170,703 research outputs found

    Perancangan Arsitektur Sistem Informasi Rumah Sakit Kabupaten (Studi Kasus RSUD Majalengka)

    Full text link
    The application of the enterprise architecture aims to create an alignment between business and technology of information to the needs of the organization, implementation of the enterprise architecture influences of how an organization plans and designs the enterprise architecture. A wide variety of frame works and methods can be used in designing the enterprise architecture, including the Zachman Framework, TOGAF Framework, and other enterprise architectures. In this case, will be discussed about how to use TOGAF frame work in making a planning of the enterprise architecture, so the clarity of the original concepts of the enterprise architecture planning can all be described to get a good enterprise architecture and capable of being used by organizations and to achieve the strategic goals owned. TOGAF has four main components: business architecture, data architecture, technology architecture, and application architecture. Information system in the hospital is one of media services owned by the hospital. Objects that are involved in the planning of the development of this architecture,in which the role of the system play a huge role in services and made it the main business of the information system in the hospital. the big role services are inpatient, outpatient, logistics, medical records and emergency unit. It can be concluded that hospital system of information plays very active role when there is changes of the architecture of information system, such as in RSUD Majalengka. The result of this research is blueprint of the technology of information based on TOGAF roadmap that have been create so that produce an enterprise architecture that includes the applications of inpatient, outpatient, logistics, medical records, and emergency unit

    PERCEIVED BENEFITS FROM ENTERPRISE ARCHITECTURE

    Get PDF
    Enterprise Architecture has been developed in order to optimize the alignment between business needs and the (rapidly changing) possibilities of information technology. But do organizations indeed benefit from the application of Enterprise Architecture according to those who are in any way involved in architecture? To answer this question, a model has been developed (the Enterprise Architecture Value Framework) to organize the benefits of Enterprise Architecture. Based on this model, a survey has been conducted among the various types of stakeholders of Enterprise Architecture, such as architects, project managers, developers and business or IT managers. In the survey the respondents were asked to what extent they perceive various benefits of Enterprise Architecture in their organization. The results of this survey (with 287 fully completed responses) are analyzed and presented in this paper. In all categories of the framework benefits are perceived, though to different extent. Very few benefits are perceived in relation to the external orientation of the organization. Few statistically significant correlations were found in relation to the background of the respondents: the overall view on benefits of Enterprise Architecture appeared independent of the role of the respondents, the economic sector and the number of years of experience with architectur

    Towards an understanding of business design within enterprise architecture management: a cautionary tale

    Get PDF
    Includes bibliographical references.Business Design represents a set of concepts that are described in the literature as providing a sound foundation for sustainable competitive advantage into the future. The particular values underpinning Business design are based on the enablement of a design thinking approach to solving the imponderable problems that organisations regularly encounter. In particular, the application of a design thinking approach to Business Design requires that resultant system designs are economically viable and technologically feasible. Enterprise Architecture Management plays a vital role in supporting these latter two requirements. Yet the definition of Enterprise Architecture Management as the 'normative restriction of design freedom' (Deitz, 2011) implies constraints that could impose limits on such business design. Consequently, the qualitative inductive research described in this document was undertaken to explore the perceived paradoxical relationship between Business Design and Enterprise Architecture Management. This dissertation recounts the process and results of this research initiative based on data recorded during interviews with a number of management level staff at a leading South African Insurance organisation. The participants were intimately involved in a programme to, amongst other objectives, establish a platform to support enterprise-wide Business Design within Enterprise Architecture Management, a programme that was experiencing a number of challenges and that was still underway at the time of completion of this research. Findings arising from this research were that the varying perceptions and levels of commitment of business and IT stakeholders associated with the programme and its requirements, contributed significantly to these challenges. In addition to providing a rich description of the case organisation's journey towards the establishment of a Business Design platform, a sensitising framework – 'The 6 Cs Framework in Support of the Successful Enablement of Business Design within Enterprise Architecture Management' – is proposed as a useful tool to assist organisations that might be considering a similar programme in the future

    Perancangan Arsitektur Sistem Informasi Rumah Sakit Kabupaten (Studi Kasus RSUD Majalengka)

    Get PDF
    The application of the enterprise architecture aims to create an alignment between business and technology of information to the needs of the organization, implementation of the enterprise architecture influences of how an organization plans and designs the enterprise architecture. A wide variety of frame works and methods can be used in designing the enterprise architecture, including the Zachman Framework, TOGAF Framework, and other enterprise architectures. In this case, will be discussed about how to use TOGAF frame work in making a planning of the enterprise architecture, so the clarity of the original concepts of the enterprise architecture planning can all be described to get a good enterprise architecture and capable of being used by organizations and to achieve the strategic goals owned. TOGAF has four main components: business architecture, data architecture, technology architecture, and application architecture. Information system in the hospital is one of media services owned by the hospital. Objects that are involved in the planning of the development of this architecture,in which the role of the system play a huge role in services and made it the main business of the information system in the hospital. the big role services are inpatient, outpatient, logistics, medical records and emergency unit. It can be concluded that hospital system of information plays very active role when there is changes of the architecture of information system, such as in RSUD Majalengka. The result of this research is blueprint of the technology of information based on TOGAF roadmap that have been create so that produce an enterprise architecture that includes the applications of inpatient, outpatient, logistics, medical records, and emergency unit

    Role-based security for distributed object systems

    No full text
    This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in which domains are used to group objects for specifying security policies. We use the concept of a role to define access control related to a position within an organisation although our role framework caters for the specification of both authorisation and obligation policies. Access control and authentication is implemented using security agents on a per host basis to achieve a high degree of transparency to the application level. Cascaded delegation of access rights is also supported. The domain based authentication service uses symmetric cryptography and is implemented by replicated servers which maintain minimal state

    Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System

    Get PDF
    The need for a robust system architecture to support software development is well known. In enterprise software development, this must be realized in a multi-tier environment for deployment to a software framework. Many popular integrated development environment (IDE) tools for component-based frameworks push multi-tier partitioning by assisting developers with convenient code generation tools and software deployment tools which package the code. However, if components are not packaged wisely, modifying and adding components becomes difficult and expensive. To help manage change, vertical partitioning can be applied to compartmentalize components according to function and role, resulting in a grid partitioning. This thesis is to advocate a design methodology that enforces vertical partitioning on top of the horizontal multitier partitioning, and to provide guidelines that document the grid partitioning realization in enterprise software development processes as applied in the J2EE framework

    Ontology-based patterns for the integration of business processes and enterprise application architectures

    Get PDF
    Increasingly, enterprises are using Service-Oriented Architecture (SOA) as an approach to Enterprise Application Integration (EAI). SOA has the potential to bridge the gap between business and technology and to improve the reuse of existing applications and the interoperability with new ones. In addition to service architecture descriptions, architecture abstractions like patterns and styles capture design knowledge and allow the reuse of successfully applied designs, thus improving the quality of software. Knowledge gained from integration projects can be captured to build a repository of semantically enriched, experience-based solutions. Business patterns identify the interaction and structure between users, business processes, and data. Specific integration and composition patterns at a more technical level address enterprise application integration and capture reliable architecture solutions. We use an ontology-based approach to capture architecture and process patterns. Ontology techniques for pattern definition, extension and composition are developed and their applicability in business process-driven application integration is demonstrated

    Competences of IT Architects

    Get PDF
    The field of architecture in the digital world uses a plethora of terms to refer to different kinds of architects, and recognises a confusing variety of competences that these architects are required to have. Different service providers use different terms for similar architects and even if they use the same term, they may mean something different. This makes it hard for customers to know what competences an architect can be expected to have.\ud \ud This book combines competence profiles of the NGI Platform for IT Professionals, The Open Group Architecture Framework (TOGAF), as well as a number of Dutch IT service providers in a comprehensive framework. Using this framework, the book shows that notwithstanding a large variety in terminology, there is convergence towards a common set of competence profiles. In other words, when looking beyond terminological differences by using the framework, one sees that organizations recognize similar types of architects, and that similar architects in different organisations have similar competence profiles. The framework presented in this book thus provides an instrument to position architecture services as offered by IT service providers and as used by their customers.\ud \ud The framework and the competence profiles presented in this book are the main results of the special interest group “Professionalisation” of the Netherlands Architecture Forum for the Digital World (NAF). Members of this group, as well as students of the universities of Twente and Nijmegen have contributed to the research on which this book is based

    Dynamic Role-Based Access Control for Decentralized Applications

    Full text link
    Access control management is an integral part of maintaining the security of an application. Although there has been significant work in the field of cloud access control mechanisms, however, with the advent of Distributed Ledger Technology (DLT), on-chain access control management frameworks hardly exist. Existing access control management mechanisms are tightly coupled with the business logic, resulting in governance issues, non-coherent with existing Identity Management Solutions, low security, and compromised usability. We propose a novel framework to implement dynamic role-based access control for decentralized applications (dApps). The framework allows for managing access control on a dApp, which is completely decoupled from the business application and integrates seamlessly with any dApps. The smart contract architecture allows for the independent management of business logic and execution of access control policies. It also facilitates secure, low cost, and a high degree of flexibility of access control management. The proposed framework promotes decentralized governance of access control policies and efficient smart contract upgrades. We also provide quantitative and qualitative metrics for the efficacy and efficiency of the framework. Any Turing complete smart contract programming language is an excellent fit to implement the framework. We expect this framework to benefit enterprise and non-enterprise dApps and provide greater access control flexibility and effective integration with traditional and state of the art identity management solutions.Comment: 6 pages, 3 figures, 1 tabl
    • 

    corecore