17 research outputs found

    An Empirical Validation of the Patient-centered e-Health Framework in Patient-focused Websites

    Get PDF
    Although the Internet is in its second decade of wide-spread adoption, many patient-centered health websites are still in a phase of early adoption, scrambling to define and defend market segments in a shifting healthcare information landscape. Consequently, healthcare and health information providers are jockeying for position in a dynamic industry trying to serve different patients’ needs. To understand the situation, this article takes the approach of Patient-centered e-Health (PCEH) and makes three contributions. One, we empirically test the PCEH framework on patient-focused websites. Two, given the PCEH framework, we identify five categories of websites that serve different segments of the patient-centered health information market. Three, we analyze the five categories in terms of different features and derive a classification model. This article helps us better understand PCEH websites and guide the future development of online healthcare and health information services

    City Resilience Dynamics tool

    Get PDF
    acceptedVersio

    Blockchain Value Creation Logics and Financial Returns

    Get PDF
    With its complexities and portfolio-nature, the advent of blockchain technology presents several use cases to stakeholders for business value appropriation and financial gains. This 3-essay dissertation focuses on three exemplars and research approaches to understanding the value creation logics of blockchain technology for financial gains. The first essay is a conceptual piece that explores five main affordances of blockchain technology and how these can be actualized and assimilated for business value. Based on the analysis of literature findings, an Affordance-Experimentation-Actualization-Assimilation (AEAA) model is proposed. The model suggests five affordance-to-assimilation value chains and eight value interdependencies that firms can leverage to optimize their value creation and capture during blockchain technology implementation. The second essay empirically examines the financial returns of public firms\u27 blockchain adoption investments at the level of the three main blockchain archetypes (private-permissioned, public-permissioned and permissionless. Drawing upon Fichman\u27s model of the option value of innovative IT platform investments, the study examines business value creation through firm blockchain strategy (i.e., archetype instances, decentralization, and complementarity), learning (i.e., blockchain patents and event participation), and bandwagon effects using quarterly data of firm archetype investments from 2015 to 2020. The study\u27s propensity score matching utilization and fixed-effects modeling provide objective quantification of how blockchain adoption leads to increases in firm value (performance measured by Tobin\u27s q) at the archetype level (permissionless, public permissioned, and private permissioned). Surprisingly, a more decentralized archetype and a second different archetype implementation are associated with a lower Tobin\u27s q. In addition, IT-option proxy parameters such as blockchain patent originality, participation in blockchain events, and network externality positively impact firm performance, whereas the effect of blockchain patents is negative. As the foremost and more established use case of blockchain technology whose business value is accessed in either of the five affordances and exemplifies a permissionless archetype for financial gains, bitcoin cryptocurrency behavior is studied through the lens of opinion leaders on Twitter. The third essay this relationship understands the hourly price returns and volatility shocks that sentiments from opinion leaders generate and vice-versa. With a dynamic opinion leader identification strategy, lexicon and rule-based sentiment analytics, I extract sentiments of the top ten per cent bitcoin opinion leaders\u27 tweets. Controlling for various economic indices and contextual factors, the study estimates a vector autoregression model (VAR) and finds that finds that Bitcoin return granger cause Polarity but the influence of sentiment subjectivity is marginal and only stronger on bitcoin price volatility. Several key implications for blockchain practitioners and financial stakeholders and suggestions for future research are discussed

    The impact of information systems auditor’s training on the quality of an information systems audit

    Get PDF
    Abstract: The significance of information technology (IT) audits in organisations is an area that has received increased focus, and it is increasingly necessary to conduct additional research into the IT audit subject area. As a result of increased dependence and spending on IT, it has effectively become a requirement for organisations to increase their level of assurance about these investments and their ability to deliver as expected. IT audits fulfil this role, and are used to examine the effectiveness of controls, security of important systems and business operations to identify weaknesses and find ways that can be used to improve and mitigate the impact of these weaknesses. However, prior research has not measured the impact that training of auditors has on the quality of IT audits. The findings of this study show that organisations play an integral role in the training programs. However, these organisations do not understand their training programs and cannot properly communicate the training requirements to IT auditors. The research findings have also shown that continuous professional development programs are additional tools in enhancing IT auditor knowledge. This research undertaking has found that generally, internal programs are more effective in delivering content to IT auditors and thus more emphasis can be put on them. Overall, this research undertaking strengthens the idea that resources should be committed to improving training programs, as improving training programs eventually leads to efficiency in all matters related to IT audit quality.M.Com. (Computer Auditing

    Spinoff 1997: 25 Years of Reporting Down-to-Earth Benefits

    Get PDF
    The 25th annual issue of NASA's report on technology transfer and research and development (R&D) from its ten field centers is presented. The publication is divided into three sections. Section 1 comprises a summary of R&D over the last 25 years. Section 2 presents details of the mechanisms NASA uses to transfer technology to private industry as well as the assistance NASA provides in commercialization efforts. Section 3, which is the focal point of the publication, features success stories of manufacturers and entrepreneurs in developing commercial products and services that improve the economy and life in general

    An Information Security Policy Compliance Reinforcement and Assessment Framework

    Get PDF
    The majority of SMEs have adopted the use of information communication and technology (ICT) services. However, this has exposed their systems to new internal and external security vulnerabilities. These SMEs seem more concerned with external threat related vulnerabilities rather than those from internal threats, although researchers and industry are suggesting a substantial proportion of security incidents to be originating from insiders. Internal threat is often addressed by, firstly, a security policy in order to direct activities and, secondly, organisational information security training and awareness programmes. These two approaches aim to ensure that employees are proficient in their roles and that they know how to carry out their responsibilities securely. There has been a significant amount of research conducted to ensure that information security programmes communicate the information security policy effectively and reinforce sound security practice. However, an assessment of the genuine effectiveness of such programmes is seldom carried out. The purposes of this research study were, firstly, to highlight the flaws in assessing behavioural intentions and equating such behavioural intentions with actual behaviours in information security; secondly, to present an information security policy compliance reinforcement and assessment framework which assists in promoting the conversion of intentions into actual behaviours and in assessing the behavioural change. The approach used was based on the Theory of Planned Behaviour, knowledge, attitude and behaviour theory and Deterrence Theory. Expert review and action research methods were used to validate and refine the framework. The action research was rigorously conducted in four iterations at an SME in South Africa and involved 30 participating employees. The main findings of the study revealed that even though employees may have been well trained and are aware of information security good practice, they may be either unable or unwilling to comply with such practice. The findings of the study also revealed that awareness drives which lead to secure behavioural intents are merely a first step in information security compliance. The study found that not all behavioural intentions converted to actual secure behaviours and only 64% converted. However, deterrence using rewards for good behaviour and punishment for undesirable behaviour was able to increase the conversion by 21%

    Exploring Blockchain Governance

    Full text link
    Blockchain systems continue to attract significant interest from both practitioners and researchers. What is more, blockchain systems come in various types, such as cryptocurrencies or as inter-organizational systems in business networks. As an example of a cryptocurrency, Bitcoin, one of the most prominent blockchain systems to date and born at the time of a major financial crisis, spearheaded the promise of relying on code and computation instead of a central governing entity. Proponents would argue that Bitcoin stood the test of time, as Bitcoin continues to operate to date for over a decade. However, these proponents overlook the never-ending, heated debates “behind the scenes” caused by diverging goals of central actors, which led to numerous alternative systems (forks) of Bitcoin. To accommodate these actors’ interests in the pursuit of their common goal is a tightrope act, and this is where this dissertation commences: blockchain governance. Based on the empirical examples of various types and application domains of blockchain systems, it is the goal of this dissertation to 1) uncover governance patterns by showing, how blockchain systems are governed, 2) derive governance challenges faced or caused by blockchain systems, and, consequently, to 3) contribute to a better understanding to what blockchain governance is. This dissertation includes four parts, each of these covering different thematical areas: In the first part, this dissertation focuses on obtaining a better understanding of blockchain governance’s context of reference by studying blockchain systems from various application domains and system types, for example, led by inter-organizational networks, states, or an independent group of actors. The second part, then, focuses on a blockchain as an inter-organizational system called “cardossier”, a project I was involved in, and its governance as a frame of reference. Hereupon, for one, I report on learnings from my project involvement in the form of managerial guidelines, and, for two, I report on structural problems within cardossier, and problems caused by membership growth and how they can be resolved. The third part focuses on a wider study of blockchains as inter-organizational systems, where I summarize findings of an analysis of 19 blockchain consortia. The findings, for one, answer the question of why blockchain consortia adopt blockchain technology, and, for two, show internal and external challenges these systems faced to derive managerial recommendations. The fourth and last part studies blockchain governance’s evolution and contributes an analysis of blockchain’s governance features and its contrast to established modes of governance. These four parts, altogether, have scientific value as they increase our understanding on blockchain governance. Consequently, this dissertation contributes to the body of knowledge on modes of governance, distributed system governance, and blockchain governance in general. I do so, by grounding the concept of blockchain governance in empirical detail, showing how these systems are governed on various application domains and system types, and by studying empirical challenges faced or caused by these systems. This approach is relevant and necessary, as blockchain systems in general, but particularly outside of cryptocurrencies, mostly still are in pursuit of a sustainable blockchain governance. As blockchains can be expected to continue to mature, the upcoming years offer very fruitful ground for empirical research along the empirical insights and theoretical lines shown in this dissertation

    Corporate information risk : an information security governance framework

    Get PDF
    Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipulate and transmit sensitive customer and financial information. IT, which involves major risks, may threaten the security if corporate information assets. Therefore, IT requires attention at board level to ensure that technology-related information risks are within an organization’s accepted risk appetite. However, IT issues are a neglected topic at board level and this could bring about enronesque disasters. Therefore, there is a need for the Board of Directors to direct and control IT-related risks effectively to reduce the potential for Information Security breaches and bring about a stronger system of internal control. The IT Oversight Committee is a proven means of achieving this, and this study further motivates the necessity for such a committee to solidify an organization’s Information Security posture among other IT-related issues

    Strategic Sensemaking and Software Asset Management: Linkages Between Interpretation and Organizational Action

    Get PDF
    Software is a critical information technology (IT) asset as it plays a key role in the creation of organizational value and it ranks as the first or second most important IT budget disbursement. Organizations are expected to govern software to ensure its efficient use while protecting the copyright of software developers. Software asset management (SAM) focuses on the good governance and effective lifecycle management of software. SAM impacts the flexibility to support business strategies with software, and protects organizations against liability and security risks associated with software use. Since the 1990s, practitioners and scholars posit that SAM is a strategic issue that should be attended by top management. However, reports indicate that widespread SAM adoption is at early stages and a review of the literature reveals limited research on SAM. Studying SAM is relevant to practice and theory because it could explain the processes behind its adoption in organizations. Two different SAM actions are identified: Proactive and Reactive SAM. This study investigates the role of top managers and important antecedents of SAM actions. This investigation draws from strategic sensemaking to explain how top management team’s (TMT) interpretation of IS strategic issues (i.e., software asset issues) as an opportunity influences proactive SAM. It also draws from institutional theory as explanation of reactive SAM actions. Survey responses from 187 chief information officers were collected. The study used a scenario to elicit a strategic issue tested in three stages. In the first stage, scholars and practitioners validated the scenario and survey items. In the second, a pilot was conducted to validate the survey instrument and research model. In the third, a full-scale data collection and test of the research model was completed. Findings from this study indicate that TMT interpretation of SAM as an IS strategic issue influences the adoption of Proactive SAM. Also, coercive force has a direct influence on reactive SAM. This study contributes to the IS literature by developing an instrument to measure reactive and proactive SAM, identifying factors that influence TMT’s interpretation, and subsequent SAM action. For practice, the study corroborates the need to involve TMT in the SAM decision making processes because TMT interpretation is positively associated with the willingness to implement Proactive SAM

    This New Ocean: A History of Project Mercury

    Get PDF
    When Congress created the National Aeronautics and Space Administration (NASA) in 1958, it charged NASA with the responsibility "to contribute materially to . . . the expansion of human knowledge of phenomena in the atmosphere and space" and "provide for the widest practicable and appropriate dissemination of information concerning its activities and the results thereof." NASA wisely interpreted this mandate to include responsibility for documenting the epochal progress of which it is the focus. The result has been the development of a historical program by NASA as unprecedented as the task of extending man's mobility beyond his planet. This volume is not only NASA's accounting of its obligation to disseminate information to our current generation of Americans. It also fulfills, as do all of NASA's future-oriented scientific-technological activities, the further obligation to document the present as the heritage of the future. The wide-ranging NASA history program includes chronicles of day-to-day space activities; specialized studies of particular fields within space science and technology; accounts of NASA's efforts in organization and management, where its innovations, while less known to the public than its more spectacular space shots, have also been of great significance; narratives of the growth and expansion of the space centers throughout the country, which represent in microcosm many aspects of NASA's total effort; program histories, tracing the successes- and failures- of the various projects that mark man's progress into the Space Age; and a history of NASA itself, incorporating in general terms the major problems and challenges, and the responses thereto, of our entire civilian space effort. The volume presented here is a program history, the first in a series telling of NASA's pioneering steps into the Space Age. It deals with the first American manned-spaceflight program: Project Mercury. Although some academicians might protest that this is "official" history, it is official only in the fact that it has been prepared and published with the support and cooperation of NASA. It is not "official" history in the sense of presenting a point of view supposedly that of NASA officialdom-if anyone could determine what the "point of view" of such a complex organism might be. Certainly, the authors were allowed to pursue their task with the fullest freedom and in accordance with the highest scholarly standards of the history profession
    corecore