348 research outputs found

    Workflow Management Systems and ERP Systems: Differences, Commonalities, and Applications

    Get PDF
    Two important classes of information systems, Workflow Management Systems(WfMSs) and Enterprise Resource Planning (ERP) systems, have been used to support e-business process redesign, integration, and management. While both technologies can help with business process automation, data transfer, and information sharing, the technological approach and features of solutions provided by WfMS and ERP are different. Currently, there is a lack of understanding of these two classes of information systems in the industry and academia, thus hindering their effective applications. In this paper, we present a comprehensive comparison between these two classes of systems. We discuss how the two types of systems can be used independently or together to develop intra- and inter-organizational application solutions. In particular, we also explore the roles of WfMS and ERP in the next generation of IT architecture based on web services. Our findings should help businesses make better decisions in the adoption of both WfMS and ERP in their e-business strategies

    KNOWLEDGE SHARING STRATEGY: THE SIGNIFICANCE OF SECURITY AND COLLABORATION

    Get PDF

    The Pervasive Impact of Information Technology on Internal Auditing

    Get PDF
    The impetus for this supplemental chapter titled The Pervasive Impact of Information Technology on Internal Auditing comes from The Institute of Internal Auditors Research Foundation (IIARF) monograph, Research Opportunities in Internal Auditing (2003), hereafter ROIA. ROIA combines theory and practice in conceptual frameworks to promote an understanding of the contemporary internal auditing environment. The goals of ROIA include stimulating academic research on significant internal auditing topics and serving as a “communication bridge” between academics and practicing professionals. ROIA provided us with internal auditing related subject matter content, including the most promising areas of information technology (IT) application in internal auditing. One significant topic that is only briefly mentioned in ROIA is the impact of IT on the internal audit function.3 IT is revolutionizing the nature and scope of worldwide communications, changing business processes, and erasing the traditional boundaries of the organization — internally between departments and externally with suppliers and customers. The resulting intra-enterprise coordination as well as inter-enterprise integration with external business partners through supply chain management and customer relationship management systems demonstrates the power of IT as both a driver and enabler of management processes and strategies. Indeed, internal auditors must recognize and leverage the powerful capabilities of computers and technology in collecting, generating, and evaluating information for managerial decision making related to strategy, risk management and controls, and, more broadly, for effective organizational governance. At the same time, internal auditors must recognize that IT, in itself, will not increase the function’s effectiveness. Rather internal auditors must first understand the audit objectives and select appropriate IT to achieve those objectives (i.e., the task-technology fit is essential). It is also imperative that internal auditors understand their organization’s appropriate leveraging of IT, and learn to harness additional IT to optimize internal audit performance.https://ecommons.udayton.edu/books/1037/thumbnail.jp

    Scalable Internet auctions

    Get PDF
    Current Internet based auction services rely, in general, on a centralised auction server; applications with large and geographically dispersed bidder client bases are thus supported in a centralised manner. Such an approach is fundamentally restrictive as too many users can overload the server, making the whole auction process unresponsive. Further, such an architecture can be vulnerable to server's failures, if not equipped with sufficient redundancy. In addition, bidders who are closer to the server are likely to have relatively faster access to the server than remote bidders, thereby gaining an unfair advantage. To overcome these shortcomings, this thesis investigates ways of enabling widely distributed, arbitrarily large number of auction servers to cooperate in conducting an auction. Allowing a bidder to register with anyone of the auction servers and place bids there, coupled with periodic exchange of auction information between servers forms the basis of the solution investigated to achieve scalability, responsiveness and fairness. Scalability and responsiveness are achieved since the total load is shared amongst many bidder servers; fairness is achieved since bidders are able to register with their local servers. The thesis presents the design and implementation of an hierarchically structured distributed Internet auction system. Protocols for inter-server cooperation are presented. Each server may be replicated locally to mask node failures. Performance evaluations of centralised and distributed configurations are performed to show the advantages of the distributed configuration over the centralised one.EThOS - Electronic Theses Online ServiceIranian Ministry of Science, Research and Technology : Isfahan UniversityGBUnited Kingdo

    An Assessment of the Influence of Functional Diversity and Perceived Information Quality on the Intention to Use Collaboration Systems

    Get PDF
    The role that perceived information quality has on the intention to use a computer supported collaborative work (CSCW) system in the Federal Highway Administration is the focus of this study. The purpose of this study was to examine the functional diversity of the contributors in a CSCW as a major determinant of perceived information quality. The study relied on the Technology Acceptance Model (TAM), the Theory of Reasoned Action (TRA) and the Theory of Planned Behavior (TPB) to propose a theoretical model which shows that perceived information quality influences perceived risk and trusting belief of the users of these systems. Both perceived risk and trusting belief shape the intention to use a computer supported collaborative work systems. This study conducted a web-based survey to validate the theoretical model. The study focused on the use of computer-supported collaborative work systems in the Federal Highway Administration. This study empirically validated the theoretical model. Scales were developed within the context of the variables (functional diversity, perceived information quality, perceived risk, trusting belief, and intention to use.) to survey discipline members at the Federal Highway Administration.The statistical results showed support for perceived information quality’s positive influence on trusting belief, perceived information quality’s negative influence on perceived risk, perceived risk’s negative influence on the intention to use a CSCW and trusting belief’s positive influence on the intention to use a CSCW. The results also showed there is no statistically significant difference in perceived information quality by functional diversity. This study concluded that the research model showed significant results to support four of the five hypotheses proposed and helped uncover key findings on how perceived information quality can be impacted. This research served as an original contribution to CSCW while working in functionally diverse teams environments

    A decentralized framework for cross administrative domain data sharing

    Get PDF
    Federation of messaging and storage platforms located in remote datacenters is an essential functionality to share data among geographically distributed platforms. When systems are administered by the same owner data replication reduces data access latency bringing data closer to applications and enables fault tolerance to face disaster recovery of an entire location. When storage platforms are administered by different owners data replication across different administrative domains is essential for enterprise application data integration. Contents and services managed by different software platforms need to be integrated to provide richer contents and services. Clients may need to share subsets of data in order to enable collaborative analysis and service integration. Platforms usually include proprietary federation functionalities and specific APIs to let external software and platforms access their internal data. These different techniques may not be applicable to all environments and networks due to security and technological restrictions. Moreover the federation of dispersed nodes under a decentralized administration scheme is still a research issue. This thesis is a contribution along this research direction as it introduces and describes a framework, called \u201cWideGroups\u201d, directed towards the creation and the management of an automatic federation and integration of widely dispersed platform nodes. It is based on groups to exchange messages among distributed applications located in different remote datacenters. Groups are created and managed using client side programmatic configuration without touching servers. WideGroups enables the extension of the software platform services to nodes belonging to different administrative domains in a wide area network environment. It lets different nodes form ad-hoc overlay networks on-the-fly depending on message destinations located in distinct administrative domains. It supports multiple dynamic overlay networks based on message groups, dynamic discovery of nodes and automatic setup of overlay networks among nodes with no server-side configuration. I designed and implemented platform connectors to integrate the framework as the federation module of Message Oriented Middleware and Key Value Store platforms, which are among the most widespread paradigms supporting data sharing in distributed systems

    Integrity Control in Relational Database Systems - An Overview

    Get PDF
    This paper gives an overview of research regarding integrity control or integrity constraint handling in relational database management systems. The topic of constraint handling is discussed from two points of view. First, constraint handling is discussed by identifying a number of important research issues, and by treating each issue in detail. Second, a number of projects is described that have resulted in the realization of database management systems supporting integrity constraints; the various projects are compared with respect to a number of system characteristics. Together, both approaches give a broad overview of the state of the art in the field at this moment
    • …
    corecore