Search results for "Tietohallinto"
showing 10 items of 21 documents
Shall we follow? Impact of reputation concern on information security managers’ investment decisions
2020
Information security (infosec) is important for organizations. While budgeting for infosec is a crucial resource allocation decision, infosec managers may choose to follow other fellow experts’ recommendations or baseline practices. The present paper uses reputational herding theory to explain the decision made by infosec managers to use a “let's follow others” strategy in this context. Based on a sample of 106 organizations in Finland, we find that infosec managers’ ability to accurately predict the benefit of infosec investment, as well as their reputations, have significant effects on motivating them to discount their own information. Infosec managers’ discounting of their own informatio…
Tietohallinnon eroavaisuudet PK-yritysten ja suurten yritysten välillä
2016
Tutkielmassa etsitään eroavaisuuksia pienten ja keskisuurten yritysten ja suur-ten yritysten tietohallinnossa kirjallisuuskatsauksen avulla. Tutkielmassa yrite-tään löytää ne erityispiirteet, jotka PK-yritysten tietohallintoa tutkittaessa tai suunniteltaessa pitää ottaa huomioon. Tutkielmassa tarkasteltiin myös PK-yritysten järjestelmähankintoja ja niiden päätöstenteon erilaisuutta suuriin yri-tyksiin. Tutkimuksessa havaittiin, että PK-yritysten joustavampi ja epäviralli-sempi toimintatapa mahdollistaa erilaisen lähestymisen tietohallintoon ja no-peampien päätöksien teon. PK-yrityksissä myös johdon tuki on selkeästi tärkeä tietohallinnon toimivuuden varmistamiseksi. Yllättäen PK-yritykset e…
Evaluation of Enterprise IT Architecture Solutions – How can an ICT consultant tell what is best for you?
2003
ICT has become a key business enabler and a competitive factor for enterprises. Enterprise architecture, developed by ICT consultants and ICT end-user organizations, is emerging as the management tool for intertwined business and IT planning. For managerial decisions, there is a need to evaluate the business value of architecture development results, but only a few models for this have so far been presented. Here we present the V-model for EA testing and validation that marks the evaluation points in EA management, and guides which evaluation tools could be used. peerReviewed
Migrating from a Centralized Data Warehouse to a Decentralized Data Platform Architecture
2021
To an increasing degree, data is a driving force for digitization, and hence also a key asset for numerous companies. In many businesses, various sources of data exist, which are isolated from one another in different domains, across a heterogeneous application landscape. Well-known centralized solution technologies, such as data warehouses and data lakes, exist to integrate data into one system, but they do not always scale well. Therefore, robust and decentralized ways to manage data can provide the companies with better value give companies a competitive edge over a single central repository. In this paper, we address why and when a monolithic data storage should be decentralized for imp…
Tietohallinnon palveluiden ulkoistamisen hallinta ja arviointi
2005
Cultivating a ‘Digital Jungle’ : Toward a Hybrid Governance Perspective on Infrastructure Evolution
2020
Digital infrastructures (DIs) evolve rather than following planned development trajectories. We know this phenomenon as drift, that is, infrastructures drift from management control. Infrastructure drift has motivated research into infrastructure governance recognizing two governance approaches: top-down and bottom-up. Yet, what happens if an organization engaging in its digital transformation expands its DI following top-down governance while simultaneously introducing elements of bottomup governance? We study how an industrial manufacturer expanded its DI for collaboration top-down while also giving employees leeway for bottom-up governance. As a result, it found that its digital collabor…
Tietohallinnon johtamisen mittaaminen Balanced Scorecardilla
2008
Strategic Communication for Cyber-security Leadership
2013
The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of cyber security and presents the physical world and the cyber world framework. The paper refers to a system model of a society and uses that model to analyze the results of two limited media surveys about cyber-related newspaper articles. The media surveys indicate a strong need to organize the cyber world. peerReviewed
Supporting the success of an information systems project : viewpoints on education and replacement of the project manager
2013
Tietohallintolaki ja sen vaikutukset sähköisen asioinnin kokonaisarkkitehtuuriin
2013
Tutkielman tavoitteena on tutkia miten uusi tietohallintolaki sekä sen asettamat vaatimukset vaikuttavat julkishallinnon (yhteisten) tietoteknisten ratkaisujen kehittämiseen ja toteuttamiseen. Vaikutusta pyritään selvittämään tutkimalla miten eri kaupungit ovat kuvanneet toimintojaan kokonaisarkkitehtuurin näkökulmasta, varsinkin varhaiskasvatuksen sähköisen asioinnin osalta. Tietohallintolaki edellyttää, että julkisen hallinnon viranomaisen on tietojärjestelmien yhteentoimivuuden mahdollistamiseksi ja varmistamiseksi suunniteltava ja kuvattava kokonaisarkkitehtuurinsa sekä noudatettava siinä julkisen hallinnon kokonaisarkkitehtuuria. Kokonaisarkkitehtuurin tavoitteena on tunnistaa organisa…