Session details: Theme: Information systems: DASH - Data-driven analysis for software and hardware co-dependability track

Author(s):  
Jong-Hyouk Lee
2017 ◽  
Author(s):  
Seda Gurses ◽  
Joris Vredy Jan van Hoboken

Moving beyond algorithms and big data as starting points for discussions about privacy, the authors of Privacy After the Agile Turn focus our attention on the new modes of production of information systems. Specifically, they look at three shifts that have transformed most of the software industry: software is now delivered as services, software and hardware have moved into the cloud and software’s development is ever more agile. These shifts have altered the conditions for privacy governance, and rendered the typical mental models underlying regulatory frameworks for information systems out-of-date. After 'the agile turn', modularity in production processes creates new challenges for allocating regulatory responsibility. Privacy implications of software are harder to address due to the dynamic nature of services and feature development, which undercuts extant privacy regulation that assumes a clear beginning and end of production processes. And the data-driven nature of services, beyond the prospect of monetization, has become part of software development itself. With their focus on production, the authors manage to place known challenges to privacy in a new light and create new avenues for privacy research and practice.


2002 ◽  
Vol 16 (2) ◽  
pp. 143-164 ◽  
Author(s):  
Craig E. Bain ◽  
Alan I. Blankley ◽  
L. Murphy Smith

This study examines topics currently addressed in the introductory Accounting Information Systems (AIS) course and makes comparisons to past studies. The study includes an examination of 12 current AIS textbooks, syllabi from current AIS instructors, and the results of a survey of AIS faculty and professionals. The divisions of topics in the books and on the syllabi suggest that introduction to systems, internal control, and transaction processing are the most important topics to be covered. After these topics, the rankings diverge. The results of this study suggest that the emphasis historically placed on system analysis and design, while still important, is somewhat less than in the past. This was also apparent from the results of the authors' surveys of AIS faculty and professionals who use technology in their jobs. Both faculty and professionals agree that greater importance should be placed on teaching internal control and transactions processing, while moderate importance should be placed on software and hardware issues. Professionals ranked ethics and Internet education of greater importance than did faculty, while faculty rated computer fraud (which may tie in with ethics) and database management systems of greater importance than did the professionals. Professionals also placed higher importance on teaching software applications (particularly spreadsheet applications) than did faculty.


Author(s):  
Li Chao

In this case study, you will encounter some of the issues of lab development for delivering lab-based information systems courses online. Many small campuses have very limited budget or no budget at all for the computer lab specifically designed for information systems majors. Sometimes, even with new computers purchased, very few people know how to set them up for lab-based information systems (IS) courses. What are the software and hardware requirements for getting the lab online? How much will it cost? Where can you find resources for the lab development? To ensure quality teaching on IS-related topics, you have to deal with these issues. This case study will discuss how to create a lab that allows students to get hands-on practice for courses such as network management or database processing online with a shoestring budget.


Author(s):  
Jo-Mae B. Maris

Cross-discipline research requires researchers to understand many concepts outside their own discipline. Computing has increased in our everyday lives to the point that “ubiquitous computing” has become an entry in the Wikipedia (Wikepedia). Research is no different. Researchers outside of computer networkrelated disciplines must account for the effects of network-based information systems on their research. This article presents a model to aid researchers with the tasks of properly identifying the elements and effects of a network-based information system within their studies. The complexity associated with network-based information systems may be seen by considering a study involving the effectiveness of an Enterprise Resource Planning (ERP) system on a mid-sized company. A study becomes muddled when it fails to recognize the differences between the myriad of people, procedures, data, software, and hardware involved in the development, implementation, security, use, and support of an ERP system. If a researcher confuses network security with ERP configuration limitations, then two important aspects of the information system are obscured. Networks limit access to network resources so that only authorized users have access to their data. ERP applications allow an organization to restrict access to data to safeguard the data (Colt & Yang, 2004). Both aspects relate to the availability of data, but they come from different parts of the system. The two aspects should not be addressed as if both are attributable to the same source. Misidentifying network-based information system elements reflects negatively upon the legitimacy of an entire study.


2020 ◽  
Vol 37 (1) ◽  
pp. 19-24
Author(s):  
Stephen Breen ◽  
Karim Ouazzane ◽  
Preeti Patel

The General Data Protection Regulation (GDPR) 2018 imposes much greater demands on companies to address the rights of individuals who provide data, that is, Data Subjects. The new law requires a much more transparent approach to gaining consent to process personal data. However, few obvious changes to how consent is gained from Data Subjects to comply with this. Many companies are running the risk of non-compliance with the law if they fail to address how data are obtained and the lack of true consent which Data Subjects currently give to their data being processed. Consent is a complex philosophical principle which relies on the person giving the consent being in full possession of the facts, this article explores the philosophical background of consent and examines the circumstances which were the point of departure for the debate on consent and attempts to develop an understanding of it in the context of the growing influence of information systems and the data-driven economy. The GDPR has gone further than any other regulation or law to date in developing an understanding of consent to address personal data and privacy concerns.


2018 ◽  
Vol 6 (5) ◽  
pp. 61-67
Author(s):  
Владимир Синицын ◽  
Vladimir Sinitsyn ◽  
В. Татаринов ◽  
V. Tatarinov ◽  
А. Кирсанов ◽  
...  

In this paper a minimum necessary structure of the software and hardware complex for operative notification of an automotive accident in the real time mode has been proposed based on analysis of accidents on automobile transport with hazardous cargo, notification features of EMERCOM’s duty-dispatching services, and functional capabilities of domestic and foreign geo-information systems. A model for management support based on application of simulation software and hardware complex for monitoring a road transportation of hazardous cargos (based on sensors for automatic identification of accidents, and satellite technologies) has been proposed as well. Model implementation of the software and hardware complex has shown its operating capacity and high efficiency.


2014 ◽  
Vol 998-999 ◽  
pp. 1319-1322 ◽  
Author(s):  
Meng Lun Li

In this paper, the existing problem and deficiencies in current information systems used in important games which are held in China or other countries are analyzed. According to the building and developing experience of information systems used in comprehensive games in many years into full consideration, the system is analyzed and designed by means of software engineering and then there are the overall technology framework of the system, different functional subsystems and the mechanism and flow of data interaction. Besides, detailed function module analysis is conducted on core subsystems and data flow and interfacing manner among core systems as well as software and hardware standards and arrangement rules are defined and specified. There are also requirements and standards of lab integration testing method and criterions of result system. We try our best to put forward the most suitable technology solution framework and technology service plan framework, so as to make contribution to the successful building of result system for the Comprehensive games as well as smooth going of the game.


CCIT Journal ◽  
2020 ◽  
Vol 13 (2) ◽  
pp. 233-246
Author(s):  
Ade Setiadi ◽  
Fifit Alfiah ◽  
Fajar Septiawan

Reservation Meeting Room System is a system that is used to reserve meeting rooms in real time in all offices of PT. Visionet Data Internasional, so that this system is easy for employees to use, there is no duplication of reservations for meeting rooms between employees, and can be used through employees' mobile devices. PT Visionet Data Internasional is a company engaged in the field of IT Consultants consisting of many departments that focus on the development and maintenance of software and hardware, with many departments using meeting rooms very intensely, obtained information systems used to book meeting rooms are inaccurate, not real time, complicated, and frequent duplication of orders. Therefore the system that will be created by the author is a renovation and update of the previous system that already exists at PT. Visionet Data Internasional. It is expected that with this system, it can minimize errors that occur in the previous system. This system is also expected to make it easier for all employees to book a meeting room at PT Visionet Data Internasional.


Sign in / Sign up

Export Citation Format

Share Document