Now showing 1 - 5 of 5
  • Publication
    The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption
    (World Scientific Publishing, 2016-01) ;
    "Nobody ever got fired for buying IBM," was a widely used cliché in the 1970s in the corporate IT (information technology) world. Since then, the traditional process of purchasing software has dramatically changed, challenged by the advent of open source software (OSS). Since its inception in the 1980s, OSS has matured, grown, and become one of the important driving forces of the enterprise ecosystem. However, it has also brought important IT security risks that are impacting the OSS IT adoption decision-making process. The recent Heartbleed bug demonstrated the grandeur of the issue. While much of the noise relates to the amplification of perceived risks by the popular mass media coverage, the effect is that many enterprises, mainly for risk reasons, have still chosen not to adopt OSS. We investigated "how do information security related characteristics of OSS affect the risk perception and adoption decision of OSS" by conducting an online survey of 188 IT decision-makers. The proposed Open Source Risk Adoption Model offers novel insights on the importance of the perceived risk antecedents. Our research brings new theoretical contributions, such as understanding the perceived IT security risk (PISR) relationship with adoption intention (AI) in the OSS context, for researchers and important insights for IT information professionals. We have found that IT security risk has a significant role in OSS adoption intention. Our results offer possible future research directions and extend existing theoretical understanding of OSS adoption.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 17
  • Publication
    Influence of Shadow IT on Innovation in Organizations
    (RTU Press, 2016-10-07) ;
    Silic, Dario
    ;
    Oblakovic, Goran
    Shadow IT is relatively new and emerging phenomenon which is bringing number of concerns and risks to the organizational security. Past literature has mostly explored the “negative” effects of the Shadow IT phenomenon, including, for example, the security aspect where Shadow systems are said to undermine the official systems and endanger organizational data flows. However, the question of how Shadow IT can contribute to leverage user’s innovation has not been adequately addressed. We used three methods to understand if Shadow IT can be an important source of innovation for firms: 1) Single case study with international firm that adopted Shadow IT; 2) Interviews with 15 IT executives and 3) Focus group using twitter as enabling tool to interact with 65 IT professionals. We offer a new perspective on how Shadow IT practices can leverage user’s innovation. The study offers novel insights on the role of Shadow users in the organizational innovation process and how they contribute to new innovations by using Shadow IT. Not only this user led innovation through Shadow IT brings positive outcomes for the employee, but it also reveals the path to follow for organizations to increase their innovation capabilities.
    Type:
    Journal:
    Issue:
  • Publication
    Identification and Importance of the Technological Risks of Open Source Software in the Enterprise Adoption Context
    (Universität Osnabrück, 2015-03-05) ;
    Open source software (OSS) has reshaped and remodeled various layers of the organizational ecosystem, becoming an important strategic asset for enterprises. Still, many enterprises are reluctant to adopt OSS. Knowledge about technological risks and their importance for IT executives is still under researched. We aim to identify the technological risks and their importance for OSS adoption during the risk identification phase in the enterprise context. We conducted an extensive literature review, identifying 34 risk factors from 88 papers, followed by an online survey of 115 IT executives to study the risk factors' importance. Our results will be very valuable for practitioners to use when evaluating, assessing and calculating the risks related to OSS product adoption. Also, researchers can use it as a base for future studies to expand current theoretical understanding of the OSS phenomenon related to IT risk management.
  • Publication
    Mobile Contactless Payments Adoption Challenge in the Complex Network Actor Ecosystem
    (Moderna Organizacija, 2014-06-01) ; ; ;
    Pucihar, Andreja
    Mobile contactless payments (MCP) technology brings an important dual use dilemma where consumer adoption can be halted if consumer is not fully persuaded that the security risk behind the technology use is very low. Currently, although many projects on the implementation of MCP solutions have commenced, MCP is still not picking up. Why? To fill this research gap and better understand how security is affecting MCP implementation, we employ triangulation approach to understand if security is the main obstacle to further adoption and extension of MCP solution. The results reveal that consumer security is the crucial factor in a successful MCP implementation. Our result offers important and new insights for practitioners as it provides a security dimension to consider in the entire contactless payment ecosystem.
  • Publication
    Information Security and Open Source Dual Use Security Software: Trust Paradox
    (Springer, 2013-06-26) ; ;
    Petrinja, Etiel
    ;
    Succi, Giancarlo
    ;
    Ioini, Nabil el
    ;
    Sillitti, Alberto
    Nmap, free open source utility for network exploration or security auditing, today counts for thirteen million lines of code representing four thousand years of programming effort1. Hackers can use it to conduct illegal activities, and information security professionals can use it to safeguard their network. In this dual-use context, question of trust is raised. Can we trust programmers developing open source dual use security software? Motivated by this research question, we conducted interviews among hackers and information security professionals, and explored ohloh.net database. Our results show that contributors behind open source security software (OSSS) are hackers, OSSS have important dual-use dimension, information security professionals generally trust OSSS, and large organizations will avoid adopting and using OSSS.
    Type:
    Volume:
    Scopus© Citations 12