Pub Date : 2022-12-30DOI: 10.7250/csimq.2022-33.02
Iva Atanassova, P. Bednar
The concept of organizational learning receives increasing attention and recognition in recent years as a critical enabler of organizational adaptation, survival, and growth during uncertain times. Our study applies a socio-technical lens to shed light on the organizational learning processes taking place in 40 various sizes and kinds of UK businesses during the critical, volatile, and unprecedented period – February–May 2021. The study identifies learning antecedents and key organizational context enabling and/or impeding learning processes and follow-up evolution within the studied companies. Our research confirms that in an uncertain environment, companies need to develop and apply ad-hoc learning and quick adaptation practices which are critical for survival and growth, and not standard management practices The findings suggest, however, that even if employees have the capability, not all are able to capture and transform intelligence into learning and apply it at a strategic level, reconfiguring purposefully future operational capabilities to respond to environmental changes, as they are not empowered and supported by the organizational management.
{"title":"Managing Uncertainty: Company's Adaptive Capabilities during Covid-19","authors":"Iva Atanassova, P. Bednar","doi":"10.7250/csimq.2022-33.02","DOIUrl":"https://doi.org/10.7250/csimq.2022-33.02","url":null,"abstract":"The concept of organizational learning receives increasing attention and recognition in recent years as a critical enabler of organizational adaptation, survival, and growth during uncertain times. Our study applies a socio-technical lens to shed light on the organizational learning processes taking place in 40 various sizes and kinds of UK businesses during the critical, volatile, and unprecedented period – February–May 2021. The study identifies learning antecedents and key organizational context enabling and/or impeding learning processes and follow-up evolution within the studied companies. Our research confirms that in an uncertain environment, companies need to develop and apply ad-hoc learning and quick adaptation practices which are critical for survival and growth, and not standard management practices The findings suggest, however, that even if employees have the capability, not all are able to capture and transform intelligence into learning and apply it at a strategic level, reconfiguring purposefully future operational capabilities to respond to environmental changes, as they are not empowered and supported by the organizational management.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126857629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.7250/csimq.2022-33.04
Haiat Perozzo, Fatema Zaghloul, A. Ravarini
Like most companies, small and medium-sized enterprises (SMEs) have become reliant on digital technology for their day-to-day business operations. While valuable, this comes with challenges; one of which is the rise in cybercrime. In terms of their cybersecurity resilience and risk, SMEs are among the most vulnerable and least mature. This article addresses a gap in the literature that has neglected cybersecurity readiness in SMEs. The study proposes a CyberSecurity Readiness Model for SMEs (CSRM-SME) based on a Socio-Technical view of organizations. The model was applied to three SMEs to assess their cybersecurity readiness and further understand the environment and strategies adopted to prevent and manage cyber-attacks.
{"title":"CyberSecurity Readiness: A Model for SMEs based on the Socio-Technical Perspective","authors":"Haiat Perozzo, Fatema Zaghloul, A. Ravarini","doi":"10.7250/csimq.2022-33.04","DOIUrl":"https://doi.org/10.7250/csimq.2022-33.04","url":null,"abstract":"Like most companies, small and medium-sized enterprises (SMEs) have become reliant on digital technology for their day-to-day business operations. While valuable, this comes with challenges; one of which is the rise in cybercrime. In terms of their cybersecurity resilience and risk, SMEs are among the most vulnerable and least mature. This article addresses a gap in the literature that has neglected cybersecurity readiness in SMEs. The study proposes a CyberSecurity Readiness Model for SMEs (CSRM-SME) based on a Socio-Technical view of organizations. The model was applied to three SMEs to assess their cybersecurity readiness and further understand the environment and strategies adopted to prevent and manage cyber-attacks.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131085324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.7250/csimq.2022-33.00
Mikko Rajanen, A. Ravarini
{"title":"\"Simplifying\" Digital Complexity? A Socio-Technical Perspective. Editorial Introduction to Issue 33 of CSIMQ","authors":"Mikko Rajanen, A. Ravarini","doi":"10.7250/csimq.2022-33.00","DOIUrl":"https://doi.org/10.7250/csimq.2022-33.00","url":null,"abstract":"","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.7250/csimq.2022-33.03
A. Islind, Helena Vallo Hult
The use of digital technology for self-care, such as self-management of chronic diseases, has emerged through mobile applications and wearables, often designed, developed, and used in everyday life outside the healthcare context. The new self-care practices may be beneficial in many ways but can also potentially pose risks, and there is a corresponding need to understand underlying algorithms and biases that may affect users. In this article, we describe the design and development of a mobile app for food nutrition information as part of diabetes self-management and critically discuss its implications for patients and designers. In conclusion, this study highlights the need to carefully consider how self-management tools are designed, developed, and used for self-care. We propose co-design to approach data-driven healthcare in general and data-driven decision-making tools in particular. Our findings show that patients need to balance overreliance and mistrust in augmented data-driven decision-making, which calls for ethical considerations and a critical approach for all future designers.
{"title":"Data-Driven Healthcare: Critically Examining the Role of Self-care and Data-Driven Decision-Making in Diabetes Management","authors":"A. Islind, Helena Vallo Hult","doi":"10.7250/csimq.2022-33.03","DOIUrl":"https://doi.org/10.7250/csimq.2022-33.03","url":null,"abstract":"The use of digital technology for self-care, such as self-management of chronic diseases, has emerged through mobile applications and wearables, often designed, developed, and used in everyday life outside the healthcare context. The new self-care practices may be beneficial in many ways but can also potentially pose risks, and there is a corresponding need to understand underlying algorithms and biases that may affect users. In this article, we describe the design and development of a mobile app for food nutrition information as part of diabetes self-management and critically discuss its implications for patients and designers. In conclusion, this study highlights the need to carefully consider how self-management tools are designed, developed, and used for self-care. We propose co-design to approach data-driven healthcare in general and data-driven decision-making tools in particular. Our findings show that patients need to balance overreliance and mistrust in augmented data-driven decision-making, which calls for ethical considerations and a critical approach for all future designers.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127116783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-28DOI: 10.7250/csimq.2022-32.00
A. Zimmermann, Bartosz Marcinkowski
The potential of the Internet and related digital technologies, such as the Internet of Things (IoT), cognition and artificial intelligence, data analytics, services computing, cloud computing, mobile systems, collaboration networks, and cyber-physical systems, are both strategic drivers and enablers of modern digital platforms with fast-evolving ecosystems of intelligent services for digital products. This issue of CSIMQ presents three recent articles on modern software engineering. First, we focus on continuous software development and place it in the context of software architectures and digital transformation. The first contribution is followed by the description of the basis of specific security requirements and adequate digital monitoring mechanisms. Finally, we present a practical example of the digital management of livestock farming.
{"title":"Handling Complexity in Modern Software Engineering: Editorial Introduction to Issue 32 of CSIMQ","authors":"A. Zimmermann, Bartosz Marcinkowski","doi":"10.7250/csimq.2022-32.00","DOIUrl":"https://doi.org/10.7250/csimq.2022-32.00","url":null,"abstract":"The potential of the Internet and related digital technologies, such as the Internet of Things (IoT), cognition and artificial intelligence, data analytics, services computing, cloud computing, mobile systems, collaboration networks, and cyber-physical systems, are both strategic drivers and enablers of modern digital platforms with fast-evolving ecosystems of intelligent services for digital products. This issue of CSIMQ presents three recent articles on modern software engineering. First, we focus on continuous software development and place it in the context of software architectures and digital transformation. The first contribution is followed by the description of the basis of specific security requirements and adequate digital monitoring mechanisms. Finally, we present a practical example of the digital management of livestock farming.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122326733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-28DOI: 10.7250/csimq.2022-32.02
Erika Nazaruka
Specification and traceability of security requirements is still a challenge since modeling and analysis of security aspects of systems require additional efforts at the very beginning of software development. The topological functioning model is a formal mathematical model that can be used as a reference model for functional and non-functional requirements of the system. It can also serve as a reference model for security requirements. The purpose of this study is to determine the approach to how security requirements can be specified and traced using the topological functioning model. This article demonstrates the suggested approach and explains its potential benefits and limitations.
{"title":"Security Requirements Specification and Tracing within Topological Functioning Model","authors":"Erika Nazaruka","doi":"10.7250/csimq.2022-32.02","DOIUrl":"https://doi.org/10.7250/csimq.2022-32.02","url":null,"abstract":"Specification and traceability of security requirements is still a challenge since modeling and analysis of security aspects of systems require additional efforts at the very beginning of software development. The topological functioning model is a formal mathematical model that can be used as a reference model for functional and non-functional requirements of the system. It can also serve as a reference model for security requirements. The purpose of this study is to determine the approach to how security requirements can be specified and traced using the topological functioning model. This article demonstrates the suggested approach and explains its potential benefits and limitations.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-28DOI: 10.7250/csimq.2022-32.01
Theo Theunissen, S. Hoppenbrouwers, S. Overbeek
It is common practice for practitioners in industry as well as for ICT/CS students to keep writing – and reading ¬– about software products to a bare minimum. However, refraining from documentation may result in severe issues concerning the vaporization of knowledge regarding decisions made during the phases of design, build, and maintenance. In this article, we distinguish between knowledge required upfront to start a project or iteration, knowledge required to complete a project or iteration, and knowledge required to operate and maintain software products. With `knowledge', we refer to actionable information. We propose three approaches to keep up with modern development methods to prevent the risk of knowledge vaporization in software projects. These approaches are `Just Enough Upfront' documentation, `Executable Knowledge', and `Automated Text Analytics' to help record, substantiate, manage and retrieve design decisions in the aforementioned phases. The main characteristic of `Just Enough Upfront' documentation is that knowledge required upfront includes shaping thoughts/ideas, a codified interface description between (sub)systems, and a plan. For building the software and making maximum use of progressive insights, updating the specifications is sufficient. Knowledge required by others to use, operate and maintain the product includes a detailed design and accountability of results. `Executable Knowledge' refers to any executable artifact except the source code. Primary artifacts include Test Driven Development methods and infrastructure-as-code, including continuous integration scripts. A third approach concerns `Automated Text Analysis' using Text Mining and Deep Learning to retrieve design decisions.
{"title":"Approaches for Documentation in Continuous Software Development","authors":"Theo Theunissen, S. Hoppenbrouwers, S. Overbeek","doi":"10.7250/csimq.2022-32.01","DOIUrl":"https://doi.org/10.7250/csimq.2022-32.01","url":null,"abstract":"It is common practice for practitioners in industry as well as for ICT/CS students to keep writing – and reading ¬– about software products to a bare minimum. However, refraining from documentation may result in severe issues concerning the vaporization of knowledge regarding decisions made during the phases of design, build, and maintenance. In this article, we distinguish between knowledge required upfront to start a project or iteration, knowledge required to complete a project or iteration, and knowledge required to operate and maintain software products. With `knowledge', we refer to actionable information. We propose three approaches to keep up with modern development methods to prevent the risk of knowledge vaporization in software projects. These approaches are `Just Enough Upfront' documentation, `Executable Knowledge', and `Automated Text Analytics' to help record, substantiate, manage and retrieve design decisions in the aforementioned phases. The main characteristic of `Just Enough Upfront' documentation is that knowledge required upfront includes shaping thoughts/ideas, a codified interface description between (sub)systems, and a plan. For building the software and making maximum use of progressive insights, updating the specifications is sufficient. Knowledge required by others to use, operate and maintain the product includes a detailed design and accountability of results. `Executable Knowledge' refers to any executable artifact except the source code. Primary artifacts include Test Driven Development methods and infrastructure-as-code, including continuous integration scripts. A third approach concerns `Automated Text Analysis' using Text Mining and Deep Learning to retrieve design decisions.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"595 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116174815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-28DOI: 10.7250/csimq.2022-32.03
A. Ņikitenko, S. Bāliņa, Andrejs Dubrovskis, Ilze Andersone, I. Birzniece
The presented work proposes a practical approach to bird weight data processing and augmentation to enable production outcome forecast model training, which contributes to higher productivity. We suggest using the parametrized model, where parameter values are found through genetic optimization and thus are closely corresponding to broiler body weight factual measurements. The proposed approach is implemented as a stand-alone software system, exposing the models through containerized web services enabling different use scenarios.
{"title":"Precision Livestock Farming IT Support Model for the Poultry Industry","authors":"A. Ņikitenko, S. Bāliņa, Andrejs Dubrovskis, Ilze Andersone, I. Birzniece","doi":"10.7250/csimq.2022-32.03","DOIUrl":"https://doi.org/10.7250/csimq.2022-32.03","url":null,"abstract":"The presented work proposes a practical approach to bird weight data processing and augmentation to enable production outcome forecast model training, which contributes to higher productivity. We suggest using the parametrized model, where parameter values are found through genetic optimization and thus are closely corresponding to broiler body weight factual measurements. The proposed approach is implemented as a stand-alone software system, exposing the models through containerized web services enabling different use scenarios.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.7250/csimq.2022-31.02
D. Staegemann, M. Volk, Maneendra Perera, Christian Haertel, M. Pohl, Christian Daase, K. Turowski
Due to the ongoing trend of digitalization, the importance of software for today’s society is continuously increasing. Naturally, there is also a huge interest in improving its quality, which led to a highly active research community dedicated to this aim. Consequently, a plethora of propositions, tools, and methods emerged from the corresponding efforts. One of the approaches that have become highly prominent is the concept of test-driven development (TDD) that increases the quality of created software by restructuring the development process. However, such a big change to the followed procedures is usually also accompanied by major challenges that pose a risk for the achievement of the set targets. In order to find ways to overcome them, or at least to mitigate their impact, it is necessary to identify them and to subsequently raise awareness. Furthermore, since the effect of TDD on productivity and quality is already extensively researched, this work focuses only on issues besides these aspects. For this purpose, a literature review is presented that focuses on the challenges of TDD. In doing so, challenges that can be attributed to the three categories of people, software, and process are identified and potential avenues for future research are discussed.
{"title":"A Literature Review on the Challenges of Applying Test-Driven Development in Software Engineering","authors":"D. Staegemann, M. Volk, Maneendra Perera, Christian Haertel, M. Pohl, Christian Daase, K. Turowski","doi":"10.7250/csimq.2022-31.02","DOIUrl":"https://doi.org/10.7250/csimq.2022-31.02","url":null,"abstract":"Due to the ongoing trend of digitalization, the importance of software for today’s society is continuously increasing. Naturally, there is also a huge interest in improving its quality, which led to a highly active research community dedicated to this aim. Consequently, a plethora of propositions, tools, and methods emerged from the corresponding efforts. One of the approaches that have become highly prominent is the concept of test-driven development (TDD) that increases the quality of created software by restructuring the development process. However, such a big change to the followed procedures is usually also accompanied by major challenges that pose a risk for the achievement of the set targets. In order to find ways to overcome them, or at least to mitigate their impact, it is necessary to identify them and to subsequently raise awareness. Furthermore, since the effect of TDD on productivity and quality is already extensively researched, this work focuses only on issues besides these aspects. For this purpose, a literature review is presented that focuses on the challenges of TDD. In doing so, challenges that can be attributed to the three categories of people, software, and process are identified and potential avenues for future research are discussed.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132015930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.7250/csimq.2022-31.03
Martin Robl, D. Bork
Enterprise architecture (EA), although matured in more than 30 years of ongoing research, receives more importance with the increasing dependency of business in IT and the growing complexity of IT systems. The integrated management of a companies’ goals, structures, and processes with respect to the business and IT elements, as well as the representation of impacts triggered by planned changes is educated in different ways at many universities all over the world. There are several techniques, methods, tools, and approaches to transfer the knowledge from the educators to the students, giving them the qualification to support their future employers in handling the EA challenges modern companies are facing. This work gives a detailed comparative analysis of more than twenty international educational offers regarding Enterprise Architecture Management, carves out the commonalities and finds two prototypical courses as a best-practice combining the strongest matches for Business Informatics and Computer Science studies alike.
{"title":"Enterprise Architecture Management Education in Academia: An International Comparative Analysis","authors":"Martin Robl, D. Bork","doi":"10.7250/csimq.2022-31.03","DOIUrl":"https://doi.org/10.7250/csimq.2022-31.03","url":null,"abstract":"Enterprise architecture (EA), although matured in more than 30 years of ongoing research, receives more importance with the increasing dependency of business in IT and the growing complexity of IT systems. The integrated management of a companies’ goals, structures, and processes with respect to the business and IT elements, as well as the representation of impacts triggered by planned changes is educated in different ways at many universities all over the world. There are several techniques, methods, tools, and approaches to transfer the knowledge from the educators to the students, giving them the qualification to support their future employers in handling the EA challenges modern companies are facing. This work gives a detailed comparative analysis of more than twenty international educational offers regarding Enterprise Architecture Management, carves out the commonalities and finds two prototypical courses as a best-practice combining the strongest matches for Business Informatics and Computer Science studies alike.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}