Journal articles on the topic 'Inter-organisational Information System (IOS)'

To see the other types of publications on this topic, follow the link: Inter-organisational Information System (IOS).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Inter-organisational Information System (IOS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Teryokhin, Sergei, and Gøril Hannås. "Pre-requisites of successful strategic electronic coordination: the moderation effect of the ownership mechanism of inter-organisational information systems." Engineering Management in Production and Services 9, no. 4 (December 20, 2017): 34–47. http://dx.doi.org/10.1515/emj-2017-0029.

Full text
Abstract:
AbstractIn this paper, we attempt to explain how the ownership mechanism of an interorganisational information system (IOS) may impact strategic information exchange (electronic coordination) induced by specific investments in the IOS. Recent research and practice show that heavy investments in IOSs demonstrate mixed results with respect to their impact on the electronic coordination. Consequently, the search of additional factors is needed to help and explain under what circumstances the IOS investments for strategic purposes become beneficial for the companies in a buyersupplier dyad. Transaction cost economics (TCE) and the hostage model are used as a framework for the research. 198 observations of Norwegian companies in different branches of industry constitute the base of the empirical study. A buyer-supplier dyad is the unit of the analysis. A regression model of the relation between the IOS ownership mechanism and the strategic information sharing is used to test two hypotheses about the buyer-supplier collaboration via an IOS. The results demonstrate that the risk of unilateral specific investments in an IOS made by the buyer or the seller is attenuated by the ownership mechanism of the IOS. The willingness of a buyer to share their strategic information with the supplier via the IOS increases if the supplier invests in the IOS which is owned and controlled by the buyer. Conversely, the supplier becomes motivated to share certain sensitive strategic information with the buying company if the latter invests in the IOS which is owned and controlled by the supplier.
APA, Harvard, Vancouver, ISO, and other styles
2

Borman, Mark. "Developing, and testing, a theoretical framework for inter-organisational systems (IOS) as infrastructure to aid future IOS design." Information Systems and e-Business Management 4, no. 4 (May 17, 2006): 343–60. http://dx.doi.org/10.1007/s10257-006-0033-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teryokhin, Sergei, and Gøril Hannås. "Impact of supplier-specific investments in inter-organisational information systems on strategic electronic coordination: the moderation effect of buyer dependence." Engineering Management in Production and Services 10, no. 1 (March 1, 2018): 7–21. http://dx.doi.org/10.1515/emj-2018-0001.

Full text
Abstract:
Abstract This paper examines the factors which influence sharing of the strategic information (in other words, electronic coordination) in a buyer–supplier dyad. The antecedents of this coordination are examined rather well in the transaction cost economics (TCE) theory and resource-dependency theory (RDT), while the supply chain management perspective is contemplated. The mentioned frameworks are used in the analysis. However, the research focus is narrowed down to the exploration of the antecedents of information exchange conducted via inter-organisational information systems (IOS). The empirical analysis is based on 198 observations of Norwegian companies operating in different types of industries. A regression model is used to test the hypotheses about the antecedents of strategic electronic coordination. The research results indicate that the direct effect of the supplier-specific investments in the IOS on the exchange of strategic information in the buyer–supplier dyad is not statistically significant. The supplier-specific investment in the IOS becomes positively associated with the strategic information exchange in the buyer–supplier dyad only when the buyer is dependent on the supplier. The buyer dependency creates a high motivation for the company to exchange the strategic information with the supplier who is more powerful in the dyad. This research concludes that the companies making substantial investments in the IOS for electronic coordination purposes may not reach their goals if relation-specific factors, such as buyer dependency, are not comprehensively considered.
APA, Harvard, Vancouver, ISO, and other styles
4

Bahlmann, Jan, and Achim Spiller. "Inter-organizational information systems in meat chains: the linkage between supply chain organization and system requirements." Journal on Chain and Network Science 9, no. 1 (January 1, 2009): 59–69. http://dx.doi.org/10.3920/jcns2009.x159.

Full text
Abstract:
The German meat sector is faced with increasing cost pressures and a high demand for quality and safety. Both issues require powerful and holistic IT solutions in order to achieve knowledge transfer, process alignment and transparent information flows across the supply chain. In recent years, new Inter-Organizational Information Systems (IOS) were developed for the red meat industry. However, the acceptance of IOS at the farm level is still relatively low. Since there is hardly any relevant literature on IOS in the meat sector, this study contributes to the general research on IOS, the status quo of data flows in the pork supply chain as well as a systematization and evaluation of the most relevant existing internet based IOS. Furthermore, special needs for IOS on the spot market which is the dominating organizational form in the German pork sector are defined and contrasted against the current supply of systems. It was found that none of the existing IT solutions adequately meet the requirements which are important in complex spot market relationships. Consequently, we recommend a higher consideration of supply chain organization in IOS research and development.
APA, Harvard, Vancouver, ISO, and other styles
5

Fu, Hsin-Pin, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang, and Cheng-Hsin Huang. "The critical success factors affecting the adoption of inter-organization systems by SMEs." Journal of Business & Industrial Marketing 29, no. 5 (May 27, 2014): 400–416. http://dx.doi.org/10.1108/jbim-04-2012-0070.

Full text
Abstract:
Purpose – The purposes of this study were to formulate a hierarchical table of factors that influence adoption of an inter-organization system (IOS) by enterprises and to apply multi-criteria decision-making (MCDM) tools to find the weights of these factors and to objectively identify the critical success factors (CSFs) for the adoption of IOSs by small- and medium-sized enterprises (SMEs). Design/methodology/approach – This study first used a literature review to collect the factors that affect an enterprise’s adoption of an IOS and then constructed a three-level hierarchical table of these factors, based on a technology – organization – environment framework. Fuzzy analytic hierarchy processing was used, based on the returned questionnaires, to determine the weights of the factors. The concept of VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) acceptable advantage was used to objectively identify the CSFs of SMEs that have adopted an IOS. Findings – This study identifies six CSFs of SMEs that have adopted an IOS: industry knowledge and experience, the degree of application of information technology within the industry, system safety, the organizational infrastructure, customer relationships and ease of use. In addition, four findings are proposed. Practical implications – The work has studied, in depth, the factors that influence the adoption of an IOS by SMEs and identified four practice implications that provide a useful guideline for SMEs when they plan to adopt an IOS. Originality/value – The identification of CSFs is also an MCDM problem. However, very few previous articles have used MCDM tools to identify the CSFs. This study adopted MCDM tools to objectively identify these CSFs and determine their appropriate weights. The results can help the managers of SMEs allocate their resources, according to the weighting of these CSFs, when they are making plans to adopt an IOS.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Busaidi, Kamla Ali. "Inter-Organizational Knowledge Sharing System in the Health Sector." International Journal of Knowledge Management 11, no. 3 (July 2015): 37–54. http://dx.doi.org/10.4018/ijkm.2015070103.

Full text
Abstract:
This study aimed to investigate the physicians' attitude toward inter-organizational knowledge sharing system (IOKSS) deployment in the health sector in Oman. IOKSS in the health sector can be very crucial and results in several operational, strategic, social and economic benefits for healthcare providers and physicians. Previous research on inter-organizational systems (IOS) has focused on organizational adoption, particularly on vertically-linked organizations. Identifying major issues that are critical to physicians, the end users and key stakeholders, is crucial for IOKSS deployment. Based on data collected from physicians in Oman, results indicated that peers, the sector and knowledge workers, are critical factors to physicians' attitudes toward IOKSS. The study also indicated that physicians' attitudes were positively associated with their intention to share implicit, explicit, exploratory and exploitive knowledge. These results are valuable for organizational designing, planning and decision-making regarding their adoption of IOKSS in the health sector.
APA, Harvard, Vancouver, ISO, and other styles
7

Sholihah, Sita Aniisah, T. M. A. Ari Samadhi, Andi Cakravastia, and Senator Nur Bahagia. "Coordination model in Hinterland chain of hub-and-spoke global logistics." Journal of Industrial Engineering and Management 11, no. 4 (November 23, 2018): 776. http://dx.doi.org/10.3926/jiem.2538.

Full text
Abstract:
Purpose: The purpose of this research is to develop an inter-organizational model of coordination in hinterland chain of hub-and-spoke in global logistics, where dryport works as a spoke and seaport as a hub.Design/methodology/approach: The model built will define a conceptual model in order to coordinate several actors involved in handling the flow of goods and the flow of information (documents) in exporting goods via dryport, where their activities are interdependence. Therefore the first step was to investigate an existing business process of export system via dryport. Value Stream Mapping (VSM) is used to identify bottleneck in existing system and simplify the process. The third step was benchmarking coordination in selected country that have similarity of hinterland characteristics with Indonesia (archipelago country), and exporting agricultural or animal products. After that several alternatives conceptual model of coordination will be proposed, of which the development based on inter-organizational system (IOS) approach. The model is then evaluated by experts to choose the best conceptual model of coordination that suits the real system, especially in Indonesia. The choosen model then being validated by developing simulation using agent-based approach and discrete-event simulation.Findings: The findings of this research is coordination mechanism in export process. There are two basic mechanisms in document preparation, three basic mechanisms in quarantine inspection, and three basic mechanisms in inland transportation and handling. The proposed model using a single connection and single submission to handling coordination among actors.Originality/value: The paper provide coordination of inter-organizational system among involved actors in handling physical flow of goods and flow of information (documents) in arranging exporting goods via dryport (hub-and-spoke typology). Moreover, scope of research is hinterland (outside seaport) with coordination that considering flow of information in hub-and-spoke concept was rarely done by other researchers.
APA, Harvard, Vancouver, ISO, and other styles
8

Apridianto, Angga, Kodrat Iman Satoto, and Ike Pertiwi Windasari. "Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS." Jurnal Teknologi dan Sistem Komputer 3, no. 3 (August 20, 2015): 362. http://dx.doi.org/10.14710/jtsiskom.3.3.2015.362-369.

Full text
Abstract:
Diversity of art and culture in Indonesia should be preserved so as not to become extinct in the face of times so that it can be passed on to generations to come. Many of the people of Indonesia who forget about the culture to identity of the area because of several factors such as the people of indonesia more interested of the western culture than self culture, the region of Indonesia which large also cause people’s reluctance to learn because of constrained of time, distance and cost as well as limitations of the media information about the art and culture that currently can only be learned through pictures and visit the location of art and culture directly make the introduction of art and culture to people of indonesia not yet optimal. Therefore required a media so that people can learn more about the wealth of art and culture without having to visit directly into the location of the arts and cultures its. “Keliling Nusantara Edisi Sumatra” application that was built can be the way to preserve the national culture. The function of this application as a learning media for recognize the diversity of arts and cultures of Indonesia on the island of Sumatra. This application is built using Mobione Studio and running on Android and iOS devices. The application is made using the UCD (User Centered Design) which has been mapped to multimedia development methods by Luther from the stage specify the context of use and specify the users and organisational requirements are mapped into the concept, the stage produce design solutions are mapped into the design, production and collecting material as wellas the evaluate design againts the user requirements are mapped into the stage of testing and distribution. The results produced an application based on Android and iOS contains folks song and lyrics and sound, traditional dress, traditional homes, custom traditions, traditional weapons, traditional dance, tradition musical instrument, the symbol of the region, the anniversaries, the name of the capital city, location, area and amount of population and the flora and fauna typical area on the island of Sumatra. The application goes well on the Android operating system version 2.2-4.X and iOS version 5-7 correspond with the functionality, specification and design of desired.
APA, Harvard, Vancouver, ISO, and other styles
9

Karlsson, Fredrik, Ella Kolkowska, and Frans Prenkert. "Inter-organisational information security: a systematic literature review." Information & Computer Security 24, no. 5 (November 14, 2016): 418–51. http://dx.doi.org/10.1108/ics-11-2016-091.

Full text
Abstract:
Purpose The purpose of this paper is to survey existing inter-organisational information security research to scrutinise the kind of knowledge that is currently available and the way in which this knowledge has been brought about. Design/methodology/approach The results are based on a literature review of inter-organisational information security research published between 1990 and 2014. Findings The authors conclude that existing research has focused on a limited set of research topics. A majority of the research has focused management issues, while employees’/non-staffs’ actual information security work in inter-organisational settings is an understudied area. In addition, the majority of the studies have used a subjective/argumentative method, and few studies combine theoretical work and empirical data. Research limitations/implications The findings suggest that future research should address a broader set of research topics, focusing especially on employees/non-staff and their use of processes and technology in inter-organisational settings, as well as on cultural aspects, which are lacking currently; focus more on theory generation or theory testing to increase the maturity of this sub-field; and use a broader set of research methods. Practical implications The authors conclude that existing research is to a large extent descriptive, philosophical or theoretical. Thus, it is difficult for practitioners to adopt existing research results, such as governance frameworks, which have not been empirically validated. Originality/value Few systematic reviews have assessed the maturity of existing inter-organisational information security research. Findings of authors on research topics, maturity and research methods extend beyond the existing knowledge base, which allow for a critical discussion about existing research in this sub-field of information security.
APA, Harvard, Vancouver, ISO, and other styles
10

Harold, Dolly A., and Thomas A. Horan. "Examining collaboration and information sharing in Inter-Organisational Information System (IOIS) implementation." Electronic Government, an International Journal 9, no. 4 (2012): 333. http://dx.doi.org/10.1504/eg.2012.049723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hannås, Gøril, and Otto Andersen. "B2B Relationships in Modern Times." International Journal of Information Systems and Supply Chain Management 4, no. 3 (July 2011): 18–37. http://dx.doi.org/10.4018/jisscm.2011070102.

Full text
Abstract:
Information technology (IT) enables businesses to integrate information systems across entities without altering the firms’ legal boundaries. New forms of inter-firm dependence and governance mechanisms may arise, due to the explicit investments made in technology and systems for collaboration purposes. There is an important distinction between general and customized investments in inter-organizational information systems (IOS), because the specificity level in IT exhibits certain characteristics that accentuate both the risk and value of inter-firm trade. Several research calls were made to validate governance theories on IOS. Based on a literature review, this paper provides a synthesis and integration of transaction cost economics (TCE) and IOS literature regarding governance forms. The paper discusses why the specificity level of IOS plays a central role in modern collaboration between firms, and how vertical electronic coordination (VEC) represents a mechanism for electronic governance forms and presents an agenda for future research.
APA, Harvard, Vancouver, ISO, and other styles
12

Min, Hokey. "An inter-organisational decision support system for global supply chain management." International Journal of Logistics Systems and Management 38, no. 4 (2021): 475. http://dx.doi.org/10.1504/ijlsm.2021.114760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Daniel, Elizabeth M., and Andrew White. "The future of inter-organisational system linkages: findings of an international Delphi study." European Journal of Information Systems 14, no. 2 (June 2005): 188–203. http://dx.doi.org/10.1057/palgrave.ejis.3000529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Zaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (June 13, 2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.

Full text
Abstract:
Purpose This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts. Design/methodology/approach A quantitative method research design has been used in this study. This study was conducted throughout Malaysia with a total of 250 valid questionnaires obtained from managers and executives from the Multimedia Super Corridor (MSC)-status companies. Structural equation modelling (SEM) using partial least square was used to analyse the data and to test all nine hypotheses developed in this study. Findings Findings from this study indicate that operational agility (OA) is significantly related to ISM practices in MSC-status companies. The validation of the structural model of nine hypotheses developed for this study has demonstrated satisfactory results, exhibited six significant direct relationships and three insignificant relationships. Research limitations/implications This study has addressed the needs for a comprehensive, coherent and empirically tested ISM practices and organisational agility framework. The current theoretical framework used in this study emphasised on the ISM–organisational agility dimensions that are predominantly important to ascertain high level of ISM practices and perceived agility level among the information technology (IT) business companies in Malaysia. With the application of SEM for powerful analysis, the empirical-based framework established in this study was validated by the empirical findings, thus contributing significantly to the field of information security (InfoSec). Originality/value This study has filled the research gap between different constructs of ISM practices and OA. The model put forth in this study contributes in several ways to the InfoSec research community. The recognition of InfoSec practices that could facilitate organisational agility in the IT industry in Malaysia is vital and contributes to more value creation for the organisations.
APA, Harvard, Vancouver, ISO, and other styles
15

Althoff, Gereon, Alexander Ellebrecht, and Brigitte Petersen. "Chain quality information management: development of a reference model for quality information requirements in pork chains." Journal on Chain and Network Science 5, no. 1 (June 1, 2005): 27–38. http://dx.doi.org/10.3920/jcns2005.x052.

Full text
Abstract:
As in many food chains, pork production is carried out in heterogeneous chain scenarios with diverse organisational arrangements. Inter-organisational information management systems have not yet been established in pork production even though they provide a chance to improve chain-wide cooperation and quality management. This article presents the concept and first results of a sub-project in an ongoing Dutch-German collaborative research and development project of the public-private network "GIQS e.V." that develops tools for improved quality and health management in pork chains. In this sub-project a chain quality information system was designed, implemented and validated in three pilot chains in Germany and the Netherlands. The major result is a comprehensive implementation guideline for chains that want to improve their use of chain quality information in their quality and health management. The aim of this study was to identify chain actors' information requirements, taking into account the existing organisational heterogeneity in the pork industry. The theoretical framework of this paper integrates the netchain model with the process approach of ISO 9000:2000. The focus lies on describing a general structure of a chain-wide information system. The concept of inter-enterprise data warehousing is adopted for quality management in food chains. Based on this concept, a "natural language" reference model for information requirements in pork netchains was generated. The reference model was adapted to three separate pilot chains. This paper presents the results obtained by implementing the model in one of the pilot chains, with a special focus on improving animal health management and supporting risk-based meat inspection with chain-wide information management.
APA, Harvard, Vancouver, ISO, and other styles
16

Karlsson, Fredrik, Martin Karlsson, and Joachim Åström. "Measuring employees’ compliance – the importance of value pluralism." Information & Computer Security 25, no. 3 (July 10, 2017): 279–99. http://dx.doi.org/10.1108/ics-11-2016-0084.

Full text
Abstract:
Purpose This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic measure, which introduces the idea of competing organisational imperatives. Design/methodology/approach A survey was developed using two sets of items to measure compliance. The survey was sent to 600 white-collar workers and analysed through ordinary least squares. Findings The results suggest that when using the value-monistic measure, employees’ compliance was a function of employees’ intentions to comply, their self-efficacy and awareness of information security policies. In addition, compliance was not related to the occurrence of conflicts between information security and other organisational imperatives. However, when the dependent variable was changed to a value-pluralistic measure, the results suggest that employees’ compliance was, to a great extent, a function of the occurrence of conflicts between information security and other organisational imperatives, indirect conflicts with other organisational values. Research limitations/implications The results are based on small survey; yet, the findings are interesting and justify further investigation. The results suggest that relevant organisational imperatives and value systems, along with information security values, should be included in measures for employees’ compliance with information security policies. Practical implications Practitioners and researchers should be aware that there is a difference in measuring employees’ compliance using value monistic and value pluralism measurements. Originality/value Few studies exist that critically compare the two different compliance measures for the same population.
APA, Harvard, Vancouver, ISO, and other styles
17

Yuryna Connolly, Lena, Michael Lang, John Gathegi, and Doug J. Tygar. "Organisational culture, procedural countermeasures, and employee security behaviour." Information & Computer Security 25, no. 2 (June 12, 2017): 118–36. http://dx.doi.org/10.1108/ics-03-2017-0013.

Full text
Abstract:
Purpose This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security countermeasures tend to influence employee security actions. An increasing number of information security breaches in organisations presents a serious threat to the confidentiality of personal and commercially sensitive data. While recent research shows that humans are the weakest link in the security chain and the root cause of a great portion of security breaches, the extant security literature tends to focus on technical issues. Design/methodology/approach This paper builds on general deterrence theory and prior organisational culture literature. The methodology adapted for this study draws on the analytical grounded theory approach employing a constant comparative method. Findings This paper demonstrates that procedural security countermeasures and organisational culture tend to affect security behaviour in organisational settings. Research limitations/implications This paper fills the void in information security research and takes its place among the very few studies that focus on behavioural as opposed to technical issues. Practical implications This paper highlights the important role of procedural security countermeasures, information security awareness and organisational culture in managing illicit behaviour of employees. Originality/value This study extends general deterrence theory in a novel way by including information security awareness in the research model and by investigating both negative and positive behaviours.
APA, Harvard, Vancouver, ISO, and other styles
18

Storer, Christine, Geoffrey Soutar, Michelle Darrington, and M. Fay Rola-Rubzen. "Buyer/seller reflections on inter-organisational information systems: Implications for chain data collection methods." Journal on Chain and Network Science 2, no. 2 (December 1, 2002): 117–33. http://dx.doi.org/10.3920/jcns2002.x023.

Full text
Abstract:
When deciding to conduct research on chains and networks, a decision needs to be made about the unit of analysis that will be used for data collection. The present paper examines the validity of collecting data from one party in a chain or dyad. The research examines the differences in perception between dyadic pairs of buyers and sellers about the nature of their relationship and the inter-organisational information system. There were significant differences in perceptions about the nature of the inter-organisational information system in terms of some the types of information exchanged, the frequency of exchange of different types of information, whether information was exchanged as often as necessary, the direction information flowed and the richness of the communication media used to exchange information. Customers and suppliers did not have significant differences in perception of the informality of the information systems. There were differences in perceptions about the relationship in terms of responsiveness and changes in commitment over time. In addition, there were differences in perception about their importance and loyalty to each other, and the predictability of demand and volume of supply. The implication for data collection in chain and network research is that greater accuracy will be gained by collection of data from all parties in dyadic, chain or network relationships. In addition, it would seem that data should be collected from multiple informants with at least one from each department that has dealings with the other party. Where a high level of accuracy is needed, diary records or electronic tracking may be needed to keep track of activities.
APA, Harvard, Vancouver, ISO, and other styles
19

Ford, Norma J. "The development and evaluation of an information technology support system to facilitate inter‐organisational collaboration in HRD." Journal of European Industrial Training 30, no. 7 (August 2006): 569–88. http://dx.doi.org/10.1108/03090590610704411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rasit, Zarinah Abdul, and Che Ruhana Isa. "Relative Comprehensiveness of Performance Measurement System: Organisational Ownership Structure and Size." International Journal of Financial Research 10, no. 3 (May 19, 2019): 380. http://dx.doi.org/10.5430/ijfr.v10n3p380.

Full text
Abstract:
Change in the business environment has resulted in significant implication in the use of Management Control System (MCS) particularly Performance Measurement System (PMS). Strategic Performance Measurement System (SPMS) has been widely used by organisation to monitor the implementation, achievement and improvement of its plan objectives. Considerable prior research identified inconsistent findings in the relationship between PMS and organisational performance. In view of the fact that organisational culture would significantly being influenced by ownership structure, this research will further explore the comprehensiveness of PMS, the extent to which the systems provide information and integration with strategy and value chain, with different ownership structure. Data were gathered in two (2) phases; firstly, using the survey data administered to the 120 strategic business unit (SBU) managers of the manufacturing companies, members of the Federation of Malaysian Manufacturers (FMM). The second phase involves conducting semi-structured interviews with SBU managers of the 10 companies with foreign and local ownership structure. Findings from the research identified that more comprehensive PMS is being implemented by foreign owned companies rather than local own companies. The size of the companies may also influence the PMS comprehensiveness. The PMS implementation was also found to be influenced by the parent companies. Adequate information technology (IT) plays an important role for effective use of the PMS, provide added supports for performance assessment, communication and exchange of information within the organisation and inter-organisations worldwide. Findings provide significant insights into the organisational factors influence the PMS design.
APA, Harvard, Vancouver, ISO, and other styles
21

Soley, Ximena. "The Crucial Role of Human Rights NGOs in the Inter-American System." AJIL Unbound 113 (2019): 355–59. http://dx.doi.org/10.1017/aju.2019.68.

Full text
Abstract:
Since the explosion of the human rights movement in the early 1970s, civil-society organizations have played a key role in the inter-American human rights system (IAS). In the era of dictatorships, they provided the information necessary for the Inter-American Commission to be able to act in the face of uncooperative states. When democracy returned to the region, these organizations grew in number, and their role within the IAS likewise expanded. In particular, a set of organizations that focused on legal strategies and the activation of regional human rights protection mechanisms cropped up. These organizations have, at a more abstract and general level, contributed to the juridification of human rights struggles and ultimately to the creation of a legal field. They have also largely set the agenda of the IAS, although the agenda-setting power has been limited to a small number of organizations that constitute the system's “repeat players.” In a manner befitting their systemic importance, these organizations have tried to make sure the organs of the IAS run smoothly, and to defend them when they come under attack. This essay explores the different roles that human rights NGOs have played in the history of the IAS and suggests that the strategy of increasing juridification that they have pursued since the region's return to democracy might have reached its limits.
APA, Harvard, Vancouver, ISO, and other styles
22

Malatji, Masike, Sune Von Solms, and Annlizé Marnewick. "Socio-technical systems cybersecurity framework." Information & Computer Security 27, no. 2 (June 12, 2019): 233–72. http://dx.doi.org/10.1108/ics-03-2018-0031.

Full text
Abstract:
Purpose This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the equal emphasis of both the social, technical and environmental factors affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied to specifically analyse some selected information and cybersecurity frameworks. The outcome of this exercise culminated in the design of a socio-technical systems cybersecurity framework that can be applied to any new or existing information and cybersecurity solutions in the organisation. A framework parameter to help continuously monitor the mutual alignment of the social, technical and environmental dimensions of the socio-technical systems cybersecurity framework was also introduced. Findings The results indicate a positive application of the socio-technical systems theory to the information and cybersecurity domain. In particular, the application of the conceptual process model is able to successfully categorise the selected information and cybersecurity practices into either social, technical or environmental practices. However, the validation of the socio-technical systems cybersecurity framework requires time and continuous monitoring in a real-life environment. Practical implications This research is beneficial to chief security officers, risk managers, information technology managers, security professionals and academics. They will gain more knowledge and understanding about the need to highlight the equal importance of both the social, technical and environmental dimensions of information and cybersecurity. Further, the less emphasised dimension is posited to open an equal but mutual security vulnerability gap as the more emphasised dimension. Both dimensions must, therefore, equally and jointly be emphasised for optimal security performance in the organisation. Originality/value The application of socio-technical systems theory to the information and cybersecurity domain has not received much attention. In this regard, the research adds value to the information and cybersecurity studies where too much emphasis is placed on security software and hardware capabilities.
APA, Harvard, Vancouver, ISO, and other styles
23

McCormac, Agata, Dragana Calic, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, and Meredith Lillie. "The effect of resilience and job stress on information security awareness." Information & Computer Security 26, no. 3 (July 9, 2018): 277–89. http://dx.doi.org/10.1108/ics-03-2018-0032.

Full text
Abstract:
Purpose The purpose of this study was to investigate the relationship between resilience, job stress and information security awareness (ISA). The study examined the effect of resilience and job stress on the three components that comprise ISA, namely, knowledge, attitude and behaviour. Design/methodology/approach A total of 1,048 working Australians completed an online questionnaire. ISA was measured with the Human Aspects of Information Security Questionnaire. Participants also completed the Brief Resilience Scale and the Job Stress Scale. Findings It was found that participants with greater resilience also had higher ISA and experienced lower levels of job stress. More specifically, individuals who reported higher levels of resilience had significantly better knowledge, attitude and behaviour. Similarly, participants who reported lower levels of job stress also reported significantly better knowledge, attitude and behaviour. Resilience plays an important mediating role in the relationship between job stress and ISA. This means that even if people have high levels of job stress, if they are better able to cope with or adapt to stress (i.e. have higher resilience), they are less likely to have lower ISA. Results of this study add to the body of literature emphasising the positive effects of resilience and suggest that resilience is associated with improved ISA and therefore more secure behaviour. Research limitations/implications Future research should focus on assessing the influence of resilience training in the workplace. Originality/value Given the constructive findings, it may be valuable to focus on the effect of organisational culture, and organisational security culture, on resilience, job stress and ISA.
APA, Harvard, Vancouver, ISO, and other styles
24

M Aydin, Alperen. "Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models." Informing Science: The International Journal of an Emerging Transdiscipline 20 (2017): 001–20. http://dx.doi.org/10.28945/3615.

Full text
Abstract:
Aim/Purpose: The objective of this paper is to review the vast literature of user-centric in-formation science and inform about the emerging themes in information behaviour science. Background: The paradigmatic shift from system-centric to user-centric approach facilitates research on the cognitive and individual information processing. Various information behaviour theories/models emerged. Methodology: Recent information behaviour theories and models are presented. Features, strengths and weaknesses of the models are discussed through the analysis of the information behaviour literature. Contribution: This paper sheds light onto the weaknesses in earlier information behaviour models and stresses (and advocates) the need for research on social information behaviour. Findings: Prominent information behaviour models deal with individual information behaviour. People live in a social world and sort out most of their daily or work problems in groups. However, only seven papers discuss social information behaviour (Scopus search). Recommendations for Practitioners : ICT tools used for inter-organisational sharing should be redesigned for effective information-sharing during disaster/emergency times. Recommendation for Researchers: There are scarce sources on social side of the information behaviour, however, most of the work tasks are carried out in groups/teams. Impact on Society: In dynamic work contexts like disaster management and health care settings, collaborative information-sharing may result in decreasing the losses. Future Research: A fieldwork will be conducted in disaster management context investigating the inter-organisational information-sharing.
APA, Harvard, Vancouver, ISO, and other styles
25

Giannakis, Mihalis, and Michalis Louis. "A multi-agent based system with big data processing for enhanced supply chain agility." Journal of Enterprise Information Management 29, no. 5 (September 12, 2016): 706–27. http://dx.doi.org/10.1108/jeim-06-2015-0050.

Full text
Abstract:
Purpose Decision support systems are becoming an indispensable tool for managing complex supply chains. The purpose of this paper is to develop a multi-agent-based supply chain management system that incorporates big data analytics that can exert autonomous corrective control actions. The effects of the system on supply chain agility are explored. Design/methodology/approach For the development of the architecture of the system, a sequential approach is adopted. First three fundamental dimensions of supply chain agility are identified – responsiveness, flexibility and speed. Then the organisational design of the system is developed. The roles for each of the agents within the framework are defined and the interactions among these agents are modelled. Findings Applications of the model are discussed, to show how the proposed model can potentially provide enhanced levels in each of the dimensions of supply chain agility. Research limitations/implications The study shows how the multi-agent systems can assist to overcome the trade-off between supply chain agility and complexity of global supply chains. It also opens up a new research agenda for incorporation of big data and semantic web applications for the design of supply chain information systems. Practical implications The proposed information system provides integrated capabilities for production, supply chain event and disruption risk management under a collaborative basis. Originality/value A novel aspect in the design of multi-agent systems is introduced for inter-organisational processes, which incorporates semantic web information and a big data ontology in the agent society.
APA, Harvard, Vancouver, ISO, and other styles
26

Ichino, Haruhiko, Kazuhiko Terada, Kenji Kawai, Osamu Ishida, Keishi Kishine, Noboru Iwasaki, Tetsuhiro Fukao, Shinji Shibao, Kazuo Kubo, and Harufusa Kondoh. "ENHANCED NETWORK SIGNALING FOR 10 GIGABIT ETHERNET TO ACHIEVE A LAN-WAN SEAMLESS INTERFACE AND ITS IMPLEMENTATION IN THE PHY-LSI/TRANSCEIVER MODULE." International Journal of High Speed Electronics and Systems 15, no. 03 (September 2005): 667–704. http://dx.doi.org/10.1142/s0129156405003387.

Full text
Abstract:
This paper describes Inter-frame Ling Signaling (ILS) protocol technology and its implementation in a 10-Gigabit Ethernet (10GbE) physical layer (PHY) LSI and optical transceiver module. The ILS can realize SDH/SONET-compatible operations, administration, maintenance, and provisioning (OAM&P) functions for PHY of 10GbE networks by inserting OAM&P information in the inter-frame gap periods. The coding features include 10GbE PHY upper compatibility, error detection capability, and disparity neutral characteristics. The 10GbE PHY LSI with the ILS function was fabricated using 0.18-um SOI CMOS technology to achieve high-speed and low-power performance. The main features of the high-speed circuit design are an inductive-load buffer, high-speed clock and data recovery (CDR), and pre-emphasis/equalizer circuits. The LSI function meets IEEE 802.3ae specifications with the very low-power consumption of about 1.2W. An XENPAK transceiver with ILS function using the LSI was also fabricated to make it easy to implement the ILS function in optical transport network systems such as WDM, OADM, OXC systems and L2/L3 switches. The key features of the module include a 1.3-um DFB laser module with highly reliable transmission performance and a small EML driver integrated module. ILS protocol operation is verified by experiment with XENPAK modules emulating the optical transport system.
APA, Harvard, Vancouver, ISO, and other styles
27

Bello, Abubakar Garba, David Murray, and Jocelyn Armarego. "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments." Information & Computer Security 25, no. 4 (October 9, 2017): 475–92. http://dx.doi.org/10.1108/ics-03-2016-0025.

Full text
Abstract:
Purpose This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on BYOD adoption, and its associated risks and mitigation strategies, investigating how both information security and privacy can be effectively achieved in BYOD environments. Design/methodology/approach This research paper used a qualitative research methodology, applying the case study approach to understand both organisational and employee views, thoughts, opinions and actions in BYOD environments. Findings This paper identifies and understands BYOD risks, threats and influences, and determines effective controls and procedures for managing organisational and personal information resources in BYOD. Research limitations/implications The scope of this paper is limited to the inquiry and findings from organisations operating in Australia. This paper also suggests key implications that lie within the ability of organisations to adequately develop and deploy successful BYOD management and practices. Originality/value This paper expands previous research investigating BYOD practices, and also provides a current best practice approach that can be used by organisations to systematically investigate and understand how to manage security and privacy risks in BYOD environments.
APA, Harvard, Vancouver, ISO, and other styles
28

P N, Sindhuja, and Anand S. Kunnathur. "Information security in supply chains: a management control perspective." Information & Computer Security 23, no. 5 (November 9, 2015): 476–96. http://dx.doi.org/10.1108/ics-07-2014-0050.

Full text
Abstract:
Purpose – This paper aims to discuss the need for management control system for information security management that encapsulates the technical, formal and informal systems. This motivated the conceptualization of supply chain information security from a management controls perspective. Extant literature on information security mostly focused on technical security and managerial nuances in implementing and enforcing technical security through formal policies and quality standards at an organizational level. However, most of the security mechanisms are difficult to differentiate between businesses, and there is no one common platform to resolve the security issues pertaining to varied organizations in the supply chain. Design/methodology/approach – The paper was conceptualized based on the review of literature pertaining to information security domain. Findings – This study analyzed the need and importance of having a higher level of control above the already existing levels so as to cover the inter-organizational context. Also, it is suggested to have a management controls perspective for an all-encompassing coverage to the information security discipline in organizations that are in the global supply chain. Originality/value – This paper have conceptualized the organizational and inter-organizational challenges that need to be addressed in the context of information security management. It would be difficult to contain the issues of information security management with the existing three levels of controls; hence, having a higher level of security control, namely, the management control that can act as an umbrella to the existing domains of security controls was suggested.
APA, Harvard, Vancouver, ISO, and other styles
29

Miao, Xin, David Banister, Yanhong Tang, Min Li, and Bao Xi. "MAINTAINING THE TRANSPORT SYSTEM UNDER EXTREME WEATHER EVENTS: A DUAL-NETWORK PERSPECTIVE." Technological and Economic Development of Economy 19, Supplement_1 (January 28, 2014): S342—S359. http://dx.doi.org/10.3846/20294913.2013.879748.

Full text
Abstract:
Recent years have seen an increase in the frequency of extreme weather events globally, and these have resulted in severe impacts on the transport system. To the means by which the transport system can be maintained under extreme weather events is an emerging topic in transport studies, and this is augmented by a growing concern about climate change. This paper considers transport system as dual-network composed of an interrelated operation level and management level that has some similarities with the theory behind the Wardrop Principle. Evidence from the case study on the snow event in South China in early 2008 is used to draw the dual-network formulation to generalise the law of maintaining the transport system under extreme weather. The mathematical models of the dual-network focus on entropic dynamics in the operation network and matching control activities in the management network. Quantitative evidence is provided to prove the methodology. Interactions through the form of information communication and organisational collaboration within and between networks are highlighted. Incentive mechanisms are emphasised for achieving effective anticipation, prevention and collaboration to coping with extreme weather events. This paper contributes to a better understanding about the role of networks, collective behaviour, information interchange and inter-organisational collaboration in influencing the maintenance of transport system under extreme weather conditions.
APA, Harvard, Vancouver, ISO, and other styles
30

Vidakovic, Milan, Branko Milosavljevic, Zora Konjovic, and Goran Sladic. "Extensible java EE-based agent framework and its application on distributed library catalogues." Computer Science and Information Systems 6, no. 2 (2009): 1–28. http://dx.doi.org/10.2298/csis0902001v.

Full text
Abstract:
The paper presents the new agent framework XJAF and its application on distributed library catalogues. The framework is based on the Java EE technology and uses the concept of the plug-ins for implementation of the basic framework components. One important plug-in of the agent framework has been introduced into this system: the inter-facilitator connection plug-in, which defines how multiple facilitators form an agent network. The inter-facilitator connection plug-in is particularly important in both design and implementation phases in the field of distributed library catalogues. In order to substantiate the above statement, the framework has been used for implementation of the agent-based central catalogue of the library information system BISIS. Also, the framework has been used to implement the agent-based metadata harvesting system for the networked digital library of theses and dissertations (NDLTD). Both systems have been implemented at the University of Novi Sad.
APA, Harvard, Vancouver, ISO, and other styles
31

Bergström, Erik, Martin Lundgren, and Åsa Ericson. "Revisiting information security risk management challenges: a practice perspective." Information & Computer Security 27, no. 3 (July 8, 2019): 358–72. http://dx.doi.org/10.1108/ics-09-2018-0106.

Full text
Abstract:
Purpose The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices. Design/methodology/approach The study is based on an empirical study consisting of in-depth interviews with representatives from public sector organisations. The data were analysed by applying a practice-based view, i.e. the lens of knowing (or knowings). The results were validated by an expert panel. Findings Managerial and organisational concerns that go beyond a technical perspective have been found, which affect the ongoing social build-up of knowledge in everyday information security work.. Research limitations/implications The study has delimitation as it consists of data from four public sector organisations, i.e. statistical analyses have not been in focus, while implying a better understanding of what and why certain actions are practised in their security work. Practical implications The new challenges that have been identified offer a refined set of actionable advice to practitioners, which, for example, can support cost-efficient decisions and avoid unnecessary security trade-offs. Originality/value Information security is increasingly relevant for organisations, yet little is still known about how related risks are handled in practice. Recent studies have indicated a gap between the espoused and the actual actions. Insights from actual, situated enactment of practice can advise on process adaption and suggest more fit approaches.
APA, Harvard, Vancouver, ISO, and other styles
32

Schinagl, Stef, and Abbas Shahim. "What do we know about information security governance?" Information & Computer Security 28, no. 2 (January 25, 2020): 261–92. http://dx.doi.org/10.1108/ics-02-2019-0033.

Full text
Abstract:
Purpose This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG. Design/methodology/approach The intention of the authors was to conduct a systematic literature review. However, owing to limited empirical papers in ISG research, this paper is more conceptually organised. Findings This paper shows that security has shifted from a narrow-focused isolated issue towards a strategic business issue with “from the basement to the boardroom” implications. The key takeaway is that protecting the organisation is important, but organizations must also develop strategies to ensure resilient businesses to take advantage of the opportunities that digitalization can bring. Research limitations/implications The concept of DSG is a new research territory that addresses the limitations and gaps of traditional ISG approaches in a digital context. To this extent, organisational theories are suggested to help build knowledge that offers a deeper understanding than that provided by the too often used practical approaches in ISG research. Practical implications This paper supports practitioners and decision makers by providing a deeper understanding of how organisations and their security approaches are actually affected by digitalisation. Social implications This paper helps individuals to understand that they have increasing rights with regard to privacy and security and a say in what parties they assign business to. Originality/value This paper makes a novel contribution to ISG research. To the authors’ knowledge, this is the first attempt to review and structure the ISG literature.
APA, Harvard, Vancouver, ISO, and other styles
33

Smedley, Jo. "Information innovation: it’s all about people." Information and Learning Science 118, no. 11/12 (November 13, 2017): 669–71. http://dx.doi.org/10.1108/ils-08-2017-0087.

Full text
Abstract:
Purpose This paper discusses the importance of effectively engaging people in sharing information and managing its implementation across organisations as a key part of successful change initiatives. Design/methodology/approach Consideration why information is important to an organisation and how people and space contribute to its current and future effective management. Findings How flexibility of working practices and the creative management of physical and virtual space empowers and enables change in innovating new working practices. Research limitations/implications How creative thinking contributes to flexibility and streamlining of established practices to achieve effective information management. There is no “final answer” – it is an ongoing iterative process which depends on people engagement for continued success. Practical implications Within a working environment of ongoing change, it is important that the value of engaging people in organisational change is embedded as a key part of assuring continuing successful outcomes. Social implications The methods of engaging people in successful change need to be carefully considered to maximise overall outcomes reflecting a “hearts and mind” perspective. Approaches used are often individual to different groups within wider communities. All contribute to achieving effective change outcomes across a whole organisation. Originality/value Today’s information age is ever changing. People are an organisations best asset. An effective information management system enables a flexible, agile and response to access data, develop information and progress knowledge to build ongoing sustainability.
APA, Harvard, Vancouver, ISO, and other styles
34

Shahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, and Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure." Information & Computer Security 23, no. 2 (June 8, 2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.

Full text
Abstract:
Purpose – This paper aims to propose a comprehensive model to find out the most preventive subset of security controls against potential security attacks inside the limited budget. Deploying the appropriate collection of information security controls, especially in information system-dependent organizations, ensures their businesses' continuity alongside with their effectiveness and efficiency. Design/methodology/approach – Impacts of security attacks are measured based on interdependent asset structure. Regarding this objective, the asset operational dependency graph is mapped to the security attack graph to assess the risks of attacks. This mapping enables us to measure the effectiveness of security controls against attacks. The most effective subset is found by mapping its features (cost and effectiveness) to items’ features in a binary knapsack problem, and then solving the problem by a modified version of the classic dynamic programming algorithm. Findings – Exact solutions are achieved using the dynamic programming algorithm approach in the proposed model. Optimal security control subset is selected based on its implementation cost, its effectiveness and the limited budget. Research limitations/implications – Estimation of control effectiveness is the most significant limitation of the proposed model utilization. This is caused by lack of experience in risk management in organizations, which forces them to rely on reports and simulation results. Originality/value – So far, cost-benefit approaches in security investments are followed only based on vulnerability assessment results. Moreover, dependency weights and types in interdependent structure of assets have been taken into account by a limited number of models. In the proposed model, a three-dimensional graph is used to capture the dependencies in risk assessment and optimal control subset selection, through a holistic approach.
APA, Harvard, Vancouver, ISO, and other styles
35

Khedr, Walid I., Mahmoud I. Abdalla, and Asmaa A. Elsheikh. "Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network." IET Information Security 9, no. 6 (November 1, 2015): 334–43. http://dx.doi.org/10.1049/iet-ifs.2013.0170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Oksanych, I. M., V. F. Grechaninov, and A. V. Lopushansky. "Information interaction in disparate information systems of situational centers." Mathematical machines and systems 3 (2020): 60–68. http://dx.doi.org/10.34121/1028-9763-2020-3-60-68.

Full text
Abstract:
The article is devoted to the problem of information exchange between automated systems of situational centers (SC) of the government authorities of the Security and Defence Sector (SDS) of Ukraine. The prob-lem is extremely topical today, since in the event of nationwide threats (military intervention, terrorism, emergencies), the SDS should work as a single well-coordinated mechanism. Therefore, the creation of the SC SDS system and the establishment of information exchange between them is a prerequisite for this. The paper assesses the most common types of data integration in information systems (IS), such as data ware-houses, data federation and service-oriented approach. As the most modern approach to information inter-action of disparate ISs, a service-oriented approach is proposed. It is noted that for data exchange it is inappropriate to get access to “other” IS and independently search for the necessary information there. Alternatively, it is proposed to isolate the data exchange subject area (SbA) from the IS subject areas of various SCs and to determine the topics necessary for the exchange. Next, for each topic, to build a the-matic view of grouped, analytical data by the type of data mart. Such views will become a data source for the corresponding services in SOA and can be used in Publish/Subscribe and Request/Response modes. The paper considers a method and proposes an algorithm for the interaction of ISs of disparate SCs based on the use of the ontology of SbA data exchange and SOA. The MIP4-IES family of data exchange specifi-cations of the NATO Multilateral Interoperability Program (MIP) is taken as an example. On the basis of legislative documents in the field of emergency response, an ontology of data exchange between the IS of the SC in response to emergency situations has been built. Examples of topics and thematic views are given that can be constructed on the basis of the constructed SbA ontology for data exchange.
APA, Harvard, Vancouver, ISO, and other styles
37

Rajamanickam, Vennila, and Duraisamy Veerappan. "Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks." IET Information Security 8, no. 4 (July 1, 2014): 234–39. http://dx.doi.org/10.1049/iet-ifs.2013.0217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hinder, Susan, Kathrin Cresswell, Aziz Sheikh, Bryony Dean Franklin, Marta Krasuska, Hung The Nguyen, Wendy Lane, et al. "Promoting inter-organisational knowledge sharing: A qualitative evaluation of England’s Global Digital Exemplar and Fast Follower Programme." PLOS ONE 16, no. 8 (August 2, 2021): e0255220. http://dx.doi.org/10.1371/journal.pone.0255220.

Full text
Abstract:
Background The Global Digital Exemplar (GDE) Programme was designed to promote the digitisation of hospital services in England. Selected provider organisations that were reasonably digitally-mature were funded with the expectation that they would achieve internationally recognised levels of excellence and act as exemplars (‘GDE sites’) and share their learning with somewhat less digitally-mature Fast Follower (FF) sites. Aims This paper explores how partnerships between GDE and FF sites have promoted knowledge sharing and learning between organisations. Methods We conducted an independent qualitative longitudinal evaluation of the GDE Programme, collecting data across 36 provider organisations (including acute, mental health and speciality), 12 of which we studied as in-depth ethnographic case studies. We used a combination of semi-structured interviews with programme leads, vendors and national policy leads, non-participant observations of meetings and workshops, and analysed national and local documents. This allowed us to explore both how inter-organisational learning and knowledge sharing was planned, and how it played out in practice. Thematic qualitative analysis, combining findings from diverse data sources, was facilitated by NVivo 11 and drew on sociotechnical systems theory. Results Formally established GDE and FF partnerships were perceived to enhance learning and accelerate adoption of technologies in most pairings. They were seen to be most successful where they had encouraged, and were supported by, informal knowledge networking, driven by the mutual benefits of information sharing. Informal networking was enhanced where the benefits were maximised (for example where paired sites had implemented the same technological system) and networking costs minimised (for example by geographical proximity, prior links and institutional alignment). Although the intervention anticipated uni-directional learning between exemplar sites and ‘followers’, in most cases we observed a two-way flow of information, with GDEs also learning from FFs, through informal networking which also extended to other health service providers outside the Programme. The efforts of the GDE Programme to establish a learning ecosystem has enhanced the profile of shared learning within the NHS. Conclusions Inter-organisational partnerships have produced significant gains for both follower (FF) and exemplar (GDE) sites. Formal linkages were most effective where they had facilitated, and were supported by, informal networking. Informal networking was driven by the mutual benefits of information sharing and was optimised where sites were well aligned in terms of technology, geography and culture. Misalignments that created barriers to networking between organisations in a few cases were attributed to inappropriate choice of partners. Policy makers seeking to promote learning through centrally directed mechanisms need to create a framework that enables networking and informal knowledge transfer, allowing local organisations to develop bottom-up collaboration and exchanges, where they are productive, in an organic manner.
APA, Harvard, Vancouver, ISO, and other styles
39

Borsellino, Valeria, Francesca Varia, Cinzia Zinnanti, and Emanuele Schimmenti. "The Sicilian cooperative system of wine production." International Journal of Wine Business Research 32, no. 3 (March 31, 2020): 391–421. http://dx.doi.org/10.1108/ijwbr-10-2018-0062.

Full text
Abstract:
Purpose The purpose of this paper is to verify whether, besides the traditional organisational models mainly implemented by wine-making cooperatives, more modern and hybrid organisational forms can be profitably applied within an increasingly competitive wine market. Design/methodology/approach The study outlined in this paper deployed a mixed method. Specifically, an archived analysis, a survey and a descriptive case study (including visits, interviews and documentary analysis) were the methodological techniques used in this study, which were “in series but integrated” between themselves. In this paper, the landscape of Sicilian wine cooperatives is described by collating and processing different types of statistical sources, which have been integrated by direct surveys undertaken in 2017. Thereafter, the study focussed on a wine cooperative with a specific business model and a strategic edge by analysing its strategic choices and main structural and governance characteristics. Within this case study, a financial ratio analysis, which was based on 2011-2017 financial statements, was conducted to analyse the profitability, financial balance, capital structure and debt relationships of the wine cooperative. Findings The Sicilian wine cooperative system is still predominantly characterised by partial and vertical integration, implemented by cooperatives which elect to sell mainly bulk wine to wine merchants. In such a context, there is scope for other degrees of integration and strategic inter-firm alliances; the latter includes “vertical quasi-integration”. The study demonstrated how the wine cooperative under investigation is overcoming the structural problems of the regional wine sector and why it is retaining such a strategic alliance with one of the most important Italian wine conglomerates. Indeed, it has acquired greater strength and reliability since its collaboration with the aforementioned wine company. Thus, total revenue and the company’s market share of packaged wine have increased. However, there are still margins for improving sales’ profitability. Research limitations/implications This study has territorial limitations but Sicilian wine cooperatives generally play an important role in the regional, Italian and European wine industries. As such, this research should be considered as an exploratory study, deserving further investigation into different strategic choices within the wine cooperative system by performing cross-case comparisons. Results may also be useful in orienting cooperative strategies in Sicily (or further afield) to small-to-medium wine cooperatives, often lacking specific abilities relating to the distribution, marketing and selling of their wine. Public agricultural policies may also be enlightened by these research pathways. Originality/value The authors contend that their study provides hitherto missing information relating to inter-firm strategic alliances, which wine cooperatives might implement to enhance their competitiveness and survive in the long-run.
APA, Harvard, Vancouver, ISO, and other styles
40

Berndtsson, Joakim, Peter Johansson, and Martin Karlsson. "Value conflicts and non-compliance." Information & Computer Security 26, no. 2 (June 11, 2018): 246–58. http://dx.doi.org/10.1108/ics-08-2017-0057.

Full text
Abstract:
Purpose The purpose of the study is to explore potential value conflicts between information security work and whistleblowing activities by analysing attitudes to whistleblowing among white-collar workers in Swedish organisations. Design/methodology/approach The study is conducted using survey data among (n = 674) Swedish white-collar workers. Statistical analyses are conducted to explore variations in acceptance of whistleblowing and analyse the relationship between acceptance for whistleblowing and information security attitudes and behaviours. Findings The study finds strong support for whistleblowing in both public and private spheres, and by both private and public sector employees. The study also finds stronger acceptance for intra-organisational whistleblowing, while support for external whistleblowing is low. Finally, the study shows that the whistleblowing activities might be perceived as coming in conflict with information security work, even as the support for including whistleblowing functions in information security practices is high. Research limitations/implications With a focus on one country, the study is limited in terms of empirical scope. It is also limited by a relatively small number of respondents and survey items relating to whistleblowing, which in turn affects its explanatory value. However, the study does provide unique new insight into a specific form of “non-compliance”, i.e. whistleblowing, which merits further investigation. Originality/value Few studies exist that combine insights from the fields of whistleblowing and information security research. Thus, this study provides a basis for further investigation into attitudes and behaviours linked to whistleblowing in public and private organisations, as well as attendant value conflicts related to information security management and practice.
APA, Harvard, Vancouver, ISO, and other styles
41

Junejo, Naveed Ur Rehman, Hamada Esmaiel, Haixin Sun, Zeyad A. H. Qasem, and Junfeng Wang. "Pilot-Based Adaptive Channel Estimation for Underwater Spatial Modulation Technologies." Symmetry 11, no. 5 (May 24, 2019): 711. http://dx.doi.org/10.3390/sym11050711.

Full text
Abstract:
Spatial Modulation Technologies (SMTs) are schemes that reduce inter-carrier interference (ICI), inter-channel interference, inter-antenna synchronization (IAS), and system complexity for multiple-input multiple-output (MIMO) communication systems. Moreover, high spectral and energy efficiency have rendered SMTs attractive to underwater acoustic (UWA) MIMO communication systems. Consequently, this paper focuses on SMTs such as spatial modulation (SM), generalized spatial modulation (GSM), and fully generalized spatial modulation (FGSM) in which one constant number and one multiple number of antennas are active to transmit data symbols in any time interval for underwater acoustic communication (UWAC). In SMTs, the receiver requires perfect channel state information (P-CSI) for accurate data detection. However, it is impractical that the perfect channel knowledge is available at the receiver. Therefore, channel estimation is of critical importance to obtain the CSI. This paper proposes the pilot-based recursive least-square (RLS) adaptive channel estimation method over the underwater time-varying MIMO channel. Furthermore, maximum likelihood (ML) decoder is used to detect the transmitted data and antennas indices from the received signal and the estimated UWA-MIMO channel. The numerical computation of mean square error (MSE) and bit error rate (BER) performance are computed for different SMTs like SM, GSM and FSGM using Monte Carlo iterations. Simulation results demonstrate that the RLS channel estimation method achieves the nearly same BER performance as P-CSI.
APA, Harvard, Vancouver, ISO, and other styles
42

De La Torre Cruz, Juan, Francisco Jesús Cañadas Quesada, Nicolás Ruiz Reyes, Pedro Vera Candeas, and Julio José Carabias Orti. "Wheezing Sound Separation Based on Informed Inter-Segment Non-Negative Matrix Partial Co-Factorization." Sensors 20, no. 9 (May 8, 2020): 2679. http://dx.doi.org/10.3390/s20092679.

Full text
Abstract:
Wheezing reveals important cues that can be useful in alerting about respiratory disorders, such as Chronic Obstructive Pulmonary Disease. Early detection of wheezing through auscultation will allow the physician to be aware of the existence of the respiratory disorder in its early stage, thus minimizing the damage the disorder can cause to the subject, especially in low-income and middle-income countries. The proposed method presents an extended version of Non-negative Matrix Partial Co-Factorization (NMPCF) that eliminates most of the acoustic interference caused by normal respiratory sounds while preserving the wheezing content needed by the physician to make a reliable diagnosis of the subject’s airway status. This extension, called Informed Inter-Segment NMPCF (IIS-NMPCF), attempts to overcome the drawback of the conventional NMPCF that treats all segments of the spectrogram equally, adding greater importance for signal reconstruction of repetitive sound events to those segments where wheezing sounds have not been detected. Specifically, IIS-NMPCF is based on a bases sharing process in which inter-segment information, informed by a wheezing detection system, is incorporated into the factorization to reconstruct a more accurate modelling of normal respiratory sounds. Results demonstrate the significant improvement obtained in the wheezing sound quality by IIS-NMPCF compared to the conventional NMPCF for all the Signal-to-Noise Ratio (SNR) scenarios evaluated, specifically, an SDR, SIR and SAR improvement equals 5.8 dB, 4.9 dB and 7.5 dB evaluating a noisy scenario with SNR = −5 dB.
APA, Harvard, Vancouver, ISO, and other styles
43

Da Veiga, Adéle. "An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture." Information & Computer Security 26, no. 5 (November 12, 2018): 584–612. http://dx.doi.org/10.1108/ics-08-2017-0056.

Full text
Abstract:
PurposeEmployee behaviour is a continuous concern owing to the number of information security incidents resulting from employee behaviour. The purpose of this paper is to propose an approach to information security culture change management (ISCCM) that integrates existing change management approaches, such as the ADKAR model of Prosci, and the Information Security Culture Assessment (ISCA) diagnostic instrument (questionnaire), to aid in addressing the risk of employee behaviour that could compromise information security.Design/methodology/approachThe ISCCM approach is constructed based on literature and the inclusion of the ISCA diagnostic instrument. The ISCA diagnostic instrument statements are also presented in this paper. The ISCCM approach using ISCA is illustrated using data from an empirical study.FindingsThe ISCCM approach was found to be useful in defining change management interventions for organisations using the data of the ISCA survey. Employees’ perception and acceptance of change to ensure information security and the effectiveness of the information security training initiatives improved significantly from the as-is survey to the follow-up survey.Research limitations/implicationsThe research illustrates the ISCCM approach and shows how it should be combined with the ISCA diagnostic instrument. Future research will focus on including a qualitative assessment of information security culture to complement the empirical data.Practical implicationsOrganisations do not have to rely on or adapt organisational development approaches to change their information security culture – they can use the proposed ISCCM approach, which has been customised from information security and change management approaches, together with the presented ISCA questionnaire, to address information security culture change purposefully.Originality/valueThe proposed ISCCM approach can be applied to complement existing information security management approaches through a holistic and structured approach that combines the ADKAR model, Prosci’s approach of change management and the ISCA diagnostic instrument. It will enable organisations to focus on transitioning to a positive or desired information security culture that mitigates the risk of the human element in the protection of information.
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Zhen-Song, Bing-Jie Li, and Min Miao. "A Parallel Transmission Scheme Based on the Turbo Product Code for Through Silicon via Array in Three-Dimensional Integrated Circuits." Journal of Nanoelectronics and Optoelectronics 16, no. 3 (March 1, 2021): 494–500. http://dx.doi.org/10.1166/jno.2021.2944.

Full text
Abstract:
Through silicon via (TSV) is the key technology for the vertical interconnect in three-dimensional integrated circuits (3-D ICs). With the help of TSVs, higher throughput in signal transmission can be attained. However, the tightly clustered TSVs in the TSV array suffer from crosstalk noise, a situation which results in transmission errors. This study investigates, the channel model of the TSV array, involving main factors affecting transmission performance, such as transmission loss, inter-channel interference, and crosstalk noise with different digital patterns. A parallel transmission scheme based on a turbo product code (TPC) parallel coding is proposed. In this scheme, the binary bits of information are reshaped into two dimensional blocks. Each block is parallel encoded using a TPC into a codeword block for parallel transmission through the TSV array channel. At the receiver, the sending information is reformed by a concurrent hard decision decoding algorithm of a TPC. This parallel transmission scheme achieves low bit-error-rate, high throughput, and a lower system overhead relative to that of its ground TSV shielded counterpart if the type of TPC is carefully selected. The simulation results confirm that this scheme reduces inter-symbol interference, minimizes structural defects in the TSV array, and improves transmission performance in 3-D ICs.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhai, Jingjing, Xiaobei Wu, Zihao Li, Shaojie Zhu, Bo Yang, and Haoming Liu. "Day-Ahead and Intra-Day Collaborative Optimized Operation among Multiple Energy Stations." Energies 14, no. 4 (February 10, 2021): 936. http://dx.doi.org/10.3390/en14040936.

Full text
Abstract:
An integrated energy system (IES) shows great potential in reducing the terminal energy supply cost and improving energy efficiency, but the operation scheduling of an IES, especially integrated with inter-connected multiple energy stations, is rather complex since it is affected by various factors. Toward a comprehensive operation scheduling of multiple energy stations, in this paper, a day-ahead and intra-day collaborative operation model is proposed. The targeted IES consists of electricity, gas, and thermal systems. First, the energy flow and equipment composition of the IES are analyzed, and a detailed operation model of combined equipment and networks is established. Then, with the objective of minimizing the total expected operation cost, a robust optimization of day-ahead and intra-day scheduling for energy stations is constructed subject to equipment operation constraints, network constraints, and so on. The day-ahead operation provides start-up and shut-down scheduling of units, and in the operating day, the intra-day rolling operation optimizes the power output of equipment and demand response with newly evolved forecasting information. The photovoltaic (PV) uncertainty and electric load demand response are also incorporated into the optimization model. Eventually, with the piecewise linearization method, the formulated optimization model is converted to a mixed-integer linear programming model, which can be solved using off-the-shelf solvers. A case study on an IES with five energy stations verifies the effectiveness of the proposed day-ahead and intra-day collaborative robust operation strategy.
APA, Harvard, Vancouver, ISO, and other styles
46

Cope, Jacqueline, Francois Siewe, Feng Chen, Leandros Maglaras, and Helge Janicke. "On data leakage from non-production systems." Information & Computer Security 25, no. 4 (October 9, 2017): 454–74. http://dx.doi.org/10.1108/ics-02-2017-0004.

Full text
Abstract:
Purpose This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development life cycle, non-production environments are used to serve various purposes to include unit, component, integration, system, user acceptance, performance and configuration testing. Organisations and third parties have been and are continuing to use copies of production data in non-production environments. This can lead to personal and sensitive data being accidentally leaked if appropriate and rigorous security guidelines are not implemented. This paper aims to propose a comprehensive framework for minimising data leakage from non-production environments. The framework was evaluated using guided interviews and was proven effective in helping organisation manage sensitive data in non-production environments. Design/methodology/approach Authors conducted a thorough literature review on areas related to data leakage from non-production systems. By doing an analysis of advice, guidelines and frameworks that aims at finding a practical solution for selecting and implementing a de-identification solution of sensitive data, the authors managed to highlight the importance of all areas related to sensitive data protection. Based on these areas, a framework was proposed which was evaluated by conducting set of guided interviews. Findings This paper has researched the background information and produced a framework for an organisation to manage sensitive data in its non-production environments. This paper presents a proposed framework that describes a process flow from the legal and regulatory requirements to data treatment and protection, gained through understanding the organisation’s business, the production system, the purpose and the requirements of the non-production environment. The paper shows that there is some conflict between security and perceived usability, which may be addressed by challenging the perceptions of usability or identifying the compromise required. Non-production environments need not be the sole responsibility of the IT section, they should be of interest to the business area that is responsible for the data held. Originality/value This paper proposes a simplified business model and framework. The proposed model diagrammatically describes the interactions of elements affecting the organisation. It highlights how non-production environments may be perceived as separate from the business systems, but despite the perceptions, these are still subject to the same legal requirements and constraints. It shows the interdependency of data, software, technical infrastructure and human interaction and how the change of one element may affect the others. The proposed framework describes the process flow and forms a practical solution in assisting the decision-making process and providing documentary evidence for assurance and audit purposes. It looks at the requirements of the non-production system in relation to the legal and regulatory constraints, as well as the organisational requirements and business systems. The impact of human factors on the data is also considered to bring a holistic approach to the protection of non-production environments.
APA, Harvard, Vancouver, ISO, and other styles
47

Ahmad, Zauwiyah, Thian Song Ong, Tze Hui Liew, and Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees." Information & Computer Security 27, no. 2 (June 12, 2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.

Full text
Abstract:
Purpose The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring. Design/methodology/approach Theoretical framework underlying this study with six constructs, namely, subjective norm, outcome expectation, information security monitoring, information security policy, self-efficacy and perceived inconvenience, were identified as significant in determining employees’ security assurance behaviour (SAB). The influence of these constructs on SAB could be explained by social cognitive theory and is empirically supported by past studies. An online questionnaire survey as the main research instrument is adopted to elicit information on the six constructs tested in this study. Opinion from industry and academic expert panels on the relevance and face validity of the questionnaire were obtained prior to the survey administration. Findings Findings from this research indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. This study also demonstrates that employees tend to abandon security behaviour when the behaviour is perceived as inconvenient. Hence, organisations must find ways to reduce the perceived inconvenience using various security automation methods and specialised security training. Reducing perceived inconvenience is a challenge to information security practitioners. Research limitations/implications There are some limitations in the existing work that could be addressed in future studies. One of them is the possible social desirability bias due to the self-reported measure adopted in the study. Even though the authors have made every effort possible to collect representative responses via anonymous survey, it is still possible that the respondents may not reveal true behaviour as good conduct is generally desired. This may lead to a bias towards favourable behaviour. Practical implications In general, the present research provides a number of significant insights and valuable information related to security assurance behaviour among employees. The major findings could assist security experts and organisations to develop better strategies and policies for information security protection. Findings of this research also indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. Social implications In this research, the social cognitive learning theory is used to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour; the finding implies that monitoring emphases expected behaviours and helps to reinforce organisational norms. Monitoring may also accelerate learning when employees become strongly mindful of their behaviours. Hence, it is important for organisations to communicate the monitoring practices implemented, even more imperative whenever security monitoring employed is unobtrusive in nature. Nonetheless, care must be taken in this communication to avoid resentment and mistrust among employees. Originality/value This study is significant in a number of ways. First, this study highlights significant antecedents of security assurance behaviour, which helps organisations to assess their current practices, which may nurture or suppress information security. Second, using users’ perspective, this study provides recommendations pertaining to monitoring as a form of information security measure. Third, this study provides theoretical contribution to the existing information security literature via the application of the social cognitive learning theory.
APA, Harvard, Vancouver, ISO, and other styles
48

Höhler, J., and R. Kühl. "Organisation of German livestock production from the bottom up: a new institutional economic analysis of dairy cattle breeding." Journal on Chain and Network Science 16, no. 1 (September 14, 2016): 7–18. http://dx.doi.org/10.3920/jcns2014.0005.

Full text
Abstract:
Cooperatives operate in many different parts of the agri-food chain. Animal breeding, as one of these areas, has not yet been subject to intensive research. In the literature, cooperatives are often claimed to produce a lower quality product than comparable investor-owned firms. Is this the case in dairy cattle breeding as well? In order to address this question, we examine the inter- and intra-organisational coordination and structure of the supply chain for cattle breeding in Germany by means of a property rights model. In a short-term perspective, the profit maximisation of the cooperative member follows the model of perfect competition. In addition, we show the existence of a quality coordination problem in breeding associations in the long run. This problem is presumed to be counteracted by the dual system of price-setting which allows the cooperative to provide incentives to its members.
APA, Harvard, Vancouver, ISO, and other styles
49

Najjar, Mohammad, Michael H. Small, and Mahmoud M. Yasin. "Social Sustainability Strategy across the Supply Chain: A Conceptual Approach from the Organisational Perspective." Sustainability 12, no. 24 (December 14, 2020): 10438. http://dx.doi.org/10.3390/su122410438.

Full text
Abstract:
Much of the existing literature on the social aspects of sustainability in the supply chain has focused on dyadic buyer-supplier relationships. However, supply chains are much more extensive, featuring multi-tiered systems consisting of many interconnected sequential and parallel dyadic relationships; therefore, a more expansive and holistic approach to exploring the management and integration of social sustainability standards across the extended supply chain is desirable. This research attempts to help fill this void and considers the extent to which a series of sequential upstream and downstream supply chain partners, rather than only a focal organization’s immediate suppliers and buyers, influence the formulation process of the social aspects of a sustainability strategy and the deployment of associated practices across the extended supply chain. Findings in the literature indicate that, inter alia, sustainability efforts in the supply chain are likely to be guided by stakeholders’ sustainability desires/requirements, the geographical location of buyers and suppliers and the associated sustainability enforcement regulations and cultural norms, and the volume of trade between the buyer and supplier. This paper uses the results gleaned from a review of the literature to propose a conceptual framework for selection of sustainability strategy across the multi-tiered supply chain. Finally, we introduce a conceptual approach to the process of implementing and deploying the social aspects of sustainability strategies and practices across the supply chain using an integrated social-sustainability information management system (ISIMS).
APA, Harvard, Vancouver, ISO, and other styles
50

Akinsanya, Opeoluwa Ore, Maria Papadaki, and Lingfen Sun. "Towards a maturity model for health-care cloud security (M2HCS)." Information & Computer Security 28, no. 3 (December 16, 2019): 321–45. http://dx.doi.org/10.1108/ics-05-2019-0060.

Full text
Abstract:
Purpose The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature. Design/methodology/approach The intended use of the proposed model was demonstrated using the evaluation method – “construct validity test” as the paper’s aim was to assess the final model and the output of the valuation. The study involved a literature-based case study of a national health-care foundation trust with an overall view because the model is assessed for the entire organisation. The data were complemented by examination of hospitals’ cyber security internal processes through web-accessible documents, and identified relevant literature. Findings The paper provides awareness about how organisational-related challenges have been identified as a main inhibiting factor for the adoption of cloud computing in health care. Regardless of the remunerations of cloud computing, its security maturity and levels of adoption varies, especially in health care. Maturity models provide a structure towards improving an organisation’s capabilities. It suggests that although several cyber security maturity models and standards resolving specific threats exist, there is a lack of maturity models for cloud-based health-care security. Research limitations/implications Due to the selected research method, the research results may lack generalizability. Therefore, future research studies can investigate the propositions further. Another is that the current thresholds were determined empirically, although it worked for the case study assessment. However, to establish more realistic threshold levels, there is a need for more validation of the model using more case studies. Practical implications The paper includes maturity model for the assessment management and improvement of the security posture of a health-care organisation actively using cloud. For executives, it provides a detailed security assessment of the eHealth cloud to aid in decision making. For security experts, its quantitative metrics support proactive and reactive processes. Originality/value The paper fulfils a recognised requirement for security maturity model focussed on health-care cloud. It could be extended to resolve evolving cyber settings.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography