41 research outputs found

    "Hey You? Get Off My Cloud": Evaluation of Cloud Service Models for Business Value within Pharma X

    Get PDF
    Recent reports note that managers need to operate at the intersection of business and current innovative technology. Most notably, "Strategy is not just informed by technology but powered by it". The opportunity to evaluate aspects of "cloud service models", as critical new systems, is therefore invaluable. Our research offers a pragmatic view of the characteristics of these technologies and a useful approach for identifying which may be most suitable in relation to the generation of business value. An example is provided of cloud service requirements within a multi-national pharmaceutical company (Pharma X) which is considered as a complex organizational context of significant interest. A highly qualitative methodological approach was adopted from personal interviews with a number of senior managers involved in new technology adoption. The extent of "benefits", "risks", "when to use" and "when not to use" were determined for a variety of common cloud service models to provide a schematic of important issues for evaluation and development. The research is insightful for large private sector multinational organisations which extends an analysis beyond the usual public sector studies. We conclude with lessons learned which demonstrate the most appropriate cloud enabled business models that support senior managers engaged in cloud service processes

    Measures for improving information security management in organisations: the impact of training and awareness programmes

    Get PDF
    Security breaches have attracted corporate attention and major organisations are now determined to stop security breaches as they are detrimental to their success. Users’ security awareness and cautious behaviour play an important role in information security both within and outside the organisation. Arguably the most common factor contributing to these breaches is that of human behaviour towards security, which suggests that changes in human behaviour can have an impact on improving security. One of the measures suggested to modify employee behaviour is through training and awareness-raising. However, before effective training and awareness programmes can be developed to achieve this aim, it is essential to understand what factors influence user behaviour and attitudes to information security. For this study, interviews with employees within the public and private sector were conducted to explore factors that influence security behaviour when using information. Our findings offer some preliminary recognition of implications for the designs of more effective training and awareness programmes that assure and sustain, in the long term, the appropriate behaviour towards security
    corecore