Maurizio Cavallari

Maurizio Cavallari
Catholic University of the Sacred Heart | UNICATT · Department of Economics and Business Management

Laurea

About

35
Publications
7,226
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
101
Citations
Citations since 2017
7 Research Items
69 Citations
201720182019202020212022202302468101214
201720182019202020212022202302468101214
201720182019202020212022202302468101214
201720182019202020212022202302468101214
Additional affiliations
January 1992 - March 2016
Catholic University of the Sacred Heart
Position
  • Lecturer
September 1988 - September 2015
Catholic University of the Sacred Heart
Position
  • Lecturer

Publications

Publications (35)
Chapter
In response to the negative COVID-19 impacts, it is urgent to support digital transformation plans at all levels of educational online activities. Fundamental it is also to support new inclusive digital pedagogical methods and skills for a resilient free adoption of digital tools for academic teachers (digital integrated learning, advanced multimed...
Chapter
Full-text available
Mobile technologies are increasingly pervading a substantial portion of everyday life. In particular, the economic sector of consumers and private sales has shown a very high rate of utilization of mobile applications. Mobile payments are no exception, and the economic development relies more and more on mobile technologies. Bank institutions and f...
Chapter
The widespread use of cloud computing and services has modified IS architectures which have been well established and consolidated in the past. We can call this “The Era of (software) MicroServices” which has led towards the adoption of Information Systems models independent from traditional tiered-architecture. MicroServices offer a new conceptual...
Conference Paper
New Software Development techniques with respect to cloud computing and eServices had modified IS architectures which were well established and consolidated in the past. The new methodologies of (software, micro/e) “Services” has pushed towards the adoption of software development organization independent from traditional tiered-architecture with t...
Article
Full-text available
Most major banks, credit card payment processors/issuers and large businesses have come to adopt mobile pay- ment applications for smartphones. A ica, Asia, South America and other developing countries are no exceptions. e rate of growth of developing countries’ smartphone market penetration and usage have increased tremendously in recent years. Ba...
Article
Full-text available
Most major banks, credit card payment processors/issuers and large businesses have come to adopt mobile pay- ment applications for smartphones. A ica, Asia, South America and other developing countries are no exceptions. e rate of growth of developing countries’ smartphone market penetration and usage have increased tremendously in recent years. Ba...
Book
This book constitutes the proceedings of the 8th International Conference on Exploring Services Science, IESS 2017, held in Rome, Italy, in May 2017. The 33 papers presented in this volume were carefully reviewed and selected from 48 submissions. IESS 2017 covered major research and development areas related to Service Science foundations, service...
Conference Paper
Mobile Application Software (M-Apps) are increasingly popular and by now represent the interactive trendiest software. Investigations about their valuation paradigms are so increasingly common. Even if M-Apps belong to the broad category of Intellectual Property assets, their underlying business model is so innovative and different from traditional...
Chapter
Full-text available
This paper studies the impact of the information and communication technologies (ICT) used by organizations in their Corporate Social Responsibility (CSR) strategy. In particular, it analyses the impact of the most recent technological development, Cloud Computing, on the corporate users that adopt this service. What key issues need to be addressed...
Article
Full-text available
In the current knowledge economy, companies need to develop competitive advantages based on an adequate and intensive use of innovation processes and Information and Communication Technology (ICT) that are becoming essential elements of business success in today’s European market. The purpose of this paper is to introduce and discuss the benefits o...
Conference Paper
Full-text available
The present paper regards risk, threats and organizational issues that are associated with human behavior;e.Business is no exception. Organizational actors in e.Businessorganizations make security decisions with a wide variety of meanings: information systems interactions, access to physical premises, behavior within the workplace, utilization of t...
Conference Paper
Full-text available
Cet article entend analyser l’impact des outils informatiques utilisés par les organisations sur leur stratégie de responsabilité sociétale (RSE), notamment de la technologie informatique la plus récente que constitue le Cloud computing, du point de vue des utilisateurs, à savoir des entreprises qui se servent de l’informatique en tant que service....
Conference Paper
Online communities can be seen as service systems, in which actors interact providing, requesting or sharing resources for [co-]creating value. On the basis of the resources needed/owned for achieving a goal it is possible to draw several dependence links among the actors (agents), creating a dependence network. On the other hand, since trust is th...
Article
Near Field Communication (NFC) and contactless applications are increasing at unprecedented rate and their value is being recognised by the financial industry (Ok et al., 2011). Attacks are also increasing and they can compromise the business value on NFC applications (Murdoch and Anderson, 2010, Trend Micro, 2015). The present paper analyse the an...
Conference Paper
Full-text available
Accomplishing interoperability among public information systems is a complex task not only by the variety of technological specifications and by the nature of the organisations in which the systems are implemented, but also because a detailed evaluation and analysis of the multiple aspects involved is lacking. The aim of this paper is to identify a...
Chapter
Starting form previously research findings this chapter investigates the determinants of knowledge transfer. The intention of the present research is to refine a previous proposed model, in order to utilize it for further empirical research. Personal traits and the concept of trust, along with absorptive capacity, dependency and availability to sha...
Conference Paper
Much research effort has been devoted in order to understand the antecedents of the phenomenon of creativity. Previous findings identify, among others, transformational leadership, individual inspiration and social capital to be of importance. In the present research paper we propose a model where social capital can influence as a mediator the impa...
Article
Protection of data and information security are crucial to business processes and include technical, sociological and organizational aspects. The purpose of this paper is to explore the importance of information security policy and organizational compliance within a socio-technical framework. Citing come of the major compliance acts in the United S...
Chapter
The aim of this research is to investigate information systems security in the context of organizational issues. In doing so, we adopted a socio-organizational approach to the subject matter by investigating the interrelationship between the organization’s ability to learn, exploiting and exploring knowledge, both as prior constructs of organizatio...
Article
Full-text available
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- iour (Stanton et al., 2005). As managers must balance the task of motivating employees to comply, without imposing counter-productive forms of punishment for non-compliant behaviour, executing leadership in agreement with IT security policy and complia...
Article
The present paper addresses an issue about the relationship between organisational structure and information systems security. Systems security is generally perceived as, and actually often constitutes, “restrictions” and “anti-ergonomics”. The general research question we address in this research is the other way round: What are the constraints of...
Article
The purpose of this paper is to provide a framework for exploring and studying extraordinary creativity when it comes to an organizational response to digital security. Three areas - inspiration, transformational leadership, and social capital - are argued to significantly impact the creative ability of IT professionals charged with the task of res...
Book
“Information security consciousness” (also cited in literature as awareness) is referred to the condition in which information systems users (end-users principally) in an organisation are well informed, prepared to – and committed – the security issues concerning the use of those systems. There is no doubt in doctrine that security of IS represents...
Chapter
The motivation of the current paper is the search for responses about decision making in both context, computer and non-computer scenarios, thus whether no difference shall be found, the large behavioural literature on non-computer decision making can be used to interpret security issues. The effort is then devoted to identify organisational theore...

Network

Cited By

Projects