This document proposes developing a competence-based model for securing the internet of things (IoT) in organizations. It aims to define the required set of organizational competences for IoT products and services regarding information security. The research will use a design science methodology to develop and empirically test a model of organizational competence for IoT security based on an existing model. This will help managers assess their competences against future requirements and properly align their IoT approaches regarding customer information security.
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
Recommendation systems only provide more specific recommendations to users. They do not consider
giving a justification for the recommendation. However, the justification for the recommendation allows the
user to make the decision whether or not to accept the recommendation. It also improves user satisfaction
and the relevance of the recommended item. However, the IAAS recommendation system that uses
advisories to make recommendations does not provide a justification for the recommendations. That is why
in this article, our task consists for helping IAAS users to justify their recommendations. For this, we
conducted a related work on architectures and approaches for justifying recommendations in order to
identify an architecture and approach suitable for the context of IAAS. From the analysis in this article, we
note that neither of these approaches uses the notices (IAAS mechanism) to justify their recommendations.
Therefore, existing architectures cannot be used in the context of IAAS. That is why,we have developed a
new IAAS architecture that deals separately with item filtration and justification extraction that
accompanied the item during recommendation generation (Figure 7). And we haveimproved the reviews by
adding users’ reviews on the items. The user’s notices include the Documentary Unit (DU), the user Group
(G), the Justification (J) and the weight (a); noted A=(DU,G,J,a).
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
Recommendation systems only provide more specific recommendations to users. They do not consider
giving a justification for the recommendation. However, the justification for the recommendation allows the
user to make the decision whether or not to accept the recommendation. It also improves user satisfaction
and the relevance of the recommended item. However, the IAAS recommendation system that uses
advisories to make recommendations does not provide a justification for the recommendations. That is why
in this article, our task consists for helping IAAS users to justify their recommendations. For this, we
conducted a related work on architectures and approaches for justifying recommendations in order to
identify an architecture and approach suitable for the context of IAAS. From the analysis in this article, we
note that neither of these approaches uses the notices (IAAS mechanism) to justify their recommendations.
Therefore, existing architectures cannot be used in the context of IAAS. That is why,we have developed a
new IAAS architecture that deals separately with item filtration and justification extraction that
accompanied the item during recommendation generation (Figure 7). And we haveimproved the reviews by
adding users’ reviews on the items. The user’s notices include the Documentary Unit (DU), the user Group
(G), the Justification (J) and the weight (a); noted A=(DU,G,J,a).
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
This summarizes my work during my first year of PhD at Institute for Manufacturing, University of Cambridge where I investigate the feasibility of deploying machine learning under uncertainty for cyber-physical manufacturing systems.
Knowledge Management and Predictive Analytics in IT Project Risksijtsrd
"Knowledge management and predictive analytics are considered to be unusual partners in today’s technology. However, they can be very good tools that would solve current problems in valuing data. Predictive analytics has now become one of the forecasting tools that is of huge help in information management. Its application in IT project development risk management is very important, where a lot of raw data is involved with risk analysis and prediction. The use of IT project risk management as supported by knowledge management KM will help increase the success rate of IT projects. Knowledge management will bring about additional value to the data needed. This paper presents the usage of KM and predictive analytics to increase the success ratings of projects by predicting the risks that might happen during project development. It explores how KM and predictive analytics can identify risks in IT project development and give recommendations in evaluating the risks that could affect successful completion of IT projects. Mia Torres-Dela Cruz | Subashini A/P Ganapathy | Noor Zuhaili Binti Mohd Yasin ""Knowledge Management and Predictive Analytics in IT Project Risks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19142.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19142/knowledge-management-and-predictive-analytics-in-it-project-risks/mia-torres-dela-cruz"
Mis 535 Education Specialist-snaptutorial.comrobertledwes14
For more classes visit
www.snaptutorial.com
This Tutorial contains 4 Set of Midterm Exam (Scroll down to see Question Details)
MIS 535 Final Exam Guide (4 Set) 1
The effect of technology-organization-environment on adoption decision of bi...IJECEIAES
Big data technology (BDT) is being actively adopted by world-leading organizations due to its expected benefits. However, most of the organizations in Thailand are still in the decision or planning stage to adopt BDT. Many challenges exist in encouraging the BDT diffusion in businesses. Thus, this study develops a research model that investigates the determinants of BDT adoption in the Thai context based on the technology-organizationenvironment (TOE) framework and diffusion of innovation (DOI) theory. Data were collected through an online questionnaire. Three hundred IT employees in different organizations in Thailand were used as a sample group. Structural equation modeling (SEM) was conducted to test the hypotheses. The result indicated that the research model was fitted with the empirical data with the statistics: Normed Chi-Square=1.651, GFI=0.895, AFGI=0.863, NFI=0.930, TLI=0.964, CFI=0.971, SRMR=0.0392, and RMSEA=0.046. The research model could, at 52%, explain decision to adopt BDT. Relative advantage, top management support, competitive pressure, and trading partner pressure show significant positive relation with BDT adoption, while security negatively influences BDT adoption.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
IT certification and validity of a candidate in sri lankakdore
Since the existing literature does not discuss what’s the best certification to select and how those IT certifications are important to candidates in Sri Lankan context under the new technological impacts of the globalization, through this new research try to investigate the influence of IT certification affecting to the validity of a candidate in Sri Lankan Networking Industry context.
Research Problem :How does the Information Technology Certification affecting to increase the validity of a candidate in Sri Lankan Networking Industry ?
To identify which IT certification offers a highest validity for a candidate in Sri Lankan Networking context.
To determine how the scope of the IT certification affecting to the validity of a candidate.
To investigate how the marketability of IT Certification affecting to a candidate’s value.
Which IT certification offers a highest validity for a candidate in Sri Lankan Networking Industry context ?
What is the IT certification’s scope that covering related to the Networking Sector and How it affect for the validity ?
How the marketability of IT Certification affecting for a candidate’s value ?
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
Application of ict benefits for building project management using ism modeleSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...Michael Mortenson
This presentation presents recent research into definitions of analytics through analysis of related job adverts. The results help us identify a new categorisation of analytics methodologies, and discusses the implications for the operational research community.
An intelligent agent model for learning group development in the digital lear...journalBEEI
Group development is the first and most important step for the success of collaborative problem solving (CPS) learning in the digital learning environment (DLE). A literacy study is needed for studies in the intelligent agent domain for group development of collaborative learning in DLE. This paper is a systematic literature review (SLR) of intelligent agents for group formation from 2001 to 2019. This paper aims to find answers to 4 (four) research questions, namely: 1) What components to develop intelligent agents for group development; 2) What is the intelligent agent model for group development; 3) How are the metrics for measuring intelligent agent performance; and 4) How is the Framework for developing intelligent agent. The components of the intelligent agent model consist of: member attributes, group attributes (group constraints), and intelligent techniques. This research refers to Srba and Bielikova's group development model. The stages of the model are formation, performing and closing. An intelligent agent model at the formation stage. A performance metric for the intelligent agent at the performance stage. The framework for developing an intelligent agent is a reference to the stages of development, component selection techniques, and performance measurement of an intelligent agent.
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERAijmvsc
The purpose of this paper is to analyze the factors that affect success of logistics companies adopting AI by studying the application of AI in the logistics industry. Although the application of technology and artificial intelligence has been widely studied, the factors affecting the adoption of Artificial Intelligence (AI) are still unknown in the existing literature. Therefore, the main research in this paper is to explore the influence of success factors on AI by integrating technology, organization and environment (TOE) framework. The framework is judged by case analysis of logistics companies. This study provides some suggestions on successful adoption of AI technology fortheir logistics operations.
Running Header: 1
SYSTEM ARCHITECTURE 24
Group Project
Group 1
Charles Williams
Participating Members
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
Non-Participating Members
5/22/2019
IT488 – IT Capstone II (IT488-1902B-01)
Henrietta Okoro
Table of Contents
Section 1 – Project Overview (from IT487) 3
Section 2 – Requirements (from IT487) 5
Section 3 – Design (from IT487) 7
Section 4 - Methodology 10
Determining Methodology 10
Section 5 – Work Breakdown Structure 12
Section 6 – Communication Plan 13
Plan involvement – 13
Stakeholder requirements 14
Key Messages 14
Scheduling 15
Section 7 – Quality Assurance Plan 16
Section 8 – Documentation Plan 17
Section 9 – Quality Assurance and Results of Test Case 18
Project Closure 19
References 20
Section 1 – Project Overview (from IT487)
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic career or the faculty member’s tenure. The.
Running Header: 1
SYSTEM ARCHITECTURE 2
Unit 3 Group Project
System Architecture
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
24 April 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 10
Section 5 - Complete Features and Trade-off Analysis 12
Section 6 - Milestones and Deliverables Based on Date and Dependencies 15
Section 7 - System Architecture Aligned with System Requirements 21
Section 8 - Technical Design Document 24
Section 9 - Design Review Checklist 25
Section 10 - Testing and Deployment 26
References 27
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic caree.
This summarizes my work during my first year of PhD at Institute for Manufacturing, University of Cambridge where I investigate the feasibility of deploying machine learning under uncertainty for cyber-physical manufacturing systems.
Knowledge Management and Predictive Analytics in IT Project Risksijtsrd
"Knowledge management and predictive analytics are considered to be unusual partners in today’s technology. However, they can be very good tools that would solve current problems in valuing data. Predictive analytics has now become one of the forecasting tools that is of huge help in information management. Its application in IT project development risk management is very important, where a lot of raw data is involved with risk analysis and prediction. The use of IT project risk management as supported by knowledge management KM will help increase the success rate of IT projects. Knowledge management will bring about additional value to the data needed. This paper presents the usage of KM and predictive analytics to increase the success ratings of projects by predicting the risks that might happen during project development. It explores how KM and predictive analytics can identify risks in IT project development and give recommendations in evaluating the risks that could affect successful completion of IT projects. Mia Torres-Dela Cruz | Subashini A/P Ganapathy | Noor Zuhaili Binti Mohd Yasin ""Knowledge Management and Predictive Analytics in IT Project Risks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19142.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19142/knowledge-management-and-predictive-analytics-in-it-project-risks/mia-torres-dela-cruz"
Mis 535 Education Specialist-snaptutorial.comrobertledwes14
For more classes visit
www.snaptutorial.com
This Tutorial contains 4 Set of Midterm Exam (Scroll down to see Question Details)
MIS 535 Final Exam Guide (4 Set) 1
The effect of technology-organization-environment on adoption decision of bi...IJECEIAES
Big data technology (BDT) is being actively adopted by world-leading organizations due to its expected benefits. However, most of the organizations in Thailand are still in the decision or planning stage to adopt BDT. Many challenges exist in encouraging the BDT diffusion in businesses. Thus, this study develops a research model that investigates the determinants of BDT adoption in the Thai context based on the technology-organizationenvironment (TOE) framework and diffusion of innovation (DOI) theory. Data were collected through an online questionnaire. Three hundred IT employees in different organizations in Thailand were used as a sample group. Structural equation modeling (SEM) was conducted to test the hypotheses. The result indicated that the research model was fitted with the empirical data with the statistics: Normed Chi-Square=1.651, GFI=0.895, AFGI=0.863, NFI=0.930, TLI=0.964, CFI=0.971, SRMR=0.0392, and RMSEA=0.046. The research model could, at 52%, explain decision to adopt BDT. Relative advantage, top management support, competitive pressure, and trading partner pressure show significant positive relation with BDT adoption, while security negatively influences BDT adoption.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
IT certification and validity of a candidate in sri lankakdore
Since the existing literature does not discuss what’s the best certification to select and how those IT certifications are important to candidates in Sri Lankan context under the new technological impacts of the globalization, through this new research try to investigate the influence of IT certification affecting to the validity of a candidate in Sri Lankan Networking Industry context.
Research Problem :How does the Information Technology Certification affecting to increase the validity of a candidate in Sri Lankan Networking Industry ?
To identify which IT certification offers a highest validity for a candidate in Sri Lankan Networking context.
To determine how the scope of the IT certification affecting to the validity of a candidate.
To investigate how the marketability of IT Certification affecting to a candidate’s value.
Which IT certification offers a highest validity for a candidate in Sri Lankan Networking Industry context ?
What is the IT certification’s scope that covering related to the Networking Sector and How it affect for the validity ?
How the marketability of IT Certification affecting for a candidate’s value ?
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
Application of ict benefits for building project management using ism modeleSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...Michael Mortenson
This presentation presents recent research into definitions of analytics through analysis of related job adverts. The results help us identify a new categorisation of analytics methodologies, and discusses the implications for the operational research community.
An intelligent agent model for learning group development in the digital lear...journalBEEI
Group development is the first and most important step for the success of collaborative problem solving (CPS) learning in the digital learning environment (DLE). A literacy study is needed for studies in the intelligent agent domain for group development of collaborative learning in DLE. This paper is a systematic literature review (SLR) of intelligent agents for group formation from 2001 to 2019. This paper aims to find answers to 4 (four) research questions, namely: 1) What components to develop intelligent agents for group development; 2) What is the intelligent agent model for group development; 3) How are the metrics for measuring intelligent agent performance; and 4) How is the Framework for developing intelligent agent. The components of the intelligent agent model consist of: member attributes, group attributes (group constraints), and intelligent techniques. This research refers to Srba and Bielikova's group development model. The stages of the model are formation, performing and closing. An intelligent agent model at the formation stage. A performance metric for the intelligent agent at the performance stage. The framework for developing an intelligent agent is a reference to the stages of development, component selection techniques, and performance measurement of an intelligent agent.
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERAijmvsc
The purpose of this paper is to analyze the factors that affect success of logistics companies adopting AI by studying the application of AI in the logistics industry. Although the application of technology and artificial intelligence has been widely studied, the factors affecting the adoption of Artificial Intelligence (AI) are still unknown in the existing literature. Therefore, the main research in this paper is to explore the influence of success factors on AI by integrating technology, organization and environment (TOE) framework. The framework is judged by case analysis of logistics companies. This study provides some suggestions on successful adoption of AI technology fortheir logistics operations.
Running Header: 1
SYSTEM ARCHITECTURE 24
Group Project
Group 1
Charles Williams
Participating Members
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
Non-Participating Members
5/22/2019
IT488 – IT Capstone II (IT488-1902B-01)
Henrietta Okoro
Table of Contents
Section 1 – Project Overview (from IT487) 3
Section 2 – Requirements (from IT487) 5
Section 3 – Design (from IT487) 7
Section 4 - Methodology 10
Determining Methodology 10
Section 5 – Work Breakdown Structure 12
Section 6 – Communication Plan 13
Plan involvement – 13
Stakeholder requirements 14
Key Messages 14
Scheduling 15
Section 7 – Quality Assurance Plan 16
Section 8 – Documentation Plan 17
Section 9 – Quality Assurance and Results of Test Case 18
Project Closure 19
References 20
Section 1 – Project Overview (from IT487)
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic career or the faculty member’s tenure. The.
Running Header: 1
SYSTEM ARCHITECTURE 2
Unit 3 Group Project
System Architecture
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
24 April 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 10
Section 5 - Complete Features and Trade-off Analysis 12
Section 6 - Milestones and Deliverables Based on Date and Dependencies 15
Section 7 - System Architecture Aligned with System Requirements 21
Section 8 - Technical Design Document 24
Section 9 - Design Review Checklist 25
Section 10 - Testing and Deployment 26
References 27
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic caree.
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
Running Header: 1
APPLICATION DEVELOPMENT METHODS 2
Unit 1 Group Project
Application Development Methods
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
April 10, 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 8
Section 5 - Complete Features and Trade-off Analysis 10
Section 6 - Milestones and Deliverables Based on Date and Dependencies 11
Section 7 - System Architecture Aligned with System Requirements 12
Section 8 - Technical Design Document 13
Section 9 - Design Review Checklist 14
Section 10 - Testing and Deployment 15
References 16
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the .
TaskYou are required to prepare for this Assessment Item by1..docxbradburgess22840
Task
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 2 Project Planning
3. BUILDING your PLAN up from the ProjectTitle and Abstract in Assessment Task 1
WHAT TO DO:
1. Follow the Study Schedule and work with the Topics in Interact as they provide a "scaffold" for your learning in this subject.
2. Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), milestones and Gantt chart. These tools may help.
1. MicrosoftProject Pro (http://office.microsoft.com/en-au/project/);
2. Open source tools like GanttProject (http://www.ganttproject.biz/);
3. OpenProj(http://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (http://www.projectlibre.org/)
3. Begin using the 'project blog' as a tool beyond the weekly progress reportsfor your chosen emerging technology topic:
1. The blog helps you to "think by writing" and also store your notes, project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to tell a story and harness each other’s knowledge.
4. The blog is ideally updated each week with 3 or 4 entries for documenting your project notes and as the foundation for editing and writing the Capstone Project Report. An ideal blog entry will have around 50-150 words (150-600 words a week).
Presentation
Project Plan Sample Format
(subject to change or modified to include systems development projects)
1. Title: Emerging Technology and Innovation Topic
1. Project Blog ( Web address provided)
2. Weekly Progress Reports Plan (In class, Discussion Board or Project Blog entries)
2. Rationale
1. Problem domain
2. Purpose and justification
3. Supervisor Approval
4. Research Questions
5. Conceptual or Theoretical Framework
6. Methodology
1. Analysis of sources of information (EndNote, APA Referencing Style)
2. Research method(s)
3. Data collection or systems design methods
4. Ethical Issues
5. Compliance Requirements (Workplace, Industry or Government regulations)
7. Project Plan
1. Deliverables (Annotated Bibliography, Journal Paper, Report, Seminar)
2. Work breakdown structure (WBS)
3. Risk Analysis
4. Duration
5. Gantt chart
8. References
9. Appendix (if required)
Final project
Formulating Strategic Management Decisions
This final project is based on the following Harvard Business case study:
Khachatryan, D. (2014). Amarcord Incorporated: Combating money laundering using data analytics. Harvard Business Case Study. Retrieved from https://hbsp.harvard.edu/tu/789925b5
Assume your client accepted your urgent business proposal to design a data-driven approach to effectively accomplish the goal of fraud detection in financial institutions. Data analytics for fraud detection in financial institutions is the strat.
TaskYou are required to prepare for this Assessment Item by1..docxdeanmtaylor1545
Task
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 2 Project Planning
3. BUILDING your PLAN up from the ProjectTitle and Abstract in Assessment Task 1
WHAT TO DO:
1. Follow the Study Schedule and work with the Topics in Interact as they provide a "scaffold" for your learning in this subject.
2. Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), milestones and Gantt chart. These tools may help.
1. MicrosoftProject Pro (http://office.microsoft.com/en-au/project/);
2. Open source tools like GanttProject (http://www.ganttproject.biz/);
3. OpenProj(http://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (http://www.projectlibre.org/)
3. Begin using the 'project blog' as a tool beyond the weekly progress reportsfor your chosen emerging technology topic:
1. The blog helps you to "think by writing" and also store your notes, project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to tell a story and harness each other’s knowledge.
4. The blog is ideally updated each week with 3 or 4 entries for documenting your project notes and as the foundation for editing and writing the Capstone Project Report. An ideal blog entry will have around 50-150 words (150-600 words a week).
Presentation
Project Plan Sample Format
(subject to change or modified to include systems development projects)
1. Title: Emerging Technology and Innovation Topic
1. Project Blog ( Web address provided)
2. Weekly Progress Reports Plan (In class, Discussion Board or Project Blog entries)
2. Rationale
1. Problem domain
2. Purpose and justification
3. Supervisor Approval
4. Research Questions
5. Conceptual or Theoretical Framework
6. Methodology
1. Analysis of sources of information (EndNote, APA Referencing Style)
2. Research method(s)
3. Data collection or systems design methods
4. Ethical Issues
5. Compliance Requirements (Workplace, Industry or Government regulations)
7. Project Plan
1. Deliverables (Annotated Bibliography, Journal Paper, Report, Seminar)
2. Work breakdown structure (WBS)
3. Risk Analysis
4. Duration
5. Gantt chart
8. References
9. Appendix (if required)
Final project
Formulating Strategic Management Decisions
This final project is based on the following Harvard Business case study:
Khachatryan, D. (2014). Amarcord Incorporated: Combating money laundering using data analytics. Harvard Business Case Study. Retrieved from https://hbsp.harvard.edu/tu/789925b5
Assume your client accepted your urgent business proposal to design a data-driven approach to effectively accomplish the goal of fraud detection in financial institutions. Data analytics for fraud detection in financial institutions is the strat.
the evolving enterprise architecture: a digital transformation perspective is a paper describing the role of IoT in the enterprises and how the EA is related to that.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Using Machine Learning embedded in Organizational Responsibility Model, added to the ten characteristics of the CIO Master and the twelve competencies of the workforce can help lead the Digital Transformation of the traditional public organizations to the Exponential.
Secured cloud support for global softwareijseajournal
This paper presents core problem solution to security of Global Software Development Requirement
Information. Currently the major issue deals with hacking of sensitive client information which may lead to
major financial as well as social loss. To avoid this system provides cloud security by encryption of data as
well as deployment of tool over the cloud will provide significant security to whole global content
management system. The core findings are presented in terms of how hacker hacks such systems and what
counter steps need to follow. Our algorithmic development provide random information storage at various
cloud nodes to secure our client requirement data files.
Improvement of IT Governance Case Study Government Institution Region Xijtsrd
The use of information technology in government processes will increase the efficiency, effectiveness, transparency, and accountability of government administration. Utilization of IT within an organization requires a system to manage IT better as well as the required audit of information technology that can be run in accordance as the expected. IT Audit is an important matter that must be carried out within an organization, also including the Government Institution Region X which utilize the technology of information as supporting the process of the public servicing. The audit of information technology is carried out with the purpose of fixing the critical point or problems that often occur in the process within the institution. As the result of study using the framework of COBIT 5, it shows the level of capability of five IT processes selected are at a lower level, namely APO07 at the level 2, EDM04 at the level 1, DSS01 at the level 1, BAI01 at the level 1, and APO08 at the level 1, whereas the expectation of capabilities of the organization’s leader is at the level 4. The results of the audit of information technology that has been made, shows the difference of the level of gap between the current maturity level with the maturity level based on the organization’s leader. In this study, will be getting suggestions and improvement recommendations according to the framework of COBIT 5 and ITIL 2011. Agus Ade Muliyana Krisna | Gusti Made Arya Sasmita | Gusti Agung Ayu Putri "Improvement of IT Governance (Case Study: Government Institution Region X)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33496.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/33496/improvement-of-it-governance-case-study-government-institution-region-x/agus-ade-muliyana-krisna
Distributed Software Development Process, Initiatives and Key Factors: A Syst...zillesubhan
Geographically Distributed Software Development (GSD) process differs from Collocated Software Development (CSD) process in various technical aspects. It is empirically proven that renowned process improvement initiatives applicable to CSD are not very effective for GSD. The objective of this research is to review the existing literature (both academia and industrial) to identify initiatives and key factors which play key role in the improvement and maturity of a GSD process, to achieve this goal we planned a Systematic Literature Review (SLR) following a standard protocol. Three highly respected sources are selected to search for the relevant literature which resulted in a large number of TOIs (Title of Interest). An inter-author custom protocol is outlined and followed to shortlist most relevant articles for review. The data is extracted from this set of finally selected articles. We have performed both qualitative and quantitative analysis of the extracted data to obtain the results. The concluded results identify several initiatives and key factors involved in GSD and answer each research question posed by the SLR.
The implementation of IT governance is important to lead and evolve the information system in agreement with stakeholders. This requirement is seriously amplified at the time of digital area considering all the new technologies that has been lunched recently (Big DATA, Artificial Intelligence, Machine Learning, Deep learning...). Thus, without a good rudder, every company risks getting lost in a sea endless and unreachable goals.
This paper aims to provide decision-making system that allow professionals to choose IT governance framework suitable to desired criteria and their importance based on a multi-criteria analysis method (WSM), we did implement a case study based on our analysis in a Moroccan company. Moreover, we present better understanding of IT Governance aspects such as standards and best practices.
Our article goes into a global objective that aims to build an integrated generated meta-model for better approach of IT Governance.
Running head cyber security competition framework cyber securi
Poster ECIS 2016
1. Competence-based model for securing the
internet of things in organizations
Rui Silva1; Gurpreet Dhillon, PhD2; Winnie Ng Picoto, PhD1
1 ISEG - Lisbon School of Economics & Management, 2 Virginia Commonwealth University
Rui Silva
ISEG - Lisbon School of Economics & Management
Department of Management
ADVANCE Research Center
Email: rui.silva@aln.iseg.ulisboa.pt
Phone: (+351) 962 671 456
Contacts
1. Bassi, A. & Biswas, A. (2012) IOT - I Final Analysis of existing IoT Strategic Research Directions and Priorities. IERC-EU. (257565), 1-159.
2. Gens, F. (2013) IDC Predictions 2013: Competing on the 3rd Platform.
3. Gubbi, J., Buyya, R., Marusic, S. & Palaniswami, M. (2013) Internet of Things (IoT): A vision, architectural elements, and future directions.
Future Generation Computer Systems. [Online] 29 (7), 1645-1660. Available from: doi:10.1016/j.future.2013.01.010.
4. Hevner, A., March, S., Park, J. & Ram, S. (2004) Design Science in Information Systems Research. Journal of Management Information
Systems. 28 (1), 75-105.
5. McGrath, R, MacMillan, I. & Venkataraman, S. (1995) Defining and developing competence: a strategic process paradigm. Long Range
Planning. [Online] 28 (4), 123. Available from: doi:10.1016/0024-6301(95)94265-Z.
6. Mukhopadhyay, S. (2014) Internet of Things. Smart Sensors, Measurement and Instrumentation. Subhas Chandra Mukhopadhyay (ed.).
[Online]. Cham, Springer International Publishing. Available from: doi:10.1007/978-3-319-04223-7.
7. Peffers, K., Tuunanen, T., Rothenberger, M. & Chatterjee, S. (2007) A Design Science Research Methodology for Information Systems
Research. Journal of Management Information Systems. [Online] 24 (3), 45-77. Available from: doi:10.2753/MIS0742-1222240302.
8. Tremblay, M., Hevner, A. & Berndt, D. (2010) Focus Groups for Artifact Refinement and Evaluation in Design Research. Communications of the
Association for Information Systems. [Online] 26 (27), 599-618. Available from: doi:10.1007/978-1-4419-5653-8_10.
References
The next generation in computing transcends the
paradigm of traditional desktop and client-server
architectures. IT products and solutions of the third
platform, specifically in the scope of the Internet of
Things (IoT) raise new security threats and
vulnerabilities, suggesting that a set of competences
is needed for any IoT product or service, regarding
information security. The knowledge of that set of
skills allows top managers to properly assess current
organizational competences against future
requirements, allowing proper business realignment.
The research at hand aims to contribute to the topic
state of the art both at academic and practical level
by developing a Competence-based Model for
Securing the Internet of Things. The construction of
the Model aims to define and develop organizational
competence, specifically in the context of
organizations that are IoT service providers.
The model, to be developed and empirically tested
using the Design Science paradigm, will be based on
an existing model that defines competence from a
strategic management perspective using Resource
Based View theory, strategic management theory
and the concept of collective mind as heedful
interrelating.
Abstract
Q1: What is the required set of organizational
competences for an IoT product/service,
regarding information security?
Q2: How can organizational competence in the
scope of IoT Security be a valid management
tool to achieve competitive advantage?
Introduction
• We argue that:
I. A specific set of competences is needed for any
IoT product/service regarding information
security;
II. The knowledge of the kind of skills required
allows top management to assess current
competences against future business
requirements;
III.This comparative assessment allows managers
to realign the approach of IoT products,
regarding their customers’ information security.
• This line of argument embodies the same
perspective of organizational competence used in
McGrath, MacMillan & Venkataraman’s [5] work
(the starting point for this study), in which two main
assumptions are considered:
(1) competitive advantage in a business initiative
is only achievable if the necessary set of
competences is properly developed;
(2) competences are perceived as an enterprise
resource combination that deliberately facilitate
the execution of the necessary processes.
Key Assumptions
• The IT industry has been directing most of its
products to key areas that have transformed the
sector radically. The products of the third platform
are grounded on a cluster based on 4 pillars: Cloud
Computing, Mobility, Big Data and Social Media [2].
• Just like in the beginning of the internet, the IoT
has been defined in its own development process
[1], influenced by the development the ubiquitous
computing web [3,6].
• The motivation for this topic is connected with:
1. Exponential growth of internet usage;
2. Number of things connected to the internet;
3. The enormous amount of data generated by
those things;
4. New security vulnerabilities and threats [6].
• The security threats related with IoT post new
challenges concerning Organizational Competence
necessary to face new technological trends,
customer needs and market demands.
• Many literature exists in the area arguing that
organizational competence is needed for
competitive advantage and to develop IT
effectiveness. However, there is no conceptual
model defining and measuring the generation of
organizational competence in the specific area of
information security in the scope of the IoT.
Research Questions
Figure 3. Research process outline based on Peffers et al. DS process model [7].
Gurpreet Dhillon
Virginia Commonwealth University
School of Business
Department of Information Systems
Email: gdhillon@vcu.edu
Winnie Ng Picoto
ISEG - Lisbon School of Economics & Management
Department of Management
ADVANCE Research Center
Email: w.picoto@iseg.ulisboa.pt
• The research suggested in the project at hand
adopts the DSR Process Model proposed by
Peffers et al. [7] (Figure 3).
• The project is based on the conceptual model for
Organizational Competence proposed by McGrath,
MacMillan & Venkataraman [5].
• In the development and evaluation of the artifact it
will be used a set of guidelines and a IS Research
Framework [4].
• This study will also use a Panel of Experts as an
exploratory focus group (EFG) in the design phase
and a confirmatory focus group (CFG) in the
Demonstration and Evaluation phases [8] (Table 1).
Research Methods
Figure 2. Conceptual Model for Organizational Competence adapted
from McGrath, MacMillan & Venkataraman (1995) [5].
STEP DESCRIPTION TASKS
Identify Problem
&
Motivate
The problem is defined and the value of a solution for the investigation topic is justified. The
motivation for the study aims not only to captivate the researcher and the stakeholders for the solution
and accept the results, but also understand the scope and researcher knowledge on the subject.
Relevant literature review;
Practitioner (industry) documentation analysis;
Case study analysis;
Consultation of concluded or ongoing Research Projects.
Conceptual Model
Definition
In this step, it will be defined the key constructs that can be identified in the organizational
competence literature related to the topic of IoT information security. The defined constructs will be
integrated on a ‘beta’ model based on the competence model (Figure 2) [5].
Relevant literature review;
Relevant constructs definition;
Initial Model development (Design starting point).
Define Objectives
of
a Solution
In this stage, objectives are established for a possible solution for the problem under investigation and
the knowledge of what is doable in the research process.
Relevant literature review;
Modeling techniques analysis;
Decision of the methodology for the design template.
Design
&
Development
The artifact is created. This activity involves the discovery of the functionality for the designed artifact
in the research process.
Relevant organizational competence literature review;
Problem instances analysis;
Work with an Exploratory Focus Group (EFG).
Demonstration
At this stage, the idea is to prove that the concept of the artifact design works effectively. The use of
the artifact in an instance of the problem must be demonstrated.
Case Study in an IoT Service Provider;
Applicability tests defined during the case study.
Evaluation
It must be observed and measured if the designed artifact supports a solution for the problem to be
addressed. At this methodology stage, the results of the Demonstration activity will be analyzed. The
methodology adopted in this step can only be appropriately decided after the completion of the
Design & Development step.
Work with a Confirmatory Focus Group (CFG);
Survey construction and application;
Model conformity tests with the statistical study, the set of
guidelines and the IS Research Framework [4].
Communication
This phase involves the communication of the research question, the proposed solution for the
research problem, the effectiveness of the solution and the research work main results/conclusions.
PhD thesis report;
Paper(s) submission(s) to scientific publications.
Table 1. The Research Process Steps.
T 21 - Managing Organizational and IS/IT Competencies in the Enterprise Systems Environment
Winnie Ng Picoto
ISEG - Lisbon School of Economics & Management
Department of Management
ADVANCE Research Center
Email: w.picoto@iseg.ulisboa.pt
Figure 1. Statistics on internet usage and connected Things [6].
Internet
Users
> 2.2 bn
END OF 2011
World
Population
6.8 bn
2010
prediction
50 bn
Things
connected
2020
Thingsconnected
to the internet
> 6.8 bn
2003 - 2010
• Competence of an organizational subunit is
defined as ‘its ability to reliably and consistently
meet or exceed its objectives’ [5] (Figure 2).
• A necessary precursor to competitive advantage
is competence emergence that cannot be
developed without the emergence of
Comprehension and Deftness [5].
• Comprehension is defined as ‘the outcome of a
process by which elements of individual know-how
and skill become linked’ [5].
• Deftness is defined as ‘a quality in a group which
permits heedful interactions to be conducted at
minimal cost’ [5].
Research Model