5 research outputs found

    Enterprise Content Management - A Literature Review

    Get PDF
    Managing information and content on an enterprise-wide scale is challenging. Enterprise content management (ECM) can be considered as an integrated approach to information management. While this concept received much attention from practitioners, ECM research is still an emerging field of IS research. Most authors that deal with ECM claim that there is little scholarly literature available. After approximately one decade of ECM research, this paper provides an in-depth review of the body of academic research: the ECM domain, its evolution, and main topics are characterized. An established ECM research framework is adopted, refined, and explained with its associated elements and working definitions. On this basis, 68 articles are reviewed, classified, and concepts are derived. Prior research is synthesized and findings are integrated in a concept-centric way. Further, implications for research and practice, including future trends, are drawn

    TOWARDS A PROCESS-ORIENTED APPROACH TO ASSESSING, CLASSIFYING AND VISUALIZING ENTERPRISE CONTENT WITH DOCUMENT MAPS

    Get PDF
    Nowadays, documents can be scattered across a company in different versions, formats, and languages, and even on different systems. Not only is the resulting content chaos inefficient, it brings with it a number of risks. However, information that is contained in unstructured documents is increasingly becoming a key business resource. Enterprise content management (ECM) is used to manage unstructured content on an enterprise-wide scale. Despite the practical importance of ECM, research is still at an immature state and the process perspective is widely neglected. We suggest a process-oriented approach to identifying, assessing, documenting, classifying and visualizing enterprise content. Within a globally operating engineering company, we check to what extent the applicability of the designed research artifact can be assumed. We give process-oriented guidelines to identify and document enterprise content. Our 7W Framework (7WF) for content assessment contains a collection of metadata (attributes, typical attribute values) to create customized content surveys. Different visual representations of content are proposed, including a document map. Combining business processes and the content of an enterprise, the document map is able to integrate the ECM perspectives and provides decision support. Technical requirements can be derived from it and in-depth analysis of business-critical content is enabled

    Information security awareness and behavior: A theory-based literature review

    Get PDF
    Purpose – This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature. Design/methodology/approach – This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories. Findings – The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented. Research limitations/implications – Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum. Practical implications – This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs. Originality/value – This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out. © Emerald Group Publishing Limited

    Technical Design Report for PANDA Electromagnetic Calorimeter (EMC)

    No full text
    This document presents the technical layout and the envisaged performance of the Electromagnetic Calorimeter (EMC) for the PANDA target spectrometer. The EMC has been designed to meet the physics goals of the PANDA experiment, which is being developed for the Facility for Antiproton and Ion Research (FAIR) at Darmstadt, Germany. The performance figures are based on extensive prototype tests and radiation hardness studies. The document shows that the EMC is ready for construction up to the front-end electronics interface
    corecore