Customer information resources advantage, marketing strategy and business performance: A market resources based view
مزیت منابع اطلاعاتی مشتری ، استراتژی بازاریابی و عملکرد تجاری: نمای مبتنی بر منابع بازار-2020
Chief among a firms market-based resources are its relational resources such as brand equity, customer equity and channel equity that result from its interactions with customers and marketing intermediaries, and intellectual resources – accumulated knowledge about entities in the market environment such as consumers, end use and intermediate customers and competitors. In the evolving digital data rich market environment, customer- based resources, a subset of a firms market-based resources, are becoming increasingly important as potential sources of competitive advantage. Customer information assets refer to information of economic value about customers owned by a firm. Information analysis capabilities are complex bundles of skills and knowledge embedded in a firms organizational processes employed to generate customer knowledge from customer information assets. Customer insights or knowledge is a firms extent of understanding of customers that informs its business decisions. Building on the resource-based, capabilities-based and knowledge-based views of the firm, resource advantage theory of competition, and the outside-in and inside-out approaches to strategy, this article presents a market resources-based view of strategy, competitive advantage and performance. The article presents a framework delineating the relationship between a firms customer information based resources, marketing strategy and performance, and discusses implications for theory, research and practice.
Keywords: Competitive advantage | Market based resources | Customer information based resources | Customer insights | Outside-in and inside-out approaches to | strategy
Development of a holistic model for the management of an enterprise’s information assets
توسعه یک مدل جامع برای مدیریت دارایی های اطلاعاتی یک شرکت-2020
Organisations increasingly realise that they must transform into true digital enterprises to create competitive advantage and ensure corporate survival. However, many organisations do not realise that successful digital transformation (DT) requires much more than technology; it can only succeed if they manage their data, in- formation and knowledge as true business assets. This paper describes collaborative research conducted by academic and industry partners, a mutually beneﬁcial journey spanning the past ten years. The aim was to develop a Holistic Information Asset Management (HIAM) model indicating the important areas of information asset management (IAM) that support the DT journey. Interviews were conducted with C-level executives in organisations from all industries on three continents to investigate their IAM practices, the barriers to good IAM and the beneﬁts of managing information assets (IAs) well. This paper proposes that organisations should focus on ten domains in their quest for eﬀective IAM: i) business beneﬁts, ii) business environment, iii) executive awareness, iv) leadership and management, v) information environment, vi) information systems, vii) in- formation behaviour, viii) information attributes/quality, ix) information performance and x) justiﬁcation.
Keywords: Information assets | Information asset management | Digital transformation | Holistic model
Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems
روش پیشگویی مبتنی بر مکان حفظ و حفظ حریم خصوصی و کمبود آگاهی برای سیستمهای توصیه گر مشترک-2019
With the rapid growth of public cloud offerings, how to design effective prediction models that provide appropriate recommendations for potential users has become more and more important. In dynamic cloud environment, both of user behaviors and service performance are sensitive to contextual information, such as geographic location information. In addition, the increasing number of attacks and security threats also brought the problem that how to protect critical information assets such as sensitive data, cloud resources and communication in a more effective and secure manner. In view of these challenges, we propose a privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems. Specifically, our method is designed as a three-phase process: Firstly, two privacy-preserving mechanisms, i.e., a randomized data obfuscation technique and a region aggregation strategy are presented to protect the private information of users and deal with the data sparsity problem. Then a location-aware latent factor model based on tensor factorization is applied to explore the spatial similarity relationships between services. Finally, predictions are made based on both global and spatial nearest neighbors. Experiments are designed and conducted to validate the effectiveness of our proposal. The experimental results show that our method achieves decent prediction accuracy on the premise of privacy preservation.
Keywords: Location-aware recommendation | Privacy-preserving | Data sparsity | Tensor factorizati
Taxonomy of information security risk assessment (ISRA)
طبقه بندی از ارزیابی ریسک امنیت اطلاعات (ISRA)-2016
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of protection for a company’s information assets and for the company as a whole. One of the best ways to address information security problems in the corporate world is through a risk-based approach. In this paper, we present a taxonomy of security risk assessment drawn from 125 papers published from 1995 to May 2014. Organizations with different size may face problems in selecting suitable risk assessment methods that satisfy their needs. Although many risk-based approaches have been proposed, most of them are based on the old taxonomy, avoiding the need for considering and applying the important criteria in assessing risk raised by rapidly changing technologies and the attackers knowledge level. In this paper, we discuss the key features of risk assessment that should be included in an information security management system. We believe that our new risk assessment taxonomy helps organizations to not only understand the risk assessment better by comparing different new concepts but also select a suitable way to conduct the risk assessment properly. Moreover, this taxonomy will open up interesting avenues for future research in the growing field of security risk assessment.
Keywords: Information security | Risk assessment | Risk management | Risk analysis | Threat | Vulnerability
Improving the information security culture through monitoring and implementation actions illustrated through a case study
بهبود فرهنگ امنیت اطلاعات از طریق نظارت و اجرای اقدامات نشان داده شده از طریق یک مطالعه موردی-2015
The human aspect, together with technology and process controls, needs to be considered as part of an information security programme. Current and former employees are still regarded as one of the root causes of information security incidents. One way of addressing the human aspect is to embed an information security culture where the interaction of employees with information assets contributes to the protection of these assets. In other words, it is critical to improve the information security culture in organisations such that the behaviour of employees is in compliance with information security and related information processing policies and regulatoryrequirements. This can be achieved by assessing, monitoringand influencingan information security culture. An information security culture can be assessed by using an approach such as an information security culture assessment (ISCA). The empirical data derived from an ISCA can be used to influence the information security culture by focussing on developmental areas, of which awareness and training programmes are a critical facet. In this paper we discuss a case study of an international financial institution at which ISCA was conducted at four intervals over a period of eight years, across twelve countries. Comparative and multivariate analyses were conducted to establish whether the information security culture improved from one assessment to the next based on the developmental actions implemented. One of the key actions implemented was training and awareness focussing on the critical dimensions identified by ISCA. The information security culture improved from one assessment to the next, with the most positive results in the fourth assessment. This research illustrates that the theoretical ISCA tool previously developed can be implemented successfully in organisations to positively influence the information security culture. Empirical evidence is provided supporting the effectiveness of ISCA in the context of identified shortcomings in the organisation's information security culture. In addition, empirical evidence is presented indicating that information security training and awareness is a significant factor in positively influencing an information security culture when applied in the context of ISCA. Keywords: Information security culture Assessment Training Awareness Monitoring Benchmark Comparative analysis Survey Human element
چارچوب مدیریت ریسک امنیت اطلاعات برای محیط های محاسبات ابری
سال انتشار: 2010 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 20
ریسک های امنیتی مربوط به هر مدل ارائه محاسبات ابری متفاوت است و به گستره وسیعی از عوامل از جمله حساسیت دارایی های اطلاعاتی، معماری محاسبات ابری و کنترل های امنیتی موجود در یک محیط محاسبات ابری خاص بستگی دارد ]7[. سازمان ها در طول زمان مایل به کم کردن شرایط امنیتی خود هستند. برای جلوگیری از این موضوع، تأمین کننده سرویس ابری باید ارزیابی های منظم امنیتی را انجام دهد ]3[.چارچوب مدیریت ریسک یکی از ابزارهای ارزیابی امنیتی برای کاهش تهدیدات و آسیب پذیری ها است و ریسک های امنیتی را کاهش می دهد. هدف این مقاله ارائه چارچوب مدیریت ریسک اطلاعات برای درک بهتر حوزه های حیاتی تمرکز در محیط محاسبات ابری به منظور شناسایی یک تهدید و شناسایی آسیب پذیری است. این چارچوب تمام مدل های سرویس ابری و مدل های توزیع ابری را پوشش می دهد. تأمین کننده سرویس ابری می تواند این چارچوب را به منظور کاهش ریسک در سازمان ها به کار بگیرد.
کلیدواژه ها: محاسبات ابری | چارچوب مدیریت ریسک
|مقاله ترجمه شده|