SlideShare a Scribd company logo
Competence-based model for securing the
internet of things in organizations
Rui Silva1; Gurpreet Dhillon, PhD2; Winnie Ng Picoto, PhD1
1 ISEG - Lisbon School of Economics & Management, 2 Virginia Commonwealth University
Rui Silva
ISEG - Lisbon School of Economics & Management
Department of Management
ADVANCE Research Center
Email: rui.silva@aln.iseg.ulisboa.pt
Phone: (+351) 962 671 456
Contacts
1. Bassi, A. & Biswas, A. (2012) IOT - I Final Analysis of existing IoT Strategic Research Directions and Priorities. IERC-EU. (257565), 1-159.
2. Gens, F. (2013) IDC Predictions 2013: Competing on the 3rd Platform.
3. Gubbi, J., Buyya, R., Marusic, S. & Palaniswami, M. (2013) Internet of Things (IoT): A vision, architectural elements, and future directions.
Future Generation Computer Systems. [Online] 29 (7), 1645-1660. Available from: doi:10.1016/j.future.2013.01.010.
4. Hevner, A., March, S., Park, J. & Ram, S. (2004) Design Science in Information Systems Research. Journal of Management Information
Systems. 28 (1), 75-105.
5. McGrath, R, MacMillan, I. & Venkataraman, S. (1995) Defining and developing competence: a strategic process paradigm. Long Range
Planning. [Online] 28 (4), 123. Available from: doi:10.1016/0024-6301(95)94265-Z.
6. Mukhopadhyay, S. (2014) Internet of Things. Smart Sensors, Measurement and Instrumentation. Subhas Chandra Mukhopadhyay (ed.).
[Online]. Cham, Springer International Publishing. Available from: doi:10.1007/978-3-319-04223-7.
7. Peffers, K., Tuunanen, T., Rothenberger, M. & Chatterjee, S. (2007) A Design Science Research Methodology for Information Systems
Research. Journal of Management Information Systems. [Online] 24 (3), 45-77. Available from: doi:10.2753/MIS0742-1222240302.
8. Tremblay, M., Hevner, A. & Berndt, D. (2010) Focus Groups for Artifact Refinement and Evaluation in Design Research. Communications of the
Association for Information Systems. [Online] 26 (27), 599-618. Available from: doi:10.1007/978-1-4419-5653-8_10.
References
The next generation in computing transcends the
paradigm of traditional desktop and client-server
architectures. IT products and solutions of the third
platform, specifically in the scope of the Internet of
Things (IoT) raise new security threats and
vulnerabilities, suggesting that a set of competences
is needed for any IoT product or service, regarding
information security. The knowledge of that set of
skills allows top managers to properly assess current
organizational competences against future
requirements, allowing proper business realignment.
The research at hand aims to contribute to the topic
state of the art both at academic and practical level
by developing a Competence-based Model for
Securing the Internet of Things. The construction of
the Model aims to define and develop organizational
competence, specifically in the context of
organizations that are IoT service providers.
The model, to be developed and empirically tested
using the Design Science paradigm, will be based on
an existing model that defines competence from a
strategic management perspective using Resource
Based View theory, strategic management theory
and the concept of collective mind as heedful
interrelating.
Abstract
Q1: What is the required set of organizational
competences for an IoT product/service,
regarding information security?
Q2: How can organizational competence in the
scope of IoT Security be a valid management
tool to achieve competitive advantage?
Introduction
• We argue that:
I. A specific set of competences is needed for any
IoT product/service regarding information
security;
II. The knowledge of the kind of skills required
allows top management to assess current
competences against future business
requirements;
III.This comparative assessment allows managers
to realign the approach of IoT products,
regarding their customers’ information security.
• This line of argument embodies the same
perspective of organizational competence used in
McGrath, MacMillan & Venkataraman’s [5] work
(the starting point for this study), in which two main
assumptions are considered:
(1) competitive advantage in a business initiative
is only achievable if the necessary set of
competences is properly developed;
(2) competences are perceived as an enterprise
resource combination that deliberately facilitate
the execution of the necessary processes.
Key Assumptions
• The IT industry has been directing most of its
products to key areas that have transformed the
sector radically. The products of the third platform
are grounded on a cluster based on 4 pillars: Cloud
Computing, Mobility, Big Data and Social Media [2].
• Just like in the beginning of the internet, the IoT
has been defined in its own development process
[1], influenced by the development the ubiquitous
computing web [3,6].
• The motivation for this topic is connected with:
1. Exponential growth of internet usage;
2. Number of things connected to the internet;
3. The enormous amount of data generated by
those things;
4. New security vulnerabilities and threats [6].
• The security threats related with IoT post new
challenges concerning Organizational Competence
necessary to face new technological trends,
customer needs and market demands.
• Many literature exists in the area arguing that
organizational competence is needed for
competitive advantage and to develop IT
effectiveness. However, there is no conceptual
model defining and measuring the generation of
organizational competence in the specific area of
information security in the scope of the IoT.
Research Questions
Figure 3. Research process outline based on Peffers et al. DS process model [7].
Gurpreet Dhillon
Virginia Commonwealth University
School of Business
Department of Information Systems
Email: gdhillon@vcu.edu
Winnie Ng Picoto
ISEG - Lisbon School of Economics & Management
Department of Management
ADVANCE Research Center
Email: w.picoto@iseg.ulisboa.pt
• The research suggested in the project at hand
adopts the DSR Process Model proposed by
Peffers et al. [7] (Figure 3).
• The project is based on the conceptual model for
Organizational Competence proposed by McGrath,
MacMillan & Venkataraman [5].
• In the development and evaluation of the artifact it
will be used a set of guidelines and a IS Research
Framework [4].
• This study will also use a Panel of Experts as an
exploratory focus group (EFG) in the design phase
and a confirmatory focus group (CFG) in the
Demonstration and Evaluation phases [8] (Table 1).
Research Methods
Figure 2. Conceptual Model for Organizational Competence adapted
from McGrath, MacMillan & Venkataraman (1995) [5].
STEP DESCRIPTION TASKS
Identify Problem
&
Motivate
The problem is defined and the value of a solution for the investigation topic is justified. The
motivation for the study aims not only to captivate the researcher and the stakeholders for the solution
and accept the results, but also understand the scope and researcher knowledge on the subject.
 Relevant literature review;
 Practitioner (industry) documentation analysis;
 Case study analysis;
 Consultation of concluded or ongoing Research Projects.
Conceptual Model
Definition
In this step, it will be defined the key constructs that can be identified in the organizational
competence literature related to the topic of IoT information security. The defined constructs will be
integrated on a ‘beta’ model based on the competence model (Figure 2) [5].
 Relevant literature review;
 Relevant constructs definition;
 Initial Model development (Design starting point).
Define Objectives
of
a Solution
In this stage, objectives are established for a possible solution for the problem under investigation and
the knowledge of what is doable in the research process.
 Relevant literature review;
 Modeling techniques analysis;
 Decision of the methodology for the design template.
Design
&
Development
The artifact is created. This activity involves the discovery of the functionality for the designed artifact
in the research process.
 Relevant organizational competence literature review;
 Problem instances analysis;
 Work with an Exploratory Focus Group (EFG).
Demonstration
At this stage, the idea is to prove that the concept of the artifact design works effectively. The use of
the artifact in an instance of the problem must be demonstrated.
 Case Study in an IoT Service Provider;
 Applicability tests defined during the case study.
Evaluation
It must be observed and measured if the designed artifact supports a solution for the problem to be
addressed. At this methodology stage, the results of the Demonstration activity will be analyzed. The
methodology adopted in this step can only be appropriately decided after the completion of the
Design & Development step.
 Work with a Confirmatory Focus Group (CFG);
 Survey construction and application;
 Model conformity tests with the statistical study, the set of
guidelines and the IS Research Framework [4].
Communication
This phase involves the communication of the research question, the proposed solution for the
research problem, the effectiveness of the solution and the research work main results/conclusions.
 PhD thesis report;
 Paper(s) submission(s) to scientific publications.
Table 1. The Research Process Steps.
T 21 - Managing Organizational and IS/IT Competencies in the Enterprise Systems Environment
Winnie Ng Picoto
ISEG - Lisbon School of Economics & Management
Department of Management
ADVANCE Research Center
Email: w.picoto@iseg.ulisboa.pt
Figure 1. Statistics on internet usage and connected Things [6].
Internet
Users
> 2.2 bn
END OF 2011
World
Population
6.8 bn
2010
prediction
50 bn
Things
connected
2020
Thingsconnected
to the internet
> 6.8 bn
2003 - 2010
• Competence of an organizational subunit is
defined as ‘its ability to reliably and consistently
meet or exceed its objectives’ [5] (Figure 2).
• A necessary precursor to competitive advantage
is competence emergence that cannot be
developed without the emergence of
Comprehension and Deftness [5].
• Comprehension is defined as ‘the outcome of a
process by which elements of individual know-how
and skill become linked’ [5].
• Deftness is defined as ‘a quality in a group which
permits heedful interactions to be conducted at
minimal cost’ [5].
Research Model

More Related Content

What's hot

First Year Report, PhD presentation
First Year Report, PhD presentationFirst Year Report, PhD presentation
First Year Report, PhD presentation
Bang Xiang Yong
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risks
ijtsrd
 
Mis 535 Education Specialist-snaptutorial.com
Mis 535 Education Specialist-snaptutorial.comMis 535 Education Specialist-snaptutorial.com
Mis 535 Education Specialist-snaptutorial.com
robertledwes14
 
A study to evaluate the impact of mobile technology on supply chain ecosystem...
A study to evaluate the impact of mobile technology on supply chain ecosystem...A study to evaluate the impact of mobile technology on supply chain ecosystem...
A study to evaluate the impact of mobile technology on supply chain ecosystem...
आशीष सिहं
 
The effect of technology-organization-environment on adoption decision of bi...
The effect of technology-organization-environment on  adoption decision of bi...The effect of technology-organization-environment on  adoption decision of bi...
The effect of technology-organization-environment on adoption decision of bi...
IJECEIAES
 
Cis 336 str Education Redefined - snaptutorial.com
Cis 336 str    Education Redefined - snaptutorial.comCis 336 str    Education Redefined - snaptutorial.com
Cis 336 str Education Redefined - snaptutorial.com
DavisMurphyC76
 
IT certification and validity of a candidate in sri lanka
IT certification and validity of a candidate in sri lankaIT certification and validity of a candidate in sri lanka
IT certification and validity of a candidate in sri lanka
kdore
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...
IRJET Journal
 
Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021
Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021
Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021
Mirko Marras
 
Cis 336 Enhance teaching / snaptutorial.com
Cis 336   Enhance teaching / snaptutorial.comCis 336   Enhance teaching / snaptutorial.com
Cis 336 Enhance teaching / snaptutorial.com
Davis104
 
Data science lecture2_doaa_mohey
Data science lecture2_doaa_mohey Data science lecture2_doaa_mohey
Data science lecture2_doaa_mohey
Doaa Mohey Eldin
 
CIS 336 str Exceptional Education / snaptutorial.com
CIS 336 str Exceptional Education / snaptutorial.comCIS 336 str Exceptional Education / snaptutorial.com
CIS 336 str Exceptional Education / snaptutorial.com
donaldzs97
 
Application of ict benefits for building project management using ism model
Application of ict benefits for building project management using ism modelApplication of ict benefits for building project management using ism model
Application of ict benefits for building project management using ism model
eSAT Publishing House
 
Data science lecture3_doaa_mohey
Data science lecture3_doaa_mohey Data science lecture3_doaa_mohey
Data science lecture3_doaa_mohey
Doaa Mohey Eldin
 
Cis 336 Education Organization / snaptutorial.com
Cis 336  Education Organization / snaptutorial.comCis 336  Education Organization / snaptutorial.com
Cis 336 Education Organization / snaptutorial.com
Baileya82
 
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...
Michael Mortenson
 
An intelligent agent model for learning group development in the digital lear...
An intelligent agent model for learning group development in the digital lear...An intelligent agent model for learning group development in the digital lear...
An intelligent agent model for learning group development in the digital lear...
journalBEEI
 
Rajesh_Angadi_(_Mechatronics)_Mart_April_2015
Rajesh_Angadi_(_Mechatronics)_Mart_April_2015Rajesh_Angadi_(_Mechatronics)_Mart_April_2015
Rajesh_Angadi_(_Mechatronics)_Mart_April_2015Rajesh Angadi
 
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERA
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERASMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERA
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERA
ijmvsc
 

What's hot (20)

First Year Report, PhD presentation
First Year Report, PhD presentationFirst Year Report, PhD presentation
First Year Report, PhD presentation
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risks
 
Mis 535 Education Specialist-snaptutorial.com
Mis 535 Education Specialist-snaptutorial.comMis 535 Education Specialist-snaptutorial.com
Mis 535 Education Specialist-snaptutorial.com
 
A study to evaluate the impact of mobile technology on supply chain ecosystem...
A study to evaluate the impact of mobile technology on supply chain ecosystem...A study to evaluate the impact of mobile technology on supply chain ecosystem...
A study to evaluate the impact of mobile technology on supply chain ecosystem...
 
The effect of technology-organization-environment on adoption decision of bi...
The effect of technology-organization-environment on  adoption decision of bi...The effect of technology-organization-environment on  adoption decision of bi...
The effect of technology-organization-environment on adoption decision of bi...
 
Cis 336 str Education Redefined - snaptutorial.com
Cis 336 str    Education Redefined - snaptutorial.comCis 336 str    Education Redefined - snaptutorial.com
Cis 336 str Education Redefined - snaptutorial.com
 
IT certification and validity of a candidate in sri lanka
IT certification and validity of a candidate in sri lankaIT certification and validity of a candidate in sri lanka
IT certification and validity of a candidate in sri lanka
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...
 
ALFRED_MUTANGA_CABIF
ALFRED_MUTANGA_CABIFALFRED_MUTANGA_CABIF
ALFRED_MUTANGA_CABIF
 
Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021
Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021
Tutorial on Advances in Bias-aware Recommendation on the Web @ WSDM 2021
 
Cis 336 Enhance teaching / snaptutorial.com
Cis 336   Enhance teaching / snaptutorial.comCis 336   Enhance teaching / snaptutorial.com
Cis 336 Enhance teaching / snaptutorial.com
 
Data science lecture2_doaa_mohey
Data science lecture2_doaa_mohey Data science lecture2_doaa_mohey
Data science lecture2_doaa_mohey
 
CIS 336 str Exceptional Education / snaptutorial.com
CIS 336 str Exceptional Education / snaptutorial.comCIS 336 str Exceptional Education / snaptutorial.com
CIS 336 str Exceptional Education / snaptutorial.com
 
Application of ict benefits for building project management using ism model
Application of ict benefits for building project management using ism modelApplication of ict benefits for building project management using ism model
Application of ict benefits for building project management using ism model
 
Data science lecture3_doaa_mohey
Data science lecture3_doaa_mohey Data science lecture3_doaa_mohey
Data science lecture3_doaa_mohey
 
Cis 336 Education Organization / snaptutorial.com
Cis 336  Education Organization / snaptutorial.comCis 336  Education Organization / snaptutorial.com
Cis 336 Education Organization / snaptutorial.com
 
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...
A Topic Model of Analytics Job Adverts (Operational Research Society Annual C...
 
An intelligent agent model for learning group development in the digital lear...
An intelligent agent model for learning group development in the digital lear...An intelligent agent model for learning group development in the digital lear...
An intelligent agent model for learning group development in the digital lear...
 
Rajesh_Angadi_(_Mechatronics)_Mart_April_2015
Rajesh_Angadi_(_Mechatronics)_Mart_April_2015Rajesh_Angadi_(_Mechatronics)_Mart_April_2015
Rajesh_Angadi_(_Mechatronics)_Mart_April_2015
 
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERA
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERASMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERA
SMART LOGISTICS AND ARTIFICIAL INTELLIGENCE PRACTICES IN INDUSTRY 4.0 ERA
 

Similar to Poster ECIS 2016

Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
rtodd599
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
rtodd599
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
rtodd599
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
bradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
deanmtaylor1545
 
The evolving enterprise architecture
The evolving enterprise architecture The evolving enterprise architecture
The evolving enterprise architecture
Hanieh Kashfi
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
Osama M. Khaled
 
3.activity 2 differentiating between applied research and basic research
3.activity 2  differentiating between applied research and basic research3.activity 2  differentiating between applied research and basic research
3.activity 2 differentiating between applied research and basic research
Nazrin Nazdri
 
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
ijcsit
 
Project Organizational Responsibility Model - ORM
Project Organizational Responsibility Model -  ORMProject Organizational Responsibility Model -  ORM
Project Organizational Responsibility Model - ORM
Guttenberg Ferreira Passos
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
ijseajournal
 
Improvement of IT Governance Case Study Government Institution Region X
Improvement of IT Governance Case Study Government Institution Region XImprovement of IT Governance Case Study Government Institution Region X
Improvement of IT Governance Case Study Government Institution Region X
ijtsrd
 
ICFAI IT and Systems - Solved assignments and case study help
ICFAI IT and Systems  - Solved assignments and case study helpICFAI IT and Systems  - Solved assignments and case study help
ICFAI IT and Systems - Solved assignments and case study help
smumbahelp
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
Kamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
Kamal Acharya
 
Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...
zillesubhan
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
IJSRED
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
IJCSIS Research Publications
 
Running head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securiRunning head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securi
DIPESH30
 

Similar to Poster ECIS 2016 (20)

Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
The evolving enterprise architecture
The evolving enterprise architecture The evolving enterprise architecture
The evolving enterprise architecture
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
3.activity 2 differentiating between applied research and basic research
3.activity 2  differentiating between applied research and basic research3.activity 2  differentiating between applied research and basic research
3.activity 2 differentiating between applied research and basic research
 
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
 
Project Organizational Responsibility Model - ORM
Project Organizational Responsibility Model -  ORMProject Organizational Responsibility Model -  ORM
Project Organizational Responsibility Model - ORM
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Improvement of IT Governance Case Study Government Institution Region X
Improvement of IT Governance Case Study Government Institution Region XImprovement of IT Governance Case Study Government Institution Region X
Improvement of IT Governance Case Study Government Institution Region X
 
ICFAI IT and Systems - Solved assignments and case study help
ICFAI IT and Systems  - Solved assignments and case study helpICFAI IT and Systems  - Solved assignments and case study help
ICFAI IT and Systems - Solved assignments and case study help
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
Running head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securiRunning head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securi
 

Poster ECIS 2016

  • 1. Competence-based model for securing the internet of things in organizations Rui Silva1; Gurpreet Dhillon, PhD2; Winnie Ng Picoto, PhD1 1 ISEG - Lisbon School of Economics & Management, 2 Virginia Commonwealth University Rui Silva ISEG - Lisbon School of Economics & Management Department of Management ADVANCE Research Center Email: rui.silva@aln.iseg.ulisboa.pt Phone: (+351) 962 671 456 Contacts 1. Bassi, A. & Biswas, A. (2012) IOT - I Final Analysis of existing IoT Strategic Research Directions and Priorities. IERC-EU. (257565), 1-159. 2. Gens, F. (2013) IDC Predictions 2013: Competing on the 3rd Platform. 3. Gubbi, J., Buyya, R., Marusic, S. & Palaniswami, M. (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems. [Online] 29 (7), 1645-1660. Available from: doi:10.1016/j.future.2013.01.010. 4. Hevner, A., March, S., Park, J. & Ram, S. (2004) Design Science in Information Systems Research. Journal of Management Information Systems. 28 (1), 75-105. 5. McGrath, R, MacMillan, I. & Venkataraman, S. (1995) Defining and developing competence: a strategic process paradigm. Long Range Planning. [Online] 28 (4), 123. Available from: doi:10.1016/0024-6301(95)94265-Z. 6. Mukhopadhyay, S. (2014) Internet of Things. Smart Sensors, Measurement and Instrumentation. Subhas Chandra Mukhopadhyay (ed.). [Online]. Cham, Springer International Publishing. Available from: doi:10.1007/978-3-319-04223-7. 7. Peffers, K., Tuunanen, T., Rothenberger, M. & Chatterjee, S. (2007) A Design Science Research Methodology for Information Systems Research. Journal of Management Information Systems. [Online] 24 (3), 45-77. Available from: doi:10.2753/MIS0742-1222240302. 8. Tremblay, M., Hevner, A. & Berndt, D. (2010) Focus Groups for Artifact Refinement and Evaluation in Design Research. Communications of the Association for Information Systems. [Online] 26 (27), 599-618. Available from: doi:10.1007/978-1-4419-5653-8_10. References The next generation in computing transcends the paradigm of traditional desktop and client-server architectures. IT products and solutions of the third platform, specifically in the scope of the Internet of Things (IoT) raise new security threats and vulnerabilities, suggesting that a set of competences is needed for any IoT product or service, regarding information security. The knowledge of that set of skills allows top managers to properly assess current organizational competences against future requirements, allowing proper business realignment. The research at hand aims to contribute to the topic state of the art both at academic and practical level by developing a Competence-based Model for Securing the Internet of Things. The construction of the Model aims to define and develop organizational competence, specifically in the context of organizations that are IoT service providers. The model, to be developed and empirically tested using the Design Science paradigm, will be based on an existing model that defines competence from a strategic management perspective using Resource Based View theory, strategic management theory and the concept of collective mind as heedful interrelating. Abstract Q1: What is the required set of organizational competences for an IoT product/service, regarding information security? Q2: How can organizational competence in the scope of IoT Security be a valid management tool to achieve competitive advantage? Introduction • We argue that: I. A specific set of competences is needed for any IoT product/service regarding information security; II. The knowledge of the kind of skills required allows top management to assess current competences against future business requirements; III.This comparative assessment allows managers to realign the approach of IoT products, regarding their customers’ information security. • This line of argument embodies the same perspective of organizational competence used in McGrath, MacMillan & Venkataraman’s [5] work (the starting point for this study), in which two main assumptions are considered: (1) competitive advantage in a business initiative is only achievable if the necessary set of competences is properly developed; (2) competences are perceived as an enterprise resource combination that deliberately facilitate the execution of the necessary processes. Key Assumptions • The IT industry has been directing most of its products to key areas that have transformed the sector radically. The products of the third platform are grounded on a cluster based on 4 pillars: Cloud Computing, Mobility, Big Data and Social Media [2]. • Just like in the beginning of the internet, the IoT has been defined in its own development process [1], influenced by the development the ubiquitous computing web [3,6]. • The motivation for this topic is connected with: 1. Exponential growth of internet usage; 2. Number of things connected to the internet; 3. The enormous amount of data generated by those things; 4. New security vulnerabilities and threats [6]. • The security threats related with IoT post new challenges concerning Organizational Competence necessary to face new technological trends, customer needs and market demands. • Many literature exists in the area arguing that organizational competence is needed for competitive advantage and to develop IT effectiveness. However, there is no conceptual model defining and measuring the generation of organizational competence in the specific area of information security in the scope of the IoT. Research Questions Figure 3. Research process outline based on Peffers et al. DS process model [7]. Gurpreet Dhillon Virginia Commonwealth University School of Business Department of Information Systems Email: gdhillon@vcu.edu Winnie Ng Picoto ISEG - Lisbon School of Economics & Management Department of Management ADVANCE Research Center Email: w.picoto@iseg.ulisboa.pt • The research suggested in the project at hand adopts the DSR Process Model proposed by Peffers et al. [7] (Figure 3). • The project is based on the conceptual model for Organizational Competence proposed by McGrath, MacMillan & Venkataraman [5]. • In the development and evaluation of the artifact it will be used a set of guidelines and a IS Research Framework [4]. • This study will also use a Panel of Experts as an exploratory focus group (EFG) in the design phase and a confirmatory focus group (CFG) in the Demonstration and Evaluation phases [8] (Table 1). Research Methods Figure 2. Conceptual Model for Organizational Competence adapted from McGrath, MacMillan & Venkataraman (1995) [5]. STEP DESCRIPTION TASKS Identify Problem & Motivate The problem is defined and the value of a solution for the investigation topic is justified. The motivation for the study aims not only to captivate the researcher and the stakeholders for the solution and accept the results, but also understand the scope and researcher knowledge on the subject.  Relevant literature review;  Practitioner (industry) documentation analysis;  Case study analysis;  Consultation of concluded or ongoing Research Projects. Conceptual Model Definition In this step, it will be defined the key constructs that can be identified in the organizational competence literature related to the topic of IoT information security. The defined constructs will be integrated on a ‘beta’ model based on the competence model (Figure 2) [5].  Relevant literature review;  Relevant constructs definition;  Initial Model development (Design starting point). Define Objectives of a Solution In this stage, objectives are established for a possible solution for the problem under investigation and the knowledge of what is doable in the research process.  Relevant literature review;  Modeling techniques analysis;  Decision of the methodology for the design template. Design & Development The artifact is created. This activity involves the discovery of the functionality for the designed artifact in the research process.  Relevant organizational competence literature review;  Problem instances analysis;  Work with an Exploratory Focus Group (EFG). Demonstration At this stage, the idea is to prove that the concept of the artifact design works effectively. The use of the artifact in an instance of the problem must be demonstrated.  Case Study in an IoT Service Provider;  Applicability tests defined during the case study. Evaluation It must be observed and measured if the designed artifact supports a solution for the problem to be addressed. At this methodology stage, the results of the Demonstration activity will be analyzed. The methodology adopted in this step can only be appropriately decided after the completion of the Design & Development step.  Work with a Confirmatory Focus Group (CFG);  Survey construction and application;  Model conformity tests with the statistical study, the set of guidelines and the IS Research Framework [4]. Communication This phase involves the communication of the research question, the proposed solution for the research problem, the effectiveness of the solution and the research work main results/conclusions.  PhD thesis report;  Paper(s) submission(s) to scientific publications. Table 1. The Research Process Steps. T 21 - Managing Organizational and IS/IT Competencies in the Enterprise Systems Environment Winnie Ng Picoto ISEG - Lisbon School of Economics & Management Department of Management ADVANCE Research Center Email: w.picoto@iseg.ulisboa.pt Figure 1. Statistics on internet usage and connected Things [6]. Internet Users > 2.2 bn END OF 2011 World Population 6.8 bn 2010 prediction 50 bn Things connected 2020 Thingsconnected to the internet > 6.8 bn 2003 - 2010 • Competence of an organizational subunit is defined as ‘its ability to reliably and consistently meet or exceed its objectives’ [5] (Figure 2). • A necessary precursor to competitive advantage is competence emergence that cannot be developed without the emergence of Comprehension and Deftness [5]. • Comprehension is defined as ‘the outcome of a process by which elements of individual know-how and skill become linked’ [5]. • Deftness is defined as ‘a quality in a group which permits heedful interactions to be conducted at minimal cost’ [5]. Research Model