study included parents of middle school students enrolled in technology-rich ACSI schools in South Florida. Phenomenological analysis identified common four themes across four schools, Socio-economic levels, and degree attainment levels. These were: Technology change & strategic consideration, parental control, parental isolation, and parent pacing. Implications for the research suggested that improved communication and more granular approach by schools in reaching out to parents could have a significant positive impact parents experiences. Recommendations for future research are provided

    Smart Service Innovation: Organization, Design, and Assessment

    Get PDF
    Background: The emergence of technologies such as the Internet of Things, big data, cloud computing, and wireless communication drives the digital transformation of the entire society. Organizations can exploit these potentials by offering new data-driven services with innovative value propositions, such as carsharing, remote equipment maintenance, and energy management services. These services result from value co-creation enabled by smart service systems, which are configurations of people, processes, and digital technologies. However, developing such systems was found to be challenging in practice. This is mainly due to the difficulties of managing complexity and uncertainty in the innovation process, as contributions of various actors from multiple disciplines must be coordinated. Previous research in service innovation and service systems engineering (SSE) has not shed sufficient light on the specifics of smart services, while research on smart service systems lacks empirical grounding. Purpose: This thesis aims to advance the understanding of the systematic development of smart services in multi-actor settings by investigating how smart service innovation (SSI) is conducted in practice, particularly regarding the participating actors, roles they assume, and methods they apply for designing smart service systems. Furthermore, the existing set of methods is extended by new methods for the design-integrated assessment of smart services and service business models. Approach: Empirical and design science methods were combined to address the research questions. To explore how SSI is conducted in practice, 25 interviews with experts from 13 organizations were conducted in two rounds. Building on service-dominant logic (SDL) as a theoretical foundation and a multi-level framework for SSI, the involvement of actors, their activities, employed means, and experienced challenges were collected. Additionally, a case study was used to evaluate the suitability of the Lifecycle Modelling Language to describe smart service systems. Design science methods were applied to determine a useful combination of service design methods and to build meta-models and tools for assessing smart services. They were evaluated using experiments and the talk aloud method. Results: On the macro-level, service ecosystems consist of various actors that conduct service innovation through the reconfiguration of resources. Collaboration of these actors is facilitated on the meso-level within a project. The structure and dynamics of project configurations can be described through a set of roles, innovation patterns, and ecosystem states. Four main activities have been identified, which actors perform to reduce uncertainty in the project. To guide their work, actors apply a variety of means from different disciplines to develop and document work products. The approach of design-integrated business model assessment is enabled through a meta-model that links qualitative aspects of service architectures and business models with quantitative assessment information. The evaluation of two tool prototypes showed the feasibility and benefit of this approach. Originality / Value: The results reported in this thesis advance the understanding of smart service innovation. They contribute to evidence-based knowledge on service systems engineering and its embedding in service ecosystems. Specifically, the consideration of actors, roles, activities, and methods can enhance existing reference process models. Furthermore, the support of activities in such processes through suitable methods can stimulate discussions on how methods from different disciplines can be applied and combined for developing the various aspects of smart service systems. The underlying results help practitioners to better organize and conduct SSI projects. As potential roles in a service ecosystem depend on organizational capabilities, the presented results can support the analysis of ex¬ternal dependencies and develop strategies for building up internal competencies.:Abstract iii Content Overview iv List of Abbreviations viii List of Tables x List of Figures xii PART A - SYNOPSIS 1 1 Introduction 2 1.1 Motivation 2 1.2 Research Objectives and Research Questions 4 1.3 Thesis Structure 6 2 Research Background 7 2.1 Smart Service Systems 7 2.2 Service-Dominant Logic 8 2.3 Service Innovation in Ecosystems 11 2.4 Systematic Development of Smart Service Systems 13 3 Research Approach 21 3.1 Research Strategy 21 3.2 Applied Research Methods 22 4 Summary of Findings 26 4.1 Overview of Research Results 26 4.2 Organizational Setup of Multi-Actor Smart Service Innovation 27 4.3 Conducting Smart Service Innovation Projects 32 4.4 Approaches for the Design-integrated Assessment of Smart Services 39 5 Discussion 44 5.1 Contributions 44 5.2 Limitations 46 5.3 Managerial Implications 47 5.4 Directions for Future Research 48 6 Conclusion 54 References 55 PART B - PUBLICATIONS 68 7 It Takes More than Two to Tango: Identifying Roles and Patterns in Multi-Actor Smart Service Innovation 69 7.1 Introduction 69 7.2 Research Background 72 7.3 Methodology 76 7.4 Results 79 7.5 Discussion 90 7.6 Conclusions and Outlook 96 7.7 References 97 8 Iterative Uncertainty Reduction in Multi-Actor Smart Service Innovation 100 8.1 Introduction 100 8.2 Research Background 103 8.3 Research Approach 109 8.4 Findings 113 8.5 Discussion 127 8.6 Conclusions and Outlook 131 8.7 References 133 9 How to Tame the Tiger – Exploring the Means, Ends, and Challenges in Smart Service Systems Engineering 139 9.1 Introduction 139 9.2 Research Background 140 9.3 Methodology 143 9.4 Results 145 9.5 Discussion and Conclusions 151 9.6 References 153 10 Combining Methods for the Design of Digital Services in Practice: Experiences from a Predictive Costing Service 156 10.1 Introduction 156 10.2 Conceptual Foundation 157 10.3 Preparing the Action Design Research Project 158 10.4 Application and Evaluation of Methods 160 10.5 Discussion and Formalization of Learning 167 10.6 Conclusion 169 10.7 References 170 11 Modelling of a Smart Service for Consumables Replenishment: A Life Cycle Perspective 171 11.1 Introduction 171 11.2 Life Cycles of Smart Services 173 11.3 Case Study 178 11.4 Discussion of the Modelling Approach 185 11.5 Conclusion and Outlook 187 11.6 References 188 12 Design-integrated Financial Assessment of Smart Services 192 12.1 Introduction 192 12.2 Problem Analysis 195 12.3 Meta-Model Design 200 12.4 Application of the Meta-Model in a Tool Prototype 204 12.5 Evaluation 206 12.6 Discussion 208 12.7 Conclusions 209 12.8 References 211 13 Towards a Cost-Benefit-Analysis of Data-Driven Business Models 215 13.1 Introduction 215 13.2 Conceptual Foundation 216 13.3 Methodology 218 13.4 Case Analysis 220 13.5 A Cost-Benefit-Analysis Model for DDBM 222 13.6 Conclusion and Outlook 225 13.7 References 226 14 Enabling Design-integrated Assessment of Service Business Models Through Factor Refinement 228 14.1 Introduction 228 14.2 Related Work 229 14.3 Research Goal and Method 230 14.4 Solution Design 231 14.5 Demonstration 234 14.6 Discussion 235 14.7 Conclusion 236 14.8 References 23

    A Secure and Strategic Approach to Keep IoT Devices Safe from Malware Attack

    Get PDF
    Through the advances in technology, businesses can now utilize the Internet of Things (IoT) devices to improve workflow and provide better services to customers. However, without a strategy to secure these devices, Information Technology (IT) security professionals are left with vulnerable equipment. Grounded in routine activities theory, the purpose of this qualitative multiple case study was to determine strategies IT security professionals used to protect IoT devices in their environment. The participants were 6 IT professionals from 2 medium to large size healthcare facilities based in the Buffalo, New York, and the Washington D.C. area, who possessed strategies to protect IoT devices. The data collection included semi-structured interviews and analysis of 7 industry standardization documents and 12 business documents. Data were analyzed using cluster analysis; four themes that emerged included user education to promote security, protect the environment through security layers, a policy that supports security, and threats that the technical gaps present. A key recommendation is that IT security professionals develop a security strategy that uses multiple layers to protect IoT devices from malware attacks. The implications for positive social change include the potential for IT security professionals to implement multi-layered IoT security strategies, which can help decrease attacks on vulnerable IoT devices and assure citizens of protecting their data

    Representación formal de mejores prácticas de IoT con base en los elementos del núcleo de la Esencia SEMAT

    Get PDF
    Internet de las Cosas (IoT) es una tecnología que consta de una serie de entidades interconectadas (objetos físicos inteligentes, servicios y sistemas de software) que trabajan de manera coordinada. Con ellas se busca simplificar y mejorar la eficiencia de los procesos buscando una mejor calidad de vida para las personas. En la literatura especializada se encontró que existen prácticas para desarrollar sistemas IoT que utilizan modelos monolíticos de Ingeniería de Software y que no son fáciles de implementar. Es necesario plantear una base común a través de una representación explícita que permita abarcar todas las problemáticas que puedan resultar al tratar de implementar estas prácticas. El objetivo de este proyecto es formalizar algunas de las mejores prácticas de IoT utilizando la extracción terminológica y teniendo como base de representación el núcleo de la Esencia de SEMAT (Software Engineering Method and Theory), el cual permite describir una base común liberando a las prácticas de las limitaciones de los métodos monolíticos. Esto permitirá a los equipos de implementación de sistemas IoT visualizar el progreso de las actividades independientemente de los métodos de trabajo, también permitirá compartir, adaptar, conectar y reproducir prácticas para crear nuevas formas de trabajo que ayudará a los desarrolladores a reutilizar sus conocimientos de forma sistemática y a los ejecutivos a dirigir programas y proyectos IoT con una mejor calidad que permitan reducir costos.Internet of Things (IoT) is a technology that consists of a series of interconnected entities (intelligent physical objects, services and software systems) that work in a coordinated manner. They seek to simplify and improve the efficiency of processes seeking a better quality of life for people. In the specialized literature, it was found that there are practices to develop IoT systems that use monolithic Software Engineering models and that are not easy to implement. It is necessary to establish a common base through a clean representation that allows covering all the problems that may result when trying to implement these practices. The objective of this project is to formalize some of the best practices of IoT using terminological extraction and having as a basis of representation the core of the Essence of SEMAT (Software Engineering Method and Theory) which allows to describe a common base freeing the practices of the limitations of monolithic methods. This will allow IoT system implementation teams to visualize the progress of activities regardless of work methods, it will also allow sharing, adapting, connecting and reproducing practices to create new ways of working that will help developers to systematically reuse their knowledge in a new way and executives to direct IoT programs and projects with better quality that reduce costs.MaestríaMagíster en Ingeniería de Sistemas y ComputaciónTabla de Contenido Pág. Resumen....................................................................................................................................... 16 Abstract........................................................................................................................................ 17 Introducción ................................................................................................................................ 18 Capítulo I: Marco Teórico ......................................................................................................... 21 1.1. Internet de las Cosas (IoT)..................................................................................................... 21 1.1.1. Arquitectura IoT.................................................................................................................. 21 1.1.1.1. Capa de percepción.......................................................................................................... 21 1.1.1.2. Capa de red ...................................................................................................................... 21 1.1.1.3. Capa de aplicación ........................................................................................................... 22 1.1.2. Aplicaciones de IoT............................................................................................................ 22 1.2. Ingeniería de Software ........................................................................................................... 22 1.2.1. Núcleo de la Esencia de SEMAT........................................................................................ 22 1.2.1.1. Elementos del Núcleo de la Esencia de SEMAT............................................................. 23 1.3. Buenas Prácticas .................................................................................................................... 29 1.3.1. Nombramiento correcto de buenas prácticas...................................................................... 29 1.4. Procesamiento del Lenguaje Natural (PLN).......................................................................... 31 1.4.1. Extracción Terminológica................................................................................................... 31 1.5. Revisión Sistemática de Literatura (RSL) ............................................................................. 33 1.6. Mapeo Sistemático de Literatura (MSL) ............................................................................... 33 1.7. Grupos focales ....................................................................................................................... 34 Capítulo II: Estado del Arte ...................................................................................................... 35 Capítulo III: Planteamiento del Problema y Objetivos........................................................... 38 3.1. Descripción del Problema ...................................................................................................... 38 7 3.2. Formulación del Problema..................................................................................................... 38 3.3. Justificación ........................................................................................................................... 39 3.4. Objetivos................................................................................................................................ 41 3.4.1. Objetivo General................................................................................................................. 41 3.4.2. Objetivos Específicos.......................................................................................................... 41 Capítulo IV: Metodología .......................................................................................................... 42 4.1. Revisión Sistemática de Literatura (RSL) ............................................................................. 42 4.1.1. Planeación........................................................................................................................... 42 4.1.1.1. Definición de las Preguntas de la Investigación .............................................................. 43 4.1.2. Búsqueda Primaria .............................................................................................................. 43 4.1.2.1. Especificación del Tipo de Búsqueda .............................................................................. 43 4.1.2.2. Selección de las Fuentes de Información......................................................................... 44 4.1.2.3. Definición de las Cadenas de Búsqueda .......................................................................... 44 4.1.3. Selección Preliminar........................................................................................................... 44 4.1.3.1. Eliminación de Documentos Irrelevantes........................................................................ 44 4.1.3.2. Eliminación de Documentos Duplicados......................................................................... 44 4.1.4. Selección............................................................................................................................. 45 4.1.4.1. Definición de criterios de inclusión ................................................................................. 45 4.1.4.2. Definición de criterios de exclusión ................................................................................ 45 4.1.5. Extracción de Datos............................................................................................................ 45 4.1.5.1. Definición de Criterios de Calidad .................................................................................. 45 4.1.5.2. Extracción de Datos de cada Documento ........................................................................ 45 4.1.6. Análisis ............................................................................................................................... 45 4.2. Relación de los Componentes de Mejores Prácticas en IoT con los elementos del núcleo de la Esencia ..................................................................................................................................... 45 8 4.2.1. Selección de algunas de las Mejores Prácticas en IoT........................................................ 46 4.2.2. Construcción del Vocabulario de Términos de IoT............................................................ 46 4.2.2.1. Mapeo Sistemático de Literatura (MSL) ......................................................................... 46 4.2.2.2. Construcción del Extractor Automático de Términos ..................................................... 48 4.2.2.3. Validación del Extractor Automático de Términos......................................................... 48 4.2.2.4. Extracción del Vocabulario con el Extractor Automático de Términos.......................... 49 4.2.3. Selección de los Nombres para Mejores Prácticas en IoT.................................................. 49 4.2.4. Tabulación de Componentes de Prácticas IoT con Elementos del Núcleo de la Esencia... 49 4.3. Modelado de Mejores Prácticas en IoT con el Núcleo de la Esencia .................................... 49 4.4. Validación de los Modelos de Mejores Prácticas en IoT....................................................... 51 4.4.1. Planeación del Grupo Focal................................................................................................ 51 4.4.2. Desarrollo del Grupo Focal................................................................................................. 52 4.4.3. Análisis de Datos y Reporte de Resultados ........................................................................ 53 Capítulo V: Desarrollo de la Tesis............................................................................................. 54 5.1. Revisión Sistemática de Literatura (RSL) en IoT.................................................................. 54 5.1.1. Conclusiones de la Revisión Sistemática de Literatura ...................................................... 55 5.2. Relación de los Componentes de Mejores Prácticas en IoT con los elementos del núcleo de la Esencia ...................................................................................................................................... 57 5.2.1. Selección de algunas de las Mejores Prácticas en IoT........................................................ 57 5.2.2. Construcción del Vocabulario de Términos de IoT............................................................ 58 5.2.2.1. Mapeo Sistemático de Literatura (MSL) ......................................................................... 59 5.2.2.2. Construcción del Extractor Automático de Términos ..................................................... 72 5.2.2.3. Validación del Extractor Automático de Términos......................................................... 88 5.2.2.4. Extracción del Vocabulario con el Extractor Automático de Términos.......................... 89 5.2.3. Selección de los Nombres para Mejores Prácticas en IoT.................................................. 89 9 5.2.4. Tabulación de Componentes de Prácticas IoT con el Núcleo de la Esencia ...................... 90 5.3. Modelado de Mejores Prácticas en IoT con el Núcleo de la Esencia .................................. 100 5.4. Validación de los Modelos de Mejores Prácticas en IoT..................................................... 110 5.4.1. Planeación del Grupo Focal.............................................................................................. 110 5.4.1.1. Definición del Objetivo.................................................................................................. 110 5.4.1.2. Identificación de los Participantes................................................................................. 111 5.4.1.3. Programación de la Reunión.......................................................................................... 111 5.4.1.4. Preparación de los Materiales del Grupo Focal ............................................................. 111 5.4.1.5. Enviar Recordatorio a los Participantes......................................................................... 112 5.4.2. Desarrollo del Grupo Focal............................................................................................... 112 5.4.2.1. Presentación de los Participantes................................................................................... 112 5.4.2.2. Grabación de la Reunión................................................................................................ 112 5.4.2.3. Entrega de Materiales .................................................................................................... 112 5.4.2.4. Presentación del Grupo Focal ........................................................................................ 113 5.4.2.5. Discusión y Evaluación de los Modelos........................................................................ 113 5.4.2.6. Finalización de la Reunión............................................................................................. 113 5.4.3. Análisis de Datos y Reporte de Resultados ...................................................................... 113 5.4.3.1. Resultados de Validación de la Práctica 1 ..................................................................... 113 5.4.3.2. Resultados de Validación de la Práctica 2 ..................................................................... 114 5.4.3.3. Resultados de Validación de la Práctica 3 ..................................................................... 114 5.4.3.4. Resultados de Validación de la Práctica 4 ..................................................................... 115 5.4.3.5. Resultados de Validación de la Práctica 5 ..................................................................... 115 5.4.3.6. Resultados de Validación de la Práctica 6 ..................................................................... 116 5.4.3.7. Resultados de Validación de la Práctica 7 ..................................................................... 116 10 5.4.3.8. Resultados de Validación de la Práctica 8 ..................................................................... 117 5.4.3.9. Resultados de Validación de la Práctica 9 ..................................................................... 117 5.4.3.10. Resultados de Validación de la Práctica 10 ................................................................. 118 5.4.3.11. Conclusiones de la Validación de los Modelos ........................................................... 118 Capítulo VI: Conclusiones y Trabajo Futuro ........................................................................ 120 6.1. Conclusiones........................................................................................................................ 120 6.2. Cumplimiento de Objetivos................................................................................................. 121 6.3. Trabajos Futuros .................................................................................................................. 124 Referencias ................................................................................................................................ 125 Anexos........................................................................................................................................ 15

    Strategies to Secure a Voice Over Internet Protocol Telephone System

    Get PDF
    Voice over internet protocol (VoIP) provides cost-effective phone service over a broadband internet connection rather than analog telephone services. While VoIP is a fast-growing technology, there are issues with intercepting and misusing transmissions, which are security concerns within telecommunication organizations and for customers. Grounded in the routine activity theory, the purpose of this multiple case study was to explore strategies information technology (IT) security managers used to secure VoIP telephone systems in telecommunication organizations. The participants consisted of nine IT security managers from three telecommunication organizations in New York who possessed the knowledge and expertise to secure a VoIP telephone system. The data were collected using semi structured interviews, note taking, and one document from one organization. Four themes emerged from the thematic analysis: best practices for VoIP security, using a secure VoIP provider, VoIP security recommendations, and awareness of future security concerns. A key recommendation for IT security professionals is to ensure encryption to secure a VoIP telephone system. The implications for positive social change include the potential for IT security managers and telecommunication organizations to reduce data breaches and the theft of their customers’ identities and credit card information

    Exploring Implementation Strategies of IoT Technology in Organizations: Technology, Organization, and Environment

    Get PDF
    AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders\u27 potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security documents. After using the thematic analysis for the data analysis process, six themes were identified: using all identified internal project staff skills, aligning current IoT technology with business needs, using all identified current internal infrastructure, using all identified external support technologies, taking full advantage of vendor support, and using all identified external influencers and influences. A key recommendation for IT leaders is to use the IoT ecosystem from the implemented IoT solutions to promote benefits and profits. The implications for positive social change include the potential to improve technology to support and encourage benefits to organizations and increase the number of organizations successfully implementing IoT technology. Businesses and end-users can benefit from the IoT ecosystem with IoT devices in smart cities, offices, hospitals, or homes
    corecore