Search results for "Architecture"
showing 10 items of 3706 documents
Das ritual der unterwerfung Stefan Nemanjas unter Maunel I. Komnenos (1172)
2013
This article investigates the ceremonial of the subjection of the Serbian zupan Stefan Nemanja to the Byzantine emperor Manuel I Komnenos (1172) and compares it with similar events of the period in question. It argues for a strong influence of western forms of conflict resolution (?deditio?) in the ceremonial.
Accuracy, Coherence, and Discrepancy in Self and Other Reports: Moving Toward an Interactive Perspective of Organizational Dissent.
2013
The purpose of this study was twofold and involved examining the viability of using the Organizational Dissent Scale as an other-report instrument, and developing additional perceptual data related to dissent expression. A sample of 291 people completed survey questionnaire measures of organizational dissent. Equal-sized groups ( n = 97) completed either a self-report, a workplace colleague other-report, or an organizational outsider other-report. Results indicated the Organizational Dissent Scale performed reliably as an other-report, but it showed some tendency for social desirability. In addition, findings suggested that certain indicators of proximity to the dissenter reduced discrepan…
Software-as-a-Service Revenue Models
2013
This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.
Enterprise Architecture - To Business or Not to Business? That Is The Question!
2018
Collaborative EA Information Elicitation Method : The IEM for Business Architecture
2015
This study contributes to the enterprise architecture (EA) methodologies by suggesting a method for eliciting architecture requirements: gathering both the current architecture information, and the development needs and requirements for the business architecture (BA) dimension in EA planning. Most of all EA dimensions, the developing of the BA requires collaboration with various non-IT stakeholders. It presents thus challenges to the IT department, or the consultancy involved in EA related efforts. The contribution of the various stakeholder groups as informants is, however, crucial to well founded EA design decisions. The suggested method takes related IS development fields as starting poi…
The Quest for Underpinning Theory of Enterprise Architecture - General Systems Theory
2017
Enterprise architecture originates from the 1980’s. It emerged among ICT practitioners to solve complex problems related to information systems. Currently EA is also utilised to solve business problems, although the focus is still in ICT and its alignment with business. EA can be defined as a description of the current and future states of the enterprise, and as a change between these states to meet stakeholder’s goals. Despite its popularity and 30 years of age, the literature review conducted on top information and management science journals revealed that EA is still lacking the sound theoretical foundation. In this conceptual paper, we propose General Systems Theory (GST) for underpinni…
A modelling framework for social media monitoring
2013
This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…
A Generic Architecture for a Social Network Monitoring and Analysis System
2011
This paper describes the architecture and a partial implementation of a system designed for the monitoring and analysis of communities at social media sites. The main contribution of the paper is a novel system architecture that facilitates long-term monitoring of diverse social networks existing and emerging at various social media sites. It consists of three main modules, the crawler, the repository and the analyzer. The first module can be adapted to crawl different sites based on ontology describing the structure of the site. The repository stores the crawled and analyzed persistent data using efficient data structures. It can be implemented using special purpose graph databases and/or …
Consumer value of camera-based mobile interaction with the real world
2013
Camera-based mobile interaction with the real world allows consumers to connect digital information with the real-world environment, and furthermore, to interact with real-world objects and places. To explore and understand the types of consumer value in the context of such consumer-level applications, we applied the critical incident technique to reflect actual use experiences from 107 application users with a recognized consumer value framework by Holbrook. The findings of the study suggest that at the current state value is heavily based on utilitarian efficiency and excellence. Although the applications enable a diverse value, they have yet to fulfill their potential in providing hedoni…
Utilizing online serious games to facilitate distributed requirements elicitation
2015
Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …