Advertisement

The Uncertainty of Information Systems: Cause or Effect of VUCA?

  • Torsten EymannEmail author

Abstract

The growing demand for information, an increase in personal computer skills and the key figure-driven management of companies have made IT ubiquitous, even indispensable. However, are users and decision makers better informed than their ancestors, more secure in their decisions today? Or does the ubiquity of information lead to a higher uncertainty, to an endless search for undisputable decision-making to no avail? Our subjective familiarity with information technology borders to over-assessment, and may lead to us taking higher risks both in economic, but also social nature. The article follows this question along three infrastructural spheres, based on F.A. von Hayeks “pretence of knowledge”: the development of technology relies on an existing technology infrastructure (the Internet), which allows to connect even smallest information feeds (the Internet of Things). Based on this, the knowledge infrastructure allows sustainable business models to provide new economic services. Both technology and knowledge follow a “spontaneous order”, and so it is a requirement for us humans to develop and maintain a legal order to provide acceptable borders between which the development of secure and safely to use information technology can take place.

Keywords

Internet IT Business models User IT security 

References

  1. Aarts E, Wichert R (2009) Ambient intelligence. In: Bullinger H-J (ed) Technology guide. Springer, Berlin, pp 244–249CrossRefGoogle Scholar
  2. Adams T, Ferguson G, Tobolski JF (2001) An introduction to silent commerce: creating new sources of value from intelligent objects. Accenture, Chicago. http://www.accenture.com/SiteCollectionDocuments/PDF/silentcommerceintropovusletter.pdf
  3. Akerlof GA (1970) The market for ‘lemons’: quality uncertainty and the market mechanism. Q J Econ 84:488–500CrossRefGoogle Scholar
  4. Anderson DP, Kubiatowicz J (2002) The worldwide computer. Sci Am 286(3):28–35CrossRefGoogle Scholar
  5. Armbrust M, Stoica I, Zaharia M, Fox A, Griffith R, Joseph AD et al (2010) A view of cloud computing. Commun ACM 53(4):50CrossRefGoogle Scholar
  6. Balke T, König S, Eymann T (2009) A survey on reputation systems for artificial societies (Bayreuther Arbeitspapiere zur Wirtschaftsinformatik No. 46). University of Bayreuth, Bayreuth. https://epub.uni-bayreuth.de/id/eprint/496 Google Scholar
  7. Banavar G, Bernstein A (2002) Software infrastructure and design challenges for ubiquitous computing. Commun ACM 45(12):92–96CrossRefGoogle Scholar
  8. Bardram J, Christensen H (2007) Pervasive computing support for hospitals: an overview of the activity-based computing project. IEEE Pervasive Comput 6(1):44–51CrossRefGoogle Scholar
  9. Buyya R, Stockinger H, Ghiddy J, Abramson D (2002) Economic models for management of resources in peer-to-peer and grid computing. J Concurr Comput Pract Exp (special issue on grid computing environments). http://web.datagrid.cnr.it/pls/portal30/docs/2867.pdf
  10. Carr NG (2004) Does IT matter? Information technology and the corrosion of competitive advantage. Harvard Business School Press, BostonGoogle Scholar
  11. Carr NG (2008) The big switch: rewiring the world, from Edison to Google. W.W. Norton & Company, New YorkGoogle Scholar
  12. Commons JR (1931) Institutional economics. Am Econ Rev 21(4):648–657. http://www.jstor.org/stable/495
  13. Dijkstra EW (1968) Letters to the editor: go to statement considered harmful. Commun ACM 11(3):147–148CrossRefGoogle Scholar
  14. Eggers D (2013) The circle: a novel, 1st edn. Knopf, TorontoGoogle Scholar
  15. Eymann T (2003) Digitale Geschäftsagenten. Xpert.press. Springer, BerlinCrossRefGoogle Scholar
  16. Eymann T (2006) The infrastructures of autonomic computing. Knowl Eng Rev 21:189–194CrossRefGoogle Scholar
  17. Eymann T, Balke T (2011) Grundlagen der Wirtschaftsinformatik. Grundzüge der BWL. Kohlhammer, StuttgartGoogle Scholar
  18. Foster I, Kesselman C, Nick J, Tuecke S (2003) The physiology of the grid: an open grid services architecture for distributed systems integration. In: Berman F, Fox G, Hey AJG (eds) Grid computing: making the global infrastructure a reality. Wiley, New York, pp 217–250Google Scholar
  19. Gerding EH (2004) Autonomous agents in bargaining games: an evolutionary investigation of fundamentals, strategies, and business applications. Eindhoven University of Technology, EindhovenGoogle Scholar
  20. Greenberg L (2006) Efficiency in health care: What does it mean? How is it measured? How can it be used for value-based purchasing? Highlights from a national conferenc. AcademyHealth Report. http://www.academyhealth.org/files/publications/EfficiencyReport.pdf
  21. Günther O, Spiekermann S (2005) RFID and the perception of control: the consumer’s view. Commun ACM 48(9):73–76CrossRefGoogle Scholar
  22. International Standards Organization (2014) ISO 27001—information security management. http://www.iso.org/iso/home/standards/management-standards/iso27001.htm. Accessed 11 Dec 2014
  23. Kogut B, Kulatilaka N (1994) Operating flexibility, global manufacturing, and the option value of a multinational network. Manag Sci 40(1):123–139CrossRefGoogle Scholar
  24. Kraus S (1997) Negotiation and cooperation in multi-agent environments. Artif Intell 94(1–2):79–97Google Scholar
  25. Lanier J, Maes P (1996) Intelligent agents = stupid humans? https://web.archive.org/web/20000815104841/http://hotwired.lycos.com/braintennis/96/29/index0a.html. Accessed 11 Dec 2014Google Scholar
  26. Laprie J-C (2008) From dependability to resilience. In 38th IEEE/IFIP international conference on dependable systems and networks, pp G8–G9Google Scholar
  27. Lombardi F, Di Pietro R (2011) Secure virtualization for cloud computing. J Netw Comput Appl 34(4):1113–1122CrossRefGoogle Scholar
  28. Mattern F (2001) Pervasive/ubiquitous computing. Informatik Spektrum 24(3):145–147CrossRefGoogle Scholar
  29. Müller G, Eymann T, Kreutzer M (2003) Telematik- und Kommunikationssysteme in der vernetzten Wirtschaft. Oldenbourg, MünchenGoogle Scholar
  30. Niemann C, Eymann T (2008) Beyond automation: hybrid human-computer decision support systems in hospitals. In Sterritt R (ed) Fifth IEEE workshop on engineering of autonomic and autonomous systems. EASE 2008Google Scholar
  31. Ondrus J, Pigneur Y (2007) An assessment of NFC for future mobile payment systems. In: International conference on the management of mobile business. ICMB 2007, p 43Google Scholar
  32. Rasmusson L, Janson S (1999) Agents, self-interest and electronic markets. Knowl Eng Rev 14(2):143–150CrossRefGoogle Scholar
  33. Sackmann S, Eymann T, Müller G (2002) EMIKA—real-time controlled mobile information systems in health care applications. In: Bludau H-B, Koop A (eds) Mobile computing in medicine. 2. Workshop Mobiles Computing in der Medizin im Rahmen der 7. Fachtagung Praxis der Informationsverarbeitung in Krankenhaus und Versorgungsnetzen, Heidelberg, Germany, 11 April 2002. Köllen Druck und Verlag, Bonn, pp 151–158Google Scholar
  34. Sánchez D, Tentori M, Favela J (2008) Activity recognition for the smart hospital. IEEE Intell Syst 23(2):50–57CrossRefGoogle Scholar
  35. Sherer SA (2014) Advocating for action design research on IT value creation in healthcare. J Assoc Inf Syst 15(12). http://aisel.aisnet.org/jais/vol15/iss12/2
  36. Stigler GJ (1961) The economics of information. J Polit Econ 69:213–225CrossRefGoogle Scholar
  37. Swanson EB, Ramiller NC (2004) Innovating mindfully with information technology. MIS Q 28(4):553–583Google Scholar
  38. Tirole J (1997) The theory of industrial organization, vol 9. MIT Press, CambridgeGoogle Scholar
  39. Walford V, Grant K (1998) Health sector reform: improving hospital efficiency. DFID Health Systems Resource Centre, LondonGoogle Scholar
  40. Weiser M (1991) The computer for the 21st century. Sci Am 265(3):66–75. http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html
  41. Weiser M (1998) The coming age of calm technology: 6. In: Denning PJ, Metcalfe RM (eds) Beyond calculation: the next fifty years of computing. Springer, Heidelberg, pp 75–85Google Scholar
  42. Weiser M, Brown JS (1996) The coming age of calm technology. XEROX Parc. http://www.ubiq.com/hypertext/weiser/acmfuture2endnote.htm
  43. Weiss G (2013) Multiagent systems, 2nd edn. Intelligent robotics and autonomous agents. MIT Press, CambridgeGoogle Scholar
  44. Wernerfelt B (1984) A resource-based view of the firm. Strateg Manag J 5(2):171–180CrossRefGoogle Scholar
  45. Wohlgemuth S, Sackmann S, Sonehara N, Tjoa AM (2014) Security and privacy in business networking. Electron Mark 24(2):81–88CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.University of BayreuthBayreuthGermany

Personalised recommendations