International Journal of Information Systems and Management (5 papers in press)
The Impact of the Role and Communication of Staff on Successful Outsourcing of Information Systems Projects
by Mohamad Hisyam Selamat, Mohd Amir Mat Samsudin, Ram Al-Jaffri Saad, Muhammad Syahir Abdul Wahab
Abstract: This study investigates the impact of the role (project scope, authority and responsibility fulfillment) and communication (formal and informal discussion and rational discourse) of staff on the successful outsourcing of information systems (IS) projects. A total of 500 questionnaires were distributed by post to the managers of IS outsourcing firms registered with the Multimedia Super Corridor Malaysia and 168 questionnaires were returned. Multiple regression was used to analyze the hypotheses. The results highlight that project scope, responsibility fulfillment, formal and informal discussions and rational discourse have a significantly positive relationship with the success of outsourcing IS projects. Implicit in this finding is that there is a need to closely monitor individual and information technology (IT) elements of IS projects to ensure its successful outsourcing.
Keywords: Information systems outsourcing success; role; communication.
A fuzzy decision support system for pre-disaster budgeting
by Terry Rakes, Jason Deane, Loren Rees, David Goldberg, Josey Chacko
Abstract: Estimating the potential loss from a disaster can be a difficult task due to the great uncertainty plus a lack of historical data. An integer programming budgeting system is developed for pre-disaster planning and mitigation funding where the loss parameters of the decision model are fuzzy numbers based on expert opinion. It allows for two options for representing the fuzzy numbers: the element with the highest grade of membership (the loss level that the expert feels about most strongly) and the element corresponding to the fuzzy average value at risk (AVaR) (a loss level with minimal support, but devastating consequences). A plan based on weighted preferences provides a compromise, using mitigation strategies based on maximum membership and strategies based on AVaR. Comparisons are made to illustrate how the budgeting model could be used to determine the best combination of strategies and weights for allocating mitigation dollars to balance overall risk.
Keywords: fuzzy numbers; decision support system; disaster budgeting; integer programming; average value at risk; mitigation strategies; weighted preferences; black swans.
Does Adoption of Cloud Computing Matter? The Economic Worth of Cloud Computing Implementation
by M. Adam Mahmood, Laura Trevino, Aurelia Nicholas-Donald
Abstract: The present research investigates the impact of cloud computing adoption on the market value of a firm using an event study and firm performance measures. Using a resource based view, the efficient market hypothesis was used to analyze a sample of 136 companies that adopted cloud computing and are listed in one of the US stock exchanges, it is found that cloud computing announcements are associated with negative market returns but these returns are not statically significant. The trading volume and the risk of these companies, however, showed a significant increase and both were found to be statistically significant. It appears that in the year of the cloud adoption, the median return on assets increased by 1.26 percent and this increase is statistically significant at the 1% level. There was, however, no significant increase in the year after the cloud adoption relative to the year before the adoption. Return on sales exhibits a similar pattern. Notably, there is a median increase from the year before the adoption to the year of adoption (0.60%) but this difference is not statistically significant. The median increase is 4.33% after the adoption and this increase is statistically significant at the .09% level. We do believe the present research shows that cloud computing adoption does provide financial benefits to the adopting firms.
Keywords: Cloud computing adoption; event study methodology; market value of the adopting firms; return of sales; return of assets.
A NEW TAXONOMY OF INSIDER THREATS; AN INITIAL STEP IN UNDERSTANDING AUTHORIZED ATTACK
by Mohammed Nasser Al-Mhiqani, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, Nathan L Clarke, Ameera Natasha Mohammad
Abstract: Insider threat represents one of the greatest challenges in the cyber security world. Insider attackers have more privileged and legitimate access to the information and facilities, compared to the outsider attackers. In fact, insider attacker has more accessibilities and higher potential to bring huge damage to the organization. However, the behaviour of the insider attacker generates many questions to ponder before a new taxonomy is created. Therefore, the main objective of this paper has two folds: a) to classify the insider threat for better understanding and b) propose a new taxonomy for insider threat with terminologies. To obtain the objective, the process starts with collecting and classifying the evident. Then, this study presents a hybrid insider threat classification based on combining insider threat access, motivation, indicator, types and actions, profile categorization, methods, and detection techniques. With the insights afforded by looking more closely at conceptual understanding, we describe how classification of insider threat may effectively be used in insider threat detection
Keywords: Insider Threat; Insider Threat Detection; Security; Classification.
Using a Context-Based Complementary Model to Assess Business Value of Information Systems
by Asare Yaw Obeng, Mkhize Peter
Abstract: There are several divergent views on how information systems (IS) strategic value is assessed. IS-strategic value has been conceptualized mainly from the perspectives of resource-based theory to enhance internal operational effectiveness and the market-driven to leverage firm capabilities to achieve or sustain a strategic position. However, complex modern business environment has propelled combining diverse models to provide a more comprehensive approach to IS-strategic value assessment. The study proposes an integrative context-based model to understand the essence of leading an offensive strategic IS effort and how industry and/or firm-specific factors impact the performance of eight universal banks in Ghana. The emergent model could serve as a useful guideline and a conceptual basis of a holistic framework of analysing and establishing the competitive status of firms. The findings indicate the two perspectives are complementary, and their combined effect on operational and innovative performance is greater.
Keywords: Complementary model; Bank; IS-business value; strategic asset; technological innovation.