Paolo Spagnoletti

Paolo Spagnoletti
LUISS Guido Carli, Libera Università Internazionale degli Studi Sociali | Luiss · Department of Business and Management

Ph.D.

About

76
Publications
24,245
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
837
Citations
Introduction
Paolo Spagnoletti currently works at the Department of Business and Management, LUISS Guido Carli, Libera Università Internazionale degli Studi Sociali. Paolo does research in Information Systems (Business Informatics), Information Systems and Organizational Studies. Their current project is 'digital platform design'.
Additional affiliations
November 2008 - October 2014
LUISS Guido Carli, Libera Università Internazionale degli Studi Sociali
Position
  • Professor (Assistant)
January 2007 - present
Libera Universitá Internazionale degli Studi Sociali, Guido Carli
January 2005 - present
University of Rome Tor Vergata
Position
  • Università degli Studi di Roma "Tor Vergata"

Publications

Publications (76)
Chapter
This paper contributes to the literature on cybersecurity governance by suggesting an approach based on pragmatism. As Jeffrey Sachs in his The Age of Sustainable Development, 2015, reminds us: “The essence of sustainable development in practice is scientifically and morally based problem solving”. Cybersecurity deals with problem solving in comple...
Chapter
High Reliability Organizations (HRO) need to devise and implement organizational processes aimed to minimize the risk of failure, facing high risks and high stakes. In this paper, we look at the case of military HRO operating under Mission Command principles. Mission Command is a doctrine born to address unexpected circumstances through diffused le...
Article
Full-text available
This contribution presents a model for cyber-resilience of Critical Cyber Infrastructures (CCI) based on the implementation of a digital twin. It addresses the risks associated with the integration of computational, communication and physical aspects of CCIs. We focus specifically on cybersecurity in the electric power sector due both to its salien...
Article
As software products increasingly become part of larger ecosystems, research and development (R&D) units of software producers organize themselves around projects to become more responsive to the environment. Organizations participating in software ecosystems must continuously adapt and adjust their software development and maintenance processes to...
Article
Full-text available
This paper investigates the functioning of Online Black-Markets (OBMs), i.e. a digital infrastructure operating in the Dark Net that enables the exchange of illegal goods such as drugs, weapons and fake digital identities. OBMs exist notwithstanding adverse conditions such as police interventions, scams and market breakdowns. Relying on a longitudi...
Technical Report
Il digital working definisce un nuovo paradigma nell’organizzazione del lavoro che va a modificare sostanzialmente la configurazione dei ruoli e delle responsabilità delle persone. Presenta elementi di estrema delicatezza dal punto di vista del cambiamento culturale, tali da richiedere un adeguato impegno nel governo dell’intero ciclo di adozione p...
Chapter
In the digital age, organizations are increasingly shifting their applications, services and infrastructures to the cloud to enhance business agility and reduce IT-related costs. However, in moving applications and data to cloud resources organizations face new risks of privacy violations. To manage this risk, organizations need to be fully aware o...
Chapter
Organizational processes, production, business strategy, value creation and value delivery are undergoing significant change as a result of emerging new technologies in industry 4.0 context. This has drawn attention across many countries and not only organizations, but also stakeholders and policy makers as the fourth industrial revolution. While I...
Chapter
There is widespread belief that crowdfunding can successfully support charity operation by accelerating and simplifying the process of finding large pools of funders. Analysing a unique dataset of donations collected in Italy through crowdfunding in 2016, we identify contextual factors that hamper online donations. Specifically, looking at the role...
Chapter
Full-text available
Securing national electronic identification (e-ID) systems requires an in depth understanding of the associated threats. The trade of identity related artefacts in the darknet facilitates illegal activities such as identity theft in both physical and virtual worlds. This paper reports the findings of an exploratory analysis of identity trading in t...
Article
Full-text available
Researchers in many fields have adopted simulation to understand a system’s behavior by imitating it through an artificial object that exhibits nearly identical behavior. Although simulation approaches have been widely adopted for theory building in fields such as engineering, computer science, management, and social sciences, researchers in the IS...
Article
Full-text available
Le piattaforme digitali offrono alle organizzazioni l’infrastruttura per interagire con complesse reti di utenti e partner nell’offerta di prodotti e servizi. Accordi di collaborazione, interoperabilità tecnica e politiche d’uso diventano importanti strumenti di progettazione organizzativa. L’articolo presenta un modello e delle linee guida per l’a...
Article
The maintenance of software products has been studied extensively in both software engineering and management information systems. Such studies are mainly focused on the activities that take place prior to starting the maintenance phase. Their contribution is either related to the improvement of software quality or to validating contingency models...
Article
Full-text available
I social media impongono un ripensamento dei modi tradizionali di comunicare in azienda, dando luogo ad un nuovo paradigma comunicativo in cui gli utenti generano e scambiano contenuti. L’articolo suggerisce ad imprenditori e manager possibili aree di intervento per la gestione della comunicazione interna mediata dagli strumenti social.
Article
Full-text available
This teaching case presents the story of the Hospital Campus (HC) project and its effort to reframe health-care services for the elderly through the adoption of social media. In a world of global ageing, in which an increased number of elderly patients will be cared for by a shrinking number of workers, a primary challenge is how to use technology...
Article
This paper explores an alternative view of design as an emergent process of engagement and learning, as opposed to the traditional view of systems design as a problem-solving tool. We focus on digitally enabled elderly support networks as an innovative approach to the design of elderly care assistance through social media. Our research project is c...
Article
Full-text available
This research proposes and validates a design theory for digital platforms that support online communities (DPsOC). It addresses ways in which digital platforms can effectively support social interactions in online communities. Drawing upon prior literature on IS design theory, online communities, and platforms, we derive an initial set of proposit...
Article
This is an industry report about a software development project that included a local team and an offshore team. Both teams contained highly qualified experts who had been selected before the project start up. After a year, which could be deemed as a break-in period, the project leaders observed that the quality and quantity of the software modules...
Article
Increasing attention is paid to organisational learning, with the success of contemporary organisations strongly contingent on their ability to learn and grow. Importantly, informal learning is argued to be even more significant than formal learning initiatives. Given the widespread use of digital technologies in the workplace, what requires furthe...
Article
Full-text available
The use of 3D virtual world platforms in learning and education is growing in popularity. While there are many learning affordances for such environments, including the possibility of doing things that are not feasible in reality, there are some noted drawbacks. In particular the way such environments can be used for distance learning deserves cons...
Chapter
Since 1995, when the first book was sold as an online bookstore, Amazon has continued to evolve turning to a provider of cloud computing services and a publisher. The aim of the present paper is to investigate this evolution focusing on the concept of platform and the concept of infrastructure as metaphors of the business/environment relationship a...
Conference Paper
Full-text available
Simulation has been adopted in many disciplines as a means for understanding the behavior of a system by imitating it through an artificial object that exhibits a nearly identical behavior. Although simulation approaches have been widely adopted for theory building in disciplines such as engineering, computer science, management, and social science...
Chapter
Full-text available
This book is dedicated to the memory of Professor Alessandro (Sandro) D'Atri, who passed away in April 2011. Professor D'Atri started his career as a brilliant scholar interested in theoretical computer science, databases and, more generally information processing systems. He journeyed far in various applications, such as human-computer interaction...
Article
Full-text available
Evaluating the impact of Information Technology (IT) projects represents a problematic task for policy and decision makers aiming to define roadmaps based on previous experiences. Especially in the healthcare sector IT can support a wide range of processes and it is difficult to analyze in a comparative way the benefits and results of e-Health prac...
Article
Full-text available
The paper is centered on the role of technology and specifically of IT in the recombination of the factors of production. Particularly, the objective is to see how this technology contributes to the formulation of business strategies, the outlining of organizational structures and the alignment with the business environment. A theoretical framework...
Conference Paper
Full-text available
Far from simply being a concept useful in investigating social relationships, social networks are rapidly becoming a diffuse phenomenon to deal with in everyday life. The goal of this paper is to provide insights from the design research perspective, both for online and offline communities. Starting from the idea that the phenomenon under investiga...
Chapter
Full-text available
The initial view of the Information System (IS) community was to consider IS as an “applied” discipline borrowing theories and methods from more mature “reference disciplines”. As ISs shifted from a techno-centric focus to a more balanced view of technology, organizational, management, and social focus, traditional reference disciplines proved to b...
Chapter
Full-text available
This chapter aims to contribute to the debate on the relationship between Information Systems (IS) and other Management (MGT) fields of studies. We present the preliminary results of the publication statistics, co-citation, and cross-citation analyses performed on a dataset of 54 and 169 “simulation related studies” published in top IS and MGT jour...
Article
Increasing attention is paid to organisational learning with the success of contemporary organisations strongly contingent on its ability to learn and grow. Importantly, informal learning is argued to be even more significant than formal learning initiatives. Given the widespread use of digital technologies in the workplace, what requires further a...
Article
Full-text available
Usage of software platforms alongside the business transformation potential of information and communication technology enables cooperation between different companies in both open and networked environments. This is possible when multiple actors cooperate in the delivery of services; each one contributes its own resources, and there is an underlyi...
Chapter
Full-text available
In this paper we debate on the possibility of enhancing current Human Computer Interaction (HCI) methods by proposing a structured view on current approaches to the design of IT artifacts which is grounded on the Information Systems (IS) literature. We adopt a design research approach by focusing on the design problem of ‘‘designing user centered s...
Chapter
Full-text available
The delivery of e-services across organizational boundaries poses a number of issues in terms of design of inter-organizational systems that support service delivery effectively. In this context interoperability emerges as a mandatory requirement for the design of Information Technology (IT) platforms supporting collaborative e-service environments...
Conference Paper
Full-text available
Cloud Computing (CC) is emerging as a new trend for managing IT resources within organizations. It also raises a broad range of issues from technically-oriented to organization-oriented related to cloud evolution and migration. It invites consideration of new models of governance for systems, service and organization. In order to take advantage fro...
Chapter
Design science is increasingly attracting the interest of scholars in the field of Information Systems. Starting from a design problem, a researcher selects the kernel theories from which to derive prescriptions for the meta-requirements, the product features (meta-design), the design process (design method) and some testable design product and pro...
Article
Full-text available
Collaborative environments where multiple organizations interact for providing e-services to their customers are widely diffused and often referred as virtual enterprises. IT systems supporting these inter-organizational models must be designed by taking into account both functional and non-functional issues. Among the non-functional issues, inform...
Conference Paper
The User Centered Design (UCD) is a flexible framework, conceived for designing, implementing and evaluating usable interactive systems, which leaves to the design team the responsibility of choosing appropriate combinations of methods, models and techniques. A critical aspect is related to the process of making such choices within the global persp...
Chapter
Organizations are more dependent than ever on the effective security of their information systems in order to ensure business continuity, efficiency and compliance with regulatory and governance frameworks. However, security breaches surveys reveal a poor effectiveness of security solutions and procedures implemented by the enterprises. In particul...
Article
Full-text available
Securing the organization critical information assets from sophisticated insider threats and outsider at-tacks is essential to ensure business continuity and efficiency. The information security risk management (ISRM) is the process that identifies the threats and vulnerabilities of an enterprise information system, evaluates the li-kelihood of the...
Conference Paper
eHealth is broadly considered as a promising strategy to improve the economic sustainability and quality of the healthcare service provision in Europe. Nevertheless, despite the enthusiastic declarations of eHealth potential, the adoption of IT in health care has progressed very slowly. A critical factor, not deeply addressed in literature, is rela...
Article
Full-text available
Growing research on Free/Libre Open Source Software (FLOSS) has addressed a variety of questions focussing on aspects ranging from open source development processes and developer motivation, to economic and policy-making implications. Nevertheless, a few authors have examined the adoption of FLOSS and its impact on organisational change and innovat...
Article
Giunta alla terza edizione, nel 2010 l'iniziativa OSPA di Concreta-Mente si è occupata di due strumenti molto diversi come il Riuso di soluzioni e il Total Cost of Ownership (TCO). Si tratta in entrambi i casi di strumenti potenzialmente di grande impatto per l'innovazione nelle Pubbliche Amministrazioni. Esistono però anche letture di segno oppost...
Article
Full-text available
We aim to make a contribution by deepening the understanding on how Qualitative Comparative Analysis methods can be applied for theory building in multiple-case studies when the relationship between Information Technology and organizations is investigated. In our presentation, we will outline a research design using qualitative comparative analysis...
Article
Full-text available
Growing research on Free/Libre Open Source Software (FLOSS) has addressed a variety of questions focusing on aspects ranging from open source development processes and developer motivation to economic and policy implications. Nevertheless, a few authors have examined the use of FLOSS and its implementation in organizations. Implementation studies r...
Conference Paper
The Beer Game is a didactic tool to simulate information and material flows along a supply chain from a factory to a retailer. The continuous evolution of inter-organisation configurations is challenging such a traditional concept of supply chain. Concepts more "market-oriented" are necessary to describe scenarios in which manufacturers operate as...
Conference Paper
The Beer Game is a didactic tool to simulate information and material flows along a supply chain from a factory to a retailer. The continuous evolution of inter-organisation configurations is challenging such a traditional concept of supply chain. Concepts more “market-oriented” are necessary to describe scenarios in which manufacturers operate as...
Article
Full-text available
Our aim is to create a simulation based on the rules of the Beer Game which includes the variables of a virtual enterprise, VirtuE in particular, and risk management, in order to understand the strategies underlying the subjects behavior in the face of risk within a means-end chain. This study shows the tests carried out on the original game, the v...
Chapter
Full-text available
In business practice and in scientific research business models seem to have caught much attention as this phenomenon has been investigated by many disciplines, with different objectives and point of views. Researchers’ general opinion on business models is based on value and information technology in an organization or a set of linked ones. Anyhow...
Article
Full-text available
Information systems security is a challenging research area in the context of Information Systems. In fact, it has strong practical implications for the management of IS and, at the same time, it gives very interesting insights into understanding the process of social phenomena when communication information technologies are deployed in organizatio...
Conference Paper
Full-text available
The term "Business Model" started to gain momentum in the early rise of the new economy and it is currently used both in business practice and scientific research. Under a general point of view BMs are considered as a contact point among technology, organization and strategy used to describe how an organization gets value from technology and uses i...
Conference Paper
Full-text available
In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last dec...
Conference Paper
Full-text available
Information systems security is a challenging research area in the context of Information Systems. In fact, it has strong practical implications for the management of IS and, at the same time, it gives very interesting insights into understanding the process of social phenomena when communication information technologies are deployed in organizatio...
Conference Paper
Full-text available
In a society where information represents one of the most valuable assets of business and government, an holistic approach to the management of information systems security is mandatory in order to prevent and detect possible abuse and misuse of information. Facing computer crimes requires to look at aspects related to the technical, formal and inf...
Conference Paper
Full-text available
Cellular Internet services must grapple with the added security threats posed by the radio transmission, open to eavesdropping. Furthermore, the combination of always-on connectivity and an interface to the public Internet means high speed data services has to cope with the same security issues that can be found in the wired environment.Confidentia...
Article
Full-text available
Introduzione In una visione sistemica delle organizzazioni, il concetto di misura assume un'importante rilevanza quale strumento per la verifica degli andamenti degli output organizzativi e la messa in atto di opportune azioni di intervento in risposta ad ano-malie riscontrate nei valori delle variabili misurate. In tal modo si ottiene la chiusura...
Article
Full-text available
Virtual organisations are considered an innovative configuration able to improve the benefits in the inter-organisational cooperation. In this context the interoperability of the systems and of the organisations, enabled by standards and technologies, represents a main requirement towards flexibility. However, some obstacles to the development of v...

Network

Cited By

Projects

Project (1)