Author(s):  
James Courtney ◽  
Yasmin Merali ◽  
David Paradice ◽  
Eleanor Wynn

This article addresses complexity in information systems. It defines how complexity can be used to inform information systems research, and how some individuals and organizations are using notions of complexity. Some organizations are dealing with technical and physical infrastructure complexity, as well as the application of complexity in specific areas such as supply chain management and network management. Their approaches can be used to address more general organizational issues. The concepts and ideas in this article are relevant to the integration of complexity into information systems research. However, the ideas and concepts in this article are not a litmus test for complexity. We hope only to provide a starting point for information systems researchers to push the boundaries of our understanding of complexity. The article also contains a number of suggested research questions that could be pursued in this area.


2009 ◽  
Vol 6 (1) ◽  
pp. 71-92 ◽  
Author(s):  
Ioannis Koskosas

A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups in setting Internet banking goals in order to identify any weaknesses in security management procedures. The novel approach of this investigation is that explores and presents the issues of risk communication and goal setting in Internet banking security through indepth interviews within three case studies. That said, it promotes an interdisciplinary and inter-organizational theory which fosters a new dialog that transcends security industry specific contexts as opposed to other studies. Interview results suggest how an effective setting of Internet banking security goals can be achieved through specific considerations for improving the communication of security messages. The research contributes to interpretive information systems with the study of risk communication and goal setting in an Internet banking security context.


1992 ◽  
Vol 11 (3) ◽  
pp. 160-174 ◽  
Author(s):  
P. HORNBY ◽  
C. W. CLEGG ◽  
J. I. ROBSON ◽  
C. R. R. MACLAREN ◽  
S. C. S. RICHARDSON ◽  
...  

Author(s):  
James Courtney ◽  
Yasmin Merali ◽  
David Paradice ◽  
Eleanor Wynn

This article addresses complexity in information systems. It defines how complexity can be used to inform information systems research, and how some individuals and organizations are using notions of complexity. Some organizations are dealing with technical and physical infrastructure complexity, as well as the application of complexity in specific areas such as supply chain management and network management. Their approaches can be used to address more general organizational issues. The concepts and ideas in this article are relevant to the integration of complexity into information systems research. However, the ideas and concepts in this article are not a litmus test for complexity. We hope only to provide a starting point for information systems researchers to push the boundaries of our understanding of complexity. The article also contains a number of suggested research questions that could be pursued in this area.


Author(s):  
Herman Balsters

Businesses can change their business structure by merging with other companies or, on the other end of the spectrum, by smoothly outsourcing some of their business processes to other more specialized parties. In this paper we will concentrate on conceptual modelling of merging and outsourcing information systems. Merging of a collection of information systems will be defined as the construction of a global information system that contains exactly the functionality of the original collection of systems. Such global information systems are called federated information systems, when we wish to address the situation where the component systems are so-called legacy systems; i.e. systems that are given beforehand and which are to interoperate in an integrated single framework in which the legacy systems are to maintain as much as possible their respective autonomy. Two major problems in constructing federated information systems concern achieving and maintaining consistency and a uniform representation of the data on the global level of the federation. The process of creation of uniform representations of data is known as data extraction, whereas data reconciliation is concerned with resolving data inconsistencies. Outsourcing of an information system, on the other hand, will be defined as the handing over of part of the functionality of the original system to an outside party (the supplier). Such functionality typically involves one or more operations, where each operation satisfies certain input- and output requirements. These requirements will be defined in terms of the ruling service level agreements (SLAs). We will provide a formal means to ensure that the outsourcing relationship between outsourcing party and supplier, determined by a SLA, satisfies specific correctness criteria. Formal specifications as offered in this paper can prove their value in the setup and evaluation of outsourcing contracts. We shall describe a uniform semantic framework for specification of both federated and outsourced information systems based on the UML/OCL data model. In particular, we will show that we can represent so-called exact views in UML/OCL, providing the means to capture the duality relation between federating and outsourcing.


1999 ◽  
Vol 28 (3) ◽  
pp. 9-11 ◽  
Author(s):  
S. Conrad ◽  
W. Hasselbring ◽  
U. Hohenstein ◽  
R.-D. Kutsche ◽  
M. Roantree ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document