Search results for "Information System"
showing 10 items of 2404 documents
ERP Implementation in an SME: A Failure Case
2013
This study examines a failed enterprise resource planning (ERP) implementation in a small-and-medium-sized enterprise (SME). The improper handling of critical success factors (CSFs), particularly those relating to support from top management, project management, and the use of consultants, led to severe problems. This placed stress on the organization, caused employees to leave the company, workarounds, and led to serious errors in the systems and a significant cost overrun. This case study contributes to the literature on ERP implementation in SMEs. In particular, it contributes to our understanding of the socio-technical dynamics of ERP implementation projects. Failed ERP cases are little…
Panel — Assessing Critical Social Theory Research in Information Systems
1997
The Critical Social Theory (CST) program of information systems research is now just over a decade old. Although the number of researchers associated with the CST program are few, they have had a disproportionately larger impact on the field than other research communities. The main reason for this disproportionate impact can be found in the intense and incisive radical critiques of the foundational assumptions of our field that CST researchers have conducted. These radical critiques have helped to open up the theoretical debate on IS research and point out new directions for future inquiry. But as we turn the century, new challenges are emerging. New information technologies (IT) are rapid…
Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark
2021
AbstractThis paper investigates the functioning of Online Black-Markets (OBMs), i.e. a digital infrastructure operating in the Dark Net that enables the exchange of illegal goods such as drugs, weapons and fake digital identities. OBMs exist notwithstanding adverse conditions such as police interventions, scams and market breakdowns. Relying on a longitudinal case study, we focus on the dynamics of interactions among actors and marketplace technologies and we identify three mechanisms explaining OBMs operations. In particular, we show that OBMs infrastructure is the result of commoditization, platformization and resilience processes. Our contribution relies on the identification of communit…
Online pricing for demand-side management in a low-voltage resistive micro-grid via a Stackelberg game with incentive strategies
2022
It has been demonstrated that online pricing mechanisms are a viable solution for demand side management in power systems. This study deals with the analysis and design of a droop-controlled low-voltage resistive AC micro-grid network system. Such a system is subjected to a dynamic demand obtained from an online pricing mechanism, which is proposed as a novelty in the study of micro-grids. This mechanism is derived from a variation of the Stackelberg game, which includes the use of incentive strategies. First, a configuration in which a supplier announces an incentive function and (Formula presented.) -consumers’ reaction to the resulting personalised price is presented. Then, a detailed st…
A global network for the control of snail-borne disease using satellite surveillance and geographic information systems
2001
Abstract At a team residency sponsored by the Rockefeller Foundation in Bellagio, Italy, 10-14 April 2000 an organizational plan was conceived to create a global network of collaborating health workers and earth scientists dedicated to the development of computer-based models that can be used for improved control programs for schistosomiasis and other snail-borne diseases of medical and veterinary importance. The models will be assembled using GIS methods, global climate model data, sensor data from earth observing satellites, disease prevalence data, the distribution and abundance of snail hosts, and digital maps of key environmental factors that affect development and propagation of snail…
Design storm prediction and hydrologic modeling using a Web-GIS approach on a Free software platform
2005
Abstract The aim of this work has been to implement a set of procedures useful to automatise the evaluation, the design storm prediction and the flood discharge associated with a selected risk level. For this purpose a Geographic Information System has been implemented using Grass 5.0. One of the main topics of such a system is a georeferenced database of the highest intensity rainfalls and their assigned duration recorded in Sicily. This database contains the main characteristics for more than 250 raingauges, as well as the values of intense rainfall events recorded by these raingauges. These data are managed through the combined use of the PostgreSQL and GRASS-GIS 5.0 databases. Some of t…
Hypertext support for the information needs of software maintainers
2004
Making changes safely to programs requires program comprehension and satisfaction of the information needs of software maintainers. In this paper we provide insights into improving hypertext-based software maintenance support by analyzing those information needs. There exists a series of four earlier, detailed-level empirical studies on the information needs of professional C program maintainers. We focus on these studies, synthesize their results and determine sources from which the required information might be attained. An experimental research tool, the HyperSoft system, is used to demonstrate the satisfaction of information needs and the system is analytically evaluated against the nee…
ISAdetect
2020
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…
A Framework to Improve the Disaster Response Through a Knowledge-Based Multi-Agent System
2017
The disaster response still faces problems of collaboration due to lack of policies concerning the information exchange during the response. Moreover, plans are prepared to respond to a disaster, but drills to apply them are limited and do not allow to determine their efficiency and conflicts with other organizations. This paper presents a framework allowing for different organizations involving in the disaster response to assess their collaboration through its simulation using an explicit representation of their knowledge. This framework is based on a multi-agent system composed of three generic agent models to represent the organizational structure of disaster response. The decision-makin…
A critical review on supply chain risk – Definition, measure and modeling
2015
Abstract Economic systems are increasingly prone to complexity and uncertainty. Therefore, making well-informed decisions requires risk analysis, control and mitigation. In some areas such as finance, insurance, crisis management and health care, the importance of considering risk is largely acknowledged and well-elaborated, yet rather heterogeneous concepts and approaches for risk management have been developed. The increased frequency and the severe consequences of past supply chain disruptions have resulted in an increasing interest in risk. This development has led to the adoption of the risk concepts, terminologies and methods from related fields. In this paper, existing approaches for…