11,827 research outputs found

    Information Systems in University Learning

    Get PDF
    The authors of this article are going to bring into light the significance, the place and the role of information systems in the university education process. At the same time they define the objectives and the target group of the subject named Economic Information Systems and state the competence gained by students by studying this subject. Special attention is given to the curriculum to be taught to students and to a suggestive enumeration of a series of economic applications that can be themes for laboratory practice and for students’ dissertation (graduation thesis).Information System, Academic Partnership, Curriculum, General Competence, Specific Competence, Open Systems

    Enterprise Information Systems and Business Process Modelling in Training and Research

    Get PDF
    The University of Debrecen introduced the five year “informatics agricultural engineer” course in the 2002/2003 academic year. In the 2006/2007 the „informatics and agricultural administration engineer“ BSc course has been introduced. The courses are run by the Agricultural Economics and Rural Development faculty. Starting of this course is demanded by the Hungarian agro-food sector, Governmental offices, Institutes, which need the applications of wide range informatics tools and systems. The business process modelling and management is becoming important part of implementing and running information systems. The ARIS is one of the leader products in modelling. The other important system is the SAP in the ERP market. In our education program we are using these products. The ARIS toolset is very useful for research on business modelling in agri-food companies too

    A unified view of data-intensive flows in business intelligence systems : a survey

    Get PDF
    Data-intensive flows are central processes in today’s business intelligence (BI) systems, deploying different technologies to deliver data, from a multitude of data sources, in user-preferred and analysis-ready formats. To meet complex requirements of next generation BI systems, we often need an effective combination of the traditionally batched extract-transform-load (ETL) processes that populate a data warehouse (DW) from integrated data sources, and more real-time and operational data flows that integrate source data at runtime. Both academia and industry thus must have a clear understanding of the foundations of data-intensive flows and the challenges of moving towards next generation BI environments. In this paper we present a survey of today’s research on data-intensive flows and the related fundamental fields of database theory. The study is based on a proposed set of dimensions describing the important challenges of data-intensive flows in the next generation BI setting. As a result of this survey, we envision an architecture of a system for managing the lifecycle of data-intensive flows. The results further provide a comprehensive understanding of data-intensive flows, recognizing challenges that still are to be addressed, and how the current solutions can be applied for addressing these challenges.Peer ReviewedPostprint (author's final draft

    Value-driven Security Agreements in Extended Enterprises

    Get PDF
    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example

    Information Systems in University Learning

    Get PDF
    The authors of this article are going to bring into light the significance, the place and the role of information systems in the university education process. At the same time they define the objectives and the target group of the subject named Economic Information Systems and state the competence gained by students by studying this subject. Special attention is given to the curriculum to be taught to students and to a suggestive enumeration of a series of economic applications that can be themes for laboratory practice and for students’ dissertation (graduation thesis)

    Storage Solutions for Big Data Systems: A Qualitative Study and Comparison

    Full text link
    Big data systems development is full of challenges in view of the variety of application areas and domains that this technology promises to serve. Typically, fundamental design decisions involved in big data systems design include choosing appropriate storage and computing infrastructures. In this age of heterogeneous systems that integrate different technologies for optimized solution to a specific real world problem, big data system are not an exception to any such rule. As far as the storage aspect of any big data system is concerned, the primary facet in this regard is a storage infrastructure and NoSQL seems to be the right technology that fulfills its requirements. However, every big data application has variable data characteristics and thus, the corresponding data fits into a different data model. This paper presents feature and use case analysis and comparison of the four main data models namely document oriented, key value, graph and wide column. Moreover, a feature analysis of 80 NoSQL solutions has been provided, elaborating on the criteria and points that a developer must consider while making a possible choice. Typically, big data storage needs to communicate with the execution engine and other processing and visualization technologies to create a comprehensive solution. This brings forth second facet of big data storage, big data file formats, into picture. The second half of the research paper compares the advantages, shortcomings and possible use cases of available big data file formats for Hadoop, which is the foundation for most big data computing technologies. Decentralized storage and blockchain are seen as the next generation of big data storage and its challenges and future prospects have also been discussed

    THE SMART CITY INFRASTRUCTURE DEVELOPMENT & MONITORING

    Get PDF
    The smart city infrastructure is the introductory step for establishing the overall smart city framework and architecture. Very few smart cities are recently established across the world. Some examples are: Dubai, Malta, Kochi (India), Singapore. The scope of these cities is mainly limited to construct a technology park converting the industrial real estate to state of the art information technology using the evolution in the telecom and IP networks including insignificant asset management automation system. The development background is to create an operational platform that would manage the power consumption and operational resources in order to reduce the overall running operational cost. This paper will debate the smart infrastructure development framework and the surveying positional accuracy of locating the assets as a base of the smart city development architecture integrated with all the facilities and systems related to the smart city framework. The paper will discuss also the main advantages of the proposed architecture including the quantifiable and non quantifiable benefits.Smart Infrastructure, GIS, Smart City, Geopsatial application, Infrastructure Development, Infrastructure Monitoring.
    • 

    corecore