192,365 research outputs found
Information Security and Privacy Management in Intelligent Transportation Systems
With the global digitalization of services, passenger Intelligent Transportation Systems (ITSs) have emerged as transformative components, yet the practical implementation of state-of-the-art measures to ensure information security and privacy presents substantial challenges. In this article, we propose a framework for information security and privacy management. The framework is validated through two empirical studies. First, the framework is used to extract data during the literature review defining state-of-the-art aspects and measures. Second, a survey-based analysis of running passenger ITSs in selected regions of the European Union provides insights into real-life ITS implementations, enabling a thorough comparison with the proposed state-of-the-art measures. The study also showed that the proposed framework depicts some dependencies between measures, and, thus, using its matrix structure for the state of information security and privacy management in the organization helps to cross-check the usage of policies or methodologies by the organization departments. Our findings resulted in recommendations for organizations developing ITSs to enhance their information security and privacy management systems and bridge the gap between research proposals and practical implementation
A Proposed Architecture for Big Data Driven Supply Chain Analytics
Advancement in information and communication technology (ICT) has given rise
to explosion of data in every field of operations. Working with the enormous
volume of data (or Big Data, as it is popularly known as) for extraction of
useful information to support decision making is one of the sources of
competitive advantage for organizations today. Enterprises are leveraging the
power of analytics in formulating business strategy in every facet of their
operations to mitigate business risk. Volatile global market scenario has
compelled the organizations to redefine their supply chain management (SCM). In
this paper, we have delineated the relevance of Big Data and its importance in
managing end to end supply chains for achieving business excellence. A Big
Data-centric architecture for SCM has been proposed that exploits the current
state of the art technology of data management, analytics and visualization.
The security and privacy requirements of a Big Data system have also been
highlighted and several mechanisms have been discussed to implement these
features in a real world Big Data system deployment in the context of SCM. Some
future scope of work has also been pointed out. Keyword: Big Data, Analytics,
Cloud, Architecture, Protocols, Supply Chain Management, Security, Privacy.Comment: 24 pages, 4 figures, 3 table
Rethinking IT Sourcing and Supplier Management for the Digital Age
In the new era of digital transformation, the role of IT sourcing is becoming more strategic. A recent global outsourcing survey showed 53% of respondents outsource elements of their IT function and that continued growth in outsourcing is expected for the foreseeable future. Due to dependency on external partners, there is an increase in both the potential opportunities and the risks involved. Organizations can benefit from integrating third party capabilities, and accommodating ‘outside in’ innovation that leverages the considerable knowledge base of supply partners and creates synergies among other business ecosystem participants. Despite these opportunities, sourcing organizations have many challenges to contend with, such as sustainable supply chain governance, end-to-end traceability, legal and regulatory global compliance, data privacy, and tolerance for risk in service level agreements and contracts. New outsourcing models such as cloudsourcing, microsourcing, crowdsourcing, impact sourcing and rural sourcing have evolved, and many of these new models require behavioural and managerial type shifts. In order to address these challenges, organizations and their suppliers need strong complementary capabilities to build successful relationships. Both contractual and relational governance are important, and organizations additionally need to maintain a strategy of agility and adaptability in order to mitigate the lock-in and dependency risks associated with outsourcing.
This paper presents a review of pertinent literature, and discusses core learnings in relation to impacts on sourcing and supplier management in a digital business landscape. Based on an analysis of the literature and insights gained from engaging with industry and academic experts, the paper proposes a model that can be used to develop a capability to support effective sourcing and supplier management. This model provides a basis for further development in an industry/academia collaborative research project and aims to provide practical guidance to organizations in facing key challenges and optimizing the opportunities of IT sourcing and supplier management in the era of digital transformation
Rethinking IT Sourcing and Supplier Management for the Digital Age
In the new era of digital transformation, the role of IT sourcing is becoming more strategic. A recent global outsourcing survey showed 53% of respondents outsource elements of their IT function and that continued growth in outsourcing is expected for the foreseeable future. Due to dependency on external partners, there is an increase in both the potential opportunities and the risks involved. Organizations can benefit from integrating third party capabilities, and accommodating ‘outside in’ innovation that leverages the considerable knowledge base of supply partners and creates synergies among other business ecosystem participants. Despite these opportunities, sourcing organizations have many challenges to contend with, such as sustainable supply chain governance, end-to-end traceability, legal and regulatory global compliance, data privacy, and tolerance for risk in service level agreements and contracts. New outsourcing models such as cloudsourcing, microsourcing, crowdsourcing, impact sourcing and rural sourcing have evolved, and many of these new models require behavioural and managerial type shifts. In order to address these challenges, organizations and their suppliers need strong complementary capabilities to build successful relationships. Both contractual and relational governance are important, and organizations additionally need to maintain a strategy of agility and adaptability in order to mitigate the lock-in and dependency risks associated with outsourcing.
This paper presents a review of pertinent literature, and discusses core learnings in relation to impacts on sourcing and supplier management in a digital business landscape. Based on an analysis of the literature and insights gained from engaging with industry and academic experts, the paper proposes a model that can be used to develop a capability to support effective sourcing and supplier management. This model provides a basis for further development in an industry/academia collaborative research project and aims to provide practical guidance to organizations in facing key challenges and optimizing the opportunities of IT sourcing and supplier management in the era of digital transformation
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
- …