Search results for "Information System"
showing 10 items of 2404 documents
Crowdsourcing as a mode of open innovation: Exploring drivers of success of a multisided platform through system dynamics modelling
2020
This article aims to explore drivers of success of a crowdsourcing platform. The study conceptualizes crowdsourcing as a mode of open innovation and places such a concept within the context of the sharing economy. Upon this framework, the paper analyses the case of InnoCentive, a successful crowdsourcing platform where innovation-driven organizations search for solutions to their R&D tasks. The system dynamics model frames main InnoCentive business processes and offers a causal perspective on the relationships between platform performance—in terms of users base—and resources structure. The discussion on simulation outputs is carried out through a dynamic performance management view of p…
Timing the information system upgrade
2010
A system upgrade requires careful planning as its implications to organizational systems might be enormous. Although in IS literature the requirements and process of systems upgrade have been discussed, the timing when to upgrade and what factors guide it has been of lesser interest. Consequently, in this paper we focus on information systems upgrading and its timing from the perspective of the user organization. Upgrading is enabled by the availability of a new software version. When to upgrade, meanwhile, is determined by the business interests of the customer organization, business calendar, development projects, and the vendor. These factors were identified by interviewing 14 IT manager…
Supporting Cyber Resilience with Semantic Wiki
2016
Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…
Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study
2016
In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…
Anomaly detection approach to keystroke dynamics based user authentication
2017
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…
An Information system design product theory for the abstract class of integrated requirements and delivery management systems
2014
Information and Communications Technology-enabled international sourcing of software-intensive systems and services (eSourcing) is increasingly used as a means of adding value, reducing costs, sharing risks, and achieving strategic aims. To maximally reap the benefits from eSourcing and to mitigate the risks, providers and clients have to be aware of and build capabilities for the eSourcing life-cycle. China is in a position to become a superpower for eSourcing service provisioning, but most Chinese eSourcing service providers are small or medium-sized and typically work for larger intermediaries instead of end-clients, limiting their business and capabilities development. The extant litera…
Employees’ adherence to information security policies: An exploratory field study
2014
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…
Why Do Users Switch Mobile Applications? : Trialing Behavior as a Predecessor of Switching Behavior
2018
Mobile application providers face high user losses because users can easily and often switch to an alternative application. Researchers have recently started to study information technology (IT) switching. However, no studies have concentrated on the unique context of mobile applications. Mobile application switching differs from the switching behavior related to many other IT products and services because of the highlighted role of alternatives, beta versions, updates, reviews, and users’ spontaneous behavior. To address this gap, we develop a mobile-specific model by using a qualitative research approach. As a theoretical contribution, we introduce trialing behavior as a predecessor of sw…
DOBRO : a prediction error correcting robot under drifts
2016
We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.
An easy approach to epistemology and ontology in computing theses
2013
In many research fields---notably social sciences but also in those fields where design, experiment-based science, and social sciences are mixed---researchers must often describe their epistemological and ontological commitments in research reports. The research literature describes those commitments in various ways, often grouped under research paradigms such as positivism, post-positivism, and constructivism, and described as "world views." This paper presents the bare bones of the ontological and epistemological questions in scientific practice. Ontologically speaking, subject matters can be mind-dependent or mind-independent. Epistemologically speaking, elements of research may be more …