The estimation algorithm and a discussion about identification are presented in Section 4. The results and managerial implications are described in Section 5,
and lt are discretized for the estimation algorithm. 10 Finally, we assume that"ijt are unobserved shocks that are independently
Therefore, Equation 12 is a dynamic programming problem for consumer i. Let V) Sdit*be the value function of being in state Sdit:
%to reflect the availability to players of more advanced abilities that make old content easy. 4 Estimation 4. 1 Identification Before we describe the estimation algorithm,
when making the decision to join the group. 4. 2 Estimation Algorithm The structure of the consumer choice process within one time period involves making two consecutive decisions:
We employ the iterative Expectation-Maximization (EM) algorithm procedure (Arcidiacono and Jones, 2003; Chung et al.
We combine the EM algorithm with the use of the constrained optimization approach (Su and Judd, 2012;
Luo, Pang and Ralph, 1996) to reduce the typical computational burden of a dynamic structural model associated with finding the solution to consumer dynamic programming problem.
Here, instead of using the nested fixed point algorithm (NFXP) on the Bellman equation to solve for the value function,
and use linear approximation of the value function in the objective function. 27 The estimation algorithm proceeds as follows:
Arcidiacono, P. and J. B. Jones (2003), Finite Mixture Distributions, Sequential Likelihood and the EM Algorithm, Econometrica, Econometric Society, Vol. 71 (3), pp
Scientific Papers (www. scientificpapers. org) Journal of Knowledge management, Economics and Information technology 409 Special Issue December 2013 The Impact of Innovation in Romanian Small and Medium-Sized
The substance of this upgrade though is situated in a great range of differences from country to country or integration groups,
Journal of Management Information systems, 18,185 214. Grant, RM. 1996). ) Toward a knowledge-based theory of the firm.
) Information technology and the U s. economy. The American Economic Review, 91 (1), 1 32. Katz, N,
and more financial resources will be made available over the 2014-2020 programming period. However, despite this considerable financial effort, the returns to research and innovation policy in the periphery of Europe has been far from satisfactory.
4) Have local universities been involved in planning for the future programming period of EU Structural Funds,
There were many examples of such agencies operating across European countries in previous programming periods of the Structural Funds.
especially SMES, for example, intensive computing facilities, experimental platforms (e g. agro-materials platform, chemical and physical analysis services.
which were aimed at implementing new facilities concerning intensive computing with SMES in the region. The project was successful in meeting its scientific goals (through establishing an Interuniversity Computation Centre involving all universities in the region)
but the targeted level of involvement of SMES was achieved not fully. The latter problem was assisted not by the requirement that a different and separate administrative body was involved in management of the SMES'participation in the project.
e g. software engineering, renewable energies. The National University of Ireland, Maynooth, had much experience of use of EU Structural and Social Funds across its teaching
and research in computer science and information and communication technologies, and including dedicated incubation space. Project financed at circa 30%with ERDF funds,
Obstacles relate to the situation that universities are considered not by regional authorities as key partners that can bring their contribution to the programming and implementation of the EU funds,
The university has accessed not European Social Fund grants in this current programming period. Within the 2007-2013 Structural Funds programme
These might include employers seeking new types of skills (e g. better ability to work in teams, or software programming.
The public can submit art and commentary on claims of pending patent applications in computer architecture, software, and information security.
title=Koispe topsy lxxviii http://www. leros. gr/en/index. php? categoryid=36 lxxixkiva at http://www. kiva. org/lxxx http://www. techcrunch. com/2009/11/01/four-years-after-founding-kiva-hits-100
http://www. democracyjournal. org/article. php? ID=6570 cxi Ibid. cxii Mccardle, Hamish,The case of the sneaky wiki'2008, not published. cxiii Ibid. cxiv Mccardle, Hamish (2008) Police Act Review:
Available at www. youngfoundation. org clxiii Patient Reported Outcomes Measurement, available at http://phi. uhce. ox. ac. uk/pubs. php clxiv Dolan
Information technologies and web 2. 0 tools are transforming how people interact, notwithstanding the necessity of physical space and meetings for the exchange of ideas and collaboration.
Country AFM-Machine tool Manufacturers'Association of Spain ACICAE-Automotive Cluster from the Basque Country GAIA-Association of Industries for Electronic and Information technologies in the Basque Country UNIPORT-Port
Much of this economy is formed around distributed systems, rather than centralised structures. It handles complexity not by standardisation
Another example is the NHS commissioning the health information specialists Dr Foster Intelligence to develop its information systems. 171) Outcomes based commissioning is where a commissioning body agrees to fund a provider on the basis that they will achieve particular
as pioneered by the US Information technology Management Reform Act of 1996. The Act included provisions for two pilot programmes (including one on share in savings) to test alternative contracting approaches.
Share in savings is based on an agreement where the contractor pays the initial cost of implementing a new information technology system
to the nature of technology and the design of distributed systems which provide spaces for people to contribute to projects directly,
and on trust in institutions as well as their formal processes. 267) Information systems that reinforce systemic change.
The move towards customer-driven management information systems that has transformed industrial and service processes in the market sector,
What begins as a group of people looking for a place to work becomes a community through conscious and careful curating and programming.
82-106 Distributed systems 5; 38; 71; 87; 98; 110; 114; 139; 195 Accountability 152-155 Organisation 69;
97 Incubators 133 Information systems 20-22; 89; 119-120 Infrastructure 114-115 Innocentive 134 Innovation Innovation Challenge Prize 54 Innovation Exchange 38;
Maria Angela Ferrario1, Zoltán Bajmócy2, 3, Will Simm1, Stephen Forshaw1. 1 Lancaster University, School of Computing and Communications, Lancaster, UK 2 University of Szeged
. & Whittle, J. 2014) Software engineering for'social good':'integrating action research, participatory design, and agile development.
In Companion Proceedings of the 36th International Conference on Software engineering (pp. 520-523. ACM. 8. Galimberti, U. 2000) I miti del nostro tempo, Feltrinelli Editore. 9. González, A. H.,Aristizábal, A b,
The game, then, to be played today is managing organizational genetics together with a new ecology of information technology.
of which can be guaranteed due to the availability of the source code. The components the basic infrastructure The basic infrastructure of the common ecosystem environment is composed by the infrastructure network and by architectural modules,
The large-scale research programmes in data mining funded by the Defence Advanced Research Projects Agency (DARPA) at Stanford and a few other universities provided the context for the development of the Google search algorithm that soon became the basis
The Changing Nature of Organizations, Work and Workplace (downloaded on 8 april from http://www. wbdg. org/resources/chngorgwork. php.
4 http://www. ireg-observatory. org/index. php? option=com content&task=view&id=41&itemid=48 47 providing users the option to create tailor-made approaches,
different performance indicators and differentalgorithms'to arrive at judgments. The qualifications frameworks currently being developed in the Bologna process
http://classifications. carnegiefoundation. org/details/community engagement. php 75 acknowledge regional engagement activities? Are there visible structures that function to assist with region-based teaching and learning?
The computation routine for the field-normalized citation rate indicator involved collecting citations to each publication according to a variable citation window,
Information technology support: further development and implementation of the on-line tool and related software development. Marketing and communication:
summarizing the vast literature in information systems, digital marketing, and computer science and identifying the most cutting edge phenomena is an arduous task.
I congratulate Vincenzo for this book and look forward to seeing it in print soon. Anindya Ghosev Preface This book aims to discuss
such as, for example, the different perspectives of Information systems research (from management to computer science and engineering, among others).
encompassing their respective areas (management, engineering, and computer science. However, these publications are going to be a part of the large set of information and body of knowledge together with other journals such as, e g.,
, Management of Information systems Quarterly (MISQ), Communications of the Association for Information systems, Management of Information systems Quarterly Executive (MISQE), Information systems Research, European Journal of Information vii Systems, Journal
of Information technology, Information systems Journal, and conferences such as International Conferences of Information systems (ICIS), European Conferences of Information systems (ECIS), America's Conferences of Information systems (AMCIS)( just to mention some of the Management of Information systems research sources),
that this book aims to consider for identifying the challenges, ideas, and trends, that may representfood for thoughts''to practitioners.
Giuseppe Airoldi, all formerly at the Institute of Organization and Information systems at Bocconi University, who have created a rich and rigorous research environment where
Rethink User Computing Change Focus from Platform to User...96 5. 3. 3 Step 3:
Shorten the Time Frame for New Computing Approach Adoption...97 5. 3. 4 Step 4:
content management HR Human resources ICT Information and Communication Technology IPO Initial public offering IT Information technology ITIL Information technology Infrastructure Library KPIS Key Performance Indicators Nosql
Not only SQL R&d Research and development SMES Small and medium enterprises TOGAF The Open Group Architecture Framework VOIP Voice over internet Protocol xxi Part I Digital Systems Trends
and processed by an information system, in order to be meaningful and useful for an agent (being human or else a machine).
Whereas we call information the useful and meaningful output of information systems, being processed the data, organized, structured, and presented.
It is worth noting that computer based information systems are a specific type of information system and not exhaustive 36.
Besides, structured data traditionally managed by information systems in organizations, most of the new breed encompasses semi structured and even unstructured data,
Accordingly, at the state of art Nosql (Not only SQL) 3 data storage systems have been emerging, usually not requiring fixed table schemas
Among the programming paradigms for processing, generating, and analyzing large data sets, Mapreduce4 and 3 Several classifications of the Nosql databases have been proposed in literature 39.
on the other hand,(ii) a reduce function that merges all intermediate values associated with the same intermediate key 41.6 1 Big data the open source computing framework Hadoop have received a growing interest
Big data seems to be yet another brick in the wall in the long discussion in the information systems field on information supply to decision makers and operations in enterprise.
Accordingly, Big data change decision making and human resources with regard to capabilities satisfying it, integrating programming, mathematical, statistical skills along with business acumen, creativity in interpreting data and effective communication of the results 5
, information systems and computer science, among other fields, contributions to Big data research. In Table 1. 1 we classify these perspectives with regard to their type
this may be seen as a management of information systems perspective, governing the overall lifecycle from Big data storage to use.
or information system oriented), and the management challenges they have to provide answers and solutions. Priority actions in Fig. 1. 3 structure a lifecycle, starting from the (continuous) storage of data from the outer and inner flood involving today's organizations.
Volume of data Value of information BIG DATA Business Information systems Processes High High Technological perspective Business perspective Management Executives often have to make decisions based on information they do not trust,
Accordingly, scholars in the research areas of information systems and information quality have identified a set of enabling and inhibiting factors for effective data governance.
and practice as a good management of information systems target, on the other hand, they look as by far challenging,
which has to be managed by internal information systems likewise. As shown in, Fig. 1. 5, both business decisions and actions rely on the digital asset of an organization,
although requiring different types of orientation in managing the information systems (IS). As for decisions, integration orientation seems to be required for satisfying the needs for optimization and effective data management of Big data.
Indeed, the greater the integration of a company's information system, the faster the overall planning and control cycles 29.
Americas conference on information systems (AMCIS 2012) 8. Mcafee A, Brynjolfsson E (2012) Big data: the management revolution.
Avison DE, Fitzgerald G (1999) Information systems development. In: Currie WL, Galliers RD (eds) Rethinking management information systems:
an interdisciplinary perspective. Oxford university Press, Oxford, pp 250 278 37. Floridi L (2011) Semantic conceptions of information.
Proceedings of the 6th international conference on pervasive computing and applications, pp 363 366 40.
which will be investigated in details in this Chapter. 2. 1 Introduction The development of cloud computing started years ago with the emergence of grid computing.
Grid computing can be explained as the allocation of several computer systems in a parallel structure to solve one problem 1. Cloud computing is similar to Grid
and specialized software applications 2. It is the latest development in the computing models that performs computing functions on multilevel virtualization and abstraction by integrating many IT resources.
Defined as the process that enables the user to utilize computing capabilities, such as server using time and data storage, automatically and without human interaction. 2. Broad network access,
which is achieved by sharing the same infrastructure by several clients. 8. Quick deployment of the cloud computing structure in comparison with traditional information systems implementations. 2. 1. 1 Cloud computing:
and provides essential application infrastructure services such as computation, connectivity and emails access. The last layer is the Infrastructure as a service (Iaas), in
The second component which is SQL Azure provides data services in the cloud using SQL SERVER.
reliable access to data using large clusters of Application Layer---Business Applications, Web Services Multimedia Platforms---Software Framework (Java, Python,.
NET) Storage (DB/File) Infrastructure---Computation (VM) Storage (Block) Hardware---CPU, Memory, Disk, Bandwidth Resources Managed at Each Layer Software as a service (Saas) Platform as a service
data management and programming models respectively 5. 2. 2 Strategic and Managerial Challenges and Opportunities The decision of whether to implement the cloud computing project by the organization itself
and to automatically allocate the resources that meet the requirements. 2. Virtual machine migration. Virtualization can be important for cloud computing by enabling virtual machine migration to balance the load throughout the data center.
Virtual machine (VM) migration enables robust and highly responsive provisioning in data centers. As a result, it can be concluded that the major benefit of VM migration is to avoid hotspots;
however, this is not straightforward. Currently, detecting workload hotspots and initiating a migration lacks the agility to respond to sudden workload changes.
which also called Virtual machine Monitor (VMM). It is a platform that allows multiple OS and related applications (called Virtual machines VMS) to run on a cloud machine concurrently to facilitate sharing of cloud resources.
Virtualization of enterprise servers introduces considerable security concerns. Associating multiple servers with one host removes the physical separation between servers,
cost-effective. 7. Insecure APIS The Applications Programming interface (APIS) are the software interfaces that document how to communicate with the concerned software.
which is an approach for computing that is based on degrees of truth rather than the usual true
In response for this situation, the Vice president of Information technology suggested using cloud computing to move the company's Business Information systems (BIS),
which includes Executive Information system (EIS), a Management Information system (MIS), a Decision Support system (DSS), an Accounting Information system (AIS), a Transaction Processing System (TPS),
and a Supply Chain Management (SCM) system, to the cloud to cut internal information technology costs.
''although responsibility for information technology would be retained by the company. As the case unfolds, the authors explained that proper oversight was neglected;
This project will be achieved by leveraging cloud computing technologies in the government data centers of the National Computing and Information Agency (NCIA.
and energy consumption by consolidating various redundantly operated information systems. Third, it provides an environment that can respond to user requests promptly via an automatic provisioning process based on on-demand operation.
Cloud computing is simply about an innovative IT model for providing an ondemand network access to a shared pool of configurable computing resources such as networks, servers and software applications.
Proceedings of 2011 international conference on electronic and mechanical engineering and information technology, vol 1, pp 320 324. doi:
Proceedings of international conference on advanced computing and communications and informatics, pp 470 476 12.
Low C, Chen HY (2012) Criteria for the evaluation of a cloud-based hospital information system outsourcing provider.
from development and integration with enterprise information systems, to a secure supply to the final users, through a constant control and performance monitoring.
company Kleiner Perkins Caufield Byers, in two Computing Cycles (i e. smartphones, and tablets cycles respectively) we are entering, faster than before, a third Computing Cycle ofWearables/Drivables/Flyables/Scannables''devices 2. Considering smartphones and tablets,
as reported by Infoworld 3, in 2013 a research company such as, e g.,, IDC has predicted that tablet shipments will hit 229.3 million units in 2013,
analyzing the factors that make up the Technology Acceptance Model (TAM) 16 18 one among the most important and studied ones in the management of information systems research field 19,20.
thus under an internal oriented perspective on a company information system. Thus, the origins of the model do not consider a complex digital ecosystems as the one acting in today market scenarios,
and result demonstrability), the latter related mainly to information systems characteristics. Taking these issues into account being perceived ease of use considered among the determinants of perceived usefulness,
in the information systems research field 27. Indeed, considering the ageing phenomenon at global level and the inedited parallel presence and divide between digital natives and last century generations,
and the question about the diversity of factors influencing information technology acceptance between the latter and the individuals that in a sense accept their actual age.
However, IT managers and executives interested in digital innovation of services through mobile have to face challenges related to the lifecycle of such initiatives from development and integration with enterprise information system, to a secure supply to the final users, through a constant
Integration, facing the issue of the alignment and adaptation to enterprise information systems, at software as well as data level.
Development Platforms for Mobile Applications (App) based on a reference framework Application integration with enterprise information systems (software and data) Device management (data privacy and security) Software solutions
an organization faces management decisions concerning their integration with its own enterprise information systems (see Fig. 3. 3). Indeed,
when facing challenges related to the lifecycle of mobile initiatives, from development and integration with enterprise information system, to a secure supply to the final users,
opportunities for information systems scholars. Inf Syst Res 17: 327 331 5. Antoniou G, van Harmelen F (2008) A semantic web primer, 2nd edn.
Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view.
and user acceptance of information technology. MIS Q 13: 319 339 19. Lee Y, Kozar KA, Larsen KRT (2003) The technology acceptance model:
algorithms for global evaluation are the most common methods used to identify opinion leaders online,
and processing large volume of data streams in real time Stream synopsis algorithms and software Histograms and sketches for data stream computation problems (see 37 for a survey) a According to 42 Hyperscale storage is measured a storage space in terms of petabytes,
serve millions of users with often one or a limited set of applications, may lack redundancy,
whales, or in patients to monitor their history Vehicular Participatory Sensing Cartel (http://cartel. csail. mit. edu/doku. php) Greengps System (http://green-way. cs
Commun AIS 16: 751 775 3. Overby E, Bharadwaj A, Sambamurthy V (2006) Enterprise agility and the enabling role of information technology.
Accessed 13 oct 2013 References 87 Chapter 5 IT Consumerization Abstract The changes that materialized in the field of information technology (IT) during the last decade have produced important effects in the strategies of the companies that produce new technologies.
and type of information technology used within their firms. However increasing numbers of employees have become more selfsufficient
Rethink User Computing Change Focus from Platform to User The traditional approaches and practices of users'profiles management are not suitable any more in nowadays work environments because of today's complex computing landscape
They need to develop a user-centered strategy designed to optimize the computing experience and keep the user as productive as possible on any platform,
and visibility that the company needs to securely deliver the right computing resources for users 14.5.3.3 Step 3:
Shorten the Time Frame for New Computing Approach Adoption Many of the consumer technologies that are already in use by enterprises are advancing very fast.
Companies that provide desktop virtualization solutions include information technology giants. One example of these companies is Cisco,
Another example of those information technology pioneers is Dell which provided Virtual desktop infrastructure (VDI) solution that provides new capabilities for its users such as high-performance 3d graphics, unified collaboration and Voip with other products such as Microsoft Lync 2013.
the future of enterprise mobile computing. White Pap Dell, Dell Headquarter Round Rock, pp 3 14 6. Docherty J (2009) Consumerisation of IT:
Financial times 110 5 IT Consumerization Part II Digital Management Trends Chapter 6 Digital Work and Collaboration Abstract The fast evolution of the Information systems (IS) during the last decade
The continuous development in the field of information systems aims to find new methods to improve the interactions between people
in order for information systems to be more successful and productive in the global economy 6. However, confusion can happen because of the lack of common understanding of the Cross Organizational Collaboration (COC),
the topic of our investigation is the integration and collaboration of people, information systems, and processes across different organizations to accomplish a predefined task
and staff resources create several challenges for information technology (IT) departments. One way to tackle such an issue is the collaboration.
and computing assets that are shared by the company in addition to the services shared by the other parties in the world 4. Thus, the individual services,
and Information technology 4. 6. 4. 5 Social Software and Collaborative Systems and Tools Nowadays, people are using social networking massively.
and share documents and media files 4. These communities can be represented by information systems that allow members to post content
Moreover, it provided a description for the crowdsourcing concept as well as the incentives and rewards in social computing.
Scekic O, Truong H-L, Dustdar S (2013) Incentives and rewarding in social computing. Commun ACM 56:72 82. doi:
Adapted from 9 136 7 Digital Business Identity the state of art on business information systems
thus, the company reduced its control over the brand as digital business identity to answer the challenges of consumer empowerment by the information technology and digital channels 29.
the role of information systems. Eur J Inf Syst 12:3 17 (ST SMES, co-opetition and knowledge sharin) 7. 4 Case studies 143 5. Brandenburger A, Nalebuff B
a foundation for the strategic management of information systems. Decis Support Syst 25:71 88 18. Topalian A (2003) Executive perspective:
information technology (IT) governance is a subset discipline of corporate governance focused on information systems and their performance and risk management.
It addresses concerns related to building a responsive development environment whose output is effective content, applications, and interaction.
and learning Mechanisms Roles and responsibilities Definition Strategic information systems planning Active participation by key stakeholders Shared understanding of business/IT goals IT organization Structure Balanced scorecards
5-Share, Review, and Upgrade; 6-Establish and Implement) they provide a light perspective to complement
Business IT alignment can be defined as a dynamic state in which a business organization is able to use information technology (IT) effectively to achieve business objectives.
3. integration issues between the legacy and 3rd party information systems the enterprise already used, as well as other different systems from other various government agencies;
Nüttgens M, Gadatsch A, Kautz K, Schirmer I, Blinn N (eds) Government and sustainability in information systems. managing transfer and diffusionof IT SE 15.
18th European Conference on Information systems, pp 1 15 12. Guldentops E (2004) Key success factors for implementing IT governance.
leveraging information technology for transforming organizations. IBM Syst J 32:4 16 20. Broadbent M, Weill P (1993) Improving business and information strategy alignment:
and other dimensions such as information systems 19 and business strategy 20 and others focus on the constituent elements that make up the business model 11.
information system and Information system''By Peter Checkland and Sue Holwell. Cybern Hum Knowing 6: 91 95 6. Checkland P, Holwell S (1998) Information systems and information systems:
making sense of the field. Wiley, Chichester 7. Osterwalder A, Pigneur Y, Tucci C (2005) Clarifying business models:
Currie WL, Galliers R (eds) Rethinking management information systems: an interdisciplinary perspective. Oxford university Press, Oxford, pp 161 174 39.
Using powerful machine learning algorithms, it provides extremely accurate profiling and segmentation of consumers based on habits and spending preferences.
The founding team includes MIT and Columbia University Professors in computer science, who were fascinated by the prospect to understand human behavior through the analysis of location data over time.
serial entrepreneur and one of the most cited authors in computer science. His research at the MIT Human Dynamics Lab has been an important brick in the development of the interpretation models,
and adoption of many other solutions based on the same core algorithms. 10.4 Billguard Billguard 5 is a personal finance security system scanning credit card activity daily for hidden
with the goal of creating the next generation of computing interfaces. It is a company of designers
multi-screen, multi-device computing environments. The core technology platform, called g-speak, enables applications to run across multiple screens and multiple devices.
so it happens to be a very sensitive topic. 10.7 Noldus Face Reader Noldus Face Reader 8 is an affective computing tool designed to capture
and the software itself is developed for easy integration with other systems. 10.7.1 Developer Noldus Information technology was established in 1989,
Table 10.11 Company competitiveness indicators for time-to-market Company Noldus information technology Funded 1989 NPRODUCTS Many Clients Many Partners Many Market dimension Average
and affective computing (Noldus Face Reader). Furthermore, the selection has shown a majority of digital innovations coming from US based companies (among them abig''player such as Starbucks),
Computing interfaces, 194 Confidentiality, 28 Consumerization, 89,90 92,95, 98,99, 102,104, 109 Critical success factors (CSFS), 152 Cross organizational collaboration (COC
method (FDM), 35 GGENERAL definition of information (GDI), 4 Generation Z, 4 Grid computing, 23 HHADOOP, 7, 28 Hybrid cloud, 34
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011