Search results1 – 4 of 4
This paper aims to investigate the extent to which newly agile organizations followed 2001’s Agile Manifesto, especially in terms of the 12 principles of the agile…
This paper aims to investigate the extent to which newly agile organizations followed 2001’s Agile Manifesto, especially in terms of the 12 principles of the agile approach, as included in the Manifesto.
The authors conducted in-depth case studies of groups in three large business organizations that had recently adopted agile. Two researchers spent one day at each site, attending daily standups and conducting interviews with managers, developers and customers.
Across the three organizations, developers were faithful to two agile principles: the primacy of delivering valuable software continually and regular reflections on the process with an eye toward improvement. The developers were uniformly unfaithful to the principle that requires face-to-face communication. Each organization varied in their adherence to the remaining nine principles. Obstacles to faithful adoption included the experience of the organization with agile, the extent to which the industry was regulated and the extent to which developers and customers were physically dispersed.
While past research on agile development is extensive, this paper examines perspectives on the method and its adoption through the lens of the original Agile Manifesto and its 12 principles. The principles were grouped into three broader categories – software delivery, people and process – to provide additional insights and to sharpen the analysis.
This article revisits Nicolas Carr's popular Harvard Review article IT Doesn't Matter on its ten-year anniversary. The purpose is to analyze Carr's argument by analyzing…
This article revisits Nicolas Carr's popular Harvard Review article IT Doesn't Matter on its ten-year anniversary. The purpose is to analyze Carr's argument by analyzing the development of the argument itself as opposed to finding exceptions to the argument, which has been done in the past.
The authors use co-evolutionary theory as a case against Carr's argument by showing that Carr has only looked at the growth of IT from a population ecology perspective and has failed to anticipate the adaptive nature of IT within the organization.
The authors show that Carr's new rules for IT management may not be applicable if viewed through the lens of the three principles of self-renewing organizations espoused by co-evolutionary theory.
The authors provide a new basis for evaluating the strategic nature of IT and offer a background for future research and case studies into evaluating IT strategic competitive advantage within the organization.
The research provides guidelines for organizations to better decide how to strategically implement IT to more fully utilize its capabilities.
The paper provides a new method for refuting a popular article by attacking the argument as opposed to finding exceptions to the argument. This is valuable to those who wish to evangelize the strategic capacity of IT within the organization.
The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life…
The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life implications, as well as to recommend ways in which the threat may be mitigated.
The methodology adopted consisted of an extensive literature review on topics to include cyber crime, virtual worlds, and financial crime.
Virtual worlds such as Second Life play a key role in supporting real world activities such as education, training and business and as such, should not be dismissed purely as a “gaming” environment. In addition, emerging technologies coupled with the lack of legislation and regulation within virtual worlds has created an environment where a variety of crimes can be committed without fear of detection or prosecution. A further concern is its use by criminals as a vehicle to mask real life crimes such as fraud, identify theft and money laundering. The question is to what extent the blurring of the virtual and real life environments can be clarified in order to minimise the risk of abuse of virtual environments by criminal elements, which have direct consequences in the real world.
This paper serves as a useful guide to alert and educate security professionals, the judiciary, law enforcement and policy makers of the significance and the extent of the use of “virtual” environments in cyberspace for criminal means, such as fraud and money laundering. Findings are supported by a conclusion which includes recommendations for tackling these issues.