Search results for "Enterprise"

showing 10 items of 422 documents

Information Systems Students’ Impressions on Learning Modeling Enterprise Architectures

2020

This Full Research Paper presents enterprise architecture (EA) modeling tools utilized in an educational context. EA is a well-known and a commonly used approach for organizational development aiming to improve the alignment of business operations and information technology. This high level design of information technology (IT) driven business operations lays the foundations on lower level technical activities such as the design and implementation of application programs and features, system boundary interfaces, database distribution and data pipes, and system recovery. Organizations’ architectures are made visible by creating EA artefacts, such as business process diagrams, data models and…

Business processComputer scienceEnterprise architecture02 engineering and technologytietotekniikkaData modelingHigh-level designcomputinginformation systemUnified Modeling LanguageOrganization development0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systemCompetence (human resources)computer.programming_languagetietojärjestelmäteducationbusiness.industry05 social sciencesCore competencyInformation technology020207 software engineeringmodelingBusiness operationsyrityksetEngineering managementkoulutusliiketoimintaenterprise architecturebusinesscomputertietomallit050203 business & management
researchProduct

ERP and Organizational Misfits: An ERP Customization Journey

2016

Abstract Enterprise resource planning (ERP) projects are complex and resource demanding. Some ERP projects fail due to what is called ‘misfit’ between the adopting organization's business requirements and the ERP's functionalities. Existing literature has studied how ERP systems match to different organizations and have argued that there always exists a gap between the business rules embedded in the system, and the practices and processes that exist in organizations. Thus, tailoring might be an important procedure during ERP implementations, in which the ERP customization takes place in order to ensure the compliance with the organizations’ critical business processes and requirements. Via …

Business requirementsKnowledge managementTailoringBusiness ruleBusiness processComputer sciencebusiness.industry05 social sciences02 engineering and technologyFitERP SystemsPersonalizationResource (project management)Order (exchange)020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary SciencesMisfitbusinessImplementationEnterprise resource planning050203 business & managementCustomizationGeneral Environmental ScienceProcedia Computer Science
researchProduct

Capital social i xarxes relacionals en els processos de creació de conexement i innovació

2010

Fa aproximadament dues dècades, el concepte de capital social va ser integrat al debat i discurs sobre el desenvolupament, en termes d'un actiu de cooperació, reciprocitat i confiança, present en normes i valors, i en les relacions socials de certs grups. El concepte de capital social guarda relació amb la necessitat d'aprehendre en un sol concepte un conjunt de dimensions de la interacció col·lectiva, en les quals els individus s'han de situar a fi d'estructurar una interacció amb sentit i establir-se com a persones en la trama de normes i valors morals que constitueixen i construeixen la comunitat i la societat que es viu. Així, doncs, el capital social de forma implícita porta associada …

Capital social xarxa de relacions socials empresa coneixement innovació. Social capital social network enterprise innovation knowledge Artículo:PSICOLOGÍA [UNESCO]UNESCO::PSICOLOGÍA
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

Educating reflective Enterprise Systems practitioners: a design research study of the iterative building of a teaching framework

2013

This research paper reports on the iterative design of a teaching framework developed for teaching Enterprise Systems ES classes for Information Systems IS graduates. These systems embed technical complexity and create organizational challenges when implemented in organizations. Therefore, teaching good ES classes is pedagogically challenging for faculty, and ES curricula are difficult for students. We have gradually designed and rebuilt curricula and teaching frameworks over 8years. This has also resulted in a set of eight design principles. We report from our design and evaluation process and present our final artefact, the teaching framework. The aim is to educate reflective practitioner…

Class (computer programming)EngineeringKnowledge managementIterative designComputer Networks and Communicationsbusiness.industryCollaborative learningEducational researchEnterprise systemTeaching and learning centerComputingMilieux_COMPUTERSANDEDUCATIONInformation systembusinessCurriculumSoftwareInformation SystemsInformation Systems Journal
researchProduct

A Literature Review on Cloud Computing Adoption Issues in Enterprises

2014

Part 3: Creating Value through Applications; International audience; Cloud computing has received increasing interest from enterprises since its inception. With its innovative information technology (IT) services delivery model, cloud computing could add technical and strategic business value to enterprises. However, cloud computing poses highly concerning internal (e.g., Top management and experience) and external issues (e.g., regulations and standards). This paper presents a systematic literature review to explore the current key issues related to cloud computing adoption. This is achieved by reviewing 51 articles published about cloud computing adoption. Using the grounded theory approa…

Cloud computing securityKnowledge managementbusiness.industry[SHS.INFO]Humanities and Social Sciences/Library and information sciencesCorporate governanceenterpriseInformation technologyCloud computingBusiness valueGrounded theorySystematic reviewInformation systemCloud computing[INFO]Computer Science [cs]businessadoption
researchProduct

Dual Capability EAM for Agility in Business Capability Building : A Systems Theoretical View

2021

Through two cases of IT-enabled business capability building in large enterprises, this paper elucidates how the systems theory approach can explain the enterprise architecture management (EAM) challenge to support business agility. The observation in both of these cases is that a legacy EAM approach does not adapt to a business development scenario involving agility. This leads to a study of the nature of the challenges in EAM when enabling strategic business moves involving new technologies, at the business unit level. For the type of projects as in these cases, we do not find a fitting paradigm in the EAM literature. Suggested solutions are IT bimodality, or Two Speed IT. However, its co…

Computer scienceComplex Adaptive SystemsBusiness AgilitysysteemiteoriaCapability buildingSystems engineeringsysteemityökokonaisarkkitehtuuriDual Capability EAMyrityksetDual (category theory)Enterprise Architecture Managementtietojärjestelmät
researchProduct

The Holonic Production System: a Multi Agent Simulation Approach

2010

Today’s turbulent markets are facing unpredictable and sudden variations in demand. In this context, the Holonic Production System (HPS) seems to be able to overcome the operational and economic problems of traditional production systems. The HPS’ ability to adapt and react to business environment changes, whilst maintaining systemic synergies and coordination, leverage on its network organizational structure, assuring both flexibility and profitability. In this paper we study HPS experimentally, modeling holon-firms as agents. In our simulation, holon-firms interact both with each other and with the external environment without predetermined hierarchies and following their own aims and int…

Computer scienceMulti-agent systemmedia_common.quotation_subjectControl reconfigurationDecision ruleAdaptabilitySupply and demandHolonic Production System (HPS) Multi Agent System (MAS) Distributed Enterprise NetworkNegotiationRisk analysis (engineering)Organizational structureProfitability indexSettore SECS-P/08 - Economia E Gestione Delle ImpreseSimulationmedia_common
researchProduct

Virtual Environment for Implementation and Testing Private Wide Area Network Solutions

2013

In this paper the concept of virtual environment for implementation and testing private Wide Area Network (WAN) solutions is presented. The VMware vSphere virtualization platform is used. The paper presents the ability to reflect the structure of any given WAN topology using Vyatta software routers and VMware virtualization platform and verifies its reliability regarding data transfer. The paper includes a number of performance tests to verify the dependability of the proposed solution and provide a proof-of-concept for the network topology during the Design phase of the PPDIOO methodology, right before the Implementation phase.

Computer sciencebusiness.industryReliability (computer networking)Virtualizationcomputer.software_genreNetwork topologyWide area networkVirtual machineDependabilityEnterprise private networkbusinesscomputerVirtual networkComputer network
researchProduct

Enterprise Architecture Benefits: Perceptions from Literature and Practice

2008

First published in the Proceedings of the 7th IBIMA Conference Internet & Information Systems in the Digital Age, 14-16 December, 2006, Brescia, Italy Enterprise Architecture (EA) is considered a means for acquiring a multitude of benefits in organizations by most academic literature and practitioners alike. However, academic research has almost omitted the domain of EA benefits and value realization, and thus more research on the subject is needed. This paper describes a study which aims to chart the benefits of EA by a comprehensive literature review and a focus group interview of practitioners. As a result, a categorization of the EA benefits is composed and analyzed.

ComputingMethodologies_MISCELLANEOUSenterprise architecture
researchProduct