Skip to main content

Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise

  • Conference paper
  • First Online:
Information and Cyber Security (ISSA 2019)

Abstract

The purpose of this paper is to focus on the security aspects of digital transformation through Unified Communication and Collaboration (UC&C) technologies impacting productivity and innovation within a global automotive enterprise. The rationale for the study came from a desire to address the challenge of integrating the complex technology landscape of the Internet of Things in the daily lives of people. This study explored the impact of digitization transformation on people in the context of the automotive industry. A framework for digital transformation via UC&C technologies was designed at a large automotive enterprise. Research leveraged qualitative and quantitative methods, following the implementation of the framework and digital transformation. Observational data combined with data from quantitative enterprise metrics to support analysis. Critical realist interpretation of results suggested that digitally transformed UC&C technologies are changing employees’ work practices. The study concludes that digital transformation via UC&C technologies impact productivity and innovation within a global automotive enterprise.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dahabiyeh, L.: The security of internet of things: current state and future directions. In: Themistocleous, M., Morabito, V. (eds.) EMCIS 2017. LNBIP, vol. 299, pp. 414–420. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65930-5_33

    Chapter  Google Scholar 

  2. Holler, J., Tsiatsis, V., Mulligan, C., Karnouskos, S., Boyle, D.: From Machine to Machine to the Internet of Things: Introduction to a New Age of Intelligence. Academic Press Inc, Orlando (2014)

    Google Scholar 

  3. Sendler, U.: The Internet of Things: Industrie 4.0 Unleashed. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-54904-9

    Book  Google Scholar 

  4. Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., Kikras, P.: On the security and privacy of internet of things architectures and systems. In: International Workshop on Secure Internet of Things (SIoT) (2015)

    Google Scholar 

  5. Wolf, G.: New challenges of the digital transformation: the comeback of the vision-mission system. In: Klewes, J., Popp, D., Rost-Hein, M. (eds.) Out-thinking Organizational Communications. MP, pp. 113–128. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-41845-2_9

    Chapter  Google Scholar 

  6. Digital Enlightment Forum: Security for the Digital World Within an Ethical Framework. IOS Press, Amsterdam (2016)

    Google Scholar 

  7. Brush, K.: The Power of One: You’re The Boss. CreateSpace Independent Publishing Platform, Scotts Valley (2012)

    Google Scholar 

  8. Dimensional Research, Digital Transformation - A Survey of IT and Security Professionals. https://software.dell.com/whitepaper/global-survey-digital-transformation-security-survey8113164. Accessed 21 Oct 2016

  9. Rittinghouse, J., Ransome, J.: Cloud Computing: Implementation, Management, and Security. CRC Press, Boca Raton (2016)

    Google Scholar 

  10. Poole, H., Lambert, L., Woodford, C., Moschovitis, C.: The Internet: a Historical Encyclopedia, vol. 1. ABC-Clio, Santa Barbara (2005)

    Google Scholar 

  11. Weber, S.: The Internet. Infobase Publishing, New York (2003)

    Google Scholar 

  12. Varadharajan, V., Bansal, S.: Data security and privacy in the internet of things (IoT) environment. In: Mahmood, Z. (ed.) Connectivity Frameworks for Smart Devices. CCN, pp. 261–281. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33124-9_11

    Chapter  Google Scholar 

  13. Mavromoustakis, C., Mastorakis, G., Batalla, J.: Internet of Things (IoT) in 5G Mobile Technologies. Springer, New York (2016). https://doi.org/10.1007/978-3-319-30913-2

    Book  Google Scholar 

  14. Slama, D., Puhlmann, F., Morrish, J., Bhatnagar, R.: Enterprise IoT: Strategies and Best Practices for Connected Products and Services. O’Reilly Media, Sebastopol (2015)

    Google Scholar 

  15. Guimaraes, P., et al.: Experimenting content-centric networks in the future internet testbed environment. In: IEEE International Conference on Communications Workshops (ICC), pp. 1383–1387 (2013)

    Google Scholar 

  16. Kagermann, H., Anderl, R., Gausemeier, J., Schuh, G., Wahlster, W.: Industrie 4.0 in a Global Context: Strategies for Cooperating with International Partners. Herbert Utz Verlag, Munich (2016)

    Google Scholar 

  17. Thiel, C.: Industry 4.0 - challenges in anti-counterfeiting. In: Reimer, H. (ed.) ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference, pp. 111–119. Springer, New York (2015). https://doi.org/10.1007/978-3-658-10934-9_10

    Chapter  Google Scholar 

  18. Bolton, A., Goosen, L., Kritzinger, E.: Enterprise digitization enablement through unified communication and collaboration. In: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, Johannesburg (2016)

    Google Scholar 

  19. Messier, R.: Collaboration with Cloud Computing: Security, Social Media and Unified Communication. Elsevier, London (2014)

    Google Scholar 

  20. Wong, R.: Data Security Breaches and Privacy in Europe. Springer, London (2013)

    Book  Google Scholar 

  21. Reimer, K., Taing, S.: Unified communications. Bus. Inf. Syst. Eng. 1(4), 326–330 (2009)

    Article  Google Scholar 

  22. Rogers, E.: Diffusion of Innovations, 4th edn. The Free Press, New York (2010)

    Google Scholar 

  23. Gerhard, J., Rosen, D., Allen, J., Mistree, F.: A distributed product realization environment for design and manufacturing. J. Comput. Inf. Sci. Eng. 1(3), 235–244 (2001)

    Article  Google Scholar 

  24. Choi, H.-J., Panchal, J., Allen, J., Rosen, D., Mistree, F.: Towards a standardized engineering framework for distributed, collaborative product realization. In: Proceedings of the ASME Design Engineering Technical Conference (DETC 2003), pp. 1–11 (2003)

    Google Scholar 

  25. Nakajima, T., Ishikawa, H., Tokunaga, E.: Technology challenges for building Internet-scale ubiquitous computing. In: Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leila Goosen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bolton, A., Goosen, L., Kritzinger, E. (2020). Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J. (eds) Information and Cyber Security. ISSA 2019. Communications in Computer and Information Science, vol 1166. Springer, Cham. https://doi.org/10.1007/978-3-030-43276-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43276-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43275-1

  • Online ISBN: 978-3-030-43276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics