293 research outputs found

    The Implementation of Governance Risk and Compliance Information Systems (GRC IS): Adoption Lifecycle and Enterprise Value

    Get PDF
    Governance, Risk and Compliance (GRC) has become an emerging field within the IS academic community. Motivated by this research direction, the study capitalizes on the theoretical background of Enterprise Systems (ES) and extends the focus on GRC systems’ implementation (enterprise value and lifecycle). Building upon expert views on GRC IS implementation projects, the analysis indicates that the three value drivers of integration; optimization and information should be considered throughout the whole GRC IS implementation lifecycle

    Understanding governance, risk and compliance information systems (GRC IS): the experts view

    Get PDF
    Although Governance, Risk and Compliance (GRC) is an emerging field of study within the information systems (IS) academic community, the concept behind the acronym has to still be demystified and further investigated. The study investigates GRC systems in depth by (a) reviewing the literature on existing GRC studies, and (b) presenting a field study on views about GRC application by professional experts. The aim of this exploratory study is to understand the aspects and the nature of the GRC system following an enterprise systems approach. The result of this study is a framework of particular GRC characteristics that need to be taken into consideration when these systems are put in place. This framework includes specific areas such as: goals and objectives, purpose of the system, key stakeholders, methodology and requirements prior to implementation, critical success factors and problems/barriers. Further discussion about the issues, the concerns and the diverse views on GRC would assist in developing an agenda for the future research on the GRC field

    More supportive or more distractive?:Investigating the negative effects of technology at the customer interface

    Get PDF
    The continuous development of technology leads to stimuli-dense consumption environments for consumers. Although the literature primarily highlighted the advantages of adopting technologies to support consumers’ decision-making process, these systems may also require too much attention and excessive effort to be considered always rewarding. Accordingly, this special issue addresses the interplay between technology-supported consumption experiences and the related distracting mechanisms triggered by this interaction in varied contexts. Specifically, the actual collection of papers in this special issue covers three main themes: (1) conceptualizing a Customer Smartphone Distraction (CSD) organizing framework, (2) drivers (including musical atmosphere, the context of the application, parasocial interaction and anthropomorphisms of virtual agents), and (3) consequences (cognitive, affective and behavioral responses, including sensory overload and discomfort)

    Organizational cloud security and control: a proactive approach

    Get PDF
    Purpose The purpose of this paper is to unfold the perceptions around additional security in cloud environments by highlighting the importance of controlling mechanisms as an approach to the ethical use of the systems. The study focuses on the effects of the controlling mechanisms in maintaining an overall secure position for the cloud and the mediating role of the ethical behavior in this relationship. Design/methodology/approach A case study was conducted, examining the adoption of managed cloud security services as a means of control, as well as a large-scale survey with the views of IT decision makers about the effects of such adoption to the overall cloud security. Findings The findings indicate that there is indeed a positive relationship between the adoption of controlling mechanisms and the maintenance of overall cloud security, which increases when the users follow an ethical behavior in the use of the cloud. A framework based on the findings is built suggesting a research agenda for the future and a conceptualization of the field. Research limitations/implications One of the major limitations of the study is the fact that the data collection was based on the perceptions of IT decision makers from a cross-section of industries; however the proposed framework should also be examined in industry-specific context. Although the firm size was indicated as a high influencing factor, it was not considered for this study, as the data collection targeted a range of organizations from various sizes. Originality/value This study extends the research of IS security behavior based on the notion that individuals (clients and providers of cloud infrastructure) are protecting something separate from themselves, in a cloud-based environment, sharing responsibility and trust with their peers. The organization in this context is focusing on managed security solutions as a proactive measurement to preserve cloud security in cloud environments

    IoT and analytical practices in traditional industries: A view of the farming and agricultural sector

    Get PDF
    IoT and analytical practices in traditional industries: A view of the farming and agricultural secto

    Access control and quality attributes of open data: Applications and techniques

    Get PDF
    Open Datasets provide one of the most popular ways to acquire insight and information about individuals, organizations and multiple streams of knowledge. Exploring Open Datasets by applying comprehensive and rigorous techniques for data processing can provide the ground for innovation and value for everyone if the data are handled in a legal and controlled way. In our study, we propose an argumentation and abductive reasoning approach for data processing which is based on the data quality background. Explicitly, we draw on the literature of data management and quality for the attributes of the data, and we extend this background through the development of our techniques. Our aim is to provide herein a brief overview of the data quality aspects, as well as indicative applications and examples of our approach. Our overall objective is to bring serious intent and propose a structured way for access control and processing of open data with a focus on the data quality aspects

    Making sense of business analytics : the case of two start-ups

    Get PDF
    Business analytics have enabled businesses to leverage unstructured and dispersed data in order to improve their operations and position themselves better within a highly turbulent environment. While much discussion has been focused on how businesses can move from data to insights to decision making, much less is known around how businesses actually interpret the insights provided by business analytics tools. This extended abstract proposes the use of sense-making as the theoretical lens for interpreting these insights, combined with contextual information. We will be using two case studies to further explore the applicability of our proposition
    • …
    corecore