Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 13
  • Item
    Thumbnail Image
    Artifacts, Activities, Benefits and Blockers: Exploring Enterprise Architecture Practice in Depth
    Kurnia, S ; Kotusev, S ; Taylor, P ; Dilnutt, R (Hawaii International Conference on System Sciences, 2020)
    Enterprise architecture (EA) is a collection of artifacts describing an organization from an integrated business and IT perspective and intended to improve business and IT alignment. The purpose of this study is to identify benefits and blockers associated with specific EA-related activities and respective artifacts. Most existing studies discuss the benefits and problems of EA practice in general without relating them to specific activities constituting EA practice. This study is based on 18 interviews with architects and leverages the grounded theory approach. As a result of our analysis, we identify eight consistent activity areas constituting EA practice. Each activity area implies certain activities supported by some EA artifacts leading to specific benefits often impeded by some blockers. Our analysis indicates that EA practice includes many diverse activities usually, though not always, closely associated with specific types of EA artifacts. Moreover, benefits and blockers of EA practice are also very activity-specific.
  • Item
    No Preview Available
    Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach
    Naseer, H ; Ahmad, A ; Maynard, S ; Shanks, G (AIS, 2018)
    The modern enterprise uses risk-driven and control-centered security management systems to protect information resources and sustain competitive advantage. Such systems have proven to be quite effective in the prevention of threats that exploit common vulnerabilities. However, they are less suited to dynamic response against threats such as Advanced Persistent Threats. The complex and dynamic nature of these threats demands a sophisticated and timely response capability to collect, process and analyze evidence to direct strategic and operational cybersecurity measures. To better understand how organizations are dealing with this new dynamic threat, we analyzed in-depth data from ten expert interviews to determine: How can organizations develop dynamic capabilities in cybersecurity risk management using business analytics? The results informed a framework that explains how organizations may develop higher-order 'analytics-enabled dynamic capabilities' such as enhanced cybersecurity awareness, dynamic cyber-risk assessment, and cybersecurity threat intelligence generation to better deal with both predictable and unpredictable threats.
  • Item
    Thumbnail Image
    A Framework for Relationships in Outsourcing: Contract Management Archetypes
    CULLEN, S ; Shanks, G ; Davern, M ; Wilcocks, L ; Bui, TX ; Sprague, R (HICSS, 2017)
    Outsourcing engagements are defined by contracts, but personal relationships drive success. In this paper, we propose a set of behavior archetypes and use them within four action-research cases that altered behavior to achieve positive outcomes. The results suggest that a successful outsourcing engagement can be derived through adaptation of well-considered behavioral approaches rather than contracting techniques.
  • Item
    Thumbnail Image
    Enablers and Mechanisms: Practices for Achieving Synergy with Business Analytics
    ASADI SOMEH, I ; Wixom, B ; Davern, MICHAEL ; Shanks, GRAEME ; Bui, TX ; Sprague, R (HICSS, 2017)
    Business Analytics (BA) systems use advanced statistical and computational techniques to analyze organizational data and enable informed and insightful decision-making. BA systems interact with other organizational systems and if their relationship is synergistic, together they create higher-order BA-enabled organizational systems, which have the potential to create value and gain competitive advantage. In this paper, we focus on the enablers and mechanisms of synergy between BA and other organizational systems and identify a set of organizational practices that underlie the emergence of BA-enabled organizational systems. We use a case study involving a large IT firm to identify the organizational practices associated with synergistic relationships that lead to the emergence of higher-order BA-enabled organizational systems.
  • Item
  • Item
    Thumbnail Image
    VIRTUAL TEAMS: INFORMATION TYPES FOR EFFECTIVE FUNCTIONING
    Shaari, I ; Chang, S ; Shanks, GG ; Huang, W ; Teo, HH (CITY UNIVERSITY HONG KONG, 2008)
  • Item
    Thumbnail Image
    The Converged Appliance; "I love it...but I hate it"
    Murphy, J ; Kjeldskov, J ; HOWARD, S ; SHANKS, G ; Harnell-Young, E (Computer-Human Interaction Special Interest Group, 2005)
  • Item
  • Item
  • Item
    Thumbnail Image
    From intention to motivation: Developing a motivation-based model of IOS Implementation
    Smith, SP ; Shanks, G ; Johnston, RB ; Rahim, MM (Association for Information Systems, 2007-12-01)