4,556 research outputs found

    Current trends on ICT technologies for enterprise information s²ystems

    Get PDF
    The proposed paper discusses the current trends on ICT technologies for Enterprise Information Systems. The paper starts by defining four big challenges of the next generation of information systems: (1) Data Value Chain Management; (2) Context Awareness; (3) Interaction and Visualization; and (4) Human Learning. The major contributions towards the next generation of information systems are elaborated based on the work and experience of the authors and their teams. This includes: (1) Ontology based solutions for semantic interoperability; (2) Context aware infrastructures; (3) Product Avatar based interactions; and (4) Human learning. Finally the current state of research is discussed highlighting the impact of these solutions on the economic and social landscape

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    Rational Cybersecurity for Business

    Get PDF
    Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your busines

    Online Personal Data Processing and EU Data Protection Reform. CEPS Task Force Report, April 2013

    Get PDF
    This report sheds light on the fundamental questions and underlying tensions between current policy objectives, compliance strategies and global trends in online personal data processing, assessing the existing and future framework in terms of effective regulation and public policy. Based on the discussions among the members of the CEPS Digital Forum and independent research carried out by the rapporteurs, policy conclusions are derived with the aim of making EU data protection policy more fit for purpose in today’s online technological context. This report constructively engages with the EU data protection framework, but does not provide a textual analysis of the EU data protection reform proposal as such

    Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

    Get PDF
    Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US2.8million.Furthermore,Australianorganisationsspendthesecondmostworldwide(US2.8 million. Furthermore, Australian organisations spend the second most worldwide (US1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews

    Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

    Full text link
    Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US$\$2.8 million. Furthermore, Australian organisations spend the second most worldwide (US$\$1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews. Keywords: Knowledge leakage, mobile devices, mobile contexts, knowledge leakage riskComment: Pages 14. arXiv admin note: text overlap with arXiv:1606.0145

    A study of BIM collaboration requirements and available features in existing model collaboration systems

    Get PDF
    Established collaboration practices in the construction industry are document centric and are challenged by the introduction of Building Information Modelling (BIM). Document management collaboration systems (e.g. Extranets) have significantly improved the document collaboration in recent years; however their capabilities for model collaboration are limited and do not support the complex requirements of BIM collaboration. The construction industry is responding to this situation by adopting emerging model collaboration systems (MCS), such as model servers, with the ability to exploit and reuse information directly from the models to extend the current intra-disciplinary collaboration towards integrated multi-disciplinary collaboration on models. The functions of existing MCSs have evolved from the manufacturing industry and there is no concrete study on how these functions correspond to the requirements of the construction industry, especially with BIM requirements. This research has conducted focus group sessions with major industry disciplines to explore the user requirements for BIM collaboration. The research results have been used to categorise and express the features of existing MCS which are then analysed in selected MCS from a user’s perspective. The potential of MCS and the match or gap in user requirements and available model collaboration features is discussed. This study concludes that model collaborative solutions for construction industry users are available in different capacities; however a comprehensive custom built solution is yet to be realized. The research results are useful for construction industry professionals, software developers and researchers involved in exploring collaborative solutions for the construction industry

    Context-based and human-centred information fusion in diagnostics

    Get PDF
    Maintenance management and engineering practice has progressed to adopt approaches which aim to reach maintenance decisions not by means of pre-specified plans and recommendations but increasingly on the basis of best contextually relevant available information and knowledge, all considered against stated objectives. Different methods for automating event detection, diagnostics and prognostics have been proposed, which may achieve very high performance when appropriately adapted and tuned to serve the needs of well defined tasks. However, the scope of such solutions is often narrow and without a mechanism to include human contributed intervention and knowledge contribution. This paper presents a conceptual framework of integrating automated detection and diagnostics and human contributed knowledge in a single architecture. This is instantiated by an e-maintenance platform comprising tools for both lower level information fusion as well as for handling higher level knowledge. Well structured maintenance relationships, such as those present in a typical FMECA study, as well as on the job human contributed compact knowledge are exploited to this end. A case study presenting the actual workflow of the process in an industrial setting is employed to pilot test the approach
    corecore