37 research outputs found

    Designing Viable Security Solutions

    Get PDF
    Technological solutions that address issues like security, privacy and reliability have been developed by companies and inresearch projects. However, they often appear disconnected from markets, user needs and economic contexts. As a resultseveral security and privacy technologies have become market failures in recent years. Economic issues are often neglectedby technology developers. Instead security solutions continue to be designed with technological factors in mind, valuingincreases in security guarantees and even technical complexity over practical relevance. This paper argues that the widelylamented failure of many security solutions in the market is due to an overly technology- and complexity-driven designapproach. Building on a literature review, we derive a set of factors influencing the viability of security solutions in themarket, and thus the overall security level. We build on earlier approaches and findings from IT security and relateddisciplines, but integrate them in a larger paradigmatic framework targeting specifically the security domain

    MT4j - A Cross-platform Multi-touch Development Framework

    Full text link
    This article describes requirements and challenges of crossplatform multi-touch software engineering, and presents the open source framework Multi-Touch for Java (MT4j) as a solution. MT4j is designed for rapid development of graphically rich applications on a variety of contemporary hardware, from common PCs and notebooks to large-scale ambient displays, as well as different operating systems. The framework has a special focus on making multi-touch software development easier and more efficient. Architecture and abstractions used by MT4j are described, and implementations of several common use cases are presented.Comment: ACM EICS 2010, Workshop: Engineering patterns for multi-touch interfaces (2010), p. 52-5

    Mobiles ortsbezogenes Projektmanagement

    Full text link
    Classic project management and its tools usually deal with the management of three variables, and their relationships with each other. These are the factors of time, resources (cost) and quality. If one of the variables is to be improved, it always has negative effects on the other two. However, these factors only partially describe the reality of project management. What current project management tools often only consider implicitly is the location of an activity. In this paper, the implications of using location data for project management are clarified and a system that offers mobile support in planning and implementing projects. ----- Klassisches Projektmanagement und seine Werkzeuge befassen sich meist mit der Verwaltung dreier Gr\"o{\ss}en und ihrer Zusammenh\"ange untereinander. Dabei handelt es sich um die Faktoren Zeit, Ressourcen (Kosten) und Qualit\"at. Falls eine der Gr\"o{\ss}en verbessert werden soll, hat dies immer negative Auswirkungen auf die anderen beiden Gr\"o{\ss}en. Diese Gr\"o{\ss}en beschreiben die Ph\"anomene des Projektmanagement jedoch nur unvollst\"andig. Was bei Projektmanagementwerkzeugen bis dato oft nur implizit durch den Projektleiter einbezogen wird ist ein Ortsbezug. In diesem Beitrag werden die Implikationen durch diesen Ortsbezug konkretisiert und ein System dargestellt, welches Projektleiter bei der Planung und Umsetzung von Projekten mobil wie auch station\"ar unterst\"utzt.Comment: 5 pages, in German; preprint, to appear in GI/ITG KuVS Fachgespr\"ach "Ortsbezogene Anwendungen und Dienste" 201

    Consumer-Based Ranking for Strategic Selection of IoT Business Models

    Get PDF
    The digitization of business environments requires companies to be more consumer-centric than before. In the course of these adjustments, managers operate in the area of conflict between value creation for the firm, consumers’ limited willingness to pay for products and services, and the need to gain and maintain consumers’ trust. To support managers in the challenge to redefine their business models to fit the new digitized business environment, we suggest that managers should incorporate consumer\u27s attitudes towards Internet of Things (IoT) business models in their strategic business model choice. Based on a choice experiment with 301 individuals, we identified a set of business models ranked according to the probability that users are most likely to agree with, and thus accept. The results of the study provide direct indications about which IoT business models are from a consumer perspective desirable and which not so that managers can directly implement these insights in practice

    Mobility in a Globalised World

    Get PDF
    The term mobility has different meanings in the following academic disciplines. In economics, mobility is the ability of an individual or a group to improve their economic status in relation to income and wealth within their lifetime or between generations. In information systems and computer science, mobility is used for the concept of mobile computing, in which a computer is transported by a person during normal use. Logistics creates, by the design of logistics networks, the infrastructure for the mobility of people and goods. Electric mobility is one of today’s solutions from engineering perspective to reduce the need of energy resources and environmental impact. Moreover, for urban planning, mobility is the crunch question about how to optimize the different needs for mobility and how to link different transportation systems. The conference “Mobility in a Globalised World” took place in Iserlohn, Germany, on September 14th – 15th, 2011. The aim of this conference was to provide an interdisciplinary forum for the exchange of ideas among practitioners, researchers, and government officials regarding the different modes of mobility in a globalised world, focusing on both domestic and international issues. The proceedings at hand document the results of the presentations and ensuing discussions at the conference

    Mobility in a Globalised World 2012

    Get PDF
    The term mobility has different meanings in the following science disciplines. In economics, mobility is the ability of an individual or a group to improve their economic status in relation to income and wealth within their lifetime or between generations. In information systems and computer science, mobility is used for the concept of mobile computing, in which a computer is transported by a person during normal use. By designing logistics networks, logistics creates the infrastructure for the mobility of people and goods. Electric mobility is one of today’s solutions from an engineering perspective to the problem of reducing the need for energy resources and environmental impact. Finally, for urban planning, mobility is the crunch question as to how to optimise the different needs for mobility and how to link different transportation systems. In this publication we have collected the ideas of practitioners, researchers, and government officials about the different modes of mobility in a globalised world, focusing on both domestic and international issues

    Integrating qualified electronic signatures with password legacy systems

    Get PDF
    Heiko RoĂźnagel and Jan Zibuschka propose a method to achieve single sign on using qualified electronic signatures that can be used for all e-commerce site

    Learning to Learn: Facets of Generativity in Machine Learning Frameworks

    No full text
    We study the spread of several leading machine learning frameworks underlying the current permeation of artificial intelligence in information systems through the lens of generativity. Empirical evidence indicates that machine learning frameworks do, indeed, exhibit generativity. We further identify three different types of generativity in the frameworks’ development process: evolutionary, combinatorial, and reciprocal generativity. We demonstrate predictive relations of those facets of generativity to related constructs like popularity, activity, and growth empirically, based on an analysis of longitudinal archival data. Empirical analysis further demonstrates that all three facets should be selected as part of a comprehensive predictive model of generativity. The research procedure follows an iterative methodology that facilitates the connection of this work\u27s findings to the broader information systems field

    On Some Conjectures in IT Security: The Case for Viable Security Solutions

    No full text
    Abstract: Due to the increased utilization of computers and the Internet the importance of IT security has also increased. Naturally the field of IT security has grown significantly and has provided manyvaluable contributions in recent years. Most of the work is concerned with the design of systems offering strong technological security. With regard to behavioural factors, researchers build their work on assumptions about human behaviour that are prevalent in the field of IT security without considering the results and insights of related disciplines. In this contribution we challenge some of these widely held conjectures and offer alternative interpretations based on the results of neighbouring disciplines. Based on this analysis, we suggest new directions for the design of security solutions that support the inclusion of insights from reference disciplines during the design process.
    corecore