Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides... more Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notio...
This paper suggests an approach to add some participatory and evolutionary features to Informatio... more This paper suggests an approach to add some participatory and evolutionary features to Information Systems Development (ISD) methods. In general, the major weakness of traditional ISD methods is their inability to integrate the development of a system to its deployment process, whereas participatory design methods have been found to be resource consuming. Our approach facilitates an organization to develop its information systems evolutionarily as a part of organizational work processes. We suggest an organizational setting which enables effective participation of the three most important roles - namely manager, IS expert and user.
This paper presents research in progress. Data modeling skills of university students are studied... more This paper presents research in progress. Data modeling skills of university students are studied and some problems that they have encountered in abstract data modeling are presented. The perspective of this study is mainly educational: Are there such problems with data modeling, which require more profound actions than just adding some exercises or lectures? The study presents two general misunderstandings found in data models made by university students. The problems are in a normative sense briefly analyzed and a preliminary solution is produced. A test with two groups of university students with above average modeling skills is presented to validate the usability of the preliminary solution. Finally, some conclusions and future research plans are discussed.
Autonomy of Group Work: The Realm of Work Groups and Information Systems Antti Tuomisto Universit... more Autonomy of Group Work: The Realm of Work Groups and Information Systems Antti Tuomisto University of Turku, Department of Computer Science, Lemminkäisenkatu 14, FIN-20520 Turku, Finland Academic Dissertation for the Degree of LICENTIATE OF PHILOSOPHY ...
This paper suggests an approach to add some participatory and evolutionary features to Informatio... more This paper suggests an approach to add some participatory and evolutionary features to Information Systems Development (ISD) methods. In general, the major weakness of traditional ISD methods is their inability to integrate the development of a system to its deployment process, ...
Seuraavan sukupolven kansalaislähtöisten sähköisten terveyspalvelujen suunnittelun periaatteet pe... more Seuraavan sukupolven kansalaislähtöisten sähköisten terveyspalvelujen suunnittelun periaatteet perustuvat yhä parempaan ymmärrykseen sosiaalisesta pääomasta, ihmisten vastuista, tietotyöstä, velvollisuuksista ja yhteistoiminnallisuudesta. Tuottamamme kansalaislähtöisyyden periaatteet kertovat keskeisten toimijoiden – kansalaisen, terveydenhuollon ammattihenkilön sekä tietojärjestelmän kehittäjän – rooleista hyvinvoinnin ja elämänhallinnan lisäämiseksi. Kansalainen sekä terveydenhuollon ammattihenkilö tuovat yhtälöön kukin omaa asiantuntijuuttansa ja tärkeän voimavaran. Tietojärjestelmän kehittäjä taas luo välineitä, joiden avulla tätä tietoa voidaan jakaa ja hyödyntää terveydenhuollossa ja on täten keskeinen tekijä uusia toimintatapoja luotaessa. Elämänpolulla, jossa jokainen kansalainen on oman elämänsä asiantuntija, tarvitaan näiden kaikkien eri rooleissa toimivien yhteistyötä. Näin voidaan aikaansaada kansalaislähtöinen toimintatapa, joka kunnioittaa kansalaisen oikeuksia ja sama...
ABSTRACT Socio-technical approaches search for optimal solutions for social and technical systems... more ABSTRACT Socio-technical approaches search for optimal solutions for social and technical systems with the help of an organisational autonomous group. The attraction of such groups is not based on higher job satisfaction alone. Autonomous groups also encapsulate the control of disturbances to be treated locally. It is important to realise that responsibility and autonomy are two sides of the same coin. However, the bridge between the group autonomy and the information system (IS) to be designed does not exist in current Information System Design (ISD) methodologies. Therefore ISs often weaken or even violate this autonomy. The system may unnecessarily prescribe a certain way of performing tasks in terms of the sequence of the tasks or division of labour. It may allow detailed surveillance even when its object belongs to the area of group privacy as part of the autonomy. The deficiencies confronted in the group’s autonomy reflect problems in the group’s responsibility.
We believe that when a new employee enters an organization this engages a need for long- lasting ... more We believe that when a new employee enters an organization this engages a need for long- lasting initiation processes which requires sophisticated organizational interactions and activities. In general, initiation process (IP) is about transferring knowledge. However, knowledge management is the individual/organization relationship, and about how knowledge transfer, sharing and creation are pursued and supported. Information technology can help to shift the focus of IP from introductory briefing to the process of knowledge transfer between an individual and an organization. The result is a conceptualization of the roles and interactions of an initiation process in which individual level attributes and cyclic-qualitative time concept support the discovery of knowledge as it emerges in practice.
This paper suggests an approach to add some participatory and evolutionary features to Informatio... more This paper suggests an approach to add some participatory and evolutionary features to Information Systems Development (ISD) methods. In general, the major weakness of traditional ISD methods is their inability to integrate the development of a system to its deployment process, ...
This study is about giving ideas and concepts to IT field to deal with the emergent and overwhelm... more This study is about giving ideas and concepts to IT field to deal with the emergent and overwhelming issues of change in organisations. The causes for the changes can be social, economical, technical, organisational, personal etc. but IT always seems to have an important role. Thus we are interested in the change-driven, turbulent and emergent organisational phenomena, which directly or
Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides... more Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notio...
This paper suggests an approach to add some participatory and evolutionary features to Informatio... more This paper suggests an approach to add some participatory and evolutionary features to Information Systems Development (ISD) methods. In general, the major weakness of traditional ISD methods is their inability to integrate the development of a system to its deployment process, whereas participatory design methods have been found to be resource consuming. Our approach facilitates an organization to develop its information systems evolutionarily as a part of organizational work processes. We suggest an organizational setting which enables effective participation of the three most important roles - namely manager, IS expert and user.
This paper presents research in progress. Data modeling skills of university students are studied... more This paper presents research in progress. Data modeling skills of university students are studied and some problems that they have encountered in abstract data modeling are presented. The perspective of this study is mainly educational: Are there such problems with data modeling, which require more profound actions than just adding some exercises or lectures? The study presents two general misunderstandings found in data models made by university students. The problems are in a normative sense briefly analyzed and a preliminary solution is produced. A test with two groups of university students with above average modeling skills is presented to validate the usability of the preliminary solution. Finally, some conclusions and future research plans are discussed.
Autonomy of Group Work: The Realm of Work Groups and Information Systems Antti Tuomisto Universit... more Autonomy of Group Work: The Realm of Work Groups and Information Systems Antti Tuomisto University of Turku, Department of Computer Science, Lemminkäisenkatu 14, FIN-20520 Turku, Finland Academic Dissertation for the Degree of LICENTIATE OF PHILOSOPHY ...
This paper suggests an approach to add some participatory and evolutionary features to Informatio... more This paper suggests an approach to add some participatory and evolutionary features to Information Systems Development (ISD) methods. In general, the major weakness of traditional ISD methods is their inability to integrate the development of a system to its deployment process, ...
Seuraavan sukupolven kansalaislähtöisten sähköisten terveyspalvelujen suunnittelun periaatteet pe... more Seuraavan sukupolven kansalaislähtöisten sähköisten terveyspalvelujen suunnittelun periaatteet perustuvat yhä parempaan ymmärrykseen sosiaalisesta pääomasta, ihmisten vastuista, tietotyöstä, velvollisuuksista ja yhteistoiminnallisuudesta. Tuottamamme kansalaislähtöisyyden periaatteet kertovat keskeisten toimijoiden – kansalaisen, terveydenhuollon ammattihenkilön sekä tietojärjestelmän kehittäjän – rooleista hyvinvoinnin ja elämänhallinnan lisäämiseksi. Kansalainen sekä terveydenhuollon ammattihenkilö tuovat yhtälöön kukin omaa asiantuntijuuttansa ja tärkeän voimavaran. Tietojärjestelmän kehittäjä taas luo välineitä, joiden avulla tätä tietoa voidaan jakaa ja hyödyntää terveydenhuollossa ja on täten keskeinen tekijä uusia toimintatapoja luotaessa. Elämänpolulla, jossa jokainen kansalainen on oman elämänsä asiantuntija, tarvitaan näiden kaikkien eri rooleissa toimivien yhteistyötä. Näin voidaan aikaansaada kansalaislähtöinen toimintatapa, joka kunnioittaa kansalaisen oikeuksia ja sama...
ABSTRACT Socio-technical approaches search for optimal solutions for social and technical systems... more ABSTRACT Socio-technical approaches search for optimal solutions for social and technical systems with the help of an organisational autonomous group. The attraction of such groups is not based on higher job satisfaction alone. Autonomous groups also encapsulate the control of disturbances to be treated locally. It is important to realise that responsibility and autonomy are two sides of the same coin. However, the bridge between the group autonomy and the information system (IS) to be designed does not exist in current Information System Design (ISD) methodologies. Therefore ISs often weaken or even violate this autonomy. The system may unnecessarily prescribe a certain way of performing tasks in terms of the sequence of the tasks or division of labour. It may allow detailed surveillance even when its object belongs to the area of group privacy as part of the autonomy. The deficiencies confronted in the group’s autonomy reflect problems in the group’s responsibility.
We believe that when a new employee enters an organization this engages a need for long- lasting ... more We believe that when a new employee enters an organization this engages a need for long- lasting initiation processes which requires sophisticated organizational interactions and activities. In general, initiation process (IP) is about transferring knowledge. However, knowledge management is the individual/organization relationship, and about how knowledge transfer, sharing and creation are pursued and supported. Information technology can help to shift the focus of IP from introductory briefing to the process of knowledge transfer between an individual and an organization. The result is a conceptualization of the roles and interactions of an initiation process in which individual level attributes and cyclic-qualitative time concept support the discovery of knowledge as it emerges in practice.
This paper suggests an approach to add some participatory and evolutionary features to Informatio... more This paper suggests an approach to add some participatory and evolutionary features to Information Systems Development (ISD) methods. In general, the major weakness of traditional ISD methods is their inability to integrate the development of a system to its deployment process, ...
This study is about giving ideas and concepts to IT field to deal with the emergent and overwhelm... more This study is about giving ideas and concepts to IT field to deal with the emergent and overwhelming issues of change in organisations. The causes for the changes can be social, economical, technical, organisational, personal etc. but IT always seems to have an important role. Thus we are interested in the change-driven, turbulent and emergent organisational phenomena, which directly or
Uploads
Papers by Antti Tuomisto