210 research outputs found

    The IT-CMF: A Practical Application of Design Science

    Get PDF
    The IT-Capability Maturity Model [IT-CMF] is a high-level process capability maturity framework for managing the IT function within an organization. The purpose of this paper is to explore and explain the IT-CMF as a “ method meta-model” for IT management, emphasizing the novel approach to addressing the application of design processes and design artifacts by means of a very structured use of engaged scholarship and open innovation techniques to the ongoing challenge of managing organization’s IT capability

    Governance of Offshore IT Outsourcing at Shell Global Functions IT-BAM Development and Application of a Governance Framework to Improve Outsourcing Relationships

    Get PDF
    The lack of effective IT governance is widely recognized as a key inhibitor to successful global IT outsourcing relationships. In this study we present the development and application of a governance framework to improve outsourcing relationships. The approach used to developing an IT governance framework includes a meta model and a customization process to fit the framework to the target organization. The IT governance framework consists of four different elements (1) organisational structures, (2) joint processes between in- and outsourcer, (3) responsibilities that link roles to processes and (4) a diverse set of control indicators to measure the success of the relationship. The IT governance framework is put in practice in Shell GFIT BAM, a part of Shell that concluded to have a lack of management control over at least one of their outsourcing relationships. In a workshop the governance framework was used to perform a gap analysis between the current and desired governance. Several gaps were identified in the way roles and responsibilities are assigned and joint processes are set-up. Moreover, this workshop also showed the usefulness and usability of the IT governance framework in structuring, providing input and managing stakeholders in the discussions around IT governance

    Creation, Transfer, and Diffusion of Innovation in Organizations and Society: Information Systems Design Science Research for Human Benefit

    Full text link
    International audienceDesign science research is a way of creating and studying new technological phenomena, where the understanding comes from inventing, designing, and building new forms of solutions to problems. It has been touted as a new means for the IS field to improve its relevance as the resulting design artifact(s) can directly be used to solve relevant problems. DSR is different from other types of research in its focus on building artifacts and learning from the use and application of the artifacts. It is different in that it engages reality in a way that no descriptive or observational research method can. DSR shares the iterative process with action research but can take place in a laboratory without any involvement of users as researchers (Iivari and Venable 2009)

    ON COMPUTER SIMULATION AS A COMPONENT IN INFORMATION SYSTEMS RESEARCH

    Get PDF
    Computer simulation is widely regarded as a useful activity during various phases of research. However, depending on its context, the meaning, definition, and focus of the term can vary: In traffic planning, for example, simulation is used to determine useful configurations of a road network, thus focusing on the environment. An entirely different perspective is used within multi-agent systems. In such settings, the environment of the agents remains static, while the interesting research questions concern the behavior of the agents themselves. The research focuses on the microscopic level and the resulting emergent behavior. This article puts such diverse meanings in the context of a research process that treats descriptive and prescriptive research as two sides of the same coin. We develop a framework to classify different types of simulation, based on the actual research activity they are intended to be used for. Two case studies supplement the framework

    A screen for hoxb1-regulated genes identifies ppp1r14al as a regulator of the rhombomere 4 Fgf-signaling center

    Get PDF
    AbstractSegmentation of the vertebrate hindbrain into multiple rhombomeres is essential for proper formation of the cerebellum, cranial nerves and cranial neural crest. Paralog group 1 (PG1) hox genes are expressed early in the caudal hindbrain and are required for rhombomere formation. Accordingly, loss of PG1 hox function disrupts development of caudal rhombomeres in model organisms and causes brainstem defects, associated with cognitive impairment, in humans. In spite of this important role for PG1 hox genes, transcriptional targets of PG1 proteins are not well characterized. Here we use ectopic expression together with embryonic dissection to identify novel targets of the zebrafish PG1 gene hoxb1b. Of 100 genes up-regulated by hoxb1b, 54 were examined and 25 were found to represent novel hoxb1b regulated hindbrain genes. The ppp1r14al gene was analyzed in greater detail and our results indicate that Hoxb1b is likely to directly regulate ppp1r14al expression in rhombomere 4. Furthermore, ppp1r14al is essential for establishment of the earliest hindbrain signaling-center in rhombomere 4 by regulating expression of fgf3

    Generic Business Model Types for Enterprise Mashup Intermediaries

    Get PDF
    The huge demand for situational and ad-hoc applications desired by the mass of business end users led to a new kind of Web applications, well-known as Enterprise Mashups. Users with no or limited programming skills are empowered to leverage in a collaborative manner existing Mashup components by combining and reusing company internal and external resources within minutes to new value added applications. Thereby, Enterprise Mashup environments interact as intermediaries to match the supply of providers and demand of consumers. By following the design science approach, we propose an interaction phase model artefact based on market transaction phases to structure required intermediary features. By means of five case studies, we demonstrate the application of the designed model and identify three generic business model types for Enterprise Mashups intermediaries (directory, broker, and marketplace). So far, intermediaries following a real marketplace business model don’t exist in context of Enterprise Mashups and require further research for this emerging paradigm

    What Shall I Do Next? Intention Mining for Flexible Process Enactment

    No full text
    International audienceBesides the benefits of flexible processes, practical implementations of process aware information systems have also revealed difficulties encountered by process participants during enactment. Several support and guidance solutions based on process mining have been proposed, but they lack a suitable semantics for human reasoning and decisions making as they mainly rely on low level activities. Applying design science, we created FlexPAISSeer, an intention mining oriented approach, with its component artifacts: 1) IntentMiner which discovers the intentional model of the executable process in an unsupervised manner; 2) In-tentRecommender which generates recommendations as intentions and confidence factors, based on the mined intentional process model and probabilistic calculus. The artifacts were evaluated in a case study with a Netherlands software company, using a Childcare system that allows flexible data-driven process enactment

    Secure Mobile Support of Independent Sales Agencies

    Get PDF
    Sales agents depend on mobile support systems for their daily work. Independent sales agencies, however, are not able to facilitate this kind of mobile support on their own due to their small size and lack of the necessary funds. Since their processes correlate with confidential information and include the initiation and alteration of legally binding transactions they have a high need for security. In this contribution we first propose an IT-artifact consisting of a service platform that supports multi-vendor sales processes based on previous work. We then analyze use cases of sales representatives of independent sales agencies using this system and derive their security requirements. We then propose a security extension to the IT-artifact and evaluate this extension by comparing it to existing solutions. Our results show that the proposed artifact extension provides a more convenient and secure solution than already existing approaches
    • …
    corecore