8 research outputs found

    Antecedents and Impacts of E-Business Aligment Amongst Small and Medium-Sized Enterprises

    Get PDF
    E-business has great potentials for firms to extend their business efficiency. Nevertheless, due to various problems and constraints, the e-business deployment within SMEs sector has been reported as not effective. To ensure effective e-business deployment, necessary measures are needed to assess how firms align diverse ebusiness capabilities in support of their business operation. This study therefore aims to investigate the extent firms align diverse e-business capabilities across business processes (e-business alignment). Using a strategic fit perspective, this study has observed two major propositions. First, firms‟ ability to align e-business to support the most crucial business processes has potentially led to better realisation of ebusiness values. Secondly, certain managerial and environmental conditions have explained the differing characteristics of e-business alignment amongst firms. This study employs quantitative research approach using survey method to collect and collate evidences from 140 owner/managers of SMEs. Preliminary analysis has indicated e-business alignment/misalignment patterns across business functions. The cluster analysis further reveals three distinct profiles with different characteristics of e-business alignment. These profiles are labelled as 'highly fit', 'moderately fit' and 'low fit' based on their e-business fit characteristics. This result confirms the first proposition where highly aligned firms will report greater and wider e-business impacts. The second proposition reveals that environmental uncertainty, IT sophistication, owner/manager knowledge on advanced IT/IS, e-business deployment status, and support network are significant predictors to different e-business alignment characteristics among firms. This study suggests that firms relatively have different priority over e-business solutions to support their business. These findings have demonstrated why some firms do not progress to a higher e-business ladder. It further justifies unequal deployment of e-business solutions to support functions across firms

    Hubung kait antara amalan perancangan strategik sistem maklumat (PSSM) dan prestasi agensi kerajaan di Malaysia: Kesan penyederhana konteks PSSM dan pendekatan PSSM

    Get PDF
    Strategic information system planning (SISP) as a management practice and process helps organizations to identify as well as selecting suitable computer- based systems for improving their organizational performance. Although, as an area of study, SISP has gained much attention among academics and practitioners, research that focuses on SISP in government agencies has not been emphasized. Given the limited number of studies on SISP in government agencies, this study initiated an attempt to investigate SISP among government agencies in Malaysia. The objectives of this study were to determine the relationship between SISP practices and performance of government agencies as well as to determine whether SISP contexts and SISP approaches moderate the relationship between SISP practices and performance of government agencies. More specifically, the study adopted the contingency framework to examine the moderating effects of SISP contexts and SISP approaches on the relationship between SISP practices and performance of government agencies in Malaysia. Questionnaires were sent to 254 government agencies that were registered with the Malaysian Administrative Modernization and Management Planning Unit (MAMPU). Descriptive analysis, Pearson correlation, and multiple and hierarchical regressions were used to analyze the data. Based on the analyses of the data obtained from the respondents, the results of the study indicated positive relationships between SISP practices and performance of the government agencies. Furthermore, the results also showed that SISP contexts and SISP approaches moderate the relationship between SISP practices and performance of the government agencies. The findings of this study appear to support the notion that SISP practices are related to the performance of government agencies. The association between SISP practices and the performance of government agencies as well as the moderating effects of SISP contexts and SISP approaches further suggests implications to practitioners, policy - makers and government agencie

    Towards a business process model warehouse framework

    Get PDF
    This dissertation focuses on the re-use of business process reference models, available in a business process model warehouse, to enable the definition of more comprehensive business requirements. It proposes a business process model warehouse framework to promote the re-use of multiple business process reference models and the flexible visualisation of business process models. The critical success factor for such a framework is that it should contribute to minimise to some extent the causes of inadequate business requirements. The proposed framework is based on an analogy with a data warehouse framework, consisting of the following components: usage of multiple business process reference models as source models, the conceptual design of a process to extract, load and transform multiple business process reference models into a repository, a description of repository functionality for managing enterprise architecture artefacts, and motivation of flexible visualisation of business process models to ensure more comprehensive business requirements.Computer Science (School of Computing)M.Sc. (Information Systems

    The Web Engineering Security (WES) methodology

    Get PDF
    The World Wide Web has had a significant impact on basic operational economical components in global information rich civilizations. This impact is forcing organizations to provide justification for security from a business case perspective and to focus on security from a web application development environment perspective. This increased focus on security was the basis of a business case discussion and led to the acquisition of empirical evidence gathered from a high level Web survey and more detailed industry surveys to analyse security in the Web application development environment. Along with this information, a collection of evidence from relevant literature was also gathered. Individual aspects of the data gathered in the previously mentioned activities contributed to the proposal of the Essential Elements (EE) and the Security Criteria for Web Application Development (SCWAD). The Essential Elements present the idea that there are essential, basic organizational elements that need to be identified, defined and addressed before examining security aspects of a Web Engineering Development process. The Security Criteria for Web Application Development identifies criteria that need to be addressed by a secure Web Engineering process. Both the EE and SCWAD are presented in detail along with relevant justification of these two elements to Web Engineering. SCWAD is utilized as a framework to evaluate the security of a representative selection of recognized software engineering processes used in Web Engineering application development. The software engineering processes appraised by SCWAD include: the Waterfall Model, the Unified Software Development Process (USD), Dynamic Systems Development Method (DSDM) and eXtreme Programming (XP). SCWAD is also used to assess existing security methodologies which are comprised of the Orion Strategy; Survivable / Viable IS approaches; Comprehensive Lightweight Application Security Process (CLASP) and Microsoft’s Trust Worthy Computing Security Development Lifecycle. The synthesis of information provided by both the EE and SCWAD were used to develop the Web Engineering Security (WES) methodology. WES is a proactive, flexible, process neutral security methodology with customizable components that is based on empirical evidence and used to explicitly integrate security throughout an organization’s chosen application development process. In order to evaluate the practical application of the EE, SCWAD and the WES methodology, two case studies were conducted during the course of this research. The first case study describes the application of both the EE and SCWAD to the Hunterian Museum and Art Gallery’s Online Photo Library (HOPL) Internet application project. The second case study presents the commercial implementation of the WES methodology within a Global Fortune 500 financial service sector organization. The assessment of the WES methodology within the organization consisted of an initial survey establishing current security practices, a follow-up survey after changes were implemented and an overall analysis of the security conditions assigned to projects throughout the life of the case study

    Ausgewählte Chancen und Herausforderungen der digitalen Transformation für die Produktentwicklung und Unternehmensorganisation im Finanzdienstleistungssektor

    Get PDF
    Vor dem Hintergrund der digitalen Transformation sind Finanzdienstleistungsunternehmen auf unterschiedlichen Ebenen zahlreichen Chancen sowie Herausforderungen ausgesetzt. Während der Einsatz neuer Technologien die Optimierung bestehender Geschäftsprozesse sowie das Angebot digitalisierter Finanzdienstleistungen ermöglicht, geht dies zugleich mit veränderten Arbeitsbedingungen innerhalb der Unternehmensorganisation einher. Darüber hinaus sind Finanzdienstleister dazu angehalten die sich ändernden Kundenerwartungen bei den bisherigen Geschäftsaktivitäten sowie bei der Produktentwicklung zu berücksichtigen. Das Ziel der vorliegenden kumulativen Dissertation ist es, bestehende Forschungsdesiderate hinsichtlich der Auswirkungen der digitalen Transformation auf den Finanzdienstleistungssektor, differenziert nach der Kunden- und Produktperspektive sowie der internen Unternehmensperspektive, vertiefend zu analysieren. Das Technology-Organization-Environment (TOE)-Framework von DePietro et al. (1990) wird dabei als theoretischer Rahmen zur Einordnung und Strukturierung der Forschungsmodule verwendet. Die Ergebnisse der acht Module zeigen, dass die Kundenbedürfnisse und –erwartungen im Finanzdienstleistungssektor verstärkt von der digitalen Transformation beeinflusst werden. Dies zeigt sich in der Beratungstätigkeit bspw. durch das Angebot neuer Kundenkanäle sowie der aus dem steigenden Wettbewerbsdruck resultierenden erhöhten Preistransparenz. Im Rahmen der Produktentwicklung sind zudem u. a. ESG-Risiken und Silent Cyber-Risiken zu beachten. Aus der Analyse der Auswirkungen der digitalen Transformation auf die Unternehmensorganisation geht hervor, dass über den Einsatz digitaler Innovationen innerhalb des Backoffice die Realisation von Effizienzgewinnen sowie das Entgegenwirken eines Personalmangels möglich ist. Darüber hinaus wird in den Modulen der Einfluss des Faktors Mensch auf die Cyber-Sicherheit hervorgehoben. Während dieser einerseits als „schwächstes Glied“ und potenzielles Angriffsziel im Sicherheitskonstrukt der Unternehmen dargestellt wird, ist andererseits das Potenzial der Beschäftigten zur Frühwarnung zu berücksichtigen

    Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization

    Get PDF
    Numerous IS researchers have argued that IS Security can be more effectively managed if the emphasis goes beyond the technical means of protecting information resources. In an effort to adopt a broader perspective that accounts for issues that transcend technical means alone, Dhillon and Torkzadeh (2006) present an array of 9 fundamental and 16 means objectives that are essential for maximizing IS security in an organization. These objectives were derived using a value-focused thinking approach and are organized into a conceptual framework. This conceptual framework provides a rigorous theoretical base for considering IS security in a manner that accounts for both technical and organizational issues; however, no direction is provided for using these objectives so that informed decisions can be made. As a result, the goal of this dissertation is to develop a decision model using Multiple Objective Decision Analysis (MODA) techniques that seek to provide informed alternatives to decision makers who desire to maximize IS security within an organization

    Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    Get PDF
    corecore