170,703 research outputs found
Perancangan Arsitektur Sistem Informasi Rumah Sakit Kabupaten (Studi Kasus RSUD Majalengka)
The application of the enterprise architecture aims to create an alignment between business and technology of information to the needs of the organization, implementation of the enterprise architecture influences of how an organization plans and designs the enterprise architecture. A wide variety of frame works and methods can be used in designing the enterprise architecture, including the Zachman Framework, TOGAF Framework, and other enterprise architectures. In this case, will be discussed about how to use TOGAF frame work in making a planning of the enterprise architecture, so the clarity of the original concepts of the enterprise architecture planning can all be described to get a good enterprise architecture and capable of being used by organizations and to achieve the strategic goals owned. TOGAF has four main components: business architecture, data architecture, technology architecture, and application architecture. Information system in the hospital is one of media services owned by the hospital. Objects that are involved in the planning of the development of this architecture,in which the role of the system play a huge role in services and made it the main business of the information system in the hospital. the big role services are inpatient, outpatient, logistics, medical records and emergency unit. It can be concluded that hospital system of information plays very active role when there is changes of the architecture of information system, such as in RSUD Majalengka. The result of this research is blueprint of the technology of information based on TOGAF roadmap that have been create so that produce an enterprise architecture that includes the applications of inpatient, outpatient, logistics, medical records, and emergency unit
PERCEIVED BENEFITS FROM ENTERPRISE ARCHITECTURE
Enterprise Architecture has been developed in order to optimize the alignment between business needs and the (rapidly changing) possibilities of information technology. But do organizations indeed benefit from the application of Enterprise Architecture according to those who are in any way involved in architecture? To answer this question, a model has been developed (the Enterprise Architecture Value Framework) to organize the benefits of Enterprise Architecture. Based on this model, a survey has been conducted among the various types of stakeholders of Enterprise Architecture, such as architects, project managers, developers and business or IT managers. In the survey the respondents were asked to what extent they perceive various benefits of Enterprise Architecture in their organization. The results of this survey (with 287 fully completed responses) are analyzed and presented in this paper. In all categories of the framework benefits are perceived, though to different extent. Very few benefits are perceived in relation to the external orientation of the organization. Few statistically significant correlations were found in relation to the background of the respondents: the overall view on benefits of Enterprise Architecture appeared independent of the role of the respondents, the economic sector and the number of years of experience with architectur
Towards an understanding of business design within enterprise architecture management: a cautionary tale
Includes bibliographical references.Business Design represents a set of concepts that are described in the literature as providing a sound foundation for sustainable competitive advantage into the future. The particular values underpinning Business design are based on the enablement of a design thinking approach to solving the imponderable problems that organisations regularly encounter. In particular, the application of a design thinking approach to Business Design requires that resultant system designs are economically viable and technologically feasible. Enterprise Architecture Management plays a vital role in supporting these latter two requirements. Yet the definition of Enterprise Architecture Management as the 'normative restriction of design freedom' (Deitz, 2011) implies constraints that could impose limits on such business design. Consequently, the qualitative inductive research described in this document was undertaken to explore the perceived paradoxical relationship between Business Design and Enterprise Architecture Management. This dissertation recounts the process and results of this research initiative based on data recorded during interviews with a number of management level staff at a leading South African Insurance organisation. The participants were intimately involved in a programme to, amongst other objectives, establish a platform to support enterprise-wide Business Design within Enterprise Architecture Management, a programme that was experiencing a number of challenges and that was still underway at the time of completion of this research. Findings arising from this research were that the varying perceptions and levels of commitment of business and IT stakeholders associated with the programme and its requirements, contributed significantly to these challenges. In addition to providing a rich description of the case organisation's journey towards the establishment of a Business Design platform, a sensitising framework â 'The 6 Cs Framework in Support of the Successful Enablement of Business Design within Enterprise Architecture Management' â is proposed as a useful tool to assist organisations that might be considering a similar programme in the future
Perancangan Arsitektur Sistem Informasi Rumah Sakit Kabupaten (Studi Kasus RSUD Majalengka)
The application of the enterprise architecture aims to create an alignment between business and technology of information to the needs of the organization, implementation of the enterprise architecture influences of how an organization plans and designs the enterprise architecture. A wide variety of frame works and methods can be used in designing the enterprise architecture, including the Zachman Framework, TOGAF Framework, and other enterprise architectures. In this case, will be discussed about how to use TOGAF frame work in making a planning of the enterprise architecture, so the clarity of the original concepts of the enterprise architecture planning can all be described to get a good enterprise architecture and capable of being used by organizations and to achieve the strategic goals owned. TOGAF has four main components: business architecture, data architecture, technology architecture, and application architecture. Information system in the hospital is one of media services owned by the hospital. Objects that are involved in the planning of the development of this architecture,in which the role of the system play a huge role in services and made it the main business of the information system in the hospital. the big role services are inpatient, outpatient, logistics, medical records and emergency unit. It can be concluded that hospital system of information plays very active role when there is changes of the architecture of information system, such as in RSUD Majalengka. The result of this research is blueprint of the technology of information based on TOGAF roadmap that have been create so that produce an enterprise architecture that includes the applications of inpatient, outpatient, logistics, medical records, and emergency unit
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in which domains are used to group objects for specifying security policies. We use the concept of a role to define access control related to a position within an organisation although our role framework caters for the specification of both authorisation and obligation policies. Access control and authentication is implemented using security agents on a per host basis to achieve a high degree of transparency to the application level. Cascaded delegation of access rights is also supported. The domain based authentication service uses symmetric cryptography and is implemented by replicated servers which maintain minimal state
Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System
The need for a robust system architecture to support software development is well known. In enterprise software development, this must be realized in a multi-tier environment for deployment to a software framework. Many popular integrated development environment (IDE) tools for component-based frameworks push multi-tier partitioning by assisting developers with convenient code generation tools and software deployment tools which package the code. However, if components are not packaged wisely, modifying and adding components becomes difficult and expensive. To help manage change, vertical partitioning can be applied to compartmentalize components according to function and role, resulting in a grid partitioning. This thesis is to advocate a design methodology that enforces vertical partitioning on top of the horizontal multitier partitioning, and to provide guidelines that document the grid partitioning realization in enterprise software development processes as applied in the J2EE framework
Ontology-based patterns for the integration of business processes and enterprise application architectures
Increasingly, enterprises are using Service-Oriented Architecture (SOA) as an approach to Enterprise Application Integration (EAI). SOA has the potential to bridge
the gap between business and technology and to improve the reuse of existing applications and the interoperability with new ones. In addition to service architecture
descriptions, architecture abstractions like patterns and styles capture design knowledge and allow the reuse of successfully applied designs, thus improving the quality of
software. Knowledge gained from integration projects can be captured to build a repository of semantically enriched, experience-based solutions. Business patterns identify the interaction and structure between users, business processes, and data.
Specific integration and composition patterns at a more technical level address enterprise application integration and capture reliable architecture solutions. We use an
ontology-based approach to capture architecture and process patterns. Ontology techniques for pattern definition, extension and composition are developed and their
applicability in business process-driven application integration is demonstrated
Competences of IT Architects
The field of architecture in the digital world uses a plethora of terms to refer to different kinds of architects, and recognises a confusing variety of competences that these architects are required to have. Different service providers use different terms for similar architects and even if they use the same term, they may mean something different. This makes it hard for customers to know what competences an architect can be expected to have.\ud
\ud
This book combines competence profiles of the NGI Platform for IT Professionals, The Open Group Architecture Framework (TOGAF), as well as a number of Dutch IT service providers in a comprehensive framework. Using this framework, the book shows that notwithstanding a large variety in terminology, there is convergence towards a common set of competence profiles. In other words, when looking beyond terminological differences by using the framework, one sees that organizations recognize similar types of architects, and that similar architects in different organisations have similar competence profiles. The framework presented in this book thus provides an instrument to position architecture services as offered by IT service providers and as used by their customers.\ud
\ud
The framework and the competence profiles presented in this book are the main results of the special interest group âProfessionalisationâ of the Netherlands Architecture Forum for the Digital World (NAF). Members of this group, as well as students of the universities of Twente and Nijmegen have contributed to the research on which this book is based
Dynamic Role-Based Access Control for Decentralized Applications
Access control management is an integral part of maintaining the security of
an application. Although there has been significant work in the field of cloud
access control mechanisms, however, with the advent of Distributed Ledger
Technology (DLT), on-chain access control management frameworks hardly exist.
Existing access control management mechanisms are tightly coupled with the
business logic, resulting in governance issues, non-coherent with existing
Identity Management Solutions, low security, and compromised usability. We
propose a novel framework to implement dynamic role-based access control for
decentralized applications (dApps). The framework allows for managing access
control on a dApp, which is completely decoupled from the business application
and integrates seamlessly with any dApps. The smart contract architecture
allows for the independent management of business logic and execution of access
control policies. It also facilitates secure, low cost, and a high degree of
flexibility of access control management. The proposed framework promotes
decentralized governance of access control policies and efficient smart
contract upgrades. We also provide quantitative and qualitative metrics for the
efficacy and efficiency of the framework. Any Turing complete smart contract
programming language is an excellent fit to implement the framework. We expect
this framework to benefit enterprise and non-enterprise dApps and provide
greater access control flexibility and effective integration with traditional
and state of the art identity management solutions.Comment: 6 pages, 3 figures, 1 tabl
- âŠ