48,682 research outputs found

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    Review of the environmental and organisational implications of cloud computing: final report.

    Get PDF
    Cloud computing – where elastic computing resources are delivered over the Internet by external service providers – is generating significant interest within HE and FE. In the cloud computing business model, organisations or individuals contract with a cloud computing service provider on a pay-per-use basis to access data centres, application software or web services from any location. This provides an elasticity of provision which the customer can scale up or down to meet demand. This form of utility computing potentially opens up a new paradigm in the provision of IT to support administrative and educational functions within HE and FE. Further, the economies of scale and increasingly energy efficient data centre technologies which underpin cloud services means that cloud solutions may also have a positive impact on carbon footprints. In response to the growing interest in cloud computing within UK HE and FE, JISC commissioned the University of Strathclyde to undertake a Review of the Environmental and Organisational Implications of Cloud Computing in Higher and Further Education [19]

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    Security threat probability computation using Markov Chain and Common Vulnerability Scoring System

    Full text link
    © 2018 IEEE. Security metrics have become essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative method, or compliance checking and this renders the outcome far from accurate. This paper proposes a novel approach to compute the probability distribution of cloud security threats based on Markov chain and Common Vulnerability Scoring System (CVSS). The paper gives an application on cloud systems to demonstrate the use of the proposed approach

    The national cloud computing strategy

    Get PDF
    Executive summary On 5 October 2012 the Prime Minister announced that the Australian Government would develop a National Cloud Computing Strategy. This announcement recognised the synergies between the National Broadband Network (NBN) and cloud computing, but also the important role for government in providing the tools that small business, individuals and government agencies need to realise the promise of cloud computing. This strategy has been developed in a partnership between government, industry and consumer groups and outlines a vision for cloud computing in Australia: Australians will create and use world-class cloud services to boost innovation and productivity across the digital economy. When organisations adopt cloud services, they are generally more productive, innovate better and operate with greater agility. As a nation, Australia is well placed to take advantage of cloud computing for a range of reasons—including a stable socio-economic system, a strong rule of law, and a highly diverse and skilled Information and Communications Technology (ICT) sector. At the individual level there are many organisations across the economy that have implemented innovative cloud computing services that have transformed the way they operate. However, as a group, Australian small business and not-for-profit organisations lag behind their counterparts in Organisation for Economic Co-operation and Development (OECD) countries in the use of online technology. This places these organisations at a competitive disadvantage, which could be overcome through the use of cloud computing services. One reason for this has been insufficient access to the necessary infrastructure to support sophisticated cloud services—the relatively slow download or upload speeds in many parts of Australia have limited the adoption of cloud services. The NBN is changing this and is a key enabler of the digital economy more broadly. There are other reasons that cloud computing has not been adopted more generally in Australia, including a lack of awareness of how to make best use of cloud computing and a lack of confidence that some organisations and individuals have in adopting cloud computing services. This strategy has identified three core goals and a set of actions to achieve the government’s vision. However, as the cloud services market continues to evolve, users and providers of cloud services must remain responsive to change. Likewise, the government will continue to adapt its strategy in response to market and technological changes
    • …
    corecore