首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
《Computers & Security》1988,7(5):455-465
Management is often rightfully dissatisfied with the performance of many information security efforts. After investment of considerable resources, and prolonged waiting for results, many efforts can demonstrate little if any significant improvement. This is largely due to a lack of planning. Many efforta lack explicitly articulated plans as well as specific performance milestones. Although many are loathe to admit it, information security efforts at many organizations lack formal planning and performance monitoring.Management's dissatisfaction with information security is exemplified by the seriously inadequate staffing levels found at a large number of organizations. When management is convinced that information security is a prudent investment, they will respond with additional resources.This article examines why information security efforts are often ineffective and why more formal planning efforts can alleviate this condition. It discusses tools best used to prepare an action plan for information security and gives some tips on how to sell such a plan to management. Also discussed are organizational design, policies, standards, and guidelines and other elements of a foundation that is required if an effective information security planning process is to be sustained. The article dwells on the establishment of a context for effective information security planning.  相似文献   

2.
Recently, context-awareness has been a hot topic in the ubiquitous computing field. Numerous methods for capturing, representing and inferring context have been developed and relevant projects have been performed. Existing research has tried to determine user’s contextual information physically by using stereo type cameras, RFID, smart devices, etc. These are heavily focusing on external context such as location, temperature, light, etc. However, cognitive elements of the context are important and need more study. This paper confines its research domain to the Web-based information system (IS) and, first, proposes two algorithms, the context inference algorithm and the service recommendation algorithm, for inferring cognitive context in the IS domain. Second, this paper demonstrates cognitive context-awareness on the Web-based information systems through implementing prototype deploying the proposed algorithms. The proposed system deploying the context inference and service recommendation algorithm can help the IS user to work with an IS conveniently and enable an existing IS to deliver ubiquitous service. In this fashion, we show the direction of existing IS and, ultimately, shows the typical services of a ubiquitous computing-based IS.  相似文献   

3.
Codifying expert domain knowledge is a difficult and expensive task. To evaluate the quality of the outcome, often the same domain expert or a colleague of similar expertise is relied on to undertake a direct evaluation of the knowledge-based system or indirectly by preparing appropriate test data. During an incremental knowledge acquisition process, a data stream is available, and the knowledge base is observed and amended by an expert each time it produces an error. Using the kept record of the system’s performance, we propose an evaluation process to estimate its effectiveness as it gets evolved. We instantiate this process for an incremental knowledge acquisition methodology, Ripple Down Rules. We estimate the added value in each knowledge base update. Using these values, the decision makers in the organisation employing the knowledge-based information system can apply a cost-benefit analysis of the continuation of the incremental knowledge acquisition process. They can then determine when this process, involving keeping an expert online, should be terminated. As a result, the expert is not kept on-line longer than it is absolutely necessary. Hence, a major expense in deploying the information system—the cost of keeping a domain expert on-line—is reduced.  相似文献   

4.
5.
Context-aware environments must allow adaptive and autonomous access to context information. This multi-agent middleware uses a negotiation protocol and ontology model to make the environment more easily personalized at runtime and adapted and managed at provisioning time. In a pervasive environment, a wide range of devices and resources use heterogeneous networks to perform the tasks involved in spontaneous ad hoc communication. The environment's infrastructure must therefore make available a rich set of computing capabilities and services at all times and in all locations in a transparent, integrated, and convenient way. Context provides perceptual information about the location and status of the people, places, and other devices in the environment.  相似文献   

6.
7.
8.
We present an architecture to coordinate the construction of the context within which meaningful information between heterogeneous information systems can be exchanged. We call this coordinator SCOPES (Semantic Coordinator Over Parallel Exploration Spaces). A classification of semantic conflicts we proposed elsewhere is used to build and refine the context, by discovering the semantic mapping rules (inter-schema correspondence assertions) between corresponding elements of the communicating systems. A truth maintenance system is used to manage the multiple intermediate contexts. It provides a mechanism to infer or retract assertions on the basis of the knowledge acquired during the reconciliation process. This nonmonotonic technique is used in conjunction with the Dempster-Shafer theory of belief functions to model the likelihood of alternative contexts. Finally, we propose an algorithm which illustrates how the various components of the architecture interact with one another in order to build context.  相似文献   

9.
One of the prime reasons for the deployment of information technology in organizations is the expectation of a positive return on the investment. But the returns from different types of application vary both in terms of the ability to provide straightforward measurement of the costs and benefits, and in the degree of certainty with which estimates of costs and benefits will be realised. This paper provides a framework for classifying applications in the form of an eight-rung ladder, each rung of which represents a class of application. The way in which applications need to be handled and the methods by which their impact can be evaluated changes from rung to rung. Moving up the ladder increases the complexity of evaluation and the degree of risk and uncertainty, but at the same time also increases the potential returns on the investments. The ladder is different from conventional ‘strategic IT’ frameworks: it is a framework for action as well as understanding; it specifically relates to evaluation; and it does not imply any predetermined or time-based sequence of progress.  相似文献   

10.
Healthcare industries have not only been criticized for being slow in adopting IT (Barnes 2001) but also face tremendous challenges in developing and deploying HIS successfully (Teoh and Cai 2009). In view of these challenges, this study aims to articulate the theory and practice from Enterprise Systems (ES) as it is perceived to produce an extensive suite of strategic, managerial, and operational benefits in the healthcare setting. Healthcare institutions have begun to explore the possibilities of exploiting ES as a means to facilitate the delivery of high-quality and integrated patient care. In particular, one of the benefits of ES is that it leads to better resource management in terms of assets and manpower allocation. In our study, empirical data was collected and analyzed based on an in-depth case study of two ES implementations at Alexandra Hospital in Singapore. Our findings contribute to the ES research on how an organization manages its resource portfolio and activity during the implementation of a healthcare information system in a hospital. Theoretically, we adapted and extended Sirmon et al.’s (2007) Dynamic Resource Management Model of Value Creation and integrated it with the Technochange Life Cycle framework proposed by Markus (2004). Finally, this paper adds value by inductively deriving eight key resource management activities and seven key resources that correspond to the phases of the technochange life cycle.  相似文献   

11.
《Information & Management》2005,42(5):761-779
While much has been written about strategic information systems planning (SISP), two important aspects have been under-emphasized. The first is the planning process or how planning is accomplished. The second is planning evolution or how planning evolves as a learning system. Both perspectives can provide practical guidance on how organizations will change their planning process over time in an attempt to improve their effectiveness as well as leverage their investment in SISP. This paper draws on prior literature to identify key dimensions of SISP and its effectiveness. The evolution of these dimensions is studied as a three-stage model. The results provide an interesting insight into how planning evolves as organizations reconcile seemingly contradictory “rational” and “adaptive” dimensions of planning. This balanced approach to planning is shown to be more effective, providing strong implications for both research and practice.  相似文献   

12.
Businesses need to continuously focus on change and innovation in order to survive in dynamic environments. The ability of an organization to deploy appropriate business processes requires that the fit between business processes and systems that support the management of these processes is continuously maintained and evolved. Acquisition and use of the knowledge about the context in which business processes are defined, modified, and implemented can help maintain this fit. We identify requirements for a business process management system (BPMS) capable of managing contextual knowledge. Based on these requirements, we have enhanced KOPeR, a knowledge-based system for business process improvement, with an explanation facility that can acquire and maintain knowledge about the context behind process definitions and design choices. A case study that illustrates the functionalities of this system which is designed to improve the fit between business processes and BPMS is presented.
Peng XuEmail:
  相似文献   

13.
An interpretive approach was applied to understand the social meanings of Geographic Information Systems (GIS) being implemented in two local government agencies in the United States. We assumed that information technologies, like other knowledge systems, are subject to social construction and that resulting social interpretations may shape their implementation and use. Guided by a framework linking social context with organizational processes, the research used inductive methods to describe the social constructed frames of meaning pertaining to GIS. Findings revealed strikingly different patterns of implementation and social consequences from the same technology. These findings demonstrate the role of social interpretations in the implementation of information technology. Social interpretations mediate between organizational context and the process of implementation to produce particular consequences of technology. The results support the notion of emergent causality and the importance of process in understanding the social consequences of technology  相似文献   

14.
This paper critically reviews current expert system developments relevant to geographic information systems, and identifies several research topics for application of expert system technology in geographic information systems. We have identified four major problem domains of geographic information systems in which expert system technology has been applied—automated map design, terrain/feature extraction, database management/user interface, and geographic decision support systems. Efforts in each problem domain are critically reviewed. Considering the accomplishments and shortcomings of efforts to date, we identify areas likely to gain importance in this field. Our view of these prospects is moderated by constraints of current technology and a realistic view of current efforts. Future research will place more emphasis on formal representation of both knowledge and uncertainty. Another future research area will be the development of advanced tools for geographic knowledge acquisition. Finally, better methods for working with large-scale geographic databases will be needed.  相似文献   

15.
16.
This paper argues that it is of crucial importance that information systems (IS) research and practice associates technology innovation with the context within which it is embedded. It identifies three principles to be followed in order to address the contextual processes involved in IS implementation: first, technology innovation should be considered in relation to socio‐organizational change; second, analysis should consider not only the local organizational, but also the national and international context; and third, analysis should consider both the technical/rational decisions and actions involved in the innovation process and the cultural, social and cognitive forces of such a process. These principles are demonstrated with the analysis of a case study of organizational reform in Cyprus.  相似文献   

17.
Several process metamodels exist. Each of them presents a different viewpoint of the same information systems engineering process. However, there are no existing correspondences between them. We propose a method to build unified, fitted and multi-viewpoint process metamodels for information systems engineering. Our method is based on a process domain metamodel that contains the main concepts of information systems engineering process field. This process domain metamodel helps selecting the needed metamodel concepts for a particular situational context. Our method is also based on patterns to refine the process metamodel. The process metamodel can then be instantiated according to the organisation’s needs. The resulting method is represented as a pattern system.  相似文献   

18.
Whilst researchers and professionals recognise that mobile health (M-health) systems offer unprecedented opportunities, most existing work has comprised individual project-based developments in specialised areas. Existing review articles generally utilise medical literature and categories: none investigates M-health from an information systems (IS) design point of view. Identifying application areas, design issues and IS research techniques will demonstrate models, issues, approaches and gaps to inform future research. A comprehensive analysis of the literature from this viewpoint is thus valuable, both for theoretical progression and for guiding real-world innovative system developments.Drawing from key IS and healthcare multidisciplinary journals we analyse recent (2010–2016) articles concerning M-health application developments and their associated design or development issues, with particular focus on the use of contemporary research methods. Our analysis suggests that M-health is an emerging field to which, although underused, contemporary approaches such as design science research are particularly appropriate. We identify eight application categories, eleven design issues (security, privacy, literacy, accessibility, acceptability, reliability, usability, confidentiality, integrity, knowledge sharing and flexibility) as well as the stakeholders and development techniques involved. This goes beyond previous frameworks, and theoretically integrates the central role of IS design within the sub-field.  相似文献   

19.
Online reviews, as one kind of quality indicator of products or service, are becoming increasingly important in influencing purchase decisions of prospective consumers on electronic commerce websites. With the fast growth of the Chinese e-commerce industry, it is thus indispensable to design effective online review systems for e-commerce websites in the Chinese context, by taking into account cultural factors. In this paper, we conduct two empirical studies on online reviews. Firstly, we study how culture differences across countries (i.e., China and the USA) impact the way in which consumers provide online reviews. Secondly, we investigate the impact of online reviews on product sales in the Chinese context, and show that directly copying the ideas of successful online review systems in the USA will deteriorate the effectiveness of the systems in China. Finally, we propose several suggestions for the development of effective online review systems in the Chinese context based on the results of our two empirical studies and the findings in previous studies.  相似文献   

20.
《Information Systems》2004,29(2):187-203
In order to design a better information system, a designer would like to have notations to visualize how design experts’ know-how can be applied according to one's specific social and technology situation. We propose the combined use of a goal-oriented requirements language (GRL) and a scenario-oriented notation Use Case Maps (UCM) for representing design knowledge of information systems. Goal-oriented modelling is used throughout the requirements and design process. In GRL, goals are used to depict business objectives and system requirements, both functional and non-functional. Tasks are used to represent different ways for achieving goals. Means-ends reasoning is used to explore alternative solutions and their operationalizations into implementable system constructs. Social context is modelled in terms of dependency relationships among agents and roles. Scenarios expressed in UCM are used to describe elaborated business processes or workflow. The complementary use of goal-oriented modelling with GRL and scenario modelling with UCM is illustrated with an example of designing a web-based training system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号