1,096 research outputs found

    The Knowledge Innovation Matrix (KIM): A Clarifying Lens for Innovation

    Get PDF

    Box-Structured Requirement Determination Methods

    Get PDF
    Requirements determination is an iterative process of eliciting, gathering, modeling, specifying, and analyzing system requirements information. It is the most critical, yet least understood, phase of systems development. This paper presents a rigorous approach for performing requirements determination with box-structured methods. By capturing requirements information in black box transactions and transaction hierarchies, intellectual control is maintained over large amounts of requirements information. The results of the box-structured requirements determination methods provide the basis for formal system design techniques. A concise example of box-structured requirements determination is included in an appendix

    Box-Structured Methods for Systems-Development with Objects

    Get PDF

    Information Technology and Systems - I Systems Analysis and Design: Should We Be Researching What We Teach?

    Get PDF
    A guiding premise of academic scholarship is that knowledge gained from first-hand research experience is disseminated to students via the classroom. However, that valuable connection is lost when professors are not researching what they teach. In this paper, we explore issues of mismatch between teaching and research in the Information Systems (IS) discipline. Specifically, while systems analysis and design (SA&D) is an integral topic in IS curricula, this topic is the research specialty of few IS professors. This situation is reflected by the low number of research publications in this area; particularly in the leading mainstream IS journals. We characterize the gap between teaching and research in SA&D, offer possible explanations for this gap, suggest avenues to better understand and enhance SA&D research via the design science paradigm, list a number of areas in SA&D in which there is ample need and opportunity for high quality research, and show through an example how a research mindset can be incorporated in a graduate level SA&D course

    The iTEC Technical Artefacts, Architecture and Educational Cloud

    Get PDF
    This chapter introduces the technical artefacts of the iTEC project in the context of a cloud architecture. The rationale for the technology developed in the iTEC project follows from its overall aim to re-engineer the uptake of ICT in schools. To that end, iTEC focused (a) on some important barriers for the uptake of ICT such the effort that teachers must make in redesigning their teaching and fi nding the right resources for that, and (b) on enablers for the uptake of ICT, such as providing engaging experiences both for the learner and teacher. The technical innovations are centred around three themes: innovations in the support of learning design, innovations by using a-typical resources, and innovations in the integration and management of learning services and resources. Next this chapter presents the cloud architecture adopted by all technology providers, including a shared user management and control system, the shared data models and interoperability solutions. The technical artefacts and then further elaborated in the ensuing chapters

    HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components

    Get PDF
    Security has been recognized as a leading barrier for IoT adoption. The growing number of connected devices and reported software vulnerabilities increases the importance firmware updates. Maturity models for software security do include parts of this, but are lacking in several aspects. This paper presents and evaluates a maturity model (HAVOSS) for handling vulnerabilities in third party OSS and COTS components. The maturity model was designed by first reviewing industry interviews, current best practice guidelines and other maturity models. After that, the practices were refined through industry interviews, resulting in six capability areas covering in total 21 practices. These were then evaluated based on their importance according to industry experts. It is shown that the practices are seen as highly important, indicating that the model can be seen as a valuable tool when assessing strengths and weaknesses in an organization's ability to handle firmware updates

    ICIS 2008 Panel Report: Design Science in Information Systems: Hegemony, Bandwagon, or New Wave?

    Get PDF
    In the past few years, design science has become a topic of increasing importance, especially in the North American academic IS community. Some observers see a new hegemony forming. Others dispute that but suggest that design science is merely the latest bandwagon rolling through the IS domain. A panel at the 2008 International Conference on Information Systems debated views of design science prevalent in the IS community. This paper reports on the panel discussion and attempts to position design science from various perspectives, including North American and European views, the latter with a long tradition of design-based IS scholarship

    ICIS 2008 Panel Report: Design Science in Information Systems: Hegemony, Bandwagon, or New Wave?

    Get PDF
    In the past few years, design science has become a topic of increasing importance, especially in the North American academic IS community. Some observers see a new hegemony forming. Others dispute that but suggest that design science is merely the latest bandwagon rolling through the IS domain. A panel at the 2008 International Conference on Information Systems debated views of design science prevalent in the IS community. This paper reports on the panel discussion and attempts to position design science from various perspectives, including North American and European views, the latter with a long tradition of design-based IS scholarship

    Governance of Offshore IT Outsourcing at Shell Global Functions IT-BAM Development and Application of a Governance Framework to Improve Outsourcing Relationships

    Get PDF
    The lack of effective IT governance is widely recognized as a key inhibitor to successful global IT outsourcing relationships. In this study we present the development and application of a governance framework to improve outsourcing relationships. The approach used to developing an IT governance framework includes a meta model and a customization process to fit the framework to the target organization. The IT governance framework consists of four different elements (1) organisational structures, (2) joint processes between in- and outsourcer, (3) responsibilities that link roles to processes and (4) a diverse set of control indicators to measure the success of the relationship. The IT governance framework is put in practice in Shell GFIT BAM, a part of Shell that concluded to have a lack of management control over at least one of their outsourcing relationships. In a workshop the governance framework was used to perform a gap analysis between the current and desired governance. Several gaps were identified in the way roles and responsibilities are assigned and joint processes are set-up. Moreover, this workshop also showed the usefulness and usability of the IT governance framework in structuring, providing input and managing stakeholders in the discussions around IT governance
    • …
    corecore