Search results for "Architecture"

showing 10 items of 3706 documents

Das ritual der unterwerfung Stefan Nemanjas unter Maunel I. Komnenos (1172)

2013

This article investigates the ceremonial of the subjection of the Serbian zupan Stefan Nemanja to the Byzantine emperor Manuel I Komnenos (1172) and compares it with similar events of the period in question. It argues for a strong influence of western forms of conflict resolution (?deditio?) in the ceremonial.

symbolic communicationtransfer of the ritualbiologysubmissionlcsh:History (General) and history of Europemedia_common.quotation_subjectGeneral MedicineArtAncient historybiology.organism_classificationlanguage.human_languagelcsh:DlanguageEmperorTheologySerbianconflict settlementByzantine architecturemedia_commonZbornik radova Vizantoloskog instituta
researchProduct

Accuracy, Coherence, and Discrepancy in Self and Other Reports: Moving Toward an Interactive Perspective of Organizational Dissent.

2013

The purpose of this study was twofold and involved examining the viability of using the Organizational Dissent Scale as an other-report instrument, and developing additional perceptual data related to dissent expression. A sample of 291 people completed survey questionnaire measures of organizational dissent. Equal-sized groups ( n = 97) completed either a self-report, a workplace colleague other-report, or an organizational outsider other-report. Results indicated the Organizational Dissent Scale performed reliably as an other-report, but it showed some tendency for social desirability. In addition, findings suggested that certain indicators of proximity to the dissenter reduced discrepan…

ta112Strategy and ManagementCommunicationmedia_common.quotation_subjectPerspective (graphical)humanitiesOrganizational dissentExpression (architecture)Scale (social sciences)PerceptionDissentta518PsychologySocial psychologyCoherence (linguistics)media_commonSocial desirabilityManagement Communication Quarterly
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

Enterprise Architecture - To Business or Not to Business? That Is The Question!

2018

ta113Computer sciencetieto- ja viestintätekniikka05 social sciences0211 other engineering and technologiesEnterprise architecture02 engineering and technologyEngineering managementICTliiketoimintaenterprise architecture021105 building & construction0502 economics and businessscopekokonaisarkkitehtuuribusiness050203 business & managementProceedings of the 20th International Conference on Enterprise Information Systems
researchProduct

Collaborative EA Information Elicitation Method : The IEM for Business Architecture

2015

This study contributes to the enterprise architecture (EA) methodologies by suggesting a method for eliciting architecture requirements: gathering both the current architecture information, and the development needs and requirements for the business architecture (BA) dimension in EA planning. Most of all EA dimensions, the developing of the BA requires collaboration with various non-IT stakeholders. It presents thus challenges to the IT department, or the consultancy involved in EA related efforts. The contribution of the various stakeholder groups as informants is, however, crucial to well founded EA design decisions. The suggested method takes related IS development fields as starting poi…

ta113EngineeringKnowledge managementRequirements engineeringbusiness.industryrequirements elicitationComputingMethodologies_MISCELLANEOUSStakeholderEnterprise architectureInformation technologyRequirements elicitationpublic administrationBusiness process modelingKnowledge acquisitionmethodsmenetelmätenterprise architectureBusiness architecturejulkinen hallintokokonaisarkkitehtuuribusiness
researchProduct

The Quest for Underpinning Theory of Enterprise Architecture - General Systems Theory

2017

Enterprise architecture originates from the 1980’s. It emerged among ICT practitioners to solve complex problems related to information systems. Currently EA is also utilised to solve business problems, although the focus is still in ICT and its alignment with business. EA can be defined as a description of the current and future states of the enterprise, and as a change between these states to meet stakeholder’s goals. Despite its popularity and 30 years of age, the literature review conducted on top information and management science journals revealed that EA is still lacking the sound theoretical foundation. In this conceptual paper, we propose General Systems Theory (GST) for underpinni…

ta113Enterprise architecture frameworkUnderpinningComputer science05 social sciencesEnterprise architecture02 engineering and technologygeneral systems theoryManagementEngineering managementSystems theoryEnterprise architecture management020204 information systemsenterprise architecture0502 economics and businessBusiness architecture0202 electrical engineering electronic engineering information engineeringkokonaisarkkitehtuuriView model050203 business & managementProceedings of the 19th International Conference on Enterprise Information Systems
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

A Generic Architecture for a Social Network Monitoring and Analysis System

2011

This paper describes the architecture and a partial implementation of a system designed for the monitoring and analysis of communities at social media sites. The main contribution of the paper is a novel system architecture that facilitates long-term monitoring of diverse social networks existing and emerging at various social media sites. It consists of three main modules, the crawler, the repository and the analyzer. The first module can be adapted to crawl different sites based on ontology describing the structure of the site. The repository stores the crawled and analyzed persistent data using efficient data structures. It can be implemented using special purpose graph databases and/or …

ta113Graph databaseDatabaseRelational databaseComputer scienceSystems architectureGraph (abstract data type)Persistent data structureOntology (information science)computer.software_genreSoftware architectureData structurecomputer2011 14th International Conference on Network-Based Information Systems
researchProduct

Consumer value of camera-based mobile interaction with the real world

2013

Camera-based mobile interaction with the real world allows consumers to connect digital information with the real-world environment, and furthermore, to interact with real-world objects and places. To explore and understand the types of consumer value in the context of such consumer-level applications, we applied the critical incident technique to reflect actual use experiences from 107 application users with a recognized consumer value framework by Holbrook. The findings of the study suggest that at the current state value is heavily based on utilitarian efficiency and excellence. Although the applications enable a diverse value, they have yet to fulfill their potential in providing hedoni…

ta113MultimediaComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectContext (language use)computer.software_genreComputer Science ApplicationsHardware and ArchitectureHuman–computer interactionExcellenceState (computer science)ta512computerCritical Incident TechniqueValue (mathematics)Mobile interactionSoftwareInformation SystemsValue frameworkActual usemedia_commonPervasive and Mobile Computing
researchProduct

Utilizing online serious games to facilitate distributed requirements elicitation

2015

Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …

ta113Requirements managementBusiness requirementsRequirementEngineeringserious gamesKnowledge managementbusiness.industryrequirements elicitationSoftware developmentRequirements elicitationpelitEmpirical researchhyötypelitHardware and Architecturesoftware developmentohjelmistokehitysbusinessRequirements analysisKnowledge transferSoftwaregamesInformation SystemsJournal of Systems and Software
researchProduct