To see the other types of publications on this topic, follow the link: Inter-organisational Information System (IOS).

Journal articles on the topic 'Inter-organisational Information System (IOS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Inter-organisational Information System (IOS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Teryokhin, Sergei, and Gøril Hannås. "Pre-requisites of successful strategic electronic coordination: the moderation effect of the ownership mechanism of inter-organisational information systems." Engineering Management in Production and Services 9, no. 4 (December 20, 2017): 34–47. http://dx.doi.org/10.1515/emj-2017-0029.

Full text
Abstract:
AbstractIn this paper, we attempt to explain how the ownership mechanism of an interorganisational information system (IOS) may impact strategic information exchange (electronic coordination) induced by specific investments in the IOS. Recent research and practice show that heavy investments in IOSs demonstrate mixed results with respect to their impact on the electronic coordination. Consequently, the search of additional factors is needed to help and explain under what circumstances the IOS investments for strategic purposes become beneficial for the companies in a buyersupplier dyad. Transa
APA, Harvard, Vancouver, ISO, and other styles
2

Borman, Mark. "Developing, and testing, a theoretical framework for inter-organisational systems (IOS) as infrastructure to aid future IOS design." Information Systems and e-Business Management 4, no. 4 (May 17, 2006): 343–60. http://dx.doi.org/10.1007/s10257-006-0033-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teryokhin, Sergei, and Gøril Hannås. "Impact of supplier-specific investments in inter-organisational information systems on strategic electronic coordination: the moderation effect of buyer dependence." Engineering Management in Production and Services 10, no. 1 (March 1, 2018): 7–21. http://dx.doi.org/10.1515/emj-2018-0001.

Full text
Abstract:
Abstract This paper examines the factors which influence sharing of the strategic information (in other words, electronic coordination) in a buyer–supplier dyad. The antecedents of this coordination are examined rather well in the transaction cost economics (TCE) theory and resource-dependency theory (RDT), while the supply chain management perspective is contemplated. The mentioned frameworks are used in the analysis. However, the research focus is narrowed down to the exploration of the antecedents of information exchange conducted via inter-organisational information systems (IOS). The empi
APA, Harvard, Vancouver, ISO, and other styles
4

Bahlmann, Jan, and Achim Spiller. "Inter-organizational information systems in meat chains: the linkage between supply chain organization and system requirements." Journal on Chain and Network Science 9, no. 1 (January 1, 2009): 59–69. http://dx.doi.org/10.3920/jcns2009.x159.

Full text
Abstract:
The German meat sector is faced with increasing cost pressures and a high demand for quality and safety. Both issues require powerful and holistic IT solutions in order to achieve knowledge transfer, process alignment and transparent information flows across the supply chain. In recent years, new Inter-Organizational Information Systems (IOS) were developed for the red meat industry. However, the acceptance of IOS at the farm level is still relatively low. Since there is hardly any relevant literature on IOS in the meat sector, this study contributes to the general research on IOS, the status
APA, Harvard, Vancouver, ISO, and other styles
5

Fu, Hsin-Pin, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang, and Cheng-Hsin Huang. "The critical success factors affecting the adoption of inter-organization systems by SMEs." Journal of Business & Industrial Marketing 29, no. 5 (May 27, 2014): 400–416. http://dx.doi.org/10.1108/jbim-04-2012-0070.

Full text
Abstract:
Purpose – The purposes of this study were to formulate a hierarchical table of factors that influence adoption of an inter-organization system (IOS) by enterprises and to apply multi-criteria decision-making (MCDM) tools to find the weights of these factors and to objectively identify the critical success factors (CSFs) for the adoption of IOSs by small- and medium-sized enterprises (SMEs). Design/methodology/approach – This study first used a literature review to collect the factors that affect an enterprise’s adoption of an IOS and then constructed a three-level hierarchical table of these f
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Busaidi, Kamla Ali. "Inter-Organizational Knowledge Sharing System in the Health Sector." International Journal of Knowledge Management 11, no. 3 (July 2015): 37–54. http://dx.doi.org/10.4018/ijkm.2015070103.

Full text
Abstract:
This study aimed to investigate the physicians' attitude toward inter-organizational knowledge sharing system (IOKSS) deployment in the health sector in Oman. IOKSS in the health sector can be very crucial and results in several operational, strategic, social and economic benefits for healthcare providers and physicians. Previous research on inter-organizational systems (IOS) has focused on organizational adoption, particularly on vertically-linked organizations. Identifying major issues that are critical to physicians, the end users and key stakeholders, is crucial for IOKSS deployment. Based
APA, Harvard, Vancouver, ISO, and other styles
7

Sholihah, Sita Aniisah, T. M. A. Ari Samadhi, Andi Cakravastia, and Senator Nur Bahagia. "Coordination model in Hinterland chain of hub-and-spoke global logistics." Journal of Industrial Engineering and Management 11, no. 4 (November 23, 2018): 776. http://dx.doi.org/10.3926/jiem.2538.

Full text
Abstract:
Purpose: The purpose of this research is to develop an inter-organizational model of coordination in hinterland chain of hub-and-spoke in global logistics, where dryport works as a spoke and seaport as a hub.Design/methodology/approach: The model built will define a conceptual model in order to coordinate several actors involved in handling the flow of goods and the flow of information (documents) in exporting goods via dryport, where their activities are interdependence. Therefore the first step was to investigate an existing business process of export system via dryport. Value Stream Mapping
APA, Harvard, Vancouver, ISO, and other styles
8

Apridianto, Angga, Kodrat Iman Satoto, and Ike Pertiwi Windasari. "Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS." Jurnal Teknologi dan Sistem Komputer 3, no. 3 (August 20, 2015): 362. http://dx.doi.org/10.14710/jtsiskom.3.3.2015.362-369.

Full text
Abstract:
Diversity of art and culture in Indonesia should be preserved so as not to become extinct in the face of times so that it can be passed on to generations to come. Many of the people of Indonesia who forget about the culture to identity of the area because of several factors such as the people of indonesia more interested of the western culture than self culture, the region of Indonesia which large also cause people’s reluctance to learn because of constrained of time, distance and cost as well as limitations of the media information about the art and culture that currently can only be learned
APA, Harvard, Vancouver, ISO, and other styles
9

Karlsson, Fredrik, Ella Kolkowska, and Frans Prenkert. "Inter-organisational information security: a systematic literature review." Information & Computer Security 24, no. 5 (November 14, 2016): 418–51. http://dx.doi.org/10.1108/ics-11-2016-091.

Full text
Abstract:
Purpose The purpose of this paper is to survey existing inter-organisational information security research to scrutinise the kind of knowledge that is currently available and the way in which this knowledge has been brought about. Design/methodology/approach The results are based on a literature review of inter-organisational information security research published between 1990 and 2014. Findings The authors conclude that existing research has focused on a limited set of research topics. A majority of the research has focused management issues, while employees’/non-staffs’ actual information s
APA, Harvard, Vancouver, ISO, and other styles
10

Harold, Dolly A., and Thomas A. Horan. "Examining collaboration and information sharing in Inter-Organisational Information System (IOIS) implementation." Electronic Government, an International Journal 9, no. 4 (2012): 333. http://dx.doi.org/10.1504/eg.2012.049723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hannås, Gøril, and Otto Andersen. "B2B Relationships in Modern Times." International Journal of Information Systems and Supply Chain Management 4, no. 3 (July 2011): 18–37. http://dx.doi.org/10.4018/jisscm.2011070102.

Full text
Abstract:
Information technology (IT) enables businesses to integrate information systems across entities without altering the firms’ legal boundaries. New forms of inter-firm dependence and governance mechanisms may arise, due to the explicit investments made in technology and systems for collaboration purposes. There is an important distinction between general and customized investments in inter-organizational information systems (IOS), because the specificity level in IT exhibits certain characteristics that accentuate both the risk and value of inter-firm trade. Several research calls were made to v
APA, Harvard, Vancouver, ISO, and other styles
12

Min, Hokey. "An inter-organisational decision support system for global supply chain management." International Journal of Logistics Systems and Management 38, no. 4 (2021): 475. http://dx.doi.org/10.1504/ijlsm.2021.114760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Daniel, Elizabeth M., and Andrew White. "The future of inter-organisational system linkages: findings of an international Delphi study." European Journal of Information Systems 14, no. 2 (June 2005): 188–203. http://dx.doi.org/10.1057/palgrave.ejis.3000529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Zaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (June 13, 2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.

Full text
Abstract:
Purpose This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts. Design/methodology/approach A quantitative method research design has been used in this study. This study was conducted throughout Malaysia with a total of 250 valid questionnaires obtained from managers and executives from the Multimedia Super Corridor (MSC)-status companies. Structural equation modelling (SEM) using partial least square was used to analyse the data and to test all nine hypotheses develo
APA, Harvard, Vancouver, ISO, and other styles
15

Althoff, Gereon, Alexander Ellebrecht, and Brigitte Petersen. "Chain quality information management: development of a reference model for quality information requirements in pork chains." Journal on Chain and Network Science 5, no. 1 (June 1, 2005): 27–38. http://dx.doi.org/10.3920/jcns2005.x052.

Full text
Abstract:
As in many food chains, pork production is carried out in heterogeneous chain scenarios with diverse organisational arrangements. Inter-organisational information management systems have not yet been established in pork production even though they provide a chance to improve chain-wide cooperation and quality management. This article presents the concept and first results of a sub-project in an ongoing Dutch-German collaborative research and development project of the public-private network "GIQS e.V." that develops tools for improved quality and health management in pork chains. In this sub-p
APA, Harvard, Vancouver, ISO, and other styles
16

Karlsson, Fredrik, Martin Karlsson, and Joachim Åström. "Measuring employees’ compliance – the importance of value pluralism." Information & Computer Security 25, no. 3 (July 10, 2017): 279–99. http://dx.doi.org/10.1108/ics-11-2016-0084.

Full text
Abstract:
Purpose This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic measure, which introduces the idea of competing organisational imperatives. Design/methodology/approach A survey was developed using two sets of items to measure compliance. The survey was sent to 600 white-collar workers and analysed through ordinary least squares. Findings The results suggest that when using the value-monistic measure, employees’ compliance was a function of employees’ intentions to comply, thei
APA, Harvard, Vancouver, ISO, and other styles
17

Yuryna Connolly, Lena, Michael Lang, John Gathegi, and Doug J. Tygar. "Organisational culture, procedural countermeasures, and employee security behaviour." Information & Computer Security 25, no. 2 (June 12, 2017): 118–36. http://dx.doi.org/10.1108/ics-03-2017-0013.

Full text
Abstract:
Purpose This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security countermeasures tend to influence employee security actions. An increasing number of information security breaches in organisations presents a serious threat to the confidentiality of personal and commercially sensitive data. While recent research shows that humans are the weakest link in the security chain and the root cause of a great portion of security breaches, the extant security literature tends to focus on technical
APA, Harvard, Vancouver, ISO, and other styles
18

Storer, Christine, Geoffrey Soutar, Michelle Darrington, and M. Fay Rola-Rubzen. "Buyer/seller reflections on inter-organisational information systems: Implications for chain data collection methods." Journal on Chain and Network Science 2, no. 2 (December 1, 2002): 117–33. http://dx.doi.org/10.3920/jcns2002.x023.

Full text
Abstract:
When deciding to conduct research on chains and networks, a decision needs to be made about the unit of analysis that will be used for data collection. The present paper examines the validity of collecting data from one party in a chain or dyad. The research examines the differences in perception between dyadic pairs of buyers and sellers about the nature of their relationship and the inter-organisational information system. There were significant differences in perceptions about the nature of the inter-organisational information system in terms of some the types of information exchanged, the
APA, Harvard, Vancouver, ISO, and other styles
19

Ford, Norma J. "The development and evaluation of an information technology support system to facilitate inter‐organisational collaboration in HRD." Journal of European Industrial Training 30, no. 7 (August 2006): 569–88. http://dx.doi.org/10.1108/03090590610704411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rasit, Zarinah Abdul, and Che Ruhana Isa. "Relative Comprehensiveness of Performance Measurement System: Organisational Ownership Structure and Size." International Journal of Financial Research 10, no. 3 (May 19, 2019): 380. http://dx.doi.org/10.5430/ijfr.v10n3p380.

Full text
Abstract:
Change in the business environment has resulted in significant implication in the use of Management Control System (MCS) particularly Performance Measurement System (PMS). Strategic Performance Measurement System (SPMS) has been widely used by organisation to monitor the implementation, achievement and improvement of its plan objectives. Considerable prior research identified inconsistent findings in the relationship between PMS and organisational performance. In view of the fact that organisational culture would significantly being influenced by ownership structure, this research will further
APA, Harvard, Vancouver, ISO, and other styles
21

Soley, Ximena. "The Crucial Role of Human Rights NGOs in the Inter-American System." AJIL Unbound 113 (2019): 355–59. http://dx.doi.org/10.1017/aju.2019.68.

Full text
Abstract:
Since the explosion of the human rights movement in the early 1970s, civil-society organizations have played a key role in the inter-American human rights system (IAS). In the era of dictatorships, they provided the information necessary for the Inter-American Commission to be able to act in the face of uncooperative states. When democracy returned to the region, these organizations grew in number, and their role within the IAS likewise expanded. In particular, a set of organizations that focused on legal strategies and the activation of regional human rights protection mechanisms cropped up.
APA, Harvard, Vancouver, ISO, and other styles
22

Malatji, Masike, Sune Von Solms, and Annlizé Marnewick. "Socio-technical systems cybersecurity framework." Information & Computer Security 27, no. 2 (June 12, 2019): 233–72. http://dx.doi.org/10.1108/ics-03-2018-0031.

Full text
Abstract:
Purpose This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the equal emphasis of both the social, technical and environmental factors affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied to specifically analyse some selected information and cybersecu
APA, Harvard, Vancouver, ISO, and other styles
23

McCormac, Agata, Dragana Calic, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, and Meredith Lillie. "The effect of resilience and job stress on information security awareness." Information & Computer Security 26, no. 3 (July 9, 2018): 277–89. http://dx.doi.org/10.1108/ics-03-2018-0032.

Full text
Abstract:
Purpose The purpose of this study was to investigate the relationship between resilience, job stress and information security awareness (ISA). The study examined the effect of resilience and job stress on the three components that comprise ISA, namely, knowledge, attitude and behaviour. Design/methodology/approach A total of 1,048 working Australians completed an online questionnaire. ISA was measured with the Human Aspects of Information Security Questionnaire. Participants also completed the Brief Resilience Scale and the Job Stress Scale. Findings It was found that participants with greater
APA, Harvard, Vancouver, ISO, and other styles
24

M Aydin, Alperen. "Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models." Informing Science: The International Journal of an Emerging Transdiscipline 20 (2017): 001–20. http://dx.doi.org/10.28945/3615.

Full text
Abstract:
Aim/Purpose: The objective of this paper is to review the vast literature of user-centric in-formation science and inform about the emerging themes in information behaviour science. Background: The paradigmatic shift from system-centric to user-centric approach facilitates research on the cognitive and individual information processing. Various information behaviour theories/models emerged. Methodology: Recent information behaviour theories and models are presented. Features, strengths and weaknesses of the models are discussed through the analysis of the information behaviour literature. Cont
APA, Harvard, Vancouver, ISO, and other styles
25

Giannakis, Mihalis, and Michalis Louis. "A multi-agent based system with big data processing for enhanced supply chain agility." Journal of Enterprise Information Management 29, no. 5 (September 12, 2016): 706–27. http://dx.doi.org/10.1108/jeim-06-2015-0050.

Full text
Abstract:
Purpose Decision support systems are becoming an indispensable tool for managing complex supply chains. The purpose of this paper is to develop a multi-agent-based supply chain management system that incorporates big data analytics that can exert autonomous corrective control actions. The effects of the system on supply chain agility are explored. Design/methodology/approach For the development of the architecture of the system, a sequential approach is adopted. First three fundamental dimensions of supply chain agility are identified – responsiveness, flexibility and speed. Then the organisat
APA, Harvard, Vancouver, ISO, and other styles
26

Ichino, Haruhiko, Kazuhiko Terada, Kenji Kawai, Osamu Ishida, Keishi Kishine, Noboru Iwasaki, Tetsuhiro Fukao, Shinji Shibao, Kazuo Kubo, and Harufusa Kondoh. "ENHANCED NETWORK SIGNALING FOR 10 GIGABIT ETHERNET TO ACHIEVE A LAN-WAN SEAMLESS INTERFACE AND ITS IMPLEMENTATION IN THE PHY-LSI/TRANSCEIVER MODULE." International Journal of High Speed Electronics and Systems 15, no. 03 (September 2005): 667–704. http://dx.doi.org/10.1142/s0129156405003387.

Full text
Abstract:
This paper describes Inter-frame Ling Signaling (ILS) protocol technology and its implementation in a 10-Gigabit Ethernet (10GbE) physical layer (PHY) LSI and optical transceiver module. The ILS can realize SDH/SONET-compatible operations, administration, maintenance, and provisioning (OAM&P) functions for PHY of 10GbE networks by inserting OAM&P information in the inter-frame gap periods. The coding features include 10GbE PHY upper compatibility, error detection capability, and disparity neutral characteristics. The 10GbE PHY LSI with the ILS function was fabricated using 0.18-um SOI
APA, Harvard, Vancouver, ISO, and other styles
27

Bello, Abubakar Garba, David Murray, and Jocelyn Armarego. "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments." Information & Computer Security 25, no. 4 (October 9, 2017): 475–92. http://dx.doi.org/10.1108/ics-03-2016-0025.

Full text
Abstract:
Purpose This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on BYOD adoption, and its associated risks and mitigation strategies, investigating how
APA, Harvard, Vancouver, ISO, and other styles
28

P N, Sindhuja, and Anand S. Kunnathur. "Information security in supply chains: a management control perspective." Information & Computer Security 23, no. 5 (November 9, 2015): 476–96. http://dx.doi.org/10.1108/ics-07-2014-0050.

Full text
Abstract:
Purpose – This paper aims to discuss the need for management control system for information security management that encapsulates the technical, formal and informal systems. This motivated the conceptualization of supply chain information security from a management controls perspective. Extant literature on information security mostly focused on technical security and managerial nuances in implementing and enforcing technical security through formal policies and quality standards at an organizational level. However, most of the security mechanisms are difficult to differentiate between busines
APA, Harvard, Vancouver, ISO, and other styles
29

Miao, Xin, David Banister, Yanhong Tang, Min Li, and Bao Xi. "MAINTAINING THE TRANSPORT SYSTEM UNDER EXTREME WEATHER EVENTS: A DUAL-NETWORK PERSPECTIVE." Technological and Economic Development of Economy 19, Supplement_1 (January 28, 2014): S342—S359. http://dx.doi.org/10.3846/20294913.2013.879748.

Full text
Abstract:
Recent years have seen an increase in the frequency of extreme weather events globally, and these have resulted in severe impacts on the transport system. To the means by which the transport system can be maintained under extreme weather events is an emerging topic in transport studies, and this is augmented by a growing concern about climate change. This paper considers transport system as dual-network composed of an interrelated operation level and management level that has some similarities with the theory behind the Wardrop Principle. Evidence from the case study on the snow event in South
APA, Harvard, Vancouver, ISO, and other styles
30

Vidakovic, Milan, Branko Milosavljevic, Zora Konjovic, and Goran Sladic. "Extensible java EE-based agent framework and its application on distributed library catalogues." Computer Science and Information Systems 6, no. 2 (2009): 1–28. http://dx.doi.org/10.2298/csis0902001v.

Full text
Abstract:
The paper presents the new agent framework XJAF and its application on distributed library catalogues. The framework is based on the Java EE technology and uses the concept of the plug-ins for implementation of the basic framework components. One important plug-in of the agent framework has been introduced into this system: the inter-facilitator connection plug-in, which defines how multiple facilitators form an agent network. The inter-facilitator connection plug-in is particularly important in both design and implementation phases in the field of distributed library catalogues. In order to s
APA, Harvard, Vancouver, ISO, and other styles
31

Bergström, Erik, Martin Lundgren, and Åsa Ericson. "Revisiting information security risk management challenges: a practice perspective." Information & Computer Security 27, no. 3 (July 8, 2019): 358–72. http://dx.doi.org/10.1108/ics-09-2018-0106.

Full text
Abstract:
Purpose The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices. Design/methodology/approach The study is based on an empirical study consisting of in-depth interviews with representatives from public sector organisations. The data were analysed by applying a practice-based view, i.e. the lens of knowing (or knowings). The results were validated by an expert panel. Findings Managerial and organisational concerns that go beyond a technical perspective have been found, which affect the
APA, Harvard, Vancouver, ISO, and other styles
32

Schinagl, Stef, and Abbas Shahim. "What do we know about information security governance?" Information & Computer Security 28, no. 2 (January 25, 2020): 261–92. http://dx.doi.org/10.1108/ics-02-2019-0033.

Full text
Abstract:
Purpose This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG. Design/methodology/approach The intention of the authors was to conduct a systematic literature review. However, owing to limited empirical papers in ISG research, this paper is more conceptually organised. Findings This paper shows that security has shifted from a narrow-focused isolated issue towards a strategic business issue with “from the basement to the boardroom
APA, Harvard, Vancouver, ISO, and other styles
33

Smedley, Jo. "Information innovation: it’s all about people." Information and Learning Science 118, no. 11/12 (November 13, 2017): 669–71. http://dx.doi.org/10.1108/ils-08-2017-0087.

Full text
Abstract:
Purpose This paper discusses the importance of effectively engaging people in sharing information and managing its implementation across organisations as a key part of successful change initiatives. Design/methodology/approach Consideration why information is important to an organisation and how people and space contribute to its current and future effective management. Findings How flexibility of working practices and the creative management of physical and virtual space empowers and enables change in innovating new working practices. Research limitations/implications How creative thinking co
APA, Harvard, Vancouver, ISO, and other styles
34

Shahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, and Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure." Information & Computer Security 23, no. 2 (June 8, 2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.

Full text
Abstract:
Purpose – This paper aims to propose a comprehensive model to find out the most preventive subset of security controls against potential security attacks inside the limited budget. Deploying the appropriate collection of information security controls, especially in information system-dependent organizations, ensures their businesses' continuity alongside with their effectiveness and efficiency. Design/methodology/approach – Impacts of security attacks are measured based on interdependent asset structure. Regarding this objective, the asset operational dependency graph is mapped to the security
APA, Harvard, Vancouver, ISO, and other styles
35

Khedr, Walid I., Mahmoud I. Abdalla, and Asmaa A. Elsheikh. "Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network." IET Information Security 9, no. 6 (November 1, 2015): 334–43. http://dx.doi.org/10.1049/iet-ifs.2013.0170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Oksanych, I. M., V. F. Grechaninov, and A. V. Lopushansky. "Information interaction in disparate information systems of situational centers." Mathematical machines and systems 3 (2020): 60–68. http://dx.doi.org/10.34121/1028-9763-2020-3-60-68.

Full text
Abstract:
The article is devoted to the problem of information exchange between automated systems of situational centers (SC) of the government authorities of the Security and Defence Sector (SDS) of Ukraine. The prob-lem is extremely topical today, since in the event of nationwide threats (military intervention, terrorism, emergencies), the SDS should work as a single well-coordinated mechanism. Therefore, the creation of the SC SDS system and the establishment of information exchange between them is a prerequisite for this. The paper assesses the most common types of data integration in information sy
APA, Harvard, Vancouver, ISO, and other styles
37

Rajamanickam, Vennila, and Duraisamy Veerappan. "Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks." IET Information Security 8, no. 4 (July 1, 2014): 234–39. http://dx.doi.org/10.1049/iet-ifs.2013.0217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hinder, Susan, Kathrin Cresswell, Aziz Sheikh, Bryony Dean Franklin, Marta Krasuska, Hung The Nguyen, Wendy Lane, et al. "Promoting inter-organisational knowledge sharing: A qualitative evaluation of England’s Global Digital Exemplar and Fast Follower Programme." PLOS ONE 16, no. 8 (August 2, 2021): e0255220. http://dx.doi.org/10.1371/journal.pone.0255220.

Full text
Abstract:
Background The Global Digital Exemplar (GDE) Programme was designed to promote the digitisation of hospital services in England. Selected provider organisations that were reasonably digitally-mature were funded with the expectation that they would achieve internationally recognised levels of excellence and act as exemplars (‘GDE sites’) and share their learning with somewhat less digitally-mature Fast Follower (FF) sites. Aims This paper explores how partnerships between GDE and FF sites have promoted knowledge sharing and learning between organisations. Methods We conducted an independent qua
APA, Harvard, Vancouver, ISO, and other styles
39

Borsellino, Valeria, Francesca Varia, Cinzia Zinnanti, and Emanuele Schimmenti. "The Sicilian cooperative system of wine production." International Journal of Wine Business Research 32, no. 3 (March 31, 2020): 391–421. http://dx.doi.org/10.1108/ijwbr-10-2018-0062.

Full text
Abstract:
Purpose The purpose of this paper is to verify whether, besides the traditional organisational models mainly implemented by wine-making cooperatives, more modern and hybrid organisational forms can be profitably applied within an increasingly competitive wine market. Design/methodology/approach The study outlined in this paper deployed a mixed method. Specifically, an archived analysis, a survey and a descriptive case study (including visits, interviews and documentary analysis) were the methodological techniques used in this study, which were “in series but integrated” between themselves. In
APA, Harvard, Vancouver, ISO, and other styles
40

Berndtsson, Joakim, Peter Johansson, and Martin Karlsson. "Value conflicts and non-compliance." Information & Computer Security 26, no. 2 (June 11, 2018): 246–58. http://dx.doi.org/10.1108/ics-08-2017-0057.

Full text
Abstract:
Purpose The purpose of the study is to explore potential value conflicts between information security work and whistleblowing activities by analysing attitudes to whistleblowing among white-collar workers in Swedish organisations. Design/methodology/approach The study is conducted using survey data among (n = 674) Swedish white-collar workers. Statistical analyses are conducted to explore variations in acceptance of whistleblowing and analyse the relationship between acceptance for whistleblowing and information security attitudes and behaviours. Findings The study finds strong support for whi
APA, Harvard, Vancouver, ISO, and other styles
41

Junejo, Naveed Ur Rehman, Hamada Esmaiel, Haixin Sun, Zeyad A. H. Qasem, and Junfeng Wang. "Pilot-Based Adaptive Channel Estimation for Underwater Spatial Modulation Technologies." Symmetry 11, no. 5 (May 24, 2019): 711. http://dx.doi.org/10.3390/sym11050711.

Full text
Abstract:
Spatial Modulation Technologies (SMTs) are schemes that reduce inter-carrier interference (ICI), inter-channel interference, inter-antenna synchronization (IAS), and system complexity for multiple-input multiple-output (MIMO) communication systems. Moreover, high spectral and energy efficiency have rendered SMTs attractive to underwater acoustic (UWA) MIMO communication systems. Consequently, this paper focuses on SMTs such as spatial modulation (SM), generalized spatial modulation (GSM), and fully generalized spatial modulation (FGSM) in which one constant number and one multiple number of an
APA, Harvard, Vancouver, ISO, and other styles
42

De La Torre Cruz, Juan, Francisco Jesús Cañadas Quesada, Nicolás Ruiz Reyes, Pedro Vera Candeas, and Julio José Carabias Orti. "Wheezing Sound Separation Based on Informed Inter-Segment Non-Negative Matrix Partial Co-Factorization." Sensors 20, no. 9 (May 8, 2020): 2679. http://dx.doi.org/10.3390/s20092679.

Full text
Abstract:
Wheezing reveals important cues that can be useful in alerting about respiratory disorders, such as Chronic Obstructive Pulmonary Disease. Early detection of wheezing through auscultation will allow the physician to be aware of the existence of the respiratory disorder in its early stage, thus minimizing the damage the disorder can cause to the subject, especially in low-income and middle-income countries. The proposed method presents an extended version of Non-negative Matrix Partial Co-Factorization (NMPCF) that eliminates most of the acoustic interference caused by normal respiratory sounds
APA, Harvard, Vancouver, ISO, and other styles
43

Da Veiga, Adéle. "An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture." Information & Computer Security 26, no. 5 (November 12, 2018): 584–612. http://dx.doi.org/10.1108/ics-08-2017-0056.

Full text
Abstract:
PurposeEmployee behaviour is a continuous concern owing to the number of information security incidents resulting from employee behaviour. The purpose of this paper is to propose an approach to information security culture change management (ISCCM) that integrates existing change management approaches, such as the ADKAR model of Prosci, and the Information Security Culture Assessment (ISCA) diagnostic instrument (questionnaire), to aid in addressing the risk of employee behaviour that could compromise information security.Design/methodology/approachThe ISCCM approach is constructed based on li
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Zhen-Song, Bing-Jie Li, and Min Miao. "A Parallel Transmission Scheme Based on the Turbo Product Code for Through Silicon via Array in Three-Dimensional Integrated Circuits." Journal of Nanoelectronics and Optoelectronics 16, no. 3 (March 1, 2021): 494–500. http://dx.doi.org/10.1166/jno.2021.2944.

Full text
Abstract:
Through silicon via (TSV) is the key technology for the vertical interconnect in three-dimensional integrated circuits (3-D ICs). With the help of TSVs, higher throughput in signal transmission can be attained. However, the tightly clustered TSVs in the TSV array suffer from crosstalk noise, a situation which results in transmission errors. This study investigates, the channel model of the TSV array, involving main factors affecting transmission performance, such as transmission loss, inter-channel interference, and crosstalk noise with different digital patterns. A parallel transmission schem
APA, Harvard, Vancouver, ISO, and other styles
45

Zhai, Jingjing, Xiaobei Wu, Zihao Li, Shaojie Zhu, Bo Yang, and Haoming Liu. "Day-Ahead and Intra-Day Collaborative Optimized Operation among Multiple Energy Stations." Energies 14, no. 4 (February 10, 2021): 936. http://dx.doi.org/10.3390/en14040936.

Full text
Abstract:
An integrated energy system (IES) shows great potential in reducing the terminal energy supply cost and improving energy efficiency, but the operation scheduling of an IES, especially integrated with inter-connected multiple energy stations, is rather complex since it is affected by various factors. Toward a comprehensive operation scheduling of multiple energy stations, in this paper, a day-ahead and intra-day collaborative operation model is proposed. The targeted IES consists of electricity, gas, and thermal systems. First, the energy flow and equipment composition of the IES are analyzed,
APA, Harvard, Vancouver, ISO, and other styles
46

Cope, Jacqueline, Francois Siewe, Feng Chen, Leandros Maglaras, and Helge Janicke. "On data leakage from non-production systems." Information & Computer Security 25, no. 4 (October 9, 2017): 454–74. http://dx.doi.org/10.1108/ics-02-2017-0004.

Full text
Abstract:
Purpose This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development life cycle, non-production environments are used to serve various purposes to include unit, component, integration, system, user acceptance, performance and configuration testing. Organisations and third parties have been and are continuing to use copies of production data in non-production environments. This can lead to personal and sensitive data being accidentally leaked if appropriate and rigorous security guidelines are not implemented. Thi
APA, Harvard, Vancouver, ISO, and other styles
47

Ahmad, Zauwiyah, Thian Song Ong, Tze Hui Liew, and Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees." Information & Computer Security 27, no. 2 (June 12, 2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.

Full text
Abstract:
Purpose The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring. Design/methodology/approach T
APA, Harvard, Vancouver, ISO, and other styles
48

Höhler, J., and R. Kühl. "Organisation of German livestock production from the bottom up: a new institutional economic analysis of dairy cattle breeding." Journal on Chain and Network Science 16, no. 1 (September 14, 2016): 7–18. http://dx.doi.org/10.3920/jcns2014.0005.

Full text
Abstract:
Cooperatives operate in many different parts of the agri-food chain. Animal breeding, as one of these areas, has not yet been subject to intensive research. In the literature, cooperatives are often claimed to produce a lower quality product than comparable investor-owned firms. Is this the case in dairy cattle breeding as well? In order to address this question, we examine the inter- and intra-organisational coordination and structure of the supply chain for cattle breeding in Germany by means of a property rights model. In a short-term perspective, the profit maximisation of the cooperative
APA, Harvard, Vancouver, ISO, and other styles
49

Najjar, Mohammad, Michael H. Small, and Mahmoud M. Yasin. "Social Sustainability Strategy across the Supply Chain: A Conceptual Approach from the Organisational Perspective." Sustainability 12, no. 24 (December 14, 2020): 10438. http://dx.doi.org/10.3390/su122410438.

Full text
Abstract:
Much of the existing literature on the social aspects of sustainability in the supply chain has focused on dyadic buyer-supplier relationships. However, supply chains are much more extensive, featuring multi-tiered systems consisting of many interconnected sequential and parallel dyadic relationships; therefore, a more expansive and holistic approach to exploring the management and integration of social sustainability standards across the extended supply chain is desirable. This research attempts to help fill this void and considers the extent to which a series of sequential upstream and downs
APA, Harvard, Vancouver, ISO, and other styles
50

Akinsanya, Opeoluwa Ore, Maria Papadaki, and Lingfen Sun. "Towards a maturity model for health-care cloud security (M2HCS)." Information & Computer Security 28, no. 3 (December 16, 2019): 321–45. http://dx.doi.org/10.1108/ics-05-2019-0060.

Full text
Abstract:
Purpose The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature. Design/methodology/approach The intended use of the proposed model was demonstrated using the evaluation method – “
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!