562 research outputs found

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective

    Get PDF
    Prior information security studies have largely focused on understanding employee security behavior from a policy compliance perspective. We contend that there is a pressing need to develop a comprehensive understanding of the circumstances that lead to employee commitment of deliberate and malicious acts against organizational digital assets. Drawing on routine activity theory (RAT), we seek to establish a comprehensive model of employee-committed malicious computer abuse (MCA) by investigating the motivations of the offenders, the suitability of the desired targets, and the effect of security guardianship in organizational settings. Specifically, we delineate the effects of the individual characteristics of self-control, hacking self-efficacy, and moral beliefs, as well as the organizational aspects of deterrence based on the routine activity framework of crime. We tested this research model using research participants holding a wide range of corporate positions and possessing varying degrees of computer skills. Our findings offer fresh insights on insider security threats, identify new directions for future research, and provide managers with prescriptive guidance for formulating effective security policies and management programs for preventing MCA in organizations

    Mapping the Path to a Health Data Marketplace in Norway: An Exploratory Case Study

    Get PDF
    This Master's thesis explores the complex dynamics of health data in the digital age, focusing on its secure and efficient management and ethical considerations. It investigates the potential of implementing a Health Data Marketplace (HDM) in the Norwegian e-health sector, aiming to construct a seamless health data exchange platform. This study proposes the integration of an existing health data gateway, the Egde Health Gateway (EHG), with the HDM. The research offers an in-depth analysis of existing limitations in health data exchange systems in Norway. It addresses current research gaps in Data Marketplace, Business Models, Gateways, and the Norwegian e-health context. Guided by two central research questions, this thesis delves into identifying essential components required to successfully implement an HDM in Norway and how this marketplace could be established using an existing data platform. Significantly, the thesis underscores the pivotal role of primary stakeholders in the HDM - Platform Operators, Platform Users, and Legal Authorities. The exploration reveals that Platform Operators are vital influencers, fostering collaboration and innovation within the ecosystem, while Platform Users and Legal Authorities ensure the marketplace's innovative and compliance aspects. Additionally, this study identifies essential components for successfully integrating an HDM into an existing health data platform, including Data Standardization, Interoperability, Integration, Security, Trust, and Legal Frameworks, among others. The thesis marks a significant step towards realizing an HDM in the Norwegian e-health sector. It invites future research to broaden stakeholder perspectives, examine economic aspects of the HDM, and delve into ethical considerations and technological innovations. The findings from this exploration serve as a catalyst for leveraging health data effectively, securely, and ethically, contributing to improved healthcare outcomes, research, and innovation in Norway and beyond

    Mapping the Path to a Health Data Marketplace in Norway: An Exploratory Case Study

    Get PDF
    This Master's thesis explores the complex dynamics of health data in the digital age, focusing on its secure and efficient management and ethical considerations. It investigates the potential of implementing a Health Data Marketplace (HDM) in the Norwegian e-health sector, aiming to construct a seamless health data exchange platform. This study proposes the integration of an existing health data gateway, the Egde Health Gateway (EHG), with the HDM. The research offers an in-depth analysis of existing limitations in health data exchange systems in Norway. It addresses current research gaps in Data Marketplace, Business Models, Gateways, and the Norwegian e-health context. Guided by two central research questions, this thesis delves into identifying essential components required to successfully implement an HDM in Norway and how this marketplace could be established using an existing data platform. Significantly, the thesis underscores the pivotal role of primary stakeholders in the HDM - Platform Operators, Platform Users, and Legal Authorities. The exploration reveals that Platform Operators are vital influencers, fostering collaboration and innovation within the ecosystem, while Platform Users and Legal Authorities ensure the marketplace's innovative and compliance aspects. Additionally, this study identifies essential components for successfully integrating an HDM into an existing health data platform, including Data Standardization, Interoperability, Integration, Security, Trust, and Legal Frameworks, among others. The thesis marks a significant step towards realizing an HDM in the Norwegian e-health sector. It invites future research to broaden stakeholder perspectives, examine economic aspects of the HDM, and delve into ethical considerations and technological innovations. The findings from this exploration serve as a catalyst for leveraging health data effectively, securely, and ethically, contributing to improved healthcare outcomes, research, and innovation in Norway and beyon

    Extending the Exposure Score of Web Browsers by Incorporating CVSS

    Get PDF
    When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Yet its content differs from one browser to another. Despite the privacy and security risks of User-Agent strings, very few works have tackled this problem. Our previous work proposed giving Internet browsers exposure relative scores to aid users to choose less intrusive ones. Thus, the objective of this work is to extend our previous work through: first, conducting a user study to identify its limitations. Second, extending the exposure score via incorporating data from the NVD. Third, providing a full implementation, instead of a limited prototype. The proposed system: assigns scores to users’ browsers upon visiting our website. It also suggests alternative safe browsers, and finally it allows updating the back-end database with a click of a button. We applied our method to a data set of more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available here [4].</p

    Survey on Additive Manufacturing, Cloud 3D Printing and Services

    Full text link
    Cloud Manufacturing (CM) is the concept of using manufacturing resources in a service oriented way over the Internet. Recent developments in Additive Manufacturing (AM) are making it possible to utilise resources ad-hoc as replacement for traditional manufacturing resources in case of spontaneous problems in the established manufacturing processes. In order to be of use in these scenarios the AM resources must adhere to a strict principle of transparency and service composition in adherence to the Cloud Computing (CC) paradigm. With this review we provide an overview over CM, AM and relevant domains as well as present the historical development of scientific research in these fields, starting from 2002. Part of this work is also a meta-review on the domain to further detail its development and structure

    Externalities and Enterprise Software: Helping and Hindering Legal Compliance

    Get PDF
    Enterprise software helps organizations comply with laws and regulations, yet software itself creates negative externalities that can undermine rights and laws. Software developers are an important regulatory force, yet many know little about how law and software interact. This work examines developer understanding of legal concepts and examples of the software code and law relationship: payroll, Sarbanes Oxley Act, web accessibility, and data protection

    Building the Hyperconnected Society- Internet of Things Research and Innovation Value Chains, Ecosystems and Markets

    Get PDF
    This book aims to provide a broad overview of various topics of Internet of Things (IoT), ranging from research, innovation and development priorities to enabling technologies, nanoelectronics, cyber-physical systems, architecture, interoperability and industrial applications. All this is happening in a global context, building towards intelligent, interconnected decision making as an essential driver for new growth and co-competition across a wider set of markets. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from research to technological innovation, validation and deployment.The book builds on the ideas put forward by the European Research Cluster on the Internet of Things Strategic Research and Innovation Agenda, and presents global views and state of the art results on the challenges facing the research, innovation, development and deployment of IoT in future years. The concept of IoT could disrupt consumer and industrial product markets generating new revenues and serving as a growth driver for semiconductor, networking equipment, and service provider end-markets globally. This will create new application and product end-markets, change the value chain of companies that creates the IoT technology and deploy it in various end sectors, while impacting the business models of semiconductor, software, device, communication and service provider stakeholders. The proliferation of intelligent devices at the edge of the network with the introduction of embedded software and app-driven hardware into manufactured devices, and the ability, through embedded software/hardware developments, to monetize those device functions and features by offering novel solutions, could generate completely new types of revenue streams. Intelligent and IoT devices leverage software, software licensing, entitlement management, and Internet connectivity in ways that address many of the societal challenges that we will face in the next decade

    Practical, appropriate, empirically-validated guidelines for designing educational games

    Get PDF
    There has recently been a great deal of interest in the potential of computer games to function as innovative educational tools. However, there is very little evidence of games fulfilling that potential. Indeed, the process of merging the disparate goals of education and games design appears problematic, and there are currently no practical guidelines for how to do so in a coherent manner. In this paper, we describe the successful, empirically validated teaching methods developed by behavioural psychologists and point out how they are uniquely suited to take advantage of the benefits that games offer to education. We conclude by proposing some practical steps for designing educational games, based on the techniques of Applied Behaviour Analysis. It is intended that this paper can both focus educational games designers on the features of games that are genuinely useful for education, and also introduce a successful form of teaching that this audience may not yet be familiar with

    ANNA: A UNIFIED FRAMEWORK FOR DATA SECURITY IN HEALTHCARE INTERNET OF THINGS

    Get PDF
    Today, the cyber-physical interactions are made possible with the development of internet and smart technologies. Smart objects such as sensors, RFID tags and actuators are the building blocks of such pervasive network, called as Internet of Things (IoT). IoT has a good number of real time applications in all domains including medical industry. It has great impact on modern healthcare with promising economic, technological and social benefits. Researchers across the globe already have started to explore a variety of technological solutions to enhance healthcare system by incorporating the potential of the IoT. This paper presents a unified framework ANNA, for integrating IoT in healthcare system. It presents three lightweight algorithms to enhance data security in the smart healthcare environment. In addition, this paper provides a detailed working scenario which would be helpful in implementing smart healthcare units in rural India. The working scenario of the ANNA smart healthcare system and the workflow of the framework are also elaborated in this paper. The proposed framework is proved against possible attacks in the healthcare environment. The salient features of the framework are outlined and this research creates a hope that the smart healthcare units based on ANNA framework will offer on time medical care to the needy and the downtrodden
    • …
    corecore