10,843 research outputs found

    Business process modelling and visualisation to support e-government decision making: Business/IS alignment

    Get PDF
    © 2017 Springer-Verlag. The final publication is available at Springer via https://doi.org/10.1007/978-3-319-57487-5_4.Alignment between business and information systems plays a vital role in the formation of dependent relationships between different departments in a government organization and the process of alignment can be improved by developing an information system (IS) according to the stakeholders’ expectations. However, establishing strong alignment in the context of the eGovernment environment can be difficult. It is widely accepted that business processes in the government environment plays a pivotal role in capturing the details of IS requirements. This paper presents a method of business process modelling through UML which can help to visualise and capture the IS requirements for the system development. A series of UML models have been developed and discussed. A case study on patient visits to a healthcare clinic in the context of eGovernment has been used to validate the models

    MANAGING KNOWLEDGE AND DATA FOR A BETTER DECISION IN PUBLIC ADMINISTRATION

    Get PDF
    In the current context, the society is dominated by the rapid development of computer networks and the integration of services and facilities offered by the Internet environment at the organizational level. The success of an organization depends largely on the quality and quantity of information it has available to develop quickly decisions able to meet the current needs. The need for a collaborative environment within the central administration leads to the unification of resources and instruments around the Center of Government, to increase both the quality and efficiency of decision - making, especially reducing the time spent with decision - making, and upgrading the decision – making act.administration, strategy, decision, complex systems, management, infrastructure, e-government, information society, government platform.

    Validating adequacy and suitability of business-IT alignment criteria in an inter-enterprise maturity model

    Get PDF
    Aligning requirements of a business with its information technology is currently a major issue in enterprise computing. Existing literature indicates important criteria to judge the level of alignment between business and IT within a single enterprise. However, identifying such criteria in an inter-enterprise setting – or re-thinking the existing ones – is hardly addressed at all. Business-IT alignment in such settings poses new challenges, as in inter-enterprise collaborations, alignment is driven by economic processes instead of centralized decision-making processes. In our research, we develop a maturity model for business-IT alignment in inter-enterprise settings that takes this difference into account. In this paper, we report on a multi-method approach we devised to confront the validation of the business-IT alignment criteria that we included in the maturity model. As independent feedback is critical for our validation, we used a focus group session and a case study as instruments to take the first step in validating the business-IT alignment criteria. We present how we applied our approach, what we learnt, and what the implications were for our model

    EXPLORING CUSTOMER RELATIONSHIP MANAGEMENT IN TWO PRIVATE HOSPITALS IN KUWAIT

    Get PDF
    The private hospital industry in Kuwait is an important contributor in the economy of the country. There has been a major increase in the number of private hospitals and clinics in the past four years, and more hospitals are launching new services in the private healthcare sector. In order to succeed in this sector, it is important for an organization to focus on Customer Relationship Management (CRM) for thriving in the competitive market. A customer relationship management strategy is believed to give a competitive edge to hospitals, as customers nowadays make their decisions based on the type and strength of the relationships that they have with their service providers. Due to the nature of hospital environment, the products and services offered are merely the same in most of the private hospitals. Therefore, in order to differentiate the services offered, CRM should be implemented in hospitals seeking the delivery of high service quality for both its internal and external customers. The quality of the delivered services is reliant on one of the most crucial elements in any service organization structure hence, the employees. Other elements such as processes and technology are also vital for a successful the implementation of CRM. The objective of this research is to explore the Customer Relationship Management strategy development and implementation by examining the components that lead to successful implementation in two private hospitals in Kuwait. The researcher used the qualitative method through conducting in-depth interviews with management staff and other respective middle and lower management in AlSeef and Royale Hayat private hospitals. The study analyzes the primary data collected using a computer software called NVIVO, v.10. The dimensions of CRM strategy and implementation, which were proven in previous research, were assessed in this study. The researcher concluded that the two private hospitals researched developed a CRM strategy to encapsulate CRM among their business strategies; however, they have weaknesses in implementation in some of the dimensions. This research helped in defining a new dimension to fill this weakness observed, which is CRM strategic aligning

    Business-IT Alignment through Enterprise Architecture in a Strategic Alignment Dimension: A Review

    Get PDF
    Business-IT Alignment (BITA) refers to the fit between business and IT strategy. BITA is important for realizing the achievement of organizational goals, enhancing performance, and gaining competitive advantage in an organization. BITA is a crucial concern for organizations and remains a top topic from the perspective of business executives. BITA can be realized through Enterprise Architecture (EA), which is a comprehensive and holistic instrument for managing and maintaining BITA. However, despite numerous literature studies on the BITA model or framework through EA, the research is currently more focused on technology planning than strategic planning. Meanwhile, strategic planning is the most crucial challenge of the EA framework because it is the embodiment of BITA in the strategic alignment dimension. The current study aims to conduct a literature review of BITA through EA in the strategic alignment dimension. This literature study resulted in 25 out of 100 papers and classified into five strategic alignments. The review identified 25 relevant papers out of 100 and categorized them into five strategic alignments. The study's contributions include solutions in the form of stages for developing strategic alignment through EA based on business strategy models. The five stages are as follows: 1) Identification of vision, mission, and goals; 2) SWOT-based strategy analysis; 3) BSC-based strategy mapping; 4) BPMN-based business process mapping; and 5) Determination of IS/IT. This study's impact on further research is that it can be used as a basis for developing BITA through EA, based on the five stages identified

    Managing and Making Sense of Data to Drive Digital Transformation: A Case Study

    Get PDF
    We explore how organizations manage and make sense of data collaboratively to drive digital transformation. We present the results of an in-depth case study of a financial organization that used Data Operations (DataOps) - a collaborative data management practice to transform its digital-first offering initiative and thereby redefining its value proposition. Drawing on sensemaking theory, we develop a process model that explains how organizations use DataOps to perceive cues through data democratization, extract plausible and comprehensive insights from data through data storytelling to make interpretations, and leverage data products to take actions that drive data-driven digital transformation. Our findings have implications for data-driven digital transformation as we show how DataOps constitutes a new class of data management practices that enable collaboration between data managers and data consumers and allow organizations to make evidence-based decisions to drive their digital transformation

    Architectural Alignment of Access Control Requirements Extracted from Business Processes

    Get PDF
    GeschĂ€ftsprozesse und IT-Systeme sind einer stĂ€ndigen Evolution unterworfen und beeinflussen sich in hohem Maße gegenseitig. Dies fĂŒhrt zu der Herausforderung, Sicherheitsaspekte innerhalb von GeschĂ€ftsprozessen und Enterprise Application Architectures (EAAs) in Einklang zu bringen. Im Besonderen gilt dies fĂŒr Zugriffskontrollanforderungen, welche sowohl in der IT-Sicherheit als auch im Datenschutz einen hohen Stellenwert haben. Die folgenden drei Ziele der GeschĂ€ftsebene verdeutlichen die Bedeutung von Zugriffskontrollanforderungen: 1) 1) Identifikation und Schutz von kritischen und schĂŒtzenswerten Daten und Assets. 2) 2) EinfĂŒhrung einer organisationsweiten IT-Sicherheit zum Schutz vor cyberkriminellen Attacken. 3) 3) Einhaltung der zunehmenden Flut an Gesetzen, welche die IT-Sicherheit und den Datenschutz betreffen. Alle drei Ziele sind in einem hohen Maß mit Zugriffskontrollanforderungen auf Seiten der GeschĂ€ftsebene verbunden. Aufgrund der FĂŒlle und KomplexitĂ€t stellt die vollstĂ€ndige und korrekte Umsetzung dieser Zugriffskontrollanforderungen eine Herausforderung fĂŒr die IT dar. HierfĂŒr muss das Wissen von der GeschĂ€ftsebene hin zur IT ĂŒbertragen werden. Die unterschiedlichen Terminologien innerhalb der FachdomĂ€nen erschweren diesen Prozess. ZusĂ€tzlich beeinflussen die GrĂ¶ĂŸe von Unternehmen, die KomplexitĂ€t von EAAs sowie die Verflechtung zwischen EAAs und GeschĂ€ftsprozessen die FehleranfĂ€lligkeit im Entwurfsprozess von Zugriffsberechtigungen und EAAs. Dieser Zusammenhang fĂŒhrt zu einer Diskrepanz zwischen ihnen und den GeschĂ€ftsprozessen und wird durch den Umstand der immer wiederkehrenden Anpassungen aufgrund von Evolutionen der GeschĂ€ftsprozesse und IT-Systeme verstĂ€rkt. Bisherige Arbeiten, die auf Erweiterungen von Modellierungssprachen setzen, fordern einen hohen Aufwand von Unternehmen, um vorhandene Modelle zu erweitern und die Erweiterungen zu pflegen. Andere Arbeiten setzen auf manuelle Prozesse. Diese erfordern viel Aufwand, skalieren nicht und sind bei komplexen Systemen fehleranfĂ€llig. Ziel meiner Arbeit ist es, zu untersuchen, wie Zugriffskontrollanforderungen zwischen der GeschĂ€ftsebene und der IT mit möglichst geringem Mehraufwand fĂŒr Unternehmen angeglichen werden können. Im Speziellen erforsche ich, wie Zugriffskontrollanforderungen der GeschĂ€ftsebene, extrahiert aus GeschĂ€ftsprozessen, automatisiert in Zugriffsberechtigungen fĂŒr Systeme der rollenbasierten Zugriffskontrolle (RBAC) ĂŒberfĂŒhrt werden können und wie die EAA zur Entwurfszeit auf die Einhaltung der extrahierten Zugriffskontrollanforderungen ĂŒberprĂŒft werden kann. Hierdurch werden Sicherheitsexperten beim Entwerfen von Zugriffsberechtigungen fĂŒr RBAC Systeme unterstĂŒtzt und die KomplexitĂ€t verringert. Weiterhin werden Enterprise-Architekten in die Lage versetzt, die EAA zur Entwurfszeit auf DatenflĂŒsse von Services zu untersuchen, welche gegen die geschĂ€ftsseitige Zugriffskontrollanforderungen verstoßen und diese Fehler zu beheben. Die KernbeitrĂ€ge meiner Arbeit lassen sich wie folgt zusammenfassen: I)\textbf{I)} Ein Ansatz zur automatisierten Extraktion von geschĂ€ftsseitigen Zugriffskontrollanforderungen aus GeschĂ€ftsprozessen mit anschließender Generierung eines initialen Rollenmodells fĂŒr RBAC. II)\textbf{II)} Ein Ansatz zum automatisierten Erstellen von architekturellen Datenfluss-Bedingungen aus Zugriffskontrollanforderungen zur Identifikation von verbotenen DatenflĂŒssen in Services von IT-Systemen der EAA. III)\textbf{III)} Eine Prozessmodell fĂŒr Unternehmen ĂŒber die Einsatzmöglichkeiten der AnsĂ€tze innerhalb verschiedener Evolutionsszenarien. IV)\textbf{IV)} Ein Modell zur VerknĂŒpfung relevanter Elemente aus GeschĂ€ftsprozessen, RBAC und EAAs im Hinblick auf die Zugriffskontrolle. Dieses wird automatisiert durch die AnsĂ€tze erstellt und dient unter anderem zur Dokumentation von Entwurfsentscheidungen, zur Verbesserung des VerstĂ€ndnisses von Modellen aus anderen DomĂ€nen und zur UnterstĂŒtzung des Enterprise-Architekten bei der Auflösung von Fehlern innerhalb der EAA. Die Anwendbarkeit der AnsĂ€tze wurden in zwei Fallstudien untersucht. Die erste Studie ist eine Real-Welt-Studie, entstanden durch eine Kooperation mit einer staatlichen Kunsthalle, welche ihre IT-Systeme ĂŒberarbeitet. Eine weitere Fallstudie wurde auf Basis von Common Component Modeling Example (CoCoME) durchgefĂŒhrt. CoCoME ist eine durch die Wissenschaftsgemeinde entwickelte Fallstudie einer realistischen Großmarkt-Handelskette, welche speziell fĂŒr die Erforschung von Software-Modellierung entwickelt wurde und um Evolutinsszenarien ergĂ€nzt wurde. Aufgrund verschiedener gesetzlicher Regularien an die IT-Sicherheit und den Datenschutz sowie dem Fluss von sensiblen Daten eignen sich beide Fallstudien fĂŒr die Untersuchung von Zugriffskontrollanforderungen. Beide Fallstudien wurden anhand der Goal Question Metric-Methode durchgefĂŒhrt. Es wurden Validierungsziele definiert. Aus diesen wurden systematisch wissenschaftliche Fragen abgleitet, fĂŒr welche anschließend Metriken aufgestellt wurden, um sie zu untersuchen. Die folgenden Aspekte wurden untersucht: ∙\bullet QualitĂ€t der generierten Zugriffsberechtigungen. ∙\bullet QualitĂ€t der Identifikation von fehlerhaften DatenflĂŒssen in Services der EAA. ∙\bullet VollstĂ€ndigkeit und Korrektheit des generierten Modells zur Nachverfolgbarkeit von Zugriffskontrollanforderungen ĂŒber Modelle hinweg. ∙\bullet Eignung der AnsĂ€tze in Evolutionsszenarien von GeschĂ€ftsprozessen und EAAs. Am Ende dieser Arbeit wird ein Ausblick gegeben, wie sich die vorgestellten AnsĂ€tze dieser Arbeit erweitern lassen. Dabei wird unter anderem darauf eingegangen, wie das Modell zur VerknĂŒpfung relevanter Elemente aus GeschĂ€ftsprozessen, RBAC und EAAs im Hinblick auf die Zugriffskontrolle, um Elemente aus weiteren Modellen der IT und der GeschĂ€ftsebene, erweitert werden kann. Weiterhin wird erörtert wie die AnsĂ€tze der Arbeit mit zusĂ€tzlichen Eingabeinformationen angereichert werden können und wie die extrahierten Zugriffskontrollanforderungen in weiteren DomĂ€nenmodellen der IT und der GeschĂ€ftsebene eingesetzt werden können

    Architectural Alignment of Access Control Requirements Extracted from Business Processes

    Get PDF
    Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures

    Improving design for manufacturing implementation in knowledge intensive collaborative environments - An analysis of organisational factors in aerospace manufacturing

    Get PDF
    Today, the manufacturing industry is under pressure to be able to rapidly come up with innovative designs and produce them in much shorter timeframes in order to keep up with growing customer demands and quickly gain new business. One of the ways used to achieve shorter time to markets for new product developments is by using design for manufacturing (DFM) methods to reduce time and energy going into resolving manufacturing based defects. It is also more vital in today’s manufacturing industry to make use of DFM methods much earlier in the product development lifecycle in order to prevent potentially known quality defects from happening and save on costs associated with late design changes. This requires enabling a more systemic feedback cycle of production data for the creation of DFM knowledge repositories as well as overcoming some wider knowledge sharing barriers across the organization. This investigation focuses on how the communications of manufacturing knowledge from production data is affected by factors within the overall organization. The investigation is one of the few that consider the influence of organizational factors on the communication of engineering knowledge as well as the related knowledge sharing barriers. The project is carried out empirically with a large UK based aerospace manufacturing company by gathering data primarily from observations and interviews. This paper presents the findings followed by discussions for improving DFM Knowledge Management in the aerospace industry
    • 

    corecore