scispace - formally typeset
Search or ask a question
Author

木嶋 恭一

Bio: 木嶋 恭一 is an academic researcher. The author has an hindex of 1, co-authored 1 publications receiving 230 citations.

Papers
More filters

Cited by
More filters
Journal ArticleDOI
TL;DR: It is shown that the proposed resilience analysis framework and metric promote the development of methodologies for investigating “deep” uncertainties in resilience assessment while retaining the use of probability for expressing uncertainties about highly uncertain, unforeseeable, or unknowable hazards in design and management activities.

792 citations

Journal ArticleDOI
TL;DR: The paper uses the Burrell and Morgan framework as an intellectual map to analyse the socio‐philosophical concerns in various information systems and security approaches and sets an agenda for a future research emphasis.
Abstract: . The purpose of this paper is to map the current territory of information systems and security research. It uses the Burrell and Morgan framework as an intellectual map to analyse the socio-philosophical concerns in various information systems and security approaches. The paper's contributions are in its analysis of trends in information systems and security research, the former in stressing the socio-organizational perspectives and the latter in criticizing the preponderance of technical solutions. The paper also sets an agenda for a future research emphasis.

638 citations

Journal ArticleDOI
TL;DR: The study presents an understanding of IS security in terms of the values of people from an organizational perspective and uses the value‐focused thinking approach to identify ‘fundamental’ objectives for IS security and ‘means’ of achieving them in an organization.
Abstract: Information system (IS) security continues to present a challenge for executives and professionals. A large part of IS security research is technical in nature with limited consideration of people and organizational issues. The study presented in this paper adopts a broader perspective and presents an understand- ing of IS security in terms of the values of people from an organizational perspec- tive. It uses the value-focused thinking approach to identify 'fundamental' objectives for IS security and 'means' of achieving them in an organization. Data for the study were collected through in-depth interviews with 103 managers about their values in managing IS security. Interview results suggest 86 objectives that are essential in managing IS security. The 86 objectives are organized into 25 clus- ters of nine fundamental and 16 means categories. These results are validated by a panel of seven IS security experts. The findings suggest that for maintaining IS security in organizations, it is necessary to go beyond technical considerations and adopt organizationally grounded principles and values.

369 citations

Journal ArticleDOI
TL;DR: Observations from the monitoring program associated with this study were used to improve state-dependent decisions to control undesired plants, to evaluate management performance relative to shallow-water habitat objectives, and to evaluate potential trade-offs between waterfowl and shorebird habitat management.
Abstract: In a natural resource management setting, monitoring is a crucial component of an informed process for making decisions, and monitoring design should be driven by the decision context and associated uncertainties. Monitoring itself can play ≥3 roles. First, it is important for state-dependent decision-making, as when managers need to know the system state before deciding on the appropriate course of action during the ensuing management cycle. Second, monitoring is critical for evaluating the effectiveness of management actions relative to objectives. Third, in an adaptive management setting, monitoring provides the feedback loop for learning about the system; learning is sought not for its own sake but primarily to better achieve management objectives. In this case, monitoring should be designed to reduce the critical uncertainties in models of the managed system. The United States Geological Survey and United States Fish and Wildlife Service are conducting a large-scale management experiment on ...

257 citations

Journal ArticleDOI
TL;DR: The value proposition of mobile applications can be defined as the net value of the benefits and costs associated with the adoption and adaptation ofMobile applications.
Abstract: Mobile and wireless devices are enabling organizations to conduct business more effectively. Mobile applications can be used to support e-commerce with customers and suppliers, and to conduct e-business within and across organizational boundaries. Despite these benefits, organizations and their customers still lack an understanding of the value of mobile applications. Value is defined here as the principles for evaluating the consequences of action, inaction, or decision [4]. The value proposition of mobile applications can be defined as the net value of the benefits and costs associated with the adoption and adaptation of mobile applications [2].

251 citations