Search results for "Information Systems"

showing 10 items of 1926 documents

Coopetition, standardization and general purpose technologies : A framework and an application

2023

Funding Information: We thank Paul Wiegmann, Geerten van de Kaa, Filippo Grillo, Tuomo Uotila, Elina Berghäll, Joakim Wikström and a number of anonymous reviewers for helpful comments. Earlier versions of the paper have been presented at EURAS2022 conference at Adam Smith Business School of the University of Glasgow, 38th Summer Seminar of Finnish Economist at University of Jyväskylä and Lappeenranta-Lahti University of Technology LUT. Heikkilä gratefully acknowledges financial support from the Foundation for Economic Education (Liikesivistysrahasto, Reino Rossi Memorial Fund), PHP Säätiö and the Jyväskylä University School of Business and Economics. We argue that coopetition and standardiz…

standardizationEconomics and EconometricsHistoryPolymers and PlasticsCommunicationcellular technologymatkapuhelinjärjestelmätLibrary and Information SciencesManagement Monitoring Policy and Lawyleiskäyttöinen teknologiacoopetitionIndustrial and Manufacturing EngineeringManagement Information Systemsstandardointigeneral purpose technologyBusiness and International ManagementInformation Systems
researchProduct

Impact of supplier-specific investments in inter-organisational information systems on strategic electronic coordination: the moderation effect of bu…

2018

Abstract This paper examines the factors which influence sharing of the strategic information (in other words, electronic coordination) in a buyer–supplier dyad. The antecedents of this coordination are examined rather well in the transaction cost economics (TCE) theory and resource-dependency theory (RDT), while the supply chain management perspective is contemplated. The mentioned frameworks are used in the analysis. However, the research focus is narrowed down to the exploration of the antecedents of information exchange conducted via inter-organisational information systems (IOS). The empirical analysis is based on 198 observations of Norwegian companies operating in different types of …

strategic electronic coordinationResource dependence theoryTS155-194Strategy and Management05 social sciences02 engineering and technologyspecific ios investmentModerationresource dependency theorytransaction cost economics (tce)inter-organisational information system (ios)Industrial and Manufacturing EngineeringManagement Information Systems020204 information systemsManagement of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation system050211 marketingbuyer dependencyBusinessProduction management. Operations managementBusiness managementIndustrial organizationEngineering Management in Production and Services
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Crowdsourcing as a mode of open innovation: Exploring drivers of success of a multisided platform through system dynamics modelling

2020

This article aims to explore drivers of success of a crowdsourcing platform. The study conceptualizes crowdsourcing as a mode of open innovation and places such a concept within the context of the sharing economy. Upon this framework, the paper analyses the case of InnoCentive, a successful crowdsourcing platform where innovation-driven organizations search for solutions to their R&D tasks. The system dynamics model frames main InnoCentive business processes and offers a causal perspective on the relationships between platform performance—in terms of users base—and resources structure. The discussion on simulation outputs is carried out through a dynamic performance management view of p…

system dynamicInformation Systems and ManagementKnowledge managementmultisided platformbusiness.industryStrategy and Managementdynamic performance managementGeneral Social Sciencescrowdsourcing; dynamic performance management; multisided platform; open innovation; system dynamicsCrowdsourcingopen innovationSystem dynamicssystem dynamicscrowdsourcingBusinessOpen innovationSystems Research and Behavioral Science
researchProduct

Timing the information system upgrade

2010

A system upgrade requires careful planning as its implications to organizational systems might be enormous. Although in IS literature the requirements and process of systems upgrade have been discussed, the timing when to upgrade and what factors guide it has been of lesser interest. Consequently, in this paper we focus on information systems upgrading and its timing from the perspective of the user organization. Upgrading is enabled by the availability of a new software version. When to upgrade, meanwhile, is determined by the business interests of the customer organization, business calendar, development projects, and the vendor. These factors were identified by interviewing 14 IT manager…

system upgrade timingdeterminantitmotivesvendorcustomerajoitus (suunnittelu)Version changeupgradeinformation systems
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study

2016

In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…

ta113Agile usability engineeringKnowledge managementbusiness.industryEmpirical process (process control model)Agile Unified Process020207 software engineering02 engineering and technologySoftware peer reviewcomputer.software_genreExtreme programming practicestechnical debtTechnical debt020204 information systemssoftware development0202 electrical engineering electronic engineering information engineeringLean software developmentbusinessohjelmistokehityscomputerAgile software development
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Employees’ adherence to information security policies: An exploratory field study

2014

The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…

ta113Cognitive evaluation theoryInformation Systems and Managementbusiness.industryInformation securityPublic relationsSecurity policyManagement Information SystemsThreatTheory of reasoned actionInformation security managementInformation security standardsSecurity managementBusinessMarketingInformation SystemsInformation & Management
researchProduct

Why Do Users Switch Mobile Applications? : Trialing Behavior as a Predecessor of Switching Behavior

2018

Mobile application providers face high user losses because users can easily and often switch to an alternative application. Researchers have recently started to study information technology (IT) switching. However, no studies have concentrated on the unique context of mobile applications. Mobile application switching differs from the switching behavior related to many other IT products and services because of the highlighted role of alternatives, beta versions, updates, reviews, and users’ spontaneous behavior. To address this gap, we develop a mobile-specific model by using a qualitative research approach. As a theoretical contribution, we introduce trialing behavior as a predecessor of sw…

ta113Computer science020204 information systems0502 economics and business05 social sciences0202 electrical engineering electronic engineering information engineeringswitching behavior02 engineering and technology050203 business & managementmobile applicationsInformation Systems
researchProduct