Search results

1 – 2 of 2
Article
Publication date: 2 February 2021

Abbas Tarhini, Puzant Balozain and F.Jordan Srour

This paper uses a cognitive analytics management approach to analyze, understand and solve the problems facing the implementation of information systems and help management do the…

485

Abstract

Purpose

This paper uses a cognitive analytics management approach to analyze, understand and solve the problems facing the implementation of information systems and help management do the needed changes to enhance such a critical process; the emergency management system in the health industry is analyzed as a case study.

Design/methodology/approach

Cognitive analytics management (CAM) framework (Osman and Anouz, 2014) is used. Cognitive process: The right questions are asked to understand the behavior of every process and the flow of its corresponding data; critical data variables were identified, guidelines for identifying data sources were set. Analytics process: Techniques of data analytics were applied to the selected data sets, problems were identified in user–system interaction and in the system design. The analysis process helped the management in the management process to make right decisions for the right change.

Findings

Using the CAM framework, the analysis to the Lebanese Red Cross case study identified system user-behavior problems and also system design problems. It identified cases where distributed subsystems are vulnerable to time keeping errors and helped the management make knowledgeable decisions to overcome major obstacles by implementing several changes related to hardware design, software implementation, human resource training, operational and human-technology changes. CAM is a novel and feasible software engineering approach for handling system failures.

Originality/value

The paper uses CAM framework as an approach to overcome system failures and help management do the needed changes to enhance such a critical process. This work contributes to the software engineering literature by introducing CAM as a new agile methodology to be used when dealing with system failures. Furthermore, this study is an action research that validated the CAM theoretical framework in a health emergency context in Lebanon.

Details

Journal of Enterprise Information Management, vol. 34 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 30 August 2021

Puzant Balozian, Dorothy Leidner and Botong Xue

Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory…

Abstract

Purpose

Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory building, this study proposes a theory of ICCS drawing upon tested empirical data of information systems security (ISS) theory in Lebanon.

Design/methodology/approach

After a pilot test, the authors tested the newly developed ISS theory using a field study consisting of 187 respondents, representing many industries, thus contributing to generalizability. ISS theory is used as a proxy for the development of ICCS theory.

Findings

Based on a review of the literature from the past three decades in the information systems (IS) discipline and a discovery of the partial yet significant relevance of ISS literature to ICCS, this study succinctly summarized the antecedents and independent variables impacting security compliance behavior, putting the variables into one comprehensive yet parsimonious theoretical model. This study shows the theoretical and practical relevancy of ISS theory to ICCS theory building.

Practical implications

This paper highlights the importance of ISS compliance in the context of ICCS, especially in the area of spoken knowledge in environments containing Internet-based security devices.

Originality/value

This research article is original, as it presents the theory of ICCS, which was developed by drawing upon a comprehensive literature review of the IS discipline and finding the bridges between the security of both IS and IC.

Details

Journal of Intellectual Capital, vol. 23 no. 6
Type: Research Article
ISSN: 1469-1930

Keywords

1 – 2 of 2