Search results
1 – 2 of 2Abbas Tarhini, Puzant Balozain and F.Jordan Srour
This paper uses a cognitive analytics management approach to analyze, understand and solve the problems facing the implementation of information systems and help management do the…
Abstract
Purpose
This paper uses a cognitive analytics management approach to analyze, understand and solve the problems facing the implementation of information systems and help management do the needed changes to enhance such a critical process; the emergency management system in the health industry is analyzed as a case study.
Design/methodology/approach
Cognitive analytics management (CAM) framework (Osman and Anouz, 2014) is used. Cognitive process: The right questions are asked to understand the behavior of every process and the flow of its corresponding data; critical data variables were identified, guidelines for identifying data sources were set. Analytics process: Techniques of data analytics were applied to the selected data sets, problems were identified in user–system interaction and in the system design. The analysis process helped the management in the management process to make right decisions for the right change.
Findings
Using the CAM framework, the analysis to the Lebanese Red Cross case study identified system user-behavior problems and also system design problems. It identified cases where distributed subsystems are vulnerable to time keeping errors and helped the management make knowledgeable decisions to overcome major obstacles by implementing several changes related to hardware design, software implementation, human resource training, operational and human-technology changes. CAM is a novel and feasible software engineering approach for handling system failures.
Originality/value
The paper uses CAM framework as an approach to overcome system failures and help management do the needed changes to enhance such a critical process. This work contributes to the software engineering literature by introducing CAM as a new agile methodology to be used when dealing with system failures. Furthermore, this study is an action research that validated the CAM theoretical framework in a health emergency context in Lebanon.
Details
Keywords
Puzant Balozian, Dorothy Leidner and Botong Xue
Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory…
Abstract
Purpose
Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory building, this study proposes a theory of ICCS drawing upon tested empirical data of information systems security (ISS) theory in Lebanon.
Design/methodology/approach
After a pilot test, the authors tested the newly developed ISS theory using a field study consisting of 187 respondents, representing many industries, thus contributing to generalizability. ISS theory is used as a proxy for the development of ICCS theory.
Findings
Based on a review of the literature from the past three decades in the information systems (IS) discipline and a discovery of the partial yet significant relevance of ISS literature to ICCS, this study succinctly summarized the antecedents and independent variables impacting security compliance behavior, putting the variables into one comprehensive yet parsimonious theoretical model. This study shows the theoretical and practical relevancy of ISS theory to ICCS theory building.
Practical implications
This paper highlights the importance of ISS compliance in the context of ICCS, especially in the area of spoken knowledge in environments containing Internet-based security devices.
Originality/value
This research article is original, as it presents the theory of ICCS, which was developed by drawing upon a comprehensive literature review of the IS discipline and finding the bridges between the security of both IS and IC.
Details