39 research outputs found

    Information Security in Value Chains: A Governance Perspective

    Get PDF

    Securing Serverless Computing

    Get PDF
    Serverless applications are based on a microservices-oriented system design, often consisting of several services, each with distinct functions that are composed and orchestrated to deliver specific functionality. The architecture allows firms to build and deploy software applications without consideration towards provisioning or maintaining the underlying infrastructure. The novelty of the architecture and its inherent characteristics present new challenges for cybersecurity. We discuss the security imperatives of this emerging cloud computing software paradigm. We then identify some of the approaches and practices that can be used by organizations to mitigate security threats in the context of serverless computing

    Who are our students? A profile of IS majors

    Get PDF
    The decline in IS enrollments since 2002 have been a cause of serious concern for IS departments. Many programs have closed IS departments, reduced in size or merged with other departments. IS faculty and associations have taken numerous steps to stem the tide of declining enrollments such as redesigning the IS curricula, forming partnerships with alumni and IS professionals, improved marketing and information dissemination to alleviate myths and stereotypes as well as apprise students of the global opportunities available in IS. An understanding of the IS student will help us better target programs and approaches to reduce the enrollment decline. This study seeks to answer this question about the academic standing, demographic profile and satisfaction levels of the IS student by analyzing the 277,238 exit surveys of which 13,910 are from IS majors from 344 US business schools for the period 1999 – 2007

    A Socio-technical Approach to CASE and the Software Development Process

    Get PDF
    An increasing number of organizations are adopting computer aided software engineering (CASE) technology to support their system development process. Proponents of CASE predict that its use will improve development productivity, reduce backlog, and improve software quality (Forte and Norman, 1992). At the same time, there is evidence to indicate that CASE technology may not meet these expectations (Orlikowski, 1992). One of the reasons identified has been the substantial changes required to the development process for implementing CASE (Fichman and Kemerer, 1993). The paper adopts a socio-technical-system based framework for examining CASE in the context of software development process. Analysis of the socio-technical context of CASE adoption and the software development process could suggest implications of different change management strategies and extend our understanding of existing research result

    A Mediated Impacts Model of Demand Volatility on Inventory Flow Integration in Supply Chains

    Get PDF
    We develop a theoretical model about how organizations cope with the bullwhip effect created by consumer demand uncertainty through product modularity and information sharing across the supply chain. Unpredictability of consumer demand is likely to accentuate inventory flows in the supply chain. Information sharing and product modularity can be used by organizations to mediate the impact of uncertain product demand on inventory flow integration. An organization’s success in coping with the bullwhip effect is reflected in the degree to which inventory flows are integrated across the supply chain. Our results suggest that (1) information sharing is essential for achieving integration of inventory flows irrespective of the demand environment, and (2) the strategy of modular product design can help organizations enhance inventory flows under conditions of consumer demand uncertainty

    Adopting New Software: Drivers of Voluntary Adoption in the same Product Category

    Get PDF
    Information systems use research has investigated post-adoption issues as a means for identifying the factors that are relevant for long term IS success. Our objective in this study is to investigate voluntary adoption decisions of new software in an organizational setting. We study how attributes of prior use, perceived ease of use and perceived usefulness affect knowledge transferability and adoption intention of new software in the same primary base domain. Out study was based in the context of changeover of a course management system at a small Southern University. Data was collected from 81 faculty members about their intention to adopt the new CMS. Results indicate that in the context of voluntary adoption of new software in the same primary base domain, habit and knowledge transferability are positively associated with adoption intention while frequency of feature use is negatively associated

    The Impact of Technology Characteristics on Infusion of Software Development Tools

    Get PDF
    Innovation diffusion research is a widely accepted theoretical basis for studying IT implementation but has many limitations. In view of these limitations some researchers have proposed that infusion of IT innovations in organizations should be studied. This paper empirically studies the impact of technology characteristics on infusion of systems development tools in organizations. The results indicate that while subsystem compatibility and scope of development tools strongly influenced infusion, methodology compatibility had no impact on infusio
    corecore