72 research outputs found

    The development and test of a relationship model on system use, job learning, and impact

    Get PDF
    Swiss banks have returned to their roots and pay an increasing amount of attention to differentiating themselves from others through good financial advisory services. This has led to a loudly publicized standardization of IT-advisory processes, but not to an increasing use of supporting IT tools. This paper uses interviews with Swiss advisors, sales managers and IT managers, as well as focus groups of users and a survey with users to identify reasons for non-usage. The analysis is based on a framework combining principal-agent theory, IT-business alignment, technology acceptance and information behaviour. We provide evidence that the key problem explanation is the incentive system of the advisors and that poor usability of the software and lack of engagement by sales managers also contribute to the non-usage of most tool

    Why IT is not being used for financial advisory

    Full text link
    Swiss banks have returned to their roots and pay an increasing amount of attention to differentiating themselves from others through good financial advisory services. This has led to a loudly publicized standardization of IT-advisory processes, but not to an increasing use of supporting IT tools. This paper uses interviews with Swiss advisors, sales managers and IT managers, as well as focus groups of users and a survey with users to identify reasons for non-usage. The analysis is based on a framework combining principal-agent theory, IT-business alignment, technology acceptance and information behaviour. We provide evidence that the key problem explanation is the incentive system of the advisors and that poor usability of the software and lack of engagement by sales managers also contribute to the non-usage of most tools

    Towards a cloud migration decision support system for Small and Medium enterprises in Tamil Nadu

    Get PDF
    Cloud computing is a promising computing paradigm which has the potential to speed up Information Technology adoption among SMEs in developing economies like India. The user friendly, pay per use cloud computing model offers SMEs access to highly scalable and reliable cloud infrastructure without having to invest on buying and maintaining expensive Information Technology resources. However, moving data and application to a cloud infrastructure is not straightforward and can be very challenging as decision makers need to consider numerous aspects before deciding to adopt cloud infrastructure. A review of the literature reveals that there are frameworks available to support cloud migration. However, there are no frameworks, models or tools available to support the whole cloud migration process. This research aims to fill that gap by proposing a conceptual framework for cloud migration decision support system targeted for SMEs in Tamil Nadu

    Exiting the risk assessment maze: A meta-survey

    Get PDF
    Organizations are exposed to threats that increase the risk factor of their ICT systems. The assurance of their protection is crucial, as their reliance on information technology is a continuing challenge for both security experts and chief executives. As risk assessment could be a necessary process in an organization, one of its deliverables could be utilized in addressing threats and thus facilitate the development of a security strategy. Given the large number of heterogeneous methods and risk assessment tools that exist, comparison criteria can provide better understanding of their options and characteristics and facilitate the selection of a method that best fits an organization’s needs. This paper aims to address the problem of selecting an appropriate risk assessment method to assess and manage information security risks, by proposing a set of comparison criteria, grouped into 4 categories. Based upon them, it provides a comparison of the 10 popular risk assessment methods that could be utilized by organizations to determine the method that is more suitable for their needs. Finally, a case study is presented to demonstrate the selection of a method based on the proposed criteri

    Making sense of business intelligence : proposing a socio-technical framework for improved decision making in not-for-profit organisations

    Full text link
    The authors of this paper argue that human intuition alone cannot be relied upon for strategic decision making in today&rsquo;s business environment and that quality data intelligence is an imperative. The proposed project described in this paper is research-in-progress, action design research (ADR), to implement an appropriate information systems (IS) enabling enhanced organisational decision making. ADR is a new research method that draws on action research and design research in an organisational setting. In phase 1 of the project, a sociotechnical &lsquo;sense-making&rsquo; approach is used to gather and analyse information and decision needs in a not-for-profit (NFP) association, Connections ACT. In phase 2, requirements are designed and modelled to build a conceptual framework that guides NFPs in improving business performance and reporting capability. Phase 3 is the evaluative stage when the framework is reflected upon and refined, with intervention in the organisation&rsquo;s processes as a promising outcome.<br /

    Selling e-commerce innovations: How do CMOs and CIOs describe their roles and relationships in the e-commerce adoption process?

    Get PDF
    Selling e-commerce innovations How do CMOs and CIOs describe their roles and relationships in the e-commerce adoption process

    Identifying and combating cyber-threats in the field of online banking

    Get PDF
    This thesis has been carried out in the industrial environment external to the University, as an industrial PhD. The results of this PhD have been tested, validated, and implemented in the production environment of Caixabank and have been used as models for others who have followed the same ideas. The most burning threats against banks throughout the Internet environment are based on software tools developed by criminal groups, applications running on web environment either on the computer of the victim (Malware) or on their mobile device itself through downloading rogue applications (fake app's with Malware APP). Method of the thesis has been used is an approximation of qualitative exploratory research on the problem, the answer to this problem and the use of preventive methods to this problem like used authentication systems. This method is based on samples, events, surveys, laboratory tests, experiments, proof of concept; ultimately actual data that has been able to deduce the thesis proposal, using both laboratory research and grounded theory methods of data pilot experiments conducted in real environments. I've been researching the various aspects related to e-crime following a line of research focusing on intrinsically related topics: - The methods, means and systems of attack: Malware, Malware families of banker Trojans, Malware cases of use, Zeus as case of use. - The fixed platforms, mobile applications and as a means for malware attacks. - forensic methods to analyze the malware and infrastructure attacks. - Continuous improvement of methods of authentication of customers and users as a first line of defense anti- malware. - Using biometrics as innovative factor authentication.The line investigating Malware and attack systems intrinsically is closed related to authentication methods and systems to infect customer (executables, APP's, etc.), because the main purpose of malware is precisely steal data entered in the "logon "authentication system, to operate and thus, fraudulently, steal money from online banking customers. Experiments in the Malware allowed establishing a new method of decryption establishing guidelines to combat its effects describing his fraudulent scheme and operation infection. I propose a general methodology to break the encryption communications malware (keystream), extracting the system used to encrypt such communications and a general approach of the Keystream technique. We show that this methodology can be used to respond to the threat of Zeus and finally provide lessons learned highlighting some general principles of Malware (in general) and in particular proposing Zeus Cronus, an IDS that specifically seeks the Zeus malware, testing it experimentally in a network production and providing an effective skills to combat the Malware are discussed. The thesis is a research interrelated progressive evolution between malware infection systems and authentication methods, reflected in the research work cumulatively, showing an evolution of research output and looking for a progressive improvement of methods authentication and recommendations for prevention and preventing infections, a review of the main app stores for mobile financial services and a proposal to these stores. The most common methods eIDAMS (authentication methods and electronic identification) implemented in Europe and its robustness are analyzed. An analysis of adequacy is presented in terms of efficiency, usability, costs, types of operations and segments including possibilities of use as authentication method with biometrics as innovation.Este trabajo de tesis se ha realizado en el entorno industrial externo a la Universidad como un PhD industrial Los resultados de este PhD han sido testeados, validados, e implementados en el entorno de producción de Caixabank y han sido utilizados como modelos por otras que han seguido las mismas ideas. Las amenazas más candentes contra los bancos en todo el entorno Internet, se basan en herramientas software desarrolladas por los grupos delincuentes, aplicaciones que se ejecutan tanto en entornos web ya sea en el propio ordenador de la víctima (Malware) o en sus dispositivos móviles mediante la descarga de falsas aplicaciones (APP falsa con Malware). Como método se ha utilizado una aproximación de investigación exploratoria cualitativa sobre el problema, la respuesta a este problema y el uso de métodos preventivos a este problema a través de la autenticación. Este método se ha basado en muestras, hechos, encuestas, pruebas de laboratorio, experimentos, pruebas de concepto; en definitiva datos reales de los que se ha podido deducir la tesis propuesta, utilizando tanto investigación de laboratorio como métodos de teoría fundamentada en datos de experimentos pilotos realizados en entornos reales. He estado investigando los diversos aspectos relacionados con e-crime siguiendo una línea de investigación focalizada en temas intrínsecamente relacionadas: - Los métodos, medios y sistemas de ataque: Malware, familias de Malware de troyanos bancarios, casos de usos de Malware, Zeus como caso de uso. - Las plataformas fijas, los móviles y sus aplicaciones como medio para realizar los ataques de Malware. - Métodos forenses para analizar el Malware y su infraestructura de ataque. - Mejora continuada de los métodos de autenticación de los clientes y usuarios como primera barrera de defensa anti- malware. - Uso de la biometría como factor de autenticación innovador. La línea investiga el Malware y sus sistemas de ataque intrínsecamente relacionada con los métodos de autenticación y los sistemas para infectar al cliente (ejecutables, APP's, etc.) porque el objetivo principal del malware es robar precisamente los datos que se introducen en el "logon" del sistema de autenticación para operar de forma fraudulenta y sustraer así el dinero de los clientes de banca electrónica. Los experimentos realizados en el Malware permitieron establecer un método novedoso de descifrado que estableció pautas para combatir sus efectos fraudulentos describiendo su esquema de infección y funcionamiento Propongo una metodología general para romper el cifrado de comunicaciones del malware (keystream) extrayendo el sistema utilizado para cifrar dichas comunicaciones y una generalización de la técnica de Keystream. Se demuestra que esta metodología puede usarse para responder a la amenaza de Zeus y finalmente proveemos lecciones aprendidas resaltando algunos principios generales del Malware (en general) y Zeus en particular proponiendo Cronus, un IDS que persigue específicamente el Malware Zeus, probándolo experimentalmente en una red de producción y se discuten sus habilidades y efectividad. En la tesis hay una evolución investigativa progresiva interrelacionada entre el Malware, sistemas de infección y los métodos de autenticación, que se refleja en los trabajos de investigación de manera acumulativa, mostrando una evolución del output de investigación y buscando una mejora progresiva de los métodos de autenticación y de la prevención y recomendaciones para evitar las infecciones, una revisión de las principales tiendas de Apps para servicios financieros para móviles y una propuesta para estas tiendas. Se analizan los métodos más comunes eIDAMS (Métodos de Autenticación e Identificación electrónica) implementados en Europa y su robustez y presentamos un análisis de adecuación en función de eficiencia, usabilidad, costes, tipos de operación y segmentos incluyendo un análisis de posibilidades con métodos biométricos como innovación.Postprint (published version
    corecore