The central idea in reference modeling is the reutilization of the business knowledge contained in reference models for the construction of specific information models. The orientation on the technical content of a reference model can increase the efficiency of processes in business engineering projects. Despite this, the use of reference models in the field of business engineering has not established itself in practice. This is due to the particular field of conflict between research and practice, in which reference modeling is at home. Thus, there is still a deficit in knowledge about the use and problems inherent in the implementation of reference models despite the array of theoretical concepts. Accordingly, in the past years the supply-sided development of reference models predominant in the science world has distanced itself from their demand-sided use in business and administration. The article at hand analyses this problem and presents an integrative approach to the computer-aided management of reference models. The task to be mastered using the proposed approach will be conceptually concretized with an framework and prototypically implemented in the form of a reference model management system.
{"title":"Tool Support for the Collaborative Design of Reference Models — A Business Engineering Perspective","authors":"Oliver Thomas, A. Scheer","doi":"10.1109/HICSS.2006.489","DOIUrl":"https://doi.org/10.1109/HICSS.2006.489","url":null,"abstract":"The central idea in reference modeling is the reutilization of the business knowledge contained in reference models for the construction of specific information models. The orientation on the technical content of a reference model can increase the efficiency of processes in business engineering projects. Despite this, the use of reference models in the field of business engineering has not established itself in practice. This is due to the particular field of conflict between research and practice, in which reference modeling is at home. Thus, there is still a deficit in knowledge about the use and problems inherent in the implementation of reference models despite the array of theoretical concepts. Accordingly, in the past years the supply-sided development of reference models predominant in the science world has distanced itself from their demand-sided use in business and administration. The article at hand analyses this problem and presents an integrative approach to the computer-aided management of reference models. The task to be mastered using the proposed approach will be conceptually concretized with an framework and prototypically implemented in the form of a reference model management system.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129546889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes how the author designed his IT security course and his IT security textbook, ⧼name withheld for anonymity⧽. The paper describes the issues and tradeoffs that all teachers will have to face when they design introductory IT security courses for information systems (IS) students (as opposed to computer science students).
{"title":"Designing a Pedagogy for an IT Security Course and Textbook","authors":"R. Panko","doi":"10.1109/HICSS.2006.117","DOIUrl":"https://doi.org/10.1109/HICSS.2006.117","url":null,"abstract":"This paper describes how the author designed his IT security course and his IT security textbook, ⧼name withheld for anonymity⧽. The paper describes the issues and tradeoffs that all teachers will have to face when they design introductory IT security courses for information systems (IS) students (as opposed to computer science students).","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127015376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure is the virtual organization, in which individuals rely on IT to mediate traditional geographical and temporal boundaries of the firm. The result is a "company without walls" that operates as a virtual "collaborative network of people," independent of location or affiliation [2]. This paper is concerned with exploring how this IT-enabled shift influences worker commitment, a critical factor identified in the organizational behavior literature. Using Wenger’s practice-based learning perspective and theory of legitimate peripheral participation (LPP), we conducted a longitudinal, qualitative analysis of commitment in one open-source software (OSS) project. Results indicate that commitment was strongly associated with engagement in LPP processes (participation, learning and identity transformation). Theoretical contributions and managerial implications are discussed.
{"title":"Should I Stay or Should I Go? Worker Commitment to Virtual Organizations","authors":"Yulin Fang, D. Neufeld","doi":"10.1109/HICSS.2006.434","DOIUrl":"https://doi.org/10.1109/HICSS.2006.434","url":null,"abstract":"As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure is the virtual organization, in which individuals rely on IT to mediate traditional geographical and temporal boundaries of the firm. The result is a \"company without walls\" that operates as a virtual \"collaborative network of people,\" independent of location or affiliation [2]. This paper is concerned with exploring how this IT-enabled shift influences worker commitment, a critical factor identified in the organizational behavior literature. Using Wenger’s practice-based learning perspective and theory of legitimate peripheral participation (LPP), we conducted a longitudinal, qualitative analysis of commitment in one open-source software (OSS) project. Results indicate that commitment was strongly associated with engagement in LPP processes (participation, learning and identity transformation). Theoretical contributions and managerial implications are discussed.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127181457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advance of mobile electronics technology has produced handheld appliances allowing both wireless voice and data communications. As data communications become increasingly important in mobile computing applications, traditional microprocessors and the accompanying software are increasingly less able to meet the size constraints of these applications while delivering increased performance. One of the most important operations in the realm of digital signal and image processing is the 2-D Discrete Cosine Transform, used to compress both still images and streaming video. The BISON Configurable Digital Signal Processor(BCDSP) architecture detailed here uses multiple memories, few instructions, and a special pipelined floating point arithmetic function core to run on a commercially available Field Programmable Gate Array(FPGA) board. The results demonstrate that although the clock speed of the FPGA board was 2 orders of magnitude slower than the microprocessor used in this study, the BCDSP implementation was still significantly faster.
{"title":"Optimizing the Design of a Configurable Digital Signal Processor for Accelerated Execution of the 2-D Discrete Cosine Transform","authors":"C. Gloster, Wanda Gay, Michaela Amoo, M. Chouikha","doi":"10.1109/HICSS.2006.374","DOIUrl":"https://doi.org/10.1109/HICSS.2006.374","url":null,"abstract":"The advance of mobile electronics technology has produced handheld appliances allowing both wireless voice and data communications. As data communications become increasingly important in mobile computing applications, traditional microprocessors and the accompanying software are increasingly less able to meet the size constraints of these applications while delivering increased performance. One of the most important operations in the realm of digital signal and image processing is the 2-D Discrete Cosine Transform, used to compress both still images and streaming video. The BISON Configurable Digital Signal Processor(BCDSP) architecture detailed here uses multiple memories, few instructions, and a special pipelined floating point arithmetic function core to run on a commercially available Field Programmable Gate Array(FPGA) board. The results demonstrate that although the clock speed of the FPGA board was 2 orders of magnitude slower than the microprocessor used in this study, the BCDSP implementation was still significantly faster.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130095162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Work processes are conducted in various contexts and they involve different tasks, interruptions, activities and actions. In all of these, tacit knowledge plays a part. Some part of that tacit knowledge can be externalized and articulated by continuously monitoring the user’s activities. Because the desktop environment is an integral part of almost any office work context, we chart the demands the unstructured and discontinuous nature of work puts on the management of desktop working context. We discuss possibilities to augment the user’s awareness of his/her desktop working environment by providing a context-aware application that can act as a map-like resource for the user’s past activities on the desktop. We propose using temporal information to couple personal experiences with representational, more objective aspects of the context in order to make it possible for the user to express and retrieve subjectively significant activities with a minimal effort. We present an abstract model for designing an application for this purpose.
{"title":"Presenting the Past: A Framework for Facilitating the Externalization and Articulation of User Activities in Desktop Environment","authors":"K. Wideroos, Samuli Pekkola","doi":"10.1109/HICSS.2006.385","DOIUrl":"https://doi.org/10.1109/HICSS.2006.385","url":null,"abstract":"Work processes are conducted in various contexts and they involve different tasks, interruptions, activities and actions. In all of these, tacit knowledge plays a part. Some part of that tacit knowledge can be externalized and articulated by continuously monitoring the user’s activities. Because the desktop environment is an integral part of almost any office work context, we chart the demands the unstructured and discontinuous nature of work puts on the management of desktop working context. We discuss possibilities to augment the user’s awareness of his/her desktop working environment by providing a context-aware application that can act as a map-like resource for the user’s past activities on the desktop. We propose using temporal information to couple personal experiences with representational, more objective aspects of the context in order to make it possible for the user to express and retrieve subjectively significant activities with a minimal effort. We present an abstract model for designing an application for this purpose.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a diagnostic for exploring IT alignment as a "strategic weapon". During the past three years of consulting and research, we have observed executives who are dissatisfied that their IT alignment facilitates projects with technical and process engineering objectives rather than projects that would leverage enterprise resources and improve competitive positioning. Not all IT can or should be dedicated to strategic enterprise-wide IT-based change. However, prominent IT experts argue that as a result of competitive pressures, CIOs must learn and adapt new approaches to implementing increasingly strategic enterprise-wide initiatives. Three case studies illustrate the benefits of using the diagnostic we propose, which explores and defines an alignment that would support strategic IT-based business outcomes.
{"title":"A Diagnostic for Exploring IT Alignment as a Strategic Weapon","authors":"Joseph W. Weiss, A. Thorogood","doi":"10.1109/HICSS.2006.8","DOIUrl":"https://doi.org/10.1109/HICSS.2006.8","url":null,"abstract":"This paper presents a diagnostic for exploring IT alignment as a \"strategic weapon\". During the past three years of consulting and research, we have observed executives who are dissatisfied that their IT alignment facilitates projects with technical and process engineering objectives rather than projects that would leverage enterprise resources and improve competitive positioning. Not all IT can or should be dedicated to strategic enterprise-wide IT-based change. However, prominent IT experts argue that as a result of competitive pressures, CIOs must learn and adapt new approaches to implementing increasingly strategic enterprise-wide initiatives. Three case studies illustrate the benefits of using the diagnostic we propose, which explores and defines an alignment that would support strategic IT-based business outcomes.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122337152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swedish public administration is currently undergoing radical change towards dynamic models of governance relying on a high level of inter-governmental collaboration. This high level of interoperability between governmental organizations and the subsequent quality of service for citizens and companies depending on the services provided by government is summarized in the vision-statement of the 24-hour government (24-timmarsmyndigheten). According to the primary actor‘s (Statskontoret) recommendation, this vision is to be realized through the application of web-service based technology, resulting in a Service Oriented Architecture (SOA). The purpose of this paper is to investigate a possible infusion of a previously developed architectural framework for change management with neo-institutional theory. The results show that neo-institutional theory could be used to infuse the architectural framework with aspects regarding primarily history and legitimacy, but also with an overall contradictory perception of change. Given the vast differences in fundamental assumptions underlying the architectural framework and neo-institutional theory, the paper concludes that these results are however somewhat problematic.
{"title":"Infusing an Architectural Framework with Neo-Institutional Theory: Reports from Recent Change Management Initiatives within the Swedish Public Administration","authors":"J. Magnusson, A. Nilsson","doi":"10.1109/HICSS.2006.223","DOIUrl":"https://doi.org/10.1109/HICSS.2006.223","url":null,"abstract":"Swedish public administration is currently undergoing radical change towards dynamic models of governance relying on a high level of inter-governmental collaboration. This high level of interoperability between governmental organizations and the subsequent quality of service for citizens and companies depending on the services provided by government is summarized in the vision-statement of the 24-hour government (24-timmarsmyndigheten). According to the primary actor‘s (Statskontoret) recommendation, this vision is to be realized through the application of web-service based technology, resulting in a Service Oriented Architecture (SOA). The purpose of this paper is to investigate a possible infusion of a previously developed architectural framework for change management with neo-institutional theory. The results show that neo-institutional theory could be used to infuse the architectural framework with aspects regarding primarily history and legitimacy, but also with an overall contradictory perception of change. Given the vast differences in fundamental assumptions underlying the architectural framework and neo-institutional theory, the paper concludes that these results are however somewhat problematic.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As local law enforcement organizations continue to embrace IT, the successful management of these technologies will continue to have expanding implications for the municipal organization. The emergence of the IT state and the risks associated with the accelerated rate of technological change places law enforcement professionals in a precarious position: balancing the needs for public safety with organizational efficiency and effectiveness concerns. This paper reports the findings of a study examining the role of law enforcement leadership with regard to the successful management of IT. This study assumes that the degree to which senior leadership within the police department and throughout the municipal organization embraces IT and appreciates the dynamic characteristics of the technologies themselves results in a greater level of success integrating technology into organizational operations.
{"title":"Organization Antecedents of Successful IT Management","authors":"Keith Schildt, Suzanne Beaumaster, S. Bailey","doi":"10.1109/HICSS.2006.375","DOIUrl":"https://doi.org/10.1109/HICSS.2006.375","url":null,"abstract":"As local law enforcement organizations continue to embrace IT, the successful management of these technologies will continue to have expanding implications for the municipal organization. The emergence of the IT state and the risks associated with the accelerated rate of technological change places law enforcement professionals in a precarious position: balancing the needs for public safety with organizational efficiency and effectiveness concerns. This paper reports the findings of a study examining the role of law enforcement leadership with regard to the successful management of IT. This study assumes that the degree to which senior leadership within the police department and throughout the municipal organization embraces IT and appreciates the dynamic characteristics of the technologies themselves results in a greater level of success integrating technology into organizational operations.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132168108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although today’s brokerage trading platforms designed by software vendors fulfill the basic functionalities, the brokerage industry still has difficulties to face emerging problems such as the gradual increase of trading volume that cannot be handled because of the limitation of the current system architecture and throughput. Based on our consultation experience, we explain some of such constraints in Hong Kong from the business viewpoint of medium size brokerages. We introduce how a cooperative Transaction Capacity Sharing System (TCSS) among brokerages could help improve the situation by sharing their transaction capacity. In such business-to-business (B2B) system integration, we adopt asynchronous Web services and explain how they can work together to overcome these constraints in a real-time brokerage trading environment. We also detail the TCSS architecture and protocols for the integration which orchestrates the new cooperative trading process in our Web service based solution.
{"title":"Cooperative Brokerage Integration for Transaction Capacity Sharing: A Case Study in Hong Kong","authors":"Anthony C. Y. Lam, Dickson K. W. Chiu","doi":"10.1109/HICSS.2006.100","DOIUrl":"https://doi.org/10.1109/HICSS.2006.100","url":null,"abstract":"Although today’s brokerage trading platforms designed by software vendors fulfill the basic functionalities, the brokerage industry still has difficulties to face emerging problems such as the gradual increase of trading volume that cannot be handled because of the limitation of the current system architecture and throughput. Based on our consultation experience, we explain some of such constraints in Hong Kong from the business viewpoint of medium size brokerages. We introduce how a cooperative Transaction Capacity Sharing System (TCSS) among brokerages could help improve the situation by sharing their transaction capacity. In such business-to-business (B2B) system integration, we adopt asynchronous Web services and explain how they can work together to overcome these constraints in a real-time brokerage trading environment. We also detail the TCSS architecture and protocols for the integration which orchestrates the new cooperative trading process in our Web service based solution.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132321343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessity leads to specific challenges for e-Government applications. This article presents the results of a study run by Luxembourg’s Presidency of the EU during the first half of 2005. This study investigated one central aspect in this area: How do countries identify their citizens and businesses, and what are their national provisions regarding data protection and privacy that limit and regulate the sharing of such data? In more technical terms: What is the impact of identity management and related privacy issues on the interoperability of e-Government systems? The status quo in 18 member states is illustrated, and compared with the results of a similar study run in 2001. We present a general model for describing the framework of identity management in cross-border contexts.
{"title":"Identity Management and Data Sharing in the European Union","authors":"B. Otjacques, Patrik Hitzelberger, F. Feltz","doi":"10.1109/HICSS.2006.211","DOIUrl":"https://doi.org/10.1109/HICSS.2006.211","url":null,"abstract":"Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessity leads to specific challenges for e-Government applications. This article presents the results of a study run by Luxembourg’s Presidency of the EU during the first half of 2005. This study investigated one central aspect in this area: How do countries identify their citizens and businesses, and what are their national provisions regarding data protection and privacy that limit and regulate the sharing of such data? In more technical terms: What is the impact of identity management and related privacy issues on the interoperability of e-Government systems? The status quo in 18 member states is illustrated, and compared with the results of a similar study run in 2001. We present a general model for describing the framework of identity management in cross-border contexts.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127906735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}