219,830 research outputs found
Governance of Offshore IT Outsourcing at Shell Global Functions IT-BAM Development and Application of a Governance Framework to Improve Outsourcing Relationships
The lack of effective IT governance is widely recognized as a key inhibitor to successful global IT outsourcing relationships. In this study we present the development and application of a governance framework to improve outsourcing relationships. The approach used to developing an IT governance framework includes a meta model and a customization process to fit the framework to the target organization. The IT governance framework consists of four different elements (1) organisational structures, (2) joint processes between in- and outsourcer, (3) responsibilities that link roles to processes and (4) a diverse set of control indicators to measure the success of the relationship. The IT governance framework is put in practice in Shell GFIT BAM, a part of Shell that concluded to have a lack of management control over at least one of their outsourcing relationships. In a workshop the governance framework was used to perform a gap analysis between the current and desired governance. Several gaps were identified in the way roles and responsibilities are assigned and joint processes are set-up. Moreover, this workshop also showed the usefulness and usability of the IT governance framework in structuring, providing input and managing stakeholders in the discussions around IT governance
Security dialogues: building better relationships between security and business
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff
Recommended from our members
Electronic transformation of government in the U.K.: a research agenda
This paper presents the findings of an exploratory research project into future
e-Government (electronic Government) initiatives. The Virtual Institute for
Electronic Government Research (VIEGO) project aimed at identifying and
further developing the research agenda of e-Government based on a solid
practical ground. As such, the paper offers a novel methodology in identifying
the road map for future e-Government initiatives based on a series of
workshops organised around the U.K. hosting a mixture of stakeholders
involving both academics and parishioners. The analysis of the VIEGO
workshops depicted that an e-Government research agenda involves a
combination of social, technological and organisational issues at both
governmental and individual citizen level, ultimately driven by empirical
case-based experience and active participation in e-Government processes.
Unlike other propositions for the future of e-Government offered in the e-
Government literature, raised research questions not only originated from an
analysis of e-Government literature but also on the outcome of brainstorming,
reflections and contemplations throughout the duration of the project
Online privacy: towards informational self-determination on the internet : report from Dagstuhl Perspectives Workshop 11061
The Dagstuhl Perspectives Workshop "Online Privacy: Towards Informational Self-Determination on the Internet" (11061) has been held in February 6-11, 2011 at Schloss Dagstuhl. 30 participants from academia, public sector, and industry have identified the current status-of-the-art of and challenges for online privacy as well as derived recommendations for improving online privacy. Whereas the Dagstuhl Manifesto of this workshop concludes the results of the working groups and panel discussions, this article presents the talks of this workshop by their abstracts
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not properly addressed by organizations. We contribute to reverse this situation by introducing a framework composed of a method for identification and assessment of insider threat risks and of two supporting deliverables for awareness of insider threat. The deliverables are: (i) attack strategies structured in four decomposition trees, and (ii) a matrix which correlates defense strategies, attack strategies and control principles. The method output consists of goal-based requirements for the defense against insiders
The Scaling Mindset – Shifting from Problems to Solutions. Insights from the Review of CCAFS Scaling Activities, 2019
In the frame of the review of CCAFS scaling activities in 2019, 21 project leaders and –implementers were interviewed about their scaling processes, touching a series of aspects that had been identified as crucial and/or critical by earlier research. Results were analysed with a systemic approach, to draw organisational learnings. The findings were validated with CCAFS core team during their Scaling Workshop in Madrid, May 2019, in which the Core Team also prioritized its programmatic areas of response.
This working paper captures the main insights and learnings from both the interviews on project level, followed by the results’ analysis. It then summarized the Core Team workshop’s main discussion points and shortly outlines the programmatic areas of response that CCAFS identified.
The learnings and insights on the realities of scaling agricultural innovations presented in this working paper can provide a rich basis for further synthesis and/or deeper research on the different aspects of innovation development and scaling
BPM News - Folge 3
Die BPM-Kolumne des EMISA-Forums berichtet über aktuelle Themen, Projekte und Veranstaltungen aus dem BPM-Umfeld. Schwerpunkt der vorliegenden Kolumne bildet das Thema Standardisierung von Prozessbeschreibungssprachen und -notationen im Allgemeinen und BPEL4WS (Business Process Execution Language for Web Services) im Speziellen. Hierzu liefert Jan Mendling von der Wirtschaftsuniversität Wien in aktuelles Schlagwort. Des weiteren erhalten Leser eine Zusammenfassung zweier im ersten Halbjahr 2006 veranstalteten Workshops zu den Themen „Flexibilität prozessorientierter Informationssysteme“ und „Kollaborative Prozesse“ sowie einen BPM Veranstaltungskalender für die 2. Jahreshälfte 2006
- …