Costs of Information Services and Information Systems

Big Data ◽  
2016 ◽  
pp. 1367-1402
Author(s):  
Steve G. Parsons

The large number of cost terms in use regarding information services contributes to confusion in discussion and cost analysis. This confusion can largely be resolved by focusing on decisions rather than on products and cost terms. This decision focus is consistent with the proper application of total cost of ownership approaches and a real options perspective for evaluating managerial flexibility. Information services also tend to display public good-like characteristics. The non-rivalrous nature of production (i.e., low marginal cost of production) and the perishability of services have critical implications for investments and complex pricing. In addition, some information services and other Internet-based services, can display network effects, which also have important implications for managing the life cycle of the service. Finally, the implications of big data for information services are briefly considered.

Author(s):  
Steve G. Parsons

The large number of cost terms in use regarding information services contributes to confusion in discussion and cost analysis. This confusion can largely be resolved by focusing on decisions rather than on products and cost terms. This decision focus is consistent with the proper application of total cost of ownership approaches and a real options perspective for evaluating managerial flexibility. Information services also tend to display public good-like characteristics. The non-rivalrous nature of production (i.e., low marginal cost of production) and the perishability of services have critical implications for investments and complex pricing. In addition, some information services and other Internet-based services, can display network effects, which also have important implications for managing the life cycle of the service. Finally, the implications of big data for information services are briefly considered.


2019 ◽  
pp. 61-70 ◽  
Author(s):  
Ramazan Ayaz ◽  
Asiye Kaymaz Ozcanli ◽  
Ismail Nakir ◽  
Pramod Bhusal ◽  
Adem Unal

This paper investigates and compares the photometric performance and lifetime cost effectiveness of LED and existing conventional luminaires (high pressure sodium (HPS) and metal halide (MH)). Photometric measurements of the lamps and the luminaires were performed at Yıldız Technical University Lighting Laboratory in Turkey. The performance requirements of the luminaires were analysed according to CIE (International Commission on Illumination) standards. In the simulations, HPS, MH and LED luminaires that provide good lighting criteria for designing M1 and M2 road models were compared in terms of a cost analysis. The life cycle cost analysis (LCCA) method, which comprises installation, energy and maintenance costs, was used in this study. The results of the LCCA showed that LED luminaires have almost the same cost effectiveness as HPS luminaires for the M2 road lighting class, and the total cost of LED luminaires is approximately 11.5 % less than that of HPS luminaires for the M1 lighting class.


2018 ◽  
Vol 13 (Number 1) ◽  
pp. 55-67
Author(s):  
Shafini M. Shafie ◽  
Zakirah Othman ◽  
N Hami

Malaysia has an abundance of biomass resources that can be utilised for power generation. One of them is paddy residue. Paddy residue creates ahuge potential in the power generation sector. The consumption of paddy residue can help Malaysia become less dependent on conventional sources of energy, mitigate greenhouse gas(GHG) emission, offer positive feedback in the economic sector, and at the same time, provide thebest solution for waste management activities. The forecast datafor 20 years on electricity generation wasused to calculate the GHG emission and its saving when paddy residue is used for electricity generation. The government’scost saving was also identified when paddy residue substituted coal fuel in electricity generation.This paper can provide forecast information so that Malaysia is able to move forward to apply paddy residue as feedstock in energy supply. Hopefully, the data achieved can encourage stakeholder bodies in the implementation of paddy residue inelectricity generation since there is apositive impact towardscost and emission saving.


2011 ◽  
Vol 4 (5) ◽  
pp. 158-161 ◽  
Author(s):  
A. Morfonios A. Morfonios ◽  
◽  
D. Kaitelidou D. Kaitelidou ◽  
G. Filntisis G. Filntisis ◽  
G. Baltopoulos G. Baltopoulos ◽  
...  

Author(s):  
Imam Riadi ◽  
Iwan Tti Riyadi Yanto ◽  
Eko Handoyo

Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.


Sign in / Sign up

Export Citation Format

Share Document