Search results

1 – 10 of over 3000
Article
Publication date: 14 August 2009

Sophie Cockcroft

The purpose of this paper is to evaluate electronic health record (EHR) initiatives at the national/external level. Governments are investing large amounts of money in national…

Abstract

Purpose

The purpose of this paper is to evaluate electronic health record (EHR) initiatives at the national/external level. Governments are investing large amounts of money in national EHR systems. These systems are socially and politically complex and a variety of stakeholders (e.g. at the individual, organisational or national level) have an interest in evaluating such systems from technical, economic or patient outcome perspectives. In cognisance of academic research in the area, this paper presents an approach which uses the perspective of one particular type of professional critic, the media, to identify issues and evaluate their impact at a national level.

Design/methodology/approach

The work is conducted using an established evaluation framework and formal content analysis of selected relevant articles from the quality press of three selected countries.

Findings

Different issues take prominence in centralised vs decentralised EHR approaches. In countries with a decentralised approach issues of standards and interoperability take the fore. Where there is a more centralised approach the media focus is more on project management, budgetary and financial aspects. In all coverage political and economic aspects are emphasised over technical or patient outcome issues.

Originality/value

The paper represents the application of the content‐context‐process framework. It contributes to the information systems evaluation literature at the national/external level.

Details

Journal of Systems and Information Technology, vol. 11 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 18 November 2013

Youcef Baghdadi

Many service-oriented software engineering (SOSE) methods from industry and academia claim their compliance with SOA and SO, but there is a lack of framework to assess the…

Abstract

Purpose

Many service-oriented software engineering (SOSE) methods from industry and academia claim their compliance with SOA and SO, but there is a lack of framework to assess the existing methods or to provide new ones. First, the paper questions: (Q1) to what extent an approach would consider the three aspect: service, composition, and management to deliver software solutions that are conformed to SO and SOA principles; (Q2) to what extent an approach would consider the aggregates of a method, including representation techniques, assisting tools, and inspection techniques to assess the delivered solution (service and composition), in addition to the process; and (Q3) to what extent an approach would consider the alignment of business and IT through the application of model-driven development by using standards such as model-driven architecture. Then, the paper compares four generic approaches: top-down, bottom-up, green-field, and meet-in-the-middle, within a framework, to highlight their strengths and weaknesses. Finally, the paper aims to propose a business-oriented approach that focuses on the value a business can add to its customers, whereby the value must be specified in a contract to be largely re-used.

Design/methodology/approach

This work develops a framework as an abstract model for SOSE generic methods. Then, it uses the framework as an analytical study to compare the generic methods and come up with research issues and a new method for SOSE.

Findings

A set of guidelines that a SOSE method develops should consider when selecting or developing a new method.

Research limitations/implications

Comparison of existing SOSE methods within the findings of the proposed framework. The paper has theoretical implications as the open issues provide a research roadmap towards the realization of SOA in accordance with a maturity model.

Practical implications

This has practical implications as it: provides a better understanding of the approaches, as they are ambiguously used by the existing methods; and assists developers in deciding an approach having the necessary knowledge related to its process, strengths and weaknesses.

Originality/value

None of the existing comparison framework has raised the level of abstraction up to generic methods such as top-down, green-filed, meet-in-the-middle and bottom-up.

Article
Publication date: 29 September 2020

Wenyuan Wang and Sira Yongchareon

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups…

Abstract

Purpose

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups. Further, the report will advise commercial applications and advice of SECaaS as an extended context to help firms make decisions.

Design/methodology/approach

This paper compares the SECaaS categories in Cloud Security Alliance (CSA) with the security clauses in ISO/IEC 27002:2013 to give a comprehensive analysis of those SECaaS categories. Reviewed from a number of related literature, this paper analyzes and categorizes SECaaS into three major groups including protective, detective and reactive based on security control perspectives. This study has discussed the three groups and their interplay to identify the key characteristics and problems that they aim to address.

Findings

This paper also adds new evidence to support a better understanding of the current and future challenges and directions for SECaaS. Also, the study reveals both the positive and negative aspects of SECaaS along with business cases. It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches.

Originality/value

SECaaS has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud computing. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud. However, it is still in infancy and not very widely investigated. Recent studies suggest that SECaaS is an efficient solution for Cloud and real industries. However, shortcomings of SECaaS have not been well-studied and documented. Moreover, reviewing the existing research, researchers did not classify the SECaaS-related categories.

Details

International Journal of Web Information Systems, vol. 16 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 17 August 2018

Miguel-Angel Sicilia and Anna Visvizi

The purpose of this paper is to employ the case of Organization for Economic Cooperation and Development (OECD) data repositories to examine the potential of blockchain technology…

3150

Abstract

Purpose

The purpose of this paper is to employ the case of Organization for Economic Cooperation and Development (OECD) data repositories to examine the potential of blockchain technology in the context of addressing basic contemporary societal concerns, such as transparency, accountability and trust in the policymaking process. Current approaches to sharing data employ standardized metadata, in which the provider of the service is assumed to be a trusted party. However, derived data, analytic processes or links from policies, are in many cases not shared in the same form, thus breaking the provenance trace and making the repetition of analysis conducted in the past difficult. Similarly, it becomes tricky to test whether certain conditions justifying policies implemented still apply. A higher level of reuse would require a decentralized approach to sharing both data and analytic scripts and software. This could be supported by a combination of blockchain and decentralized file system technology.

Design/methodology/approach

The findings presented in this paper have been derived from an analysis of a case study, i.e., analytics using data made available by the OECD. The set of data the OECD provides is vast and is used broadly. The argument is structured as follows. First, current issues and topics shaping the debate on blockchain are outlined. Then, a redefinition of the main artifacts on which some simple or convoluted analytic results are based is revised for some concrete purposes. The requirements on provenance, trust and repeatability are discussed with regards to the architecture proposed, and a proof of concept using smart contracts is used for reasoning on relevant scenarios.

Findings

A combination of decentralized file systems and an open blockchain such as Ethereum supporting smart contracts can ascertain that the set of artifacts used for the analytics is shared. This enables the sequence underlying the successive stages of research and/or policymaking to be preserved. This suggests that, in turn, and ex post, it becomes possible to test whether evidence supporting certain findings and/or policy decisions still hold. Moreover, unlike traditional databases, blockchain technology makes it possible that immutable records can be stored. This means that the artifacts can be used for further exploitation or repetition of results. In practical terms, the use of blockchain technology creates the opportunity to enhance the evidence-based approach to policy design and policy recommendations that the OECD fosters. That is, it might enable the stakeholders not only to use the data available in the OECD repositories but also to assess corrections to a given policy strategy or modify its scope.

Research limitations/implications

Blockchains and related technologies are still maturing, and several questions related to their use and potential remain underexplored. Several issues require particular consideration in future research, including anonymity, scalability and stability of the data repository. This research took as example OECD data repositories, precisely to make the point that more research and more dialogue between the research and policymaking community is needed to embrace the challenges and opportunities blockchain technology generates. Several questions that this research prompts have not been addressed. For instance, the question of how the sharing economy concept for the specifics of the case could be employed in the context of blockchain has not been dealt with.

Practical implications

The practical implications of the research presented here can be summarized in two ways. On the one hand, by suggesting how a combination of decentralized file systems and an open blockchain, such as Ethereum supporting smart contracts, can ascertain that artifacts are shared, this paper paves the way toward a discussion on how to make this approach and solution reality. The approach and architecture proposed in this paper would provide a way to increase the scope of the reuse of statistical data and results and thus would improve the effectiveness of decision making as well as the transparency of the evidence supporting policy.

Social implications

Decentralizing analytic artifacts will add to existing open data practices an additional layer of benefits for different actors, including but not limited to policymakers, journalists, analysts and/or researchers without the need to establish centrally managed institutions. Moreover, due to the degree of decentralization and absence of a single-entry point, the vulnerability of data repositories to cyberthreats might be reduced. Simultaneously, by ensuring that artifacts derived from data based in those distributed depositories are made immutable therein, full reproducibility of conclusions concerning the data is possible. In the field of data-driven policymaking processes, it might allow policymakers to devise more accurate ways of addressing pressing issues and challenges.

Originality/value

This paper offers the first blueprint of a form of sharing that complements open data practices with the decentralized approach of blockchain and decentralized file systems. The case of OECD data repositories is used to highlight that while data storing is important, the real added value of blockchain technology rests in the possible change on how we use the data and data sets in the repositories. It would eventually enable a more transparent and actionable approach to linking policy up with the supporting evidence. From a different angle, throughout the paper the case is made that rather than simply data, artifacts from conducted analyses should be made persistent in a blockchain. What is at stake is the full reproducibility of conclusions based on a given set of data, coupled with the possibility of ex post testing the validity of the assumptions and evidence underlying those conclusions.

Details

Library Hi Tech, vol. 37 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 22 August 2022

Mabrook Al-Rakhami and Majed Al-Mashari

This work focuses on the interoperability of the blockchain from the viewpoint of its technological evolution in the wider context of supply chain systems. Interoperability

Abstract

Purpose

This work focuses on the interoperability of the blockchain from the viewpoint of its technological evolution in the wider context of supply chain systems. Interoperability concerns the most since it is among the most persevering problems in the process of blockchain adaptation. The study aims to trace and pinpoint all the different methods that affect the interoperability of blockchains, gather all the obtainable evidence and recognize gaps in between the applicable approaches mentioned across the contemporary academic literature.

Design/methodology/approach

An analysis is done of seven interoperability approaches based on their relevance, practical usefulness and adoption processes concerning the blockchain. Mainly, this work examines interoperability from several different perspectives. An interoperability modular decomposition via a layered model has been defined through the level of conceptual interoperability (LCIM) and level of information system interoperability (LISI), which represent the most popular metrics with regard to assessing the level of interoperability from a qualitative level.

Findings

Generally, the findings of this work are directed in two major aspects: Firstly, it expands the research around blockchain technology interoperability by providing crucial background information and pinpointing important connotations for both industrial and academic environments. It also defines and analyzes several different approaches toward the blockchain platform's interoperability. Secondly, it also identifies and proposes several scenarios that take advantage of multiple blockchain application approaches, highlights various issues and challenges to the evolution of interoperability standards and solutions and indicates the desired areas of further research.

Originality/value

An essential aspect of the originality of this paper is that, contrary to other work contributions, this work summarized the different interoperability approaches for blockchain in supply chain systems. Mainly, seven approaches were discussed for practitioners and researchers, and the open issues and future research direction were considered.

Details

Business Process Management Journal, vol. 28 no. 5/6
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 19 October 2015

Rajesh Sharma and Prabin Kumar Panigrahi

The purpose of this paper is to propose a tool in the form of a roadmap for planning and implementation of interoperability capabilities. The issue of interoperability is gaining…

Abstract

Purpose

The purpose of this paper is to propose a tool in the form of a roadmap for planning and implementation of interoperability capabilities. The issue of interoperability is gaining importance for offering services as “one-stop shop” due to rapid developments in the field of e-government in recent times. Several complexities are associated with this important dimension, and there is an urgent need for developing a tool to facilitate rollout of e-government projects with interoperability capabilities. The proposed roadmap can enable knowledge sharing among key stakeholders for building a common vision and contribute to planning and implementation of interoperability features of e-government.

Design/methodology/approach

The paper is an exploratory study using the phenomenographic interpretive approach. The literature review identifies the facets and the issues that are crucial for facilitating interoperability. The status of interoperability in some of the developed countries is reviewed where e-government is in a relatively mature stage. Based on the review, this paper identifies an initial set of issues that can guide semi-structured interviews with policymakers, partners and the government agencies implementing e-government projects. The views of these key stakeholders are then analyzed and used for developing the roadmap for implementation of interoperability of e-government services. The findings are then mapped in India’s context for triangulation purpose.

Findings

The paper provides insights into various planning and implementation issues that have to be addressed for building interoperability capability. A roadmap is proposed encompassing the essential legal, regulatory, organizational and technical aspects that are deemed essential for successful planning and implementation of interoperability capability.

Research limitations/implications

The study has the limitation that the exploratory part of the study is based on inputs from key actors in the Indian context only. It needs to be validated by empirical studies in various contexts.

Practical implications

The roadmap proposed will be useful for the policymakers, as it can guide them for planning and implementing e-government systems with interoperability capabilities. It can be used as a knowledge-sharing tool for spreading awareness of steps required for designing and implementing interoperability capabilities.

Originality/value

The paper contributes by providing a tool in the form of a roadmap that can be used by the policymakers and implementers to take a holistic view of requirements for development of interoperability capabilities. The paper can form the basis for future research in specific issues of interoperability.

Details

Transforming Government: People, Process and Policy, vol. 9 no. 4
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 1 May 2002

Smita B. Brunnermeier and Sheila A. Martin

Concurrent design and engineering in the supply chain are vital to the growing competitiveness of the US automotive industry. However, these innovative design and development…

3285

Abstract

Concurrent design and engineering in the supply chain are vital to the growing competitiveness of the US automotive industry. However, these innovative design and development processes are hampered if product data cannot be exchanged seamlessly across the supply chain. This paper estimates that imperfect interoperability costs the US automotive industry about $1 billion per year and delays the introduction of new models by at least two months. It also evaluates different methods for alleviating interoperability problems and concludes that emerging technologies and formats offer promising solutions that may lead to significant savings for the industry. Benefits from alleviating interoperability problems can also be realized in other product data exchange‐intensive supply chains like shipbuilding and aerospace.

Details

Supply Chain Management: An International Journal, vol. 7 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 30 May 2011

Dibakar Ray, Umesh Gulla, Shefali S. Dash and M.P. Gupta

The purpose of this paper is to present such an analytical framework for analyzing Government Interoperability Frameworks (GIFs) and to do a comparative analysis of a set of GIFs…

1291

Abstract

Purpose

The purpose of this paper is to present such an analytical framework for analyzing Government Interoperability Frameworks (GIFs) and to do a comparative analysis of a set of GIFs using the analytical framework. Based on the comparative analysis, the paper presents a set of recommendations useful for new GIF initiatives.

Design/methodology/approach

Drawing on literature and personal knowledge and experience, an analytical framework is proposed for qualitative comparison of GIFs. The analytical framework is based on three core areas of interoperability frameworks – context, content, and process. A total of 21 GIFs are analyzed and evaluated against the framework. The primary sources of information for the study are the interoperability framework documents. In some cases, published articles, brochures, etc. are used as additional sources of information.

Findings

The comparative analysis shows that the analytical framework adequately covers all the features of the GIFs. Comparative analysis also shows that most of the GIFs concentrate mainly on technical and syntactical aspects only. Organizational and semantic issues are covered only by a handful of GIFs. At the policy level, most common interoperability policies are found to be: the universal adoption of common specifications used on the internet and world wide web, use of XML for data integration and data management, and use of open standards for all public sector information systems. Regarding management of GIF, it is found that German, Greek and New Zealand GIFs document the process of standards life cycle management in a much better way, whereas UK e‐GIFs' coverage of management and compliance mechanism of GIF is excellent. Overall, it is found that the UK e‐GIF is one of the most mature and exhaustive on all counts. German – Standards und Architekturen f¨r eGovernment‐Anwendungen on the other hand is found to be a unique effort. It incorporates features of both an enterprise architecture and those of an interoperability framework.

Originality/value

The contribution of the study is substantial for academia and practitioners. For academics, this framework can be used in future research as a tool to benchmark and grade GIFs. The practitioners, on the other hand, can use the study, to identify various essential features of a GIF which can be very useful for new GIF initiatives. The six‐layered e‐government technical architecture discussed here can be used to check the current status of technical interoperability in an organization and to identify gaps in the technology coverage.

Details

Transforming Government: People, Process and Policy, vol. 5 no. 2
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 14 July 2023

Marinos Themistocleous, Paulo Rupino da Cunha, Evangelos Tabakis and Maria Papadaki

Central banks from more than 100 countries, representing 95% of the global financial output, are studying Central Bank Digital Currencies (CBDCs). CBDCs can potentially enable…

Abstract

Purpose

Central banks from more than 100 countries, representing 95% of the global financial output, are studying Central Bank Digital Currencies (CBDCs). CBDCs can potentially enable safe, efficient and inexpensive cross-border and cross-currency payments in today's interconnected financial system. However, a critical factor influencing their expansion is cross-border interoperability. Therefore, there is a high demand from central banks, researchers, computer scientists, policy- and decision-makers to explore this topic further. Its better understanding will improve information management, enhance the decision-making process, and result in the redesign of central banks' processes and products (digital currencies).

Design/methodology/approach

The authors investigate this novel and timely topic by conducting a Multivocal Systematic Literature Review (MSLR) on CBDCs cross-border interoperability. Additionally, the authors collect and analyze empirical data from various online resources such as CBDC trackers.

Findings

The authors conclude that although the academic literature on CBDC cross-border interoperability is very limited, valuable documents published by central banks and other entities discuss this issue and provide valuable insights. The authors paid particular attention to the reports published by the Bank of International Settlement (BIS) as it proposes three different models for CBDC cross-border interoperability. The study research reveals that most CBDC cross-border interoperability projects run by several central banks and other organizations explore these three BIS models. For this research, the authors performed an in-depth study of CBDC cross-border interoperability cases to investigate all three BIS models. The findings illustrate that although technical interoperability is feasible, plenty of work needs to be done in terms of standards and interfaces. In addition, other non-technical interoperability areas need to be explored and addressed, as there are concerns related to legal issues, regulations, jurisdictional boundaries, policy challenges and governance.

Research limitations/implications

Research on CBDCs is progressing quickly, so, despite the authors’ use of an MSLR to identify the state-of-the-art, interested parties should be aware that new information is prone to appear imminently. Hence, this study work should be understood as a basis to build upon. Also, although the authors have included major academic databases in this study search, there is the possibility that a few papers may have been published in outlets that the authors have not covered. Finally, since the search in the grey literature returned thousands of hits, the authors had to define a stopping criterion for the documents to analyze.

Practical implications

The authors provide insights on the current state of CBDC cross-border interoperability, which is valuable to policy- and decision-makers currently assessing the situation and deciding on avenues to pursue.

Originality/value

The authors provide an integrated and critical view of the developments of CBDC cross-border interoperability, considering not only available academic literature but also fundamental documents from key institutions such as central banks and related organizations.

Details

Journal of Enterprise Information Management, vol. 36 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 25 June 2020

Moshabab Aljarman, Halim Boussabaine and Khalid Almarri

Building information modelling (BIM) is not without risk, as the greater reliance on information technology has associated technical risks. Thus, the purpose of this paper is to…

Abstract

Purpose

Building information modelling (BIM) is not without risk, as the greater reliance on information technology has associated technical risks. Thus, the purpose of this paper is to assess the perceptions of the users of BIM regarding the likelihood of emergence of technical risks which might influence the successful application of BIM, to facilitate the successful implementation of BIM in the construction industry.

Design/methodology/approach

The primary data were collected via a questionnaire to document the BIM risks, where 105 responses were recorded from constructors, consultants, cost consultants and other professionals from the UK construction industry. Subsequently, the analysis of the results was driven by univariate and inferential statistics (ANOVA) to assess the perception of risk emergence.

Findings

The study found the most likely technical risks that might emerge from BIM application. These risks are complexity of transferring modelling data from one program to another, lack of understanding of the BIM for the different software platforms, interoperability shortcomings, failure to discover errors in the model and risks of different software platforms.

Practical implications

The results will certainly intensify the discussion about BIM risks, risk allocation and all other aspects that are related to BIM contractual processes. Also, the compiled list of risks will help stakeholders in assessing financial implications that may result from BIM application.

Originality/value

Important technical risks have been identified in the application of BIM. This renders a new understanding of the risks that might influence the successful application of BIM. The respondents generally agreed on the importance of the following risks: “complexity of transferring modelling data between programs from one program to another”, “lack of understanding of the BIM for the different software platforms”, “interoperability shortcomings”, “failure to discover errors in the model” and “risks of different software platforms”, which are in line with current literature.

Details

Journal of Facilities Management , vol. 18 no. 3
Type: Research Article
ISSN: 1472-5967

Keywords

1 – 10 of over 3000