首页 > 最新文献

36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the最新文献

英文 中文
Exploring a causal model for the understanding of partnership 探索理解伙伴关系的因果模型
Jae-Nam Lee, Young-Gul Kim
This study explores the sources of influence in a successful outsourcing partnership based on a behavioral-attitudinal theory of IS success. Six major partnership-related variables were identified from the literature in terms of social exchange theory, which has been mainly applied to the study of outsourcing partnerships. A causal model of outsourcing success was proposed in which three attitudinal variables (mutual benefits, commitment, and predisposition) were introduced as intervening variables into the relationship between behavioral variables (shared knowledge, mutual dependency, and organizational linkage) and outsourcing success. This model was then tested using a sample of 225 organizations in Korea. The proposed model was compared with a rival model without such intervening variables. The findings indicate that the proposed model has more significant paths and power than the rival model in assessing the relationship between partnership and outsourcing success.
本研究基于信息系统成功的行为态度理论,探讨了成功外包伙伴关系的影响来源。根据社会交换理论,从文献中确定了六个主要的伙伴关系相关变量,社会交换理论主要应用于外包伙伴关系的研究。本文提出了外包成功的因果模型,将三个态度变量(互惠、承诺和倾向)作为中介变量引入行为变量(共享知识、相互依赖和组织联系)与外包成功的关系中。然后使用韩国225个组织的样本对该模型进行了测试。将所提出的模型与没有这些干预变量的竞争模型进行了比较。研究结果表明,本文提出的模型在评估合作伙伴关系与外包成功之间的关系方面具有更显著的路径和效力。
{"title":"Exploring a causal model for the understanding of partnership","authors":"Jae-Nam Lee, Young-Gul Kim","doi":"10.1109/HICSS.2003.1174790","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174790","url":null,"abstract":"This study explores the sources of influence in a successful outsourcing partnership based on a behavioral-attitudinal theory of IS success. Six major partnership-related variables were identified from the literature in terms of social exchange theory, which has been mainly applied to the study of outsourcing partnerships. A causal model of outsourcing success was proposed in which three attitudinal variables (mutual benefits, commitment, and predisposition) were introduced as intervening variables into the relationship between behavioral variables (shared knowledge, mutual dependency, and organizational linkage) and outsourcing success. This model was then tested using a sample of 225 organizations in Korea. The proposed model was compared with a rival model without such intervening variables. The findings indicate that the proposed model has more significant paths and power than the rival model in assessing the relationship between partnership and outsourcing success.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Community collective efficacy: structure and consequences of perceived capacities in the Blacksburg Electronic Village 社区集体效能:结构和感知能力的后果在布莱克斯堡电子村
John Millar Carroll, D. Reese
Bandura's social cognitive construct "perceived self-efficacy" has been used widely to understand individual behavior as a function of domain-specific beliefs about personal capacities. Collective efficacy is the extension of the self-efficacy construct to organizations and groups; it refers to beliefs about collective capacities in specific domains. Our research is investigating the use of collective efficacy in understanding attitudes and behaviors of members of proximal residential communities with respect to issues like attachment, engagement, and sociality, specifically as modulated by use of the Internet and community networks. This paper describes our analysis of the structure and external validity of the collective efficacy construct.
班杜拉的社会认知建构“感知自我效能”已被广泛用于理解个体行为作为对个人能力的特定领域信念的功能。集体效能感是自我效能感建构向组织和群体的延伸;它指的是对特定领域集体能力的信念。我们的研究是调查集体效能在理解近地居住社区成员在依恋、参与和社交等问题上的态度和行为方面的使用,特别是通过使用互联网和社区网络进行调节。本文描述了我们对集体效能建构的结构和外部效度的分析。
{"title":"Community collective efficacy: structure and consequences of perceived capacities in the Blacksburg Electronic Village","authors":"John Millar Carroll, D. Reese","doi":"10.1109/HICSS.2003.1174585","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174585","url":null,"abstract":"Bandura's social cognitive construct \"perceived self-efficacy\" has been used widely to understand individual behavior as a function of domain-specific beliefs about personal capacities. Collective efficacy is the extension of the self-efficacy construct to organizations and groups; it refers to beliefs about collective capacities in specific domains. Our research is investigating the use of collective efficacy in understanding attitudes and behaviors of members of proximal residential communities with respect to issues like attachment, engagement, and sociality, specifically as modulated by use of the Internet and community networks. This paper describes our analysis of the structure and external validity of the collective efficacy construct.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Does e-business modeling really help? 电子商务建模真的有用吗?
J. Gordijn, H. Akkermans
Many innovative e-business ideas are hardly understood by their stakeholders when articulated, just by words. To create a better, also shared, understanding, and to enhance confidence in the feasibility of such verbal ideas, we have developed a model-based e-business development approach called e/sup 3/-value. But does a model-based approach really contribute to the development of innovative e-business ideas? To answer this question, we report on an innovative e-business idea about online news provisioning which has been explored, using our e/sup 3/-value approach, and which has been implemented afterwards. To see the merits of e/sup 3/-value we revisited, this project one-year-and-a-half after its implementation. It then shows up that indeed a modeling approach contributes to e-business development, but also some important lessons can be learned, to improve our methodology.
许多创新的电子商务理念在通过语言表达出来时很难被利益相关者理解。为了建立更好的、共享的理解,并增强对这种口头想法可行性的信心,我们开发了一种基于模型的电子商务开发方法,称为e/sup / value。但是,基于模型的方法真的有助于创新电子商务理念的发展吗?为了回答这个问题,我们报告了一种关于在线新闻提供的创新电子商务理念,该理念已经被探索,使用我们的e/sup / value方法,并在随后实施。为了看到e/sup 3/ value的优点,我们重新审视了这个项目实施一年半后的情况。然后,它表明建模方法确实有助于电子商务开发,但也可以学习一些重要的经验教训,以改进我们的方法。
{"title":"Does e-business modeling really help?","authors":"J. Gordijn, H. Akkermans","doi":"10.1109/HICSS.2003.1174398","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174398","url":null,"abstract":"Many innovative e-business ideas are hardly understood by their stakeholders when articulated, just by words. To create a better, also shared, understanding, and to enhance confidence in the feasibility of such verbal ideas, we have developed a model-based e-business development approach called e/sup 3/-value. But does a model-based approach really contribute to the development of innovative e-business ideas? To answer this question, we report on an innovative e-business idea about online news provisioning which has been explored, using our e/sup 3/-value approach, and which has been implemented afterwards. To see the merits of e/sup 3/-value we revisited, this project one-year-and-a-half after its implementation. It then shows up that indeed a modeling approach contributes to e-business development, but also some important lessons can be learned, to improve our methodology.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Balancing safety against performance: tradeoffs in Internet security 平衡安全与性能:互联网安全中的权衡
Vu A. Ha, D. Musliner
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple script-kiddies to highly sophisticated criminal enterprises. In response to these threats, sites must perform extensive intrusion monitoring. This intrusion monitoring can have significant costs in terms of bandwidth, computing power, storage space, and licensing fees. Furthermore, when exploits are detected, the victims must take actions that can consume further resources and compromise their objectives (e.g., by reducing e-commerce server throughput). In this paper, we explore techniques for modeling the costs and benefits of various security monitoring and response actions. Given these models and stochastic expectations about the types of attacks that a site is likely to face, our CIRCADIA (cooperative intelligent real-time control architecture for dynamic information assurance) automatic security control system is able to make real-time tradeoffs between the level of safety and security that is enforced, and the level of system resources/performance that are applied to the main computational objectives (e.g., e-commerce transactions). We show how CIRCADIA is able to dynamically adjust its security activities to account for changing threat profiles and objectives. The result: a continually-optimized balance of security-maintaining activity that reduces risk while still allowing the system to meet its goals.
所有可访问互联网的计算系统目前都面临着不断的威胁,从简单的脚本kiddy到高度复杂的犯罪企业。为了应对这些威胁,站点必须执行广泛的入侵监控。这种入侵监视在带宽、计算能力、存储空间和许可费用方面可能会有很大的成本。此外,当检测到漏洞利用时,受害者必须采取可能消耗更多资源并危及其目标的操作(例如,通过减少电子商务服务器吞吐量)。在本文中,我们将探讨各种安全监控和响应操作的成本和收益建模技术。考虑到这些模型和对站点可能面临的攻击类型的随机预期,我们的CIRCADIA(用于动态信息保障的协作智能实时控制架构)自动安全控制系统能够在安全级别和强制执行的安全级别以及应用于主要计算目标(例如,电子商务交易)的系统资源/性能级别之间进行实时权衡。我们展示了CIRCADIA如何能够动态调整其安全活动,以应对不断变化的威胁概况和目标。其结果是:安全维护活动的持续优化平衡,降低了风险,同时仍然允许系统实现其目标。
{"title":"Balancing safety against performance: tradeoffs in Internet security","authors":"Vu A. Ha, D. Musliner","doi":"10.1109/HICSS.2003.1174465","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174465","url":null,"abstract":"All Internet-accessible computing systems are currently faced with incessant threats ranging from simple script-kiddies to highly sophisticated criminal enterprises. In response to these threats, sites must perform extensive intrusion monitoring. This intrusion monitoring can have significant costs in terms of bandwidth, computing power, storage space, and licensing fees. Furthermore, when exploits are detected, the victims must take actions that can consume further resources and compromise their objectives (e.g., by reducing e-commerce server throughput). In this paper, we explore techniques for modeling the costs and benefits of various security monitoring and response actions. Given these models and stochastic expectations about the types of attacks that a site is likely to face, our CIRCADIA (cooperative intelligent real-time control architecture for dynamic information assurance) automatic security control system is able to make real-time tradeoffs between the level of safety and security that is enforced, and the level of system resources/performance that are applied to the main computational objectives (e.g., e-commerce transactions). We show how CIRCADIA is able to dynamically adjust its security activities to account for changing threat profiles and objectives. The result: a continually-optimized balance of security-maintaining activity that reduces risk while still allowing the system to meet its goals.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Supporting parameterised roles with object-based access control 支持基于对象的访问控制的参数化角色
M. Evered
The per-method access control lists of standard Internet technologies allow only simple forms of access control to be expressed and enforced. They also fail to enforce a strict need-to-know view of persistent data. Real applications require more flexible security constraints including parameter restrictions, logging of accesses and state-dependent access constraints. In particular, the concept of parameterised roles, central to a fine-grained specification of access rules and compliance with privacy laws, should be supported in a natural way. In this paper, we demonstrate how an object-based approach using the mechanism of bracket capabilities can be used to enforce various kinds of access constraints including discretionary, mandatory and parameterised role-based access control. We give examples from a health information system incorporating secure patient access and secure access by appropriate medical and administrative personnel.
标准Internet技术的每个方法访问控制列表只允许表达和执行简单形式的访问控制。它们也不能对持久数据强制执行严格的“需要知道”视图。实际应用程序需要更灵活的安全约束,包括参数限制、访问日志记录和依赖于状态的访问约束。特别是,参数化角色的概念,作为细粒度访问规则规范和遵从隐私法的核心,应该以自然的方式得到支持。在本文中,我们演示了如何使用基于对象的方法来使用括号功能机制来强制各种类型的访问约束,包括酌情的,强制的和参数化的基于角色的访问控制。我们给出了一个卫生信息系统的例子,该系统包括安全的患者访问和适当的医疗和行政人员的安全访问。
{"title":"Supporting parameterised roles with object-based access control","authors":"M. Evered","doi":"10.1109/HICSS.2003.1174463","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174463","url":null,"abstract":"The per-method access control lists of standard Internet technologies allow only simple forms of access control to be expressed and enforced. They also fail to enforce a strict need-to-know view of persistent data. Real applications require more flexible security constraints including parameter restrictions, logging of accesses and state-dependent access constraints. In particular, the concept of parameterised roles, central to a fine-grained specification of access rules and compliance with privacy laws, should be supported in a natural way. In this paper, we demonstrate how an object-based approach using the mechanism of bracket capabilities can be used to enforce various kinds of access constraints including discretionary, mandatory and parameterised role-based access control. We give examples from a health information system incorporating secure patient access and secure access by appropriate medical and administrative personnel.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Roles of formal/informal networks and perceived compatibility in the diffusion of World Wide Web: the case of Indonesian banks 正式/非正式网络在万维网传播中的作用和可感知的兼容性:以印度尼西亚银行为例
D. Achjari, M. Quaddus
This study takes a cultural perspective to derive formal and informal networks and aims to investigate their roles in the diffusion of World Wide Web (WWW) among Indonesian bank employees. The study also investigates the impact of perceived compatibility on WWW diffusion. To achieve these aims, a research model, which is based on the technology acceptance model (TAM) is developed. Data is collected from 360 nonMIS staff in six Indonesian banks via questionnaire. The responses are analysed using PLS. The results suggest that informal network affects individual's self-efficacy, and perceived compatibility impacts user's perception regarding WWW. Surprisingly, the impact of formal network on self-efficacy is negligible. The implications of the results are discussed taking a cultural perspective.
本研究从文化的角度来推导正式和非正式的网络,目的是调查它们在印度尼西亚银行员工中万维网(WWW)传播中的作用。本研究还探讨了感知兼容性对WWW扩散的影响。为了实现这一目标,建立了一个基于技术接受模型(TAM)的研究模型。数据通过问卷调查的方式从印尼六家银行的360名非管理信息系统员工中收集。结果表明,非正式网络影响个体的自我效能感,而感知兼容性影响用户对WWW的感知。令人惊讶的是,正式网络对自我效能感的影响可以忽略不计。从文化的角度讨论了结果的含义。
{"title":"Roles of formal/informal networks and perceived compatibility in the diffusion of World Wide Web: the case of Indonesian banks","authors":"D. Achjari, M. Quaddus","doi":"10.1109/HICSS.2003.1174428","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174428","url":null,"abstract":"This study takes a cultural perspective to derive formal and informal networks and aims to investigate their roles in the diffusion of World Wide Web (WWW) among Indonesian bank employees. The study also investigates the impact of perceived compatibility on WWW diffusion. To achieve these aims, a research model, which is based on the technology acceptance model (TAM) is developed. Data is collected from 360 nonMIS staff in six Indonesian banks via questionnaire. The responses are analysed using PLS. The results suggest that informal network affects individual's self-efficacy, and perceived compatibility impacts user's perception regarding WWW. Surprisingly, the impact of formal network on self-efficacy is negligible. The implications of the results are discussed taking a cultural perspective.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Introduction to information systems in global business 全球商业信息系统概论
P. Ribbers, C. Holland
This year’s mini-track on information systems in global business continues the tradition of applied research and original data analysis in a wide range of information technology and international business contexts. The papers cover many of the topical issues facing academics and managers working in information systems: outsourcing; productivity issues; Business to Business and supply chain innovations; implementation of ERP; marketing strategies and the emergence of global market networks. However these topics are examined with an emphasis on their global dimension. How does outsourcing change as it becomes a global process? What are the differences of B2B implementation in a developing economy compared with B2B systems in the US? How do country differences affect the global deployment of an ERP system? These are the types of issues that will be covered and discussed in the IS in global business mini-track. The downturn of stock-markets worldwide has reduced business spending on information systems and had a dramatic effect on the value and in some cases, viability of information technology companies. It has also raised the urgency for cost reduction, and in particular encouraged the use of offshore, or global, outsourcing services. The paper by Currie and Khan investigates the supply side of IT outsourcing services based on case research in twenty Indian companies. They argue that for Indian technology companies to succeed in the global outsourcing market, they must develop capabilities that enable them to move away from simple commoditized products to offer more sophisticated services that involve extensive research and development. The papers by Ganley, Kraemer and Wong, and Shao and Shu are related insofar as they analyze the economic effects of the IT industry in different countries. Ganleey et al assess the impact of IT production on the diffusion of IT within individual countries, and found a positive relationship in developed countries, and no relation in developing countries where it is assumed that the IT industry is focused on export rather than domestic use. Shao and Shu examine the productivity of the IT industry itself (rather than the more common study of how IT affects the general economy) and found that most of the increase in productivity within the IT industry is due to technological innovation in the production process. Both of these papers have significant implications on government policy and business strategy of IT companies. The second session is focused on large-scale infrastructure systems in the areas of ERP and business to business systems. The first paper by Reimers is concerned with the development and evolution of electronic commerce in China. It explores a fascinating concept of an industry-wide information system in which a set of standards for electronic commerce are agreed before the internal infrastructures centred on ERP are finalised. In the US and Europe, companies are grappling with the issues of defining i
今年的全球商业信息系统迷你课程延续了在广泛的信息技术和国际商业环境中进行应用研究和原始数据分析的传统。这些论文涵盖了许多在信息系统工作的学者和管理人员面临的热门问题:外包;生产率问题;企业对企业和供应链创新;ERP的实施;营销策略和全球市场网络的出现。然而,这些主题的审查重点是其全球层面。当外包成为一个全球性的过程时,它是如何变化的?与美国的B2B系统相比,发展中经济体的B2B实施有何不同?国家差异如何影响ERP系统的全球部署?这些都是将在全球商业中的信息系统迷你轨道中讨论的问题类型。全球股市的低迷减少了企业在信息系统上的支出,对信息技术公司的价值产生了巨大影响,在某些情况下,还影响了它们的生存能力。它还提高了降低成本的紧迫性,并特别鼓励使用离岸或全球外包服务。Currie和Khan的论文通过对20家印度公司的案例研究,对IT外包服务的供给侧进行了调查。他们认为,印度科技公司要想在全球外包市场取得成功,就必须发展能力,使它们能够从简单的商品化产品转向提供涉及广泛研发的更复杂的服务。Ganley、Kraemer和Wong的论文,以及Shao和Shu的论文在分析IT产业在不同国家的经济影响方面是相关的。Ganleey等人评估了IT生产对单个国家内IT扩散的影响,并发现在发达国家存在正相关关系,而在假设IT产业专注于出口而不是国内使用的发展中国家则没有关系。Shao和Shu研究了IT行业本身的生产率(而不是更常见的IT如何影响整体经济的研究),发现IT行业生产率的大部分提高是由于生产过程中的技术创新。这两篇论文对政府政策和IT公司的商业战略都有重要的启示。第二部分集中在ERP和企业对企业系统领域的大规模基础设施系统。雷默斯的第一篇论文是关于电子商务在中国的发展和演变。它探讨了一个行业范围内的信息系统的迷人概念,其中在以ERP为中心的内部基础设施最终确定之前,商定了一套电子商务标准。在美国和欧洲,企业正在努力解决在内部系统实施后如何定义组织间系统的问题。中国的倡议带来了一种有趣的可能性:至少从信息技术的角度来看,内部联系和外部联系之间的区别将会消失。Nandhakumar、Rossi和Talvinen的论文探讨了“ERP漂移”的概念,即通过系统实施过程中需求的逐渐转移,失去了最初的目标。这在工业界是一个众所周知的问题,但却很少受到学术研究人员的关注。Fairchild和Peterson从商业角度讨论了基础设施问题,并在金融服务行业的不同交易环境中确定了具体的价值驱动因素。第三次会议继续关注基础设施,撒切尔和福斯特的论文利用有关IT采用的一般文献中的理论,探讨了台湾电子商务采用的问题。这项工作的一个有趣的结果是,在决定电子商务的速度和普及程度方面,同一国家内的行业差异似乎比其他政府和行业因素要重要得多。Kuo和Smits的最后一篇论文是对高科技产业中国际供应链运营绩效的详细研究,除了与供应商使用集成信息系统外,它还确定了应该到位的非it因素的重要性。
{"title":"Introduction to information systems in global business","authors":"P. Ribbers, C. Holland","doi":"10.1109/HICSS.2003.1174614","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174614","url":null,"abstract":"This year’s mini-track on information systems in global business continues the tradition of applied research and original data analysis in a wide range of information technology and international business contexts. The papers cover many of the topical issues facing academics and managers working in information systems: outsourcing; productivity issues; Business to Business and supply chain innovations; implementation of ERP; marketing strategies and the emergence of global market networks. However these topics are examined with an emphasis on their global dimension. How does outsourcing change as it becomes a global process? What are the differences of B2B implementation in a developing economy compared with B2B systems in the US? How do country differences affect the global deployment of an ERP system? These are the types of issues that will be covered and discussed in the IS in global business mini-track. The downturn of stock-markets worldwide has reduced business spending on information systems and had a dramatic effect on the value and in some cases, viability of information technology companies. It has also raised the urgency for cost reduction, and in particular encouraged the use of offshore, or global, outsourcing services. The paper by Currie and Khan investigates the supply side of IT outsourcing services based on case research in twenty Indian companies. They argue that for Indian technology companies to succeed in the global outsourcing market, they must develop capabilities that enable them to move away from simple commoditized products to offer more sophisticated services that involve extensive research and development. The papers by Ganley, Kraemer and Wong, and Shao and Shu are related insofar as they analyze the economic effects of the IT industry in different countries. Ganleey et al assess the impact of IT production on the diffusion of IT within individual countries, and found a positive relationship in developed countries, and no relation in developing countries where it is assumed that the IT industry is focused on export rather than domestic use. Shao and Shu examine the productivity of the IT industry itself (rather than the more common study of how IT affects the general economy) and found that most of the increase in productivity within the IT industry is due to technological innovation in the production process. Both of these papers have significant implications on government policy and business strategy of IT companies. The second session is focused on large-scale infrastructure systems in the areas of ERP and business to business systems. The first paper by Reimers is concerned with the development and evolution of electronic commerce in China. It explores a fascinating concept of an industry-wide information system in which a set of standards for electronic commerce are agreed before the internal infrastructures centred on ERP are finalised. In the US and Europe, companies are grappling with the issues of defining i","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and survivable software systems 安全且可生存的软件系统
A. Krings, P. Oman
With malicious computer and network attacks reaching epidemic proportions, issues of security and survivability of software systems have surfaced in a variety of application domains. Of real concern is the increasing reliance of critical applications on networked computer systems. Failure or compromises of such systems could cause threats to national infrastructures or lead to catastrophe ( e.g., loss of life, damage to the environment, or unacceptable financial losses). Driven by market speed and feature demand, commercial software developers have high pressures to deliver products rapidly, usually at the expense of quality and security. Given these market pressures and the increasing complexity of today’s software, it is unrealistic to assume total security and robustness. Hence, the research area of secure and survivable systems has addressed the ability of systems to fulfill their missions even in the presence of failures, accidents or malicious attacks. Whereas resilience to failures and accidents has been the focus of research in fault-tolerant systems design, resilience to malicious attacks has become a challenge in the field of system survivability. Principally, essential services must be designed to withstand attacks. This requirement goes beyond the scope of computer and network security, which has been traditionally addressing detection and resistance to attacks.
随着恶意计算机和网络攻击的流行,软件系统的安全性和生存性问题已经在各种应用领域浮出水面。真正令人担忧的是关键应用程序对联网计算机系统的日益依赖。此类系统的故障或破坏可能对国家基础设施造成威胁或导致灾难(例如,生命损失、环境破坏或不可接受的经济损失)。在市场速度和功能需求的驱动下,商业软件开发人员面临着快速交付产品的巨大压力,通常以牺牲质量和安全性为代价。考虑到这些市场压力和当今软件日益增加的复杂性,假设完全安全和健壮性是不现实的。因此,安全和可生存系统的研究领域已经解决了系统在存在故障,事故或恶意攻击的情况下完成其任务的能力。在容错系统设计中,对故障和事故的弹性一直是研究的重点,而对恶意攻击的弹性已成为系统生存能力领域的一个挑战。基本上,基本服务的设计必须能够承受攻击。这一要求超出了计算机和网络安全的范围,传统上,计算机和网络安全一直致力于检测和抵抗攻击。
{"title":"Secure and survivable software systems","authors":"A. Krings, P. Oman","doi":"10.1109/HICSS.2003.1174907","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174907","url":null,"abstract":"With malicious computer and network attacks reaching epidemic proportions, issues of security and survivability of software systems have surfaced in a variety of application domains. Of real concern is the increasing reliance of critical applications on networked computer systems. Failure or compromises of such systems could cause threats to national infrastructures or lead to catastrophe ( e.g., loss of life, damage to the environment, or unacceptable financial losses). Driven by market speed and feature demand, commercial software developers have high pressures to deliver products rapidly, usually at the expense of quality and security. Given these market pressures and the increasing complexity of today’s software, it is unrealistic to assume total security and robustness. Hence, the research area of secure and survivable systems has addressed the ability of systems to fulfill their missions even in the presence of failures, accidents or malicious attacks. Whereas resilience to failures and accidents has been the focus of research in fault-tolerant systems design, resilience to malicious attacks has become a challenge in the field of system survivability. Principally, essential services must be designed to withstand attacks. This requirement goes beyond the scope of computer and network security, which has been traditionally addressing detection and resistance to attacks.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An individual view on cooperation networks 个人对合作网络的看法
Tim Weitzel, D. Beimborn, W. König
Networks utilizing modern communication technologies can offer competitive advantages to those using them wisely. But due to the existence of network effects, planning and operating networks is difficult. In this paper, the strategic situation of individual agents deciding on network participation is analyzed. A systematic equilibrium analysis using computer-based simulations reveals principal solution scenarios for network agents and shows that network cooperation problems might frequently be not as difficult to resolve as often feared. In particular, strategic situations are identified showing that a majority of individuals might be better off getting the optimal solution from a central principal and that in many cases simple information intermediation can solve the start-up problem notorious in network economics.
利用现代通信技术的网络可以为那些明智地使用它们的人提供竞争优势。但由于网络效应的存在,网络的规划和运营难度较大。本文分析了个体代理决定网络参与的战略情况。使用基于计算机的模拟的系统平衡分析揭示了网络代理的主要解决方案场景,并表明网络合作问题可能通常不像通常担心的那样难以解决。特别是,战略情况被确定,表明大多数人可能更好地从一个中心原则中获得最佳解决方案,并且在许多情况下,简单的信息中介可以解决网络经济学中臭名昭著的启动问题。
{"title":"An individual view on cooperation networks","authors":"Tim Weitzel, D. Beimborn, W. König","doi":"10.1109/HICSS.2003.1174385","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174385","url":null,"abstract":"Networks utilizing modern communication technologies can offer competitive advantages to those using them wisely. But due to the existence of network effects, planning and operating networks is difficult. In this paper, the strategic situation of individual agents deciding on network participation is analyzed. A systematic equilibrium analysis using computer-based simulations reveals principal solution scenarios for network agents and shows that network cooperation problems might frequently be not as difficult to resolve as often feared. In particular, strategic situations are identified showing that a majority of individuals might be better off getting the optimal solution from a central principal and that in many cases simple information intermediation can solve the start-up problem notorious in network economics.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115617990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The conceptualization of trust, risk and their electronic commerce: the need for clarifications 信任、风险及其电子商务的概念:澄清的需要
D. Gefen, V. Rao, N. Tractinsky
In recent years, significant advances have been made in the understanding of trust and risk in electronic commerce. However, in examining the published research, some troublesome trends surface. These trends include: (a) the tendency to treat conceptualizations of trust and risk as unidimensional constructs, ignoring the large body of literature suggesting that they are complex, multidimensional constructs; (b) the tendency to ignore whether trustworthiness is part of trust or a possibly different construct; and (c) the tendency to articulate relationships between trust and risk idiosyncratically without attention to prior articulations. These trends are troublesome because they have the potential to hamper the field's ability to do cumulative research in the long run. The goal of this article is to highlight these trends and call for greater attention to the issues raised in future research.
近年来,人们对电子商务中的信任和风险的理解取得了重大进展。然而,在审查已发表的研究时,一些令人不安的趋势浮出水面。这些趋势包括:(a)倾向于将信任和风险的概念化视为一维结构,忽视了大量文献表明它们是复杂的多维结构;(b)倾向于忽视可信赖性是信任的一部分还是一个可能不同的概念;(c)倾向于在不注意先前表述的情况下,以特殊方式阐明信任与风险之间的关系。这些趋势很麻烦,因为从长远来看,它们有可能阻碍该领域进行累积研究的能力。本文的目的是强调这些趋势,并呼吁对未来研究中提出的问题给予更多关注。
{"title":"The conceptualization of trust, risk and their electronic commerce: the need for clarifications","authors":"D. Gefen, V. Rao, N. Tractinsky","doi":"10.1109/HICSS.2003.1174442","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174442","url":null,"abstract":"In recent years, significant advances have been made in the understanding of trust and risk in electronic commerce. However, in examining the published research, some troublesome trends surface. These trends include: (a) the tendency to treat conceptualizations of trust and risk as unidimensional constructs, ignoring the large body of literature suggesting that they are complex, multidimensional constructs; (b) the tendency to ignore whether trustworthiness is part of trust or a possibly different construct; and (c) the tendency to articulate relationships between trust and risk idiosyncratically without attention to prior articulations. These trends are troublesome because they have the potential to hamper the field's ability to do cumulative research in the long run. The goal of this article is to highlight these trends and call for greater attention to the issues raised in future research.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
期刊
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1