76 research outputs found
Rethinking the Business Model with RFID
Radio Frequency Identification (RFID) is an enabling technology that can provide organizations with unprecedented improved visibility and traceability of items throughout their journey in the value chain. This paper explores how RFID can impact traditional business models or create new ones. In particular, we propose an RFID business model framework and use it to show how value can be created for organizations, suppliers, customers, and business partners. We also identify the major dynamic phases of RFID and their corresponding impact on RFID business models. A taxonomy of 12 specific RFID business models is also presented, reflecting the wide spectrum of potential directions and applications of the technology. Finally, we present a case study to test the practical and theoretical relevance of our conceptual models. The paper outlines the need for technology managers to take a holistic approach to RFID business model innovation, taking into account the interrelated technical, strategic, organizational, and external environmental factors
Mobile NFC Services: Adoption Factors and a Typology of Business Models
The integration of Near Field Communication (NFC) into mobile devices has recently emerged as a disruptive innovation and a strong enabler of a wide range of new mobile applications and services. Yet, despite this great potential, the widespread adoption of mobile NFC services remains restrained. This chapter investigates the success factors that are contributing towards the proliferation of mobile NFC services. It also presents an in-depth analysis of the key hurdles standing in the way of full NFC commercialization, with the caveat that disagreement about the proper business model among the key ecosystem players is currently the major adoption restraint. The chapter articulates the vision of a cooperative model that can enable the sharing of services, infrastructure, cost, and revenues among various NFC ecosystem players. The author also adopts a four-tier classification approach to categorize NFC business models into a number of typologies. Some recommendations for future research are also provided
Performance Analysis of Two Priority Queuing Systems in Tandem
In this paper, we consider a tandem of two head-of-line (HOL) non-preemptive priority queuing systems, each with a single server and a deterministic service-time. Two classes of traffic are considered, namely high priority and low priority traffic. By means of a generating function approach, we present a technique to derive closed-form expressions for the mean buffer occupancy at each node and mean delay. Finally, we illustrate our solution technique with some numerical examples, whereby we illustrate the starvation impact of the HOL priority scheduling discipline on the performance of the low-priority traffic stream. Our research highlights the important fact that the unfairness of the HOL priority scheduling becomes even more noticeable at the network level. Thus this priority mechanism should be used with caution
Towards a Better Understanding of Organizational Adoption and Diffusion of RFID Technology: A Case Study Approach
This paper aims to acquire underlying knowledge about the dynamics of RFID adoption and diffusion and explore the drivers that shape the RFID diffusion pathway. The paper uses a case study methodology to conduct and present the research and its findings. The paper presents an RFID adoption/diffusion model that can guide enterprises to transition from standalone RFID deployments towards new RFID systems that are deeply integrated with business processes. The diffusion process follows a three-stage model with isomorphic feedback mechanisms. The first stage is an isolated/sensing phase, the second stage is an absorptive phase, while the last stage is an integrative phase. The proposed model suggests that a combination of endogenous and exogenous factors constitute the driving forces behind each phase of the diffusion pathway. Our research reveals that some congruence between organizational and individual aims is plausible during the adoption phase and that RFID adoption can be initiated through organizational free-will as opposed to coercive pressures from influencing organizations
Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems
Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating with external cybercriminals. Researchers have extensively studied insiders’ motivation to attack from the broader perspective of the deterrence theory and have explored the rationale for employees to disregard/overlook security policies from the perspective of neutralization theory. This research takes a step further: we explore the aggravating variables of insider threat using a multiple case study approach. Empirical research using black hat analysis of three case studies of insider threats suggests that, while neutralization plays an important role in insider attacks, it takes a cumulative set of aggravating factors to trigger an actual data breach. By identifying and aggregating the variables, this study presents a predictive model that can guide IS managers to proactively mitigate insider threats. Given the economic and legal ramifications of insider threats, this research has implications relevant both for both academics and security practitioners
A new perspective on the swiss cheese model applied to understanding the anatomy of healthcare data breaches
© 2018, IGI Global. The healthcare industry has been lagging behind other industries in protecting its vital data. Over the past few years, researchers and practitioners have been trying to gain a better understanding of the anatomy of healthcare data breaches. In this chapter, the authors show how Reason\u27s swiss cheese model (SCM) provides a powerful analytic model to explain the human, technical, and organizational factors of healthcare data breaches. They also show how the SCM brings forwards the latent conditions of healthcare data breach incidents that have often been overlooked in previous studies. Based on an extensive literature review and an analysis of reported breaches from credible sources, the authors provide an explanation of the cheese layers and the associated holes. Since the SCM endorses the defenses in depth approach, it can assist healthcare organizations and business associates in developing a comprehensive and systematic approach to prevent and mitigate data breach incidents
Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Over the past few years, concerns related to healthcare data privacy have been mounting since healthcare information has become more digitized, distributed and mobile. However, very little is known about the root cause of data breach incidents; making it difficult for healthcare organizations to establish proper security controls and defenses. Through a systematic review and synthesis of data breaches literature, and using databases of earlier reported healthcare data breaches, the authors re-examine and analyze the causal factors behind healthcare data breaches. The authors then use the Swiss Cheese Model (SCM) to shed light on the technical, organizational and human factors of these breaches. The author\u27s research suggests that incorporating the SCM concepts into the healthcare security policies and procedures can assist healthcare providers in assessing the vulnerabilities and risks associated with the maintenance and transmission of protected health information
A wireless environmental sensor network for the condition monitoring of paper rolls at printing facilities
A continuous monitoring system, based on wireless sensor networks, is proposed to help preserve paper rolls at printing facilities and paper mills. The system consists of four main components: environmental monitoring nodes, a base station, an application/database server and a remote monitoring station. By continuously monitoring temperature and moisture levels, the system is able to alert maintenance staff to take appropriate actions when the monitored environmental levels go beyond their operating range. The sensor nodes can also be configured to proactively take corrective actions to readjust the temperature and moisture levels. As a pilot study, a prototype system was successfully built for the remote monitoring of temperature and humidity at a local printing facility. This study demonstrates the successful application of wireless sensors to help safeguard paper stock and reduce unplanned production down-time at printing facilities and paper mills. © 2014 Inderscience Enterprises Ltd
Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention
© 2016 by IGI Global. All rights reserved. Over the past few years, concerns related to healthcare data privacy have been mounting since healthcare information has become more digitized, distributed and mobile. However, very little is known about the root cause of data breach incidents; making it difficult for healthcare organizations to establish proper security controls and defenses. Through a systematic review and synthesis of data breaches literature, and using databases of earlier reported healthcare data breaches, the authors re-examine and analyze the causal factors behind healthcare data breaches. The authors then use the Swiss Cheese Model (SCM) to shed light on the technical, organizational and human factors of these breaches. The author\u27s research suggests that incorporating the SCM concepts into the healthcare security policies and procedures can assist healthcare providers in assessing the vulnerabilities and risks associated with the maintenance and transmission of protected health information
- …