192,365 research outputs found

    Information Security and Privacy Management in Intelligent Transportation Systems

    Get PDF
    With the global digitalization of services, passenger Intelligent Transportation Systems (ITSs) have emerged as transformative components, yet the practical implementation of state-of-the-art measures to ensure information security and privacy presents substantial challenges. In this article, we propose a framework for information security and privacy management. The framework is validated through two empirical studies. First, the framework is used to extract data during the literature review defining state-of-the-art aspects and measures. Second, a survey-based analysis of running passenger ITSs in selected regions of the European Union provides insights into real-life ITS implementations, enabling a thorough comparison with the proposed state-of-the-art measures. The study also showed that the proposed framework depicts some dependencies between measures, and, thus, using its matrix structure for the state of information security and privacy management in the organization helps to cross-check the usage of policies or methodologies by the organization departments. Our findings resulted in recommendations for organizations developing ITSs to enhance their information security and privacy management systems and bridge the gap between research proposals and practical implementation

    A Proposed Architecture for Big Data Driven Supply Chain Analytics

    Full text link
    Advancement in information and communication technology (ICT) has given rise to explosion of data in every field of operations. Working with the enormous volume of data (or Big Data, as it is popularly known as) for extraction of useful information to support decision making is one of the sources of competitive advantage for organizations today. Enterprises are leveraging the power of analytics in formulating business strategy in every facet of their operations to mitigate business risk. Volatile global market scenario has compelled the organizations to redefine their supply chain management (SCM). In this paper, we have delineated the relevance of Big Data and its importance in managing end to end supply chains for achieving business excellence. A Big Data-centric architecture for SCM has been proposed that exploits the current state of the art technology of data management, analytics and visualization. The security and privacy requirements of a Big Data system have also been highlighted and several mechanisms have been discussed to implement these features in a real world Big Data system deployment in the context of SCM. Some future scope of work has also been pointed out. Keyword: Big Data, Analytics, Cloud, Architecture, Protocols, Supply Chain Management, Security, Privacy.Comment: 24 pages, 4 figures, 3 table

    Rethinking IT Sourcing and Supplier Management for the Digital Age

    Get PDF
    In the new era of digital transformation, the role of IT sourcing is becoming more strategic. A recent global outsourcing survey showed 53% of respondents outsource elements of their IT function and that continued growth in outsourcing is expected for the foreseeable future. Due to dependency on external partners, there is an increase in both the potential opportunities and the risks involved. Organizations can benefit from integrating third party capabilities, and accommodating ‘outside in’ innovation that leverages the considerable knowledge base of supply partners and creates synergies among other business ecosystem participants. Despite these opportunities, sourcing organizations have many challenges to contend with, such as sustainable supply chain governance, end-to-end traceability, legal and regulatory global compliance, data privacy, and tolerance for risk in service level agreements and contracts. New outsourcing models such as cloudsourcing, microsourcing, crowdsourcing, impact sourcing and rural sourcing have evolved, and many of these new models require behavioural and managerial type shifts. In order to address these challenges, organizations and their suppliers need strong complementary capabilities to build successful relationships. Both contractual and relational governance are important, and organizations additionally need to maintain a strategy of agility and adaptability in order to mitigate the lock-in and dependency risks associated with outsourcing. This paper presents a review of pertinent literature, and discusses core learnings in relation to impacts on sourcing and supplier management in a digital business landscape. Based on an analysis of the literature and insights gained from engaging with industry and academic experts, the paper proposes a model that can be used to develop a capability to support effective sourcing and supplier management. This model provides a basis for further development in an industry/academia collaborative research project and aims to provide practical guidance to organizations in facing key challenges and optimizing the opportunities of IT sourcing and supplier management in the era of digital transformation

    Rethinking IT Sourcing and Supplier Management for the Digital Age

    Get PDF
    In the new era of digital transformation, the role of IT sourcing is becoming more strategic. A recent global outsourcing survey showed 53% of respondents outsource elements of their IT function and that continued growth in outsourcing is expected for the foreseeable future. Due to dependency on external partners, there is an increase in both the potential opportunities and the risks involved. Organizations can benefit from integrating third party capabilities, and accommodating ‘outside in’ innovation that leverages the considerable knowledge base of supply partners and creates synergies among other business ecosystem participants. Despite these opportunities, sourcing organizations have many challenges to contend with, such as sustainable supply chain governance, end-to-end traceability, legal and regulatory global compliance, data privacy, and tolerance for risk in service level agreements and contracts. New outsourcing models such as cloudsourcing, microsourcing, crowdsourcing, impact sourcing and rural sourcing have evolved, and many of these new models require behavioural and managerial type shifts. In order to address these challenges, organizations and their suppliers need strong complementary capabilities to build successful relationships. Both contractual and relational governance are important, and organizations additionally need to maintain a strategy of agility and adaptability in order to mitigate the lock-in and dependency risks associated with outsourcing. This paper presents a review of pertinent literature, and discusses core learnings in relation to impacts on sourcing and supplier management in a digital business landscape. Based on an analysis of the literature and insights gained from engaging with industry and academic experts, the paper proposes a model that can be used to develop a capability to support effective sourcing and supplier management. This model provides a basis for further development in an industry/academia collaborative research project and aims to provide practical guidance to organizations in facing key challenges and optimizing the opportunities of IT sourcing and supplier management in the era of digital transformation

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page
    corecore