scholarly journals The Cybersecurity Focus Area Maturity (CYSFAM) Model

2021 ◽  
Vol 1 (1) ◽  
pp. 119-139
Author(s):  
Bilge Yigit Ozkan ◽  
Sonny van Lingen ◽  
Marco Spruit

The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving them to a desired state in consideration of risks are inevitable. This research proposes the CYberSecurity Focus Area Maturity (CYSFAM) Model for assessing cybersecurity capabilities. In this design science research, CYSFAM was evaluated at a large financial institution. From the many cybersecurity standards, 11 encompassing focus areas were identified. An assessment instrument—containing 144 questions—was developed. The in-depth single case study demonstrates how and to what extent cybersecurity related deficiencies can be identified. The novel scoring metric has been proven to be adequate, but can be further improved upon. The evaluation results show that the assessment questions suit the case study target audience; the assessment can be performed within four hours; the organization recognizes itself in the result.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Michele Colli ◽  
Verena Stingl ◽  
Brian V. Waehrens

PurposeThe research aims to investigate how firms can develop their sensing capabilities for Industry 4.0 (I4.0) technology adoption through reframing their opportunity perceptions related to learnings from I4.0 initiatives.Design/methodology/approachThe research follows a design science research approach. Following the case of I4.0 technology introduction at a large food manufacturer, the paper develops a theoretical framework (artefact) and validates the applicability and efficacy of the framework within the case study.FindingsThe theoretical framework highlights the different temporal (short-term/long-term) and locational (direct/indirect) value dimensions of I4.0 opportunities. The findings show that the use of the framework can shift managers’ perception regarding the business value of an I4.0 technology implementation. Specifically, the framework reversed initially negative perceptions around a narrowly scoped business case towards an opportunity-oriented attitude exploring further potentials of the technology.Research limitations/implicationsThe research adds to the debate when and why firms engage in, and sustain their I4.0 initiatives by providing a novel perspective on firms’ sensing capabilities. As a single-case study, the framework requires further validation in practice.Practical implicationsThe proposed framework provides practitioners with an extended view concerning the potential value of digital transformation projects and serves as a conversational tool.Originality/valueThe presented wider frame for evaluating digital transformation projects, taking into account the more “intangible” value of their learnings, tackles the fundamental issue of translating explorative innovation efforts into exploitative value – a key challenge when dealing with innovation and one of the main barriers for the digital transformation.


2018 ◽  
Vol 30 (1) ◽  
Author(s):  
Pieter Joubert ◽  
Carina De Villiers ◽  
Jan Hendrik Kroeze

The goal of this research is to develop an integrative modelling technique that is easy enough to be used by most business users with little training, but robust and structured enough to be used in subsequent Information Systems Development (ISD) modelling. This technique attempts to bridge the current gap between modelling on a business level and modelling on a technical level. The overall research methodology is design science research, embedding a grounded approach, to develop an integrative modelling technique. The resultant artefact is applied to a case study to test its applicability and suitability, and the results are evaluated. The results show that the proposed integrative modelling technique that is based on a better understanding of the fundamental entities in business and ISD modelling and their properties, attributes and relationships, can be used as a method to model business situations easily and expressively. By overcoming the divide between business and ISD modelling, the technique also advances informal, mostly textual, business modelling. The paper makes a methodological contribution by establishing a new technique that integrates business analysis with ISD, as well as demonstrating how a single case study could serve as an exemplar of a theory.


2015 ◽  
pp. 1116-1133 ◽  
Author(s):  
Aline Dresch ◽  
Daniel Pacheco Lacerda ◽  
Paulo Augusto Cauchick Miguel

2022 ◽  
pp. 1077-1089
Author(s):  
Pekka Mäkiaho ◽  
Katriina Vartiainen ◽  
Timo Poranen

This paper presents the Metrics Monitoring Tool (MMT) that was developed in university graduate and undergraduate courses on software project work in 2014-2016. The tool aims to support project members, project managers and upper management in reporting and monitoring software and project metrics for their easier and more effective utilization. The paper covers the development process of the tool, evaluation assessment, its current composition and features. The paradigm applied in this study is Design Science Research and the methods for evaluation include prototype, expert evaluation, case study and technical experiment. Data was collected from the tool users by two questionnaires. As a result, MMT was evaluated to ease the metrics handling, while several aspects related to the richness of functionalities and usability still require further development.


Author(s):  
Julie Q. Morrison ◽  
Anna L. Harms

This chapter consists of three case studies that illustrate how the evaluation approaches, methods, techniques, and tools presented in Chapters 1 to 5 can be translated into practice. The first case study describes an evaluation of the Dyslexia Pilot Project, a statewide multi-tier system of supports (MTSS) initiative targeting early literacy. In this evaluation, special attention was paid to the evaluating the cost-effectiveness of serving students in kindergarten to grade 2 proactively. The second case study features the use of single-case designs and corresponding summary statistics to evaluate the collective impact of more than 500 academic and behavioral interventions provided within an MTSS framework as part of the annual statewide evaluation of the Ohio Internship Program in School Psychology. The third case study focuses on efforts to evaluate the fidelity of implementation for teacher teams’ use of a five-step process for data-based decision making and instructional planning.


2015 ◽  
Vol 30 (2) ◽  
pp. 132-159 ◽  
Author(s):  
Jim Rooney ◽  
Suresh Cuganesan

Purpose – The purpose of this study is to examine how managers in financial institutions satisfy themselves of the effectiveness of risk mitigation strategy and management control. It studies the co-opting of accounting tools within a single financial institution case study, examining the recursive and emergent characteristics of risk management practice. Design/methodology/approach – Adopting a field study approach within the strategy-as-practice perspective, the paper provides insights into the role of actor perceptions of risk and accounting as a calculative practice in the adaptive enactment of risk strategy. Findings – Results highlight the interactions between risk management strategy, management controls and actor interests at Lehman Brothers. The actions and reactions of risk management decision-makers such as Executive Committee and Board members are examined to better understand the role of accounting and leadership. Research limitations/implications – Results of this study may not be generalised beyond this single case study. Practical implications – The paper emphasises that concern for the social relations and the performative interests of actors in a risk management network needs to be understood and considered in accounting research. It is argued that the market prices of tradable financial asset will continue to be opaque without these insights. Originality/value – This study explores an under-researched topic in the accounting literature in examining how management controls are affected by and, in turn, affect risk strategising.


2014 ◽  
Vol 624 ◽  
pp. 11-18
Author(s):  
Eva Coisson ◽  
Federica Ottoni

The use of composites in the field of architectural restoration is becoming more and more widespread, because of the great technical advantages they convey in many cases. But applying these materials to the Cultural Heritage poses not only technical issues, common to all the applications on the same materials, but also artistic, historical and, more generally, cultural ones. The present paper faces these issues, starting with some considerations on how they were dealt with in history, when the “new” materials were iron, steel and reinforced concrete. Then, the specific problems posed by the composite materials are discussed and some examples are shown in order to identify the correct approach to the many different cases that can arouse in the field of architectural restoration. There isn’t a single right solution for each problem, but there is a right approach that starts from the comprehension of the building’s behavior, passes through a comparison of all the possible solutions and aims at finding the best equilibrium among the technical and theoretical issues for the single case study.


Author(s):  
Brenda Scholtz ◽  
Andre Calitz ◽  
Irene Snyman

The purpose of this study was to investigate approaches (techniques and technologies) for the coordination of collaborative tasks using synchronous gesture manipulation. Business Process Modelling (BPM) tasks are often performed in teams of modellers who need to collaborate with each other in order to coordinate and integrate their individual contributions into the various process models in a co-located environment. These collaborative BPM tasks were used as a case study in order to develop the artifact (the BPM-Touch approach) as a proof of concept. The BPM-Touch approach allows for the coordination and collaboration of BPM tasks in co-located modelling teams using synchronous gesture manipulation approaches. The Design Science Research (DSR) methodology was used and several cycles of developing and evaluating the artifact took place. This paper reports on the last cycle and set of evaluations. The proposed approach was implemented in a BPM software package in order to provide empirical validation. Usability evaluations of the software were undertaken with both students and BPM professionals as participants. The empirical results of the evaluations revealed that the participants found the approach to be effective and rated the usability and satisfaction of the collaboration and gesture manipulation aspects of the software positively.


Kybernetes ◽  
2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ulrich Schmitt

Purpose In further conceptualizing a novel generative knowledge management system (KM/KMS), this paper aims to focus on identifying and mitigating the risks related to its envisaged scaling from a prototype to an application with a rapidly growing user base. Design/methodology/approach It follows up on prior publications using design science research (DSR) methodologies in compliance with theory effectiveness, a principle expecting system designs to be purposeful in terms of utility and communication. The KMS perspective taken prioritizes a decentralizing agenda benefiting knowledge workers while also aiming to foster a fruitful co-evolution with conventional organizational KM approaches. Findings The utilization and further extension of the CKDT and a “scalable innovation” heuristic are assisting the detecting of potential scaling risks related to the logics and logistics, generative interoperability, technological capacitating, knowledge dynamics and value chain which further validates the viability of the proposed KM concept and system. Research limitations/implications Although the prototype development is still in progress, the paper conforms to the DSR practice to report on early visions of technology impact on users, organizations and society but also reflects on expectations of viability, desirability and commitment, as well as the system’s prospect as a general-purpose-technology or disruptive innovation. Originality/value In addition to the novel KM-related perspectives, the paper’s practical emphasis on the scaling of more complex systems is rarely dealt with in the literature due to the respective projects’ often large-scale collaborative nature, broad methodological scope and diverse stakeholders’ interests. In this case, the task is eased as prior DSR outputs can be referred to.


Author(s):  
Nadhmi Gazem ◽  
Azizah Abdul Rahman ◽  
Faisal Saeed ◽  
Noorminshah A. Iahad

This article contends that design science research (DSR) has emerged as an important approach in information systems (IS) research. The design science research roadmap (DSRR) model describes the process of using the DSR in IS in great detail. Unfortunately, the existing literature does not address the task of demonstrating the use of the DSRR in detail by conducting a real case study. This article aims to examine the implementation of the DSRR with real IS research activities. The construction of a systematic innovation framework to solve problems for small and medium enterprises (SMEs) is used as a case study for demonstration purposes. This article shows that the DSRR provides very useful guidance, since it covers almost all the necessary steps to conduct DSR in the information systems field. The illustrations provided with each step of the DSRR in this article will help other researchers, especially novice researchers, to gain a comprehensive understanding of the use of the DSRR model.


Sign in / Sign up

Export Citation Format

Share Document