3,103 research outputs found
Information integration â an essential pillar in e-government development
The purpose of this paper is to explain and promote the need for ERP implementation in the public sector, to support the growing request for effective information systems, from the e-government viewpoint and under its influence. The paper also debates the major challenges in ERP implementation issued from research of published case studies. The challenges analysis turns out four major issues to address in order to overcome the integration obstacles and create a solid infrastructure for e-government.integration, Enterprise Resource Planning (ERP), e-government, public sector, business process reengineering (BPR)
Aviation Organization Strategy Development in National Airspace Modernization
The purpose of this qualitative study was to determine how small sub-directorates within larger organizations develop strategy to accomplish expansive legacy infrastructure re-engineering. There is significant, historical academic inquiry on Technological Transitions (TT)s with respect to infrastructure modernization; the conversion of the National Airspace System from ground-based to space-based navigation is an example of a TT. There are also studies on how to re-engineer legacy software systems to continue supporting organizational needs. This study is intended to explore a case of re-engineering the expansive legacy ground-based navigation system in the United States by efficiently reducing the size of the network and expanding then verifying signal coverage on over 4.5 million square miles. It is not a pure TT, nor a pure software re-engineering, but rather a large-scale re-engineering of a pre-existing hardware and software infrastructure. It constitutes a nationwide effort to re-design and expand the legacy ground-based navigation system developed over 70 years. The Federal Aviation Administration (FAA) advised the public in 2011 that it intended to re-engineer and reduce the Very High Frequency Omnidirectional Range (VOR) network from 896 stations down to 593 stations - to be defined as the Minimum Operational Network (MON). This reduction was based on the premise that two-thirds of the legacy VORs would be retained but their coverage expanded to cover twice the airspace within the US than the previous network. The FAA Flight Program Operations (FPO) is a small sub-directorate within the larger organization that is now responsible to validate signal coverage on several million square miles of additional airspace. Understanding how the FPO develops strategy and leverages technology to support this endeavor can provide a repeatable template for future, expansive, legacy infrastructure re-engineering efforts. This study discovered that the FPO developed and iteratively evolved strategy to accomplish the VOR MON using tribal knowledge, subject matter expertise and accepted business re-engineering practices. The template can be applied to other legacy infrastructure re-engineering efforts to support forthcoming TTs
Security-Driven Software Evolution Using A Model Driven Approach
High security level must be guaranteed in applications in order to mitigate risks during the deployment of information systems in open network environments. However, a significant number of legacy systems remain in use which poses security risks to the enterpriseâ assets due to the poor technologies used and lack of security concerns when they were in design. Software reengineering is a way out to improve their security levels in a systematic way. Model driven is an approach in which model as defined by its type directs the execution of the process. The aim of this research is to explore how model driven approach can facilitate the software reengineering driven by security demand. The research in this thesis involves the following three phases.
Firstly, legacy system understanding is performed using reverse engineering techniques. Task of this phase is to reverse engineer legacy system into UML models, partition the legacy system into subsystems with the help of model slicing technique and detect existing security mechanisms to determine whether or not the provided security in the legacy system satisfies the userâs security objectives.
Secondly, security requirements are elicited using risk analysis method. It is the process of analysing key aspects of the legacy systems in terms of security. A new risk assessment method, taking consideration of asset, threat and vulnerability, is proposed and used to elicit the security requirements which will generate the detailed security requirements in the specific format to direct the subsequent security enhancement.
Finally, security enhancement for the system is performed using the proposed ontology based security pattern approach. It is the stage that security patterns derived from security expertise and fulfilling the elicited security requirements are selected and integrated in the legacy system models with the help of the proposed security ontology.
The proposed approach is evaluated by the selected case study. Based on the analysis, conclusions are drawn and future research is discussed at the end of this thesis. The results show this thesis contributes an effective, reusable and suitable evolution approach for software security
Recommended from our members
Exploring strategic leadership challenges in achieving an ICT enabled transformational government
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel UniversityThis empirical research focuses on exploring the role of strategic leadership in the shift from Electronic Government (eGovernment) to Transformational Government (tGovernment). Despite the fact that many countries have implemented eGovernment, the literature reports a number of themhave failed to reach the promised seamless transformation. Moreover, there is a dearth of research into the domain of tGovernment; the research which exists is limited in extent thus leaving scope for timely and novel research contributions. This thesis reveals that a valuable contribution to knowledge could be derived from exploring the domain of
transformational government. The leadership motivationand incentives to conduct a radical government organisational change have become an area of great importance. There is limited research on the strategic role of leadership in achieving transformational government domain; hence, the implications of seamless integration for transformational government have yet to be explored. This research discusses transformational government by using a qualitative, multiple case study research strategy. Data is triangulated and analysed according to its explanatory properties and underlying structural context. This researchextends established norms in literature for tGovernment implementation by incorporating established theories in organisational change from other related disciplines. This is to explain the significance of the underlying philosophical nature of the emerging themes, thus enabling government leaders to create robust strategic proposals for tGovernment. This empirical research is conducted in a Middle Eastern cultural context based in Dubai, United Arab Emirates. The research arrives at several key findings and themesthat contribute to the body of knowledge. A primary finding is the need for a radical change and an innovative managerial approach in using ICT to enable radical change in government organisations. A related finding of this research is that many assumptions underlying the various tGovernment models for transformation fall short to empirically explain the transformational government domain.The government visionary leadership has been proven to be a powerful driver for change in terms of initiating and leading the process for transformational government
The real SAPÂź Business one cost : a case study of ERP adoption in an SME
This paper reports on a UK based service management Small and Medium-sized Enterprise (SME) that invested into SAPÂź Business One. The action research case study highlights the real cost and difficulties faced in moving to the one single SAP system and the process that was followed in
order to identify third-party vendors that can integrate or customise SAPÂź Business One. This paper highlights the additional costs required to ensure a âfit-for-purposeâ solution to close the gap between strategic needs and the
existing SAP Business One solution. The gap itself is illustrated by highlighting 10 key functionalities expected by the given service management SME. The actual implementation cost of the Enterprise Resource Planning (ERP) was found to be approximately double the initial SAP costs. The real costs involve time for, among other things, process reengineering, strategic decision making, software add-ons, staff-training, project-management and software
maintenance
Business rules based legacy system evolution towards service-oriented architecture.
Enterprises can be empowered to live up to the potential of becoming dynamic, agile and real-time. Service orientation is emerging from the amalgamation of a number of key business, technology and cultural developments. Three essential trends in particular are coming together to create a new revolutionary breed of enterprise, the service-oriented enterprise (SOE): (1) the continuous performance management of the enterprise; (2) the emergence of business process management; and (3) advances in the standards-based service-oriented infrastructures.
This thesis focuses on this emerging three-layered architecture that builds on a service-oriented architecture framework, with a process layer that brings technology and business together, and a corporate performance layer that continually monitors and improves the performance indicators of global enterprises provides a novel framework for the business context in which to apply the important technical idea of service orientation and moves it from being an interesting tool for engineers to a vehicle for business managers to fundamentally improve their businesses
Recommended from our members
The evaluation and the effectiveness of project management in transformational e-government projects
This paper forms part of an ongoing research of a PhD degree to describe, critically evaluate and examine the underlying barriers and challenges in large e-Government initiatives. The paper invites technology to be incorporated and inculcated into the art and science of project management, and be part of a passable solution as opposed to being distinct and separate from it. The tools used have to increase the novelty (art and science) of project management through human interaction, and empower the project manager and aiding his capacity in delivering the expected outcomes. Due to inadequate implementations of project management procedures and processes, many large information technology systems (ITS) projects failed. This becomes a characteristic and encompasses e-Government project initiatives, due to ambitious program changes, major innovations, large transformations, enterprise wide solutions, collaboration across organizationsâ governments and private sectors, and the implementation of unprecedented (or ambitious) solutions. This research paper critically analyses and summarises a list of e-Government challenges and barriers arising from an e-Government survey administered on behalf of the World Information Technology and Services Association (WITSA) which represents the national technology associations in 70 countries. It compares these challenges to the Project Management Body of Knowledge (PMBOK), which is the North American standard in project management methodology. In addition, it highlights the weaknesses in PMBOK to address these challenges and offers a technology-enabled enhancement to the Project Initiation Phase, the area identified as being particularly weak and inadequate in addressing e-Government initiatives and requirements
- âŠ