information System (IS) evolution is today a continuous preoccupation of every modern organization that aims to have a perfect support for its constantly changing business ecosystem. However, the task of IS evolution ...
详细信息
ISBN:
(纸本)9783319483931;9783319483924
information System (IS) evolution is today a continuous preoccupation of every modern organization that aims to have a perfect support for its constantly changing business ecosystem. However, the task of IS evolution is not anodyne, it presents several risks towards IS sustainability as well as towards enterprise activity. Taking a decision related to any IS change can be a troublesome responsibility because of the amount of information that has to be processed and the uncertainty of the impact of the change on the enterprise and its IS. To reduce this uncertainty, we have developed a conceptual framework for IS evolution steering. This framework allows to capture the information on how enterprise IS supports its activities and regulations, and then to extract the information relevant for realizing IS evolution activities, simulating their impact, and taking appropriate decisions. This second part of the framework is called the responsibility space of IS evolution steering and is the main subject of this paper.
information Systems (IS) research has both a journal-oriented publication culture and a rich plethora of conferences. It is unclear why IS researchers even bother with conference publishing given the high focus on jou...
详细信息
ISBN:
(纸本)9783319435978;9783319435961
information Systems (IS) research has both a journal-oriented publication culture and a rich plethora of conferences. It is unclear why IS researchers even bother with conference publishing given the high focus on journals. Against this backdrop, the purpose of this paper is to increase our understanding of conference papers in IS and the role they play for the authoring researchers. We present the first analysis of the papers published during the first six years (2010-2015) in the Scandinavian Conference on information Systems (SCIS). We conducted interviews with ten SCIS authors. Following a framework adopted from Akerlind [1], we identified how SCIS papers have the roles of fulfilling requirements, establishing oneself, developing personally, enabling change, and other roles. This article contributes to the reflection literature on the IS field by applying a practice lens to understand the role of conference papers in research.
Electronic commerce (EC) development takes place in a complex and dynamic environment that includes high levels of risk and uncertainty. This paper proposes a new method for assessing the risks associated with EC deve...
详细信息
ISBN:
(纸本)9783319328775;9783319328768
Electronic commerce (EC) development takes place in a complex and dynamic environment that includes high levels of risk and uncertainty. This paper proposes a new method for assessing the risks associated with EC development using multi-criteria decision-making techniques A model based on the analytic hierarchy process (AHP) and the technique for order of preference by similarity to ideal solution (TOPSIS) is proposed to assist EC project managers and decision makers in formalizing the types of thinking that are required in assessing the current risk environment of their EC development in a more systematic manner than previously. The solution includes the use of AHP for analyzing the problem structure and determining the weights of risk factors. The TOPSIS technique helps to obtain a final ranking among projects, and the results of an evaluation show the usefulness performance of the method.
Security risk management is an important part of system development. Given that a majority of modern organisations rely heavily on information systems, security plays a big part in ensuring smooth operations of busine...
详细信息
ISBN:
(纸本)9783319483931;9783319483924
Security risk management is an important part of system development. Given that a majority of modern organisations rely heavily on information systems, security plays a big part in ensuring smooth operations of business processes. For example, many people rely on e-services offered by banks and medical establishments. Inadequate security measures in information systems have unwanted effects on an organisation's reputation and on people's lives. In this case study research paper, we target the secure system development problem by suggesting the application of security risk oriented patterns. These patterns help find security risk occurrences in business processes and present mitigations for these risks. They provide business analysts with means to elicit and introduce security requirements to business processes. At the same time, they reduce the efforts needed for risk analysis. These security risk oriented patterns are applied on business processes from an aviation-turnaround system. In this paper, we report our experience to derive security requirements to mitigate security risks in distributed systems.
This paper proposes structural consistency checking for Adaptive Case Management (ACM). Structures such as a hierarchical organization of business goals and dependencies among tasks are either created at design time o...
详细信息
ISBN:
(纸本)9783319428871;9783319428864
This paper proposes structural consistency checking for Adaptive Case Management (ACM). Structures such as a hierarchical organization of business goals and dependencies among tasks are either created at design time or evolve over time while working on cases. In this paper, we identify structures specific to current ACM systems (as opposed to other BPM systems), discuss which inconsistencies can occur, and outline how to discover these issues through model checking and graph algorithms.
The relation between requirements and architecture is a crucial part of an information system, standing as one of the main challenges for its successful development, with traditional projects focused on the connection...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
The relation between requirements and architecture is a crucial part of an information system, standing as one of the main challenges for its successful development, with traditional projects focused on the connection of functional requirements with architecture components having a tendency to ignore quality concerns. As the quality attributes of a system support its architecture high level structure and behavior, also being highly related to its early nonfunctional requirements, there is a pressing need to align these two realities. Following our solution for aligning business requirements with services quality characteristics by derivation of a logical architecture, we now propose the specification of a metamodel and method supporting a three-dimensional approach for handling the alignment of quality issues between requirements and architecture. Taking advantage of a cube structure and method definition within a SPEM approach, which is adaptable to model variations, our proposal contributes to an improved aligned and traceable solution.
The aim of this paper is to introduce the architecture of a system that combines the strengths of agents and web services to address the practical application of freight brokering. This is an important real-life busin...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
The aim of this paper is to introduce the architecture of a system that combines the strengths of agents and web services to address the practical application of freight brokering. This is an important real-life business problem which aims to provide matchmaking services that facilitate the connection of the owners of goods with the freight transportation providers. The paper presents the general architecture of the system including agents and web services, as well as the use cases and the details of its main operations. Our system can be beneficial to logistics companies by increasing the quality of provided services and by reducing costs.
Social network sites give their users the ability to create contents and share it with others. During social crisis, the spread of false and true information could have profound impacts on users. Lack of prior studies...
详细信息
ISBN:
(数字)9783319454085
ISBN:
(纸本)9783319454085;9783319454078
Social network sites give their users the ability to create contents and share it with others. During social crisis, the spread of false and true information could have profound impacts on users. Lack of prior studies to compare differences between diffusion patterns of rumors and truths during social crisis is the motivation of this study. In this study, we examine the role of information credibility, anxiety, personal involvement, and social ties on rumor and truth spread during social crisis. Building on the rumor theory, we propose a research model to examine differences between spread of rumors and truths. Using the Tweeter data collected during the Baltimore riots in 2015, we test the research model. Theoretical contributions and practical implications will be outlined based on the findings of the study. We anticipate findings will provide new avenues of research by determining characteristics of truths and rumors in online contexts.
Software ecosystems is one promising strategy for organizations to find new market segments, new innovative value propositions creating new value streams. However, understanding internal and external actors, resources...
详细信息
ISBN:
(数字)9783319405155
ISBN:
(纸本)9783319405155;9783319405148
Software ecosystems is one promising strategy for organizations to find new market segments, new innovative value propositions creating new value streams. However, understanding internal and external actors, resources and relationships that could be leveraged in a SECO is critical for their strategic decisions. The consequence of mistakes may be costly failures that can force an organization to move out of a market. This paper describes a systematic mapping study that targets description of software ecosystems. Our conjecture is that adequate description support leads to modeling, which will improve information and in turn strategic decisions. The survey searches existing literature for description techniques and their application for comprehensive description. The study identifies and maps 63 primary studies out of 937 candidates according to their degree of modeling support and several other important aspects for SECO description. The analysis indicates that no approach fully supports comprehensive SECO descriptions, supporting domain specific and view specific modeling of ecosystem concerns. The analysis is used to highlight areas for a future research agenda.
Process mining discovers process models from event logs. Logs containing heterogeneous sets of traces can lead to complex process models that try to account for very different behaviour in a single model. Trace cluste...
详细信息
ISBN:
(纸本)9783319428871;9783319428864
Process mining discovers process models from event logs. Logs containing heterogeneous sets of traces can lead to complex process models that try to account for very different behaviour in a single model. Trace clustering identifies homogeneous sets of traces within a heterogeneous log and allows for the discovery of multiple, simpler process models. In this paper, we present a trace clustering method based on local alignment of sequences, subsequent multidimensional scaling, and k-means clustering. We describe its implementation and show that its performance compares favourably to state-of-the-art clustering approaches on two evaluation problems.
暂无评论