Search results for "Information System"

showing 10 items of 2404 documents

ERP Implementation in an SME: A Failure Case

2013

This study examines a failed enterprise resource planning (ERP) implementation in a small-and-medium-sized enterprise (SME). The improper handling of critical success factors (CSFs), particularly those relating to support from top management, project management, and the use of consultants, led to severe problems. This placed stress on the organization, caused employees to leave the company, workarounds, and led to serious errors in the systems and a significant cost overrun. This case study contributes to the literature on ERP implementation in SMEs. In particular, it contributes to our understanding of the socio-technical dynamics of ERP implementation projects. Failed ERP cases are little…

Research literatureCost overrunProcess managementbusiness.industryWorkaroundCritical success factorInformation systemTop managementProject managementbusinessEnterprise resource planning
researchProduct

Panel — Assessing Critical Social Theory Research in Information Systems

1997

The Critical Social Theory (CST) program of information systems research is now just over a decade old. Although the number of researchers associated with the CST program are few, they have had a disproportionately larger impact on the field than other research communities. The main reason for this disproportionate impact can be found in the intense and incisive radical critiques of the foundational assumptions of our field that CST researchers have conducted. These radical critiques have helped to open up the theoretical debate on IS research and point out new directions for future inquiry. But as we turn the century, new challenges are emerging. New information technologies (IT) are rapid…

Research programSocial networkbusiness.industryCritical theoryTheory of Motivated Information ManagementInformation systemEngineering ethicsRationalitySocial complexitySociologyJustice (ethics)business
researchProduct

Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark

2021

AbstractThis paper investigates the functioning of Online Black-Markets (OBMs), i.e. a digital infrastructure operating in the Dark Net that enables the exchange of illegal goods such as drugs, weapons and fake digital identities. OBMs exist notwithstanding adverse conditions such as police interventions, scams and market breakdowns. Relying on a longitudinal case study, we focus on the dynamics of interactions among actors and marketplace technologies and we identify three mechanisms explaining OBMs operations. In particular, we show that OBMs infrastructure is the result of commoditization, platformization and resilience processes. Our contribution relies on the identification of communit…

ResilienceComputer Networks and CommunicationsAdverse conditionsDarknetDarknetSocial commerceMarketplaceSocial commerceArticleDigital infrastructureTheoretical Computer ScienceIdentification (information)VDP::Mathematics and natural science: 400::Information and communication science: 420BusinessCommoditizationResilience (network)SoftwareIndustrial organizationDigital infrastructure Darknet Marketplace Resilience Social commerceInformation Systems
researchProduct

Online pricing for demand-side management in a low-voltage resistive micro-grid via a Stackelberg game with incentive strategies

2022

It has been demonstrated that online pricing mechanisms are a viable solution for demand side management in power systems. This study deals with the analysis and design of a droop-controlled low-voltage resistive AC micro-grid network system. Such a system is subjected to a dynamic demand obtained from an online pricing mechanism, which is proposed as a novelty in the study of micro-grids. This mechanism is derived from a variation of the Stackelberg game, which includes the use of incentive strategies. First, a configuration in which a supplier announces an incentive function and (Formula presented.) -consumers’ reaction to the resulting personalised price is presented. Then, a detailed st…

Resistive touchscreenMathematical optimizationDemand sideIncentiveComputer Networks and CommunicationsComputer scienceStackelberg competitionMicro gridElectrical and Electronic EngineeringLow voltageInformation Systems
researchProduct

A global network for the control of snail-borne disease using satellite surveillance and geographic information systems

2001

Abstract At a team residency sponsored by the Rockefeller Foundation in Bellagio, Italy, 10-14 April 2000 an organizational plan was conceived to create a global network of collaborating health workers and earth scientists dedicated to the development of computer-based models that can be used for improved control programs for schistosomiasis and other snail-borne diseases of medical and veterinary importance. The models will be assembled using GIS methods, global climate model data, sensor data from earth observing satellites, disease prevalence data, the distribution and abundance of snail hosts, and digital maps of key environmental factors that affect development and propagation of snail…

Resource (biology)GIS DayGeographic information systemDatabases FactualInternational CooperationVeterinary (miscellaneous)SnailsGlobal HealthEnvironmental protectionGlobal networkAnimalsHumansSchistosomiasisMedicineGeographyDigital mappingbusiness.industryEnvironmental resource managementSatellite CommunicationsData sharingInfectious DiseasesInsect ScienceParasitologyThe InternetEnterprise GISbusinessActa Tropica
researchProduct

Design storm prediction and hydrologic modeling using a Web-GIS approach on a Free software platform

2005

Abstract The aim of this work has been to implement a set of procedures useful to automatise the evaluation, the design storm prediction and the flood discharge associated with a selected risk level. For this purpose a Geographic Information System has been implemented using Grass 5.0. One of the main topics of such a system is a georeferenced database of the highest intensity rainfalls and their assigned duration recorded in Sicily. This database contains the main characteristics for more than 250 raingauges, as well as the values of intense rainfall events recorded by these raingauges. These data are managed through the combined use of the PostgreSQL and GRASS-GIS 5.0 databases. Some of t…

Return periodHydrologyAtmospheric ScienceGeographic information systemDatabasebusiness.industryComputer scienceInterface (computing)Hydrological modellingSettore ICAR/02 - Costruzioni Idrauliche E Marittime E Idrologiahydrologyfloodcomputer.software_genreGISCentralized databaseSoftwarefree-softwareGPASSInformation systemDuration (project management)businesscomputer
researchProduct

Hypertext support for the information needs of software maintainers

2004

Making changes safely to programs requires program comprehension and satisfaction of the information needs of software maintainers. In this paper we provide insights into improving hypertext-based software maintenance support by analyzing those information needs. There exists a series of four earlier, detailed-level empirical studies on the information needs of professional C program maintainers. We focus on these studies, synthesize their results and determine sources from which the required information might be attained. An experimental research tool, the HyperSoft system, is used to demonstrate the satisfaction of information needs and the system is analytically evaluated against the nee…

Reverse engineeringComputer sciencebusiness.industryProgram comprehension020207 software engineeringInformation needs02 engineering and technologySoftware maintenancecomputer.software_genrelaw.inventionWorld Wide WebEmpirical researchSoftwarelaw020204 information systems0202 electrical engineering electronic engineering information engineeringProgram slicingHypertextSoftware engineeringbusinesscomputerSoftwareJournal of Software Maintenance and Evolution: Research and Practice
researchProduct

ISAdetect

2020

Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…

Reverse engineeringprosessoritComputer scienceFirmware02 engineering and technologycomputer.file_formatcomputer.software_genrehaittaohjelmatInstruction setObject codeComputer engineering020204 information systemsEndianness0202 electrical engineering electronic engineering information engineeringMalwareesineiden internet020201 artificial intelligence & image processingBinary codeExecutabletietoturvacomputerProceedings of the Tenth ACM Conference on Data and Application Security and Privacy
researchProduct

A Framework to Improve the Disaster Response Through a Knowledge-Based Multi-Agent System

2017

The disaster response still faces problems of collaboration due to lack of policies concerning the information exchange during the response. Moreover, plans are prepared to respond to a disaster, but drills to apply them are limited and do not allow to determine their efficiency and conflicts with other organizations. This paper presents a framework allowing for different organizations involving in the disaster response to assess their collaboration through its simulation using an explicit representation of their knowledge. This framework is based on a multi-agent system composed of three generic agent models to represent the organizational structure of disaster response. The decision-makin…

Risk analysis (engineering)010201 computation theory & mathematicsComputer science[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020204 information systemsMulti-agent system0202 electrical engineering electronic engineering information engineering0102 computer and information sciences02 engineering and technology[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA]Disaster response01 natural sciencesComputingMilieux_MISCELLANEOUS
researchProduct

A critical review on supply chain risk – Definition, measure and modeling

2015

Abstract Economic systems are increasingly prone to complexity and uncertainty. Therefore, making well-informed decisions requires risk analysis, control and mitigation. In some areas such as finance, insurance, crisis management and health care, the importance of considering risk is largely acknowledged and well-elaborated, yet rather heterogeneous concepts and approaches for risk management have been developed. The increased frequency and the severe consequences of past supply chain disruptions have resulted in an increasing interest in risk. This development has led to the adoption of the risk concepts, terminologies and methods from related fields. In this paper, existing approaches for…

Risk analysisSupply chain risk managementInformation Systems and ManagementKnowledge managementbusiness.industryStrategy and ManagementSupply chainRisk management toolsManagement Science and Operations ResearchIT risk managementIT riskRisk analysis (engineering)EconomicsbusinessRisk assessmentRisk managementOmega
researchProduct