The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Heterogeneity of future networks requires the use of extensible models to understand the Security and QoS tradeoff. We believe that a good starting point is to analyze the Security and QoS tradeoff from a parametric point of view and, for this reason, in a previous paper, we defined the Parametric Relationship Model (PRM) to define relationships between Security and QoS parameters. In this paper,...
Nowadays, most classrooms are equipped with technological resources and Internet connection, which enables access to an endless amount of tools that may contribute for a paradigm shift in teaching and learning. In spite of the availability of these technological resources, we seldom find pedagogical practices grounded upon institutional guidelines which make the best of these tools. This is partly...
The emergence of new wireless technologies opened new opportunities to develop more efficient information systems. RFID is among those technologies, which extended the potential of wireless identification, and represent a potential replacement to old-fashioned identification systems such as the barcode system in retail sales. This paper presents a new RFID-based cost efficient approach for pervasive...
Many businesses today are struggling to find a better and substantive IT capability to achieve its competitive advantage. Therefore, this study aims to explore how organizational learning orientation may be the driver that may strengthen organizational IT capability. In the context of this study, organizational learning orientation involves commitment to learning, shared vision, open-mindedness, and...
The paper reviews work performed as part of the ISAES (Interoperable eSystems for Africa Enhanced by Satellites) Study. Global empirical evidence on national and district eHealth platforms was gathered, and opportunities and challenges analysed towards designing an eHealth platform for sub-Saharan Africa (SSA). The approach, method, and selection criteria for identifying and describing global good...
The need for a measurement regime to enable effective project control is well recognized. Additionally there is an increased need to understand the technical progression of projects, especially where projects have high levels of inherent complexity; have to develop solutions in complex environments; or both. Investigations have shown the difficulty in both the implementation and the use of a measurement...
The use of spreadsheets to implement Information Systems is widespread in industry. Scripting languages and ad-hoc frameworks (e.g., Visual Basic for Applications) for Rapid Application Development are often exploited by organizations to quickly develop Spreadsheets-based Information Systems for supporting the information management of their business processes. Maintenance tasks on these systems can...
Military command and control networks exist in the context of System of Systems. In a near-peer land combat environment, the benefits conferred to a commander by a networked command and control system make that network a highly desirable cyber target. This paper contends that the successful compromise of a command and control system, in conjunction with an integrated deception plan, leads to the degradation...
After the vision of Mark Wieser, and the advent of 3G connection with a large number of mobile computing devices(PDAs, Smartphones, Tablet, etc.) that have democratized access to information anywhere, we live in a new era of ubiquity where a set of services are offered in our environments. In this work we try to review the conception, discovery and composition of these services called pervasive in...
IT outsourcing has got a high priority in science and practice. Scientifically is also Cloud Computing as a partial- and full IT outsourcing approach discussed. Technological and market-related developments in scientific research and economic reality provide the motivation to process the state-of-the-art and future considerations of IT outsourcing in a literature review. Overall, from 2000 to 2012,...
Information Systems (IS) are primary enablers in instigating organisational change, increasing organisational responsiveness and decreasing supply chain overheads. This paper aims to contribute through exploring and visualising Knowledge Mapping (KM) from the perspective of Information Systems Investment Evaluation (ISIE). Complexity of IS evaluation process increases with the increase in intricacy...
The paper introduces a structured logic for iterative and incremental accumulation of a design theory during a research project and across research programs. The logic is proposed to help researchers understand the links between parallel search spaces related to a particular design and linking to theoretical knowledge bases produced by previous search processes. The proposition rests on the notion...
There is little consensus among researchers and practitioners on how best to measure IS impact and on what level to assess this impact. Although various dimensions of IS impact, such as individual impact and organizational impact, have been proposed, the number and type of IS impact's dimensions and how these dimensions can be measured remain unclear. This paper contributes to IS research by synthesizing...
Information and Communications Technology-enabled international sourcing of software-intensive systems and services (eSourcing) is increasingly used as a means of adding value, reducing costs, sharing risks, and achieving strategic aims. To maximally reap the benefits from eSourcing and to mitigate the risks, providers and clients have to be aware of and build capabilities for the eSourcing life-cycle...
In this paper, we examine outsourcing of disaggregated information-intensive services. Drawing on the theoretical streams of Global Information-Intensive Service Disaggregation and Transaction-Cost Economics, we formulate our research model to understand the phenomenon of disaggregation in the context of cloud computing. The model encompasses frequency, asset specificity, uncertainty, information...
In this paper, we introduce a simulation-based, evolutionary approach for analyzing and improving the security of complex information systems. Rather than following a purely technical approach, we bring in a social and behavioral perspective through a combination of conceptual security knowledge modeling, behavioral modeling of threat agents, simulation of attacks, and evolutionary optimization. Based...
The increasing availability of digital data offers new opportunities for analyzing business processes. Process aware information systems like Enterprise Resource Planning systems store data in the course of transaction processing. This data can be exploited by using process mining techniques. Process mining algorithms produce process models by analyzing recorded event logs. A fundamental challenge...
One of the most recent advancements in the use of internet for customer-level business management is the ability to track individual customers' activities, approach them proactively, provide customized offerings and manage customer lifecycles. Moving from managing the community to managing its individual members is the common denominator in many related developments. Customer co-created contents,...
This paper addresses the critical issue of legitimacy in relation to e-government by focusing on public e-services to citizens. The discussion is framed through a tentative model on how to integrate legitimacy in design and development of e-government. In theory legitimacy is built on legality and trust towards and within the state. In practice it is developed through a socio-technical collaborative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.