- Computing and Information Systems - Research Publications
Computing and Information Systems - Research Publications
Permanent URI for this collection
13 results
Filters
Reset filtersSettings
Statistics
Citations
Search Results
Now showing
1 - 10 of 13
-
ItemArtifacts, Activities, Benefits and Blockers: Exploring Enterprise Architecture Practice in DepthKurnia, S ; Kotusev, S ; Taylor, P ; Dilnutt, R (Hawaii International Conference on System Sciences, 2020)Enterprise architecture (EA) is a collection of artifacts describing an organization from an integrated business and IT perspective and intended to improve business and IT alignment. The purpose of this study is to identify benefits and blockers associated with specific EA-related activities and respective artifacts. Most existing studies discuss the benefits and problems of EA practice in general without relating them to specific activities constituting EA practice. This study is based on 18 interviews with architects and leverages the grounded theory approach. As a result of our analysis, we identify eight consistent activity areas constituting EA practice. Each activity area implies certain activities supported by some EA artifacts leading to specific benefits often impeded by some blockers. Our analysis indicates that EA practice includes many diverse activities usually, though not always, closely associated with specific types of EA artifacts. Moreover, benefits and blockers of EA practice are also very activity-specific.
-
ItemNo Preview AvailableCybersecurity Risk Management Using Analytics: A Dynamic Capabilities ApproachNaseer, H ; Ahmad, A ; Maynard, S ; Shanks, G (AIS, 2018)The modern enterprise uses risk-driven and control-centered security management systems to protect information resources and sustain competitive advantage. Such systems have proven to be quite effective in the prevention of threats that exploit common vulnerabilities. However, they are less suited to dynamic response against threats such as Advanced Persistent Threats. The complex and dynamic nature of these threats demands a sophisticated and timely response capability to collect, process and analyze evidence to direct strategic and operational cybersecurity measures. To better understand how organizations are dealing with this new dynamic threat, we analyzed in-depth data from ten expert interviews to determine: How can organizations develop dynamic capabilities in cybersecurity risk management using business analytics? The results informed a framework that explains how organizations may develop higher-order 'analytics-enabled dynamic capabilities' such as enhanced cybersecurity awareness, dynamic cyber-risk assessment, and cybersecurity threat intelligence generation to better deal with both predictable and unpredictable threats.
-
ItemA Framework for Relationships in Outsourcing: Contract Management ArchetypesCULLEN, S ; Shanks, G ; Davern, M ; Wilcocks, L ; Bui, TX ; Sprague, R (HICSS, 2017)Outsourcing engagements are defined by contracts, but personal relationships drive success. In this paper, we propose a set of behavior archetypes and use them within four action-research cases that altered behavior to achieve positive outcomes. The results suggest that a successful outsourcing engagement can be derived through adaptation of well-considered behavioral approaches rather than contracting techniques.
-
ItemEnablers and Mechanisms: Practices for Achieving Synergy with Business AnalyticsASADI SOMEH, I ; Wixom, B ; Davern, MICHAEL ; Shanks, GRAEME ; Bui, TX ; Sprague, R (HICSS, 2017)Business Analytics (BA) systems use advanced statistical and computational techniques to analyze organizational data and enable informed and insightful decision-making. BA systems interact with other organizational systems and if their relationship is synergistic, together they create higher-order BA-enabled organizational systems, which have the potential to create value and gain competitive advantage. In this paper, we focus on the enablers and mechanisms of synergy between BA and other organizational systems and identify a set of organizational practices that underlie the emergence of BA-enabled organizational systems. We use a case study involving a large IT firm to identify the organizational practices associated with synergistic relationships that lead to the emergence of higher-order BA-enabled organizational systems.
-
ItemExploring factors affecting the achievement of different types of inter-organisational systems (IOS) benefitsRAHIM, M. ; KURNIA, S. ; JOHNSTON, R. ; SHANKS, G. (PACIS, 2006)
-
ItemVIRTUAL TEAMS: INFORMATION TYPES FOR EFFECTIVE FUNCTIONINGShaari, I ; Chang, S ; Shanks, GG ; Huang, W ; Teo, HH (CITY UNIVERSITY HONG KONG, 2008)
-
ItemThe Converged Appliance; "I love it...but I hate it"Murphy, J ; Kjeldskov, J ; HOWARD, S ; SHANKS, G ; Harnell-Young, E (Computer-Human Interaction Special Interest Group, 2005)
-
ItemData Quality Tags and Decision-making: Improving the Design and Validity of Experimental StudiesPRICE, R ; SHANKS, G (IOS Press, 2008)
-
ItemUnderstanding ios adoption processes in a firsttier automotive supplier company: An application of the theory of ios adoption motivationRahim, MM ; Shanks, G ; Johnston, RB (Goteborgs Universitet, 2006-12-01)
-
ItemFrom intention to motivation: Developing a motivation-based model of IOS ImplementationSmith, SP ; Shanks, G ; Johnston, RB ; Rahim, MM (Association for Information Systems, 2007-12-01)