An overview of innovations in a particular area, for example retail developments in the fashion sector (Van Vliet, 2014), and a subsequent discussion about the probability as to whether these innovations will realise a ‘breakthrough’, has to be supplemented with the question of what the added value is for the customer of such a new service or product. The added value for the customer must not only be clear as to its direct (instrumental or hedonic) incentives but it must also be tested on its merits from a business point of view. This requires a methodology. Working with business models is a method for describing the added value of products/services for customers in a systematic and structured manner. The fact that this is not always simple is evident from the discussions about retail developments, which do not excel in well-grounded business models. If there is talk about business models at all, it is more likely to concern strategic positioning in the market or value chain, or the discussion is about specifics like earning- and distribution-models (see Molenaar, 2011; Shopping 2020, 2014). Here we shall deal with two aspects of business models. First of all we shall look at the different perspectives in the use of business models, ultimately arriving at four distinctive perspectives or methods of use. Secondly, we shall outline the context within which business models operate. As a conclusion we shall distil a research framework from these discussions by presenting an integrated model as the basis for further research into new services and product.
DOCUMENT
Purpose: To facilitate the design of viable business models by proposing a novel business model design framework for viability. Design: A design science research method is adopted to develop a business model design framework for viability. The business model design framework for viability is demonstrated by using it to design a business model for an energy enterprise. The aforementioned framework is validated in theory by using expert opinion. Findings: It is difficult to design viable business models because of the changing market conditions, and competing interests of stakeholders in a business ecosystem setting. Although the literature on business models provides guidance on designing viable business models, the languages (business model ontologies) used to design business models largely ignore such guidelines. Therefore, we propose a business model design framework for viability to overcome the identified shortcomings. The theoretical validation of the business model design framework for viability indicates that it is able to successfully bridge the identified shortcomings, and it is able to facilitate the design of viable business models. Moreover, the validation of the framework in practice is currently underway. Originality / value: Several business model ontologies are used to conceptualise and evaluate business models. However, their rote application will not lead to viable business models, because they largely ignore vital design elements, such as design principles, configuration techniques, business rules, design choices, and assumptions. Therefore, we propose and validate a novel business model design framework for viability that overcomes the aforementioned shortcomings.
DOCUMENT
Organisations operate in an increasingly dynamic environment. Consequently, the business models span several organisations, dealing with multiple stakeholders and their competing interests. As a result, the enterprise information systems supporting this new market setting are highly distributed, and their components are owned and managed by different stakeholders. For successful businesses to exist it is crucial that their enterprise architectures are derived from and aligned with viable business models. Business model ontologies (BMOs) are effective tools for designing and evaluating business models. However, the viability perspective has been largely neglected. In this paper, current BMOs have been assessed on their capabilities to support the design and evaluation of viable business models. As such, a list of criteria is derived from literature to evaluate BMOs from a viability perspective. These criteria are subsequently applied to six well-established BMOs, to identify a BMO best suited for design and evaluation of viable business models. The analysis reveals that, although none of the BMOs satisfy all the criteria, e3-value is the most appropriate BMO for designing and evaluating business models from a viability perspective. Furthermore, the identified deficits provide clear areas for enhancing the assessed BMOs from a viability perspective.
DOCUMENT
Despite the benefits of the widespread deployment of diverse Internet-enabled devices such as IP cameras and smart home appliances - the so-called Internet of Things (IoT) has amplified the attack surface that is being leveraged by cyber criminals. While manufacturers and vendors keep deploying new products, infected devices can be counted in the millions and spreading at an alarming rate all over consumer and business networks. The objective of this project is twofold: (i) to explain the causes behind these infections and the inherent insecurity of the IoT paradigm by exploring innovative data analytics as applied to raw cyber security data; and (ii) to promote effective remediation mechanisms that mitigate the threat of the currently vulnerable and infected IoT devices. By performing large-scale passive and active measurements, this project will allow the characterization and attribution of compromise IoT devices. Understanding the type of devices that are getting compromised and the reasons behind the attacker’s intention is essential to design effective countermeasures. This project will build on the state of the art in information theoretic data mining (e.g., using the minimum description length and maximum entropy principles), statistical pattern mining, and interactive data exploration and analytics to create a casual model that allows explaining the attacker’s tactics and techniques. The project will research formal correlation methods rooted in stochastic data assemblies between IoT-relevant measurements and IoT malware binaries as captured by an IoT-specific honeypot to aid in the attribution and thus the remediation objective. Research outcomes of this project will benefit society in addressing important IoT security problems before manufacturers saturate the market with ostensibly useful and innovative gadgets that lack sufficient security features, thus being vulnerable to attacks and malware infestations, which can turn them into rogue agents. However, the insights gained will not be limited to the attacker behavior and attribution, but also to the remediation of the infected devices. Based on a casual model and output of the correlation analyses, this project will follow an innovative approach to understand the remediation impact of malware notifications by conducting a longitudinal quasi-experimental analysis. The quasi-experimental analyses will examine remediation rates of infected/vulnerable IoT devices in order to make better inferences about the impact of the characteristics of the notification and infected user’s reaction. The research will provide new perspectives, information, insights, and approaches to vulnerability and malware notifications that differ from the previous reliance on models calibrated with cross-sectional analysis. This project will enable more robust use of longitudinal estimates based on documented remediation change. Project results and methods will enhance the capacity of Internet intermediaries (e.g., ISPs and hosting providers) to better handle abuse/vulnerability reporting which in turn will serve as a preemptive countermeasure. The data and methods will allow to investigate the behavior of infected individuals and firms at a microscopic scale and reveal the causal relations among infections, human factor and remediation.