Reality vs. Security Model vs. Software – Bridging the Gaps
FUNDP Namur, September 25, 2012 Virtual Goods 2012 Daniel P¨ ahler, tulkas@uni-koblenz.de University of Koblenz-Landau Institute for IS Research
Reality vs. Security Model vs. Software Bridging the Gaps FUNDP - - PowerPoint PPT Presentation
Reality vs. Security Model vs. Software Bridging the Gaps FUNDP Namur, September 25, 2012 Virtual Goods 2012 Daniel P ahler, tulkas@uni-koblenz.de University of Koblenz-Landau Institute for IS Research Agenda Where
FUNDP Namur, September 25, 2012 Virtual Goods 2012 Daniel P¨ ahler, tulkas@uni-koblenz.de University of Koblenz-Landau Institute for IS Research
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 2 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 3 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 4 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 5 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 6 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 7 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 8 / 36
Design Science Research according to Vaishnavi und Kuechler [VK04] Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 9 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 10 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 11 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 12 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 13 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 14 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 15 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 16 / 36
◮ Features might prove useful/neccessary later ◮ Too many features make the model needlessly complex (cf.
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 17 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 18 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 19 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 20 / 36
◮ be easier to read ◮ allow for parallel processes ◮ have an integrated time concept ◮ be computer-interpretable ◮ ...
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 21 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 22 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 23 / 36
◮ are biased ◮ are out of date ◮ focus only on specific types of virtual goods ◮ contradict each other
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 24 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 25 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 26 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 27 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 28 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 29 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 30 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 31 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 32 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 33 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 34 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 35 / 36
Daniel P¨ ahler – Reality vs. Security Model vs. Software – Bridging the Gaps 36 / 36