19 research outputs found

    Cargo Cults in Information Systems Development: a Definition and an Analytical Framework

    Get PDF
    Organizations today adopt agile information systems development methods (ISDM), but many do not succeed with the adoption process and in achieving desired results. Systems developers sometimes fail in efficient use of ISDM, often due to a lack of understanding the fundamental intentions of the chosen method. In many cases organizations simply imitate the behavior of others without really understanding why. This conceptual paper defines this phenomenon as an ISDM cargo cult behavior and proposes an analytical framework to identify such situations. The concept of cargo cults originally comes from the field of social anthropology and has been used to explain irrational, ritualistic imitation of certain behavior. By defining and introducing the concept in the field of information systems development we provide a diagnostic tool to better understand one of the reasons why ISDM adoption sometimes fail

    Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem

    No full text
    Patricia AH Williams, Andrew J Woodward eHealth Research Group and Security Research Institute, Edith Cowan University, Perth, WA, Australia Abstract: The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. Keywords: cybersecurity, security, safety, wireless, risk, medical device

    2 - Epi-3,6-dithio-2,5-diketopiperazines (ETPs): an overview of synthetic approaches to the ETP core

    No full text
    This chapter reports on the different types of both monomeric and dimeric epi-3,6-dithio-2,5-diketopiperazines (ETPs). The ETP core chemical scaffold has been reported in over 100 natural products and their diverse antiviral, antifungal, antibacterial, and anticancer activities have attracted the interest of many researchers. Herein, we describe different examples and synthetic approaches attempted to obtain the ETP core structure, characterised by a diketopiperazine ring bridged by two (or more) sulfur atoms at the three and six positions
    corecore