178,667 research outputs found

    The impact of enterprise application integration on information system lifecycles

    Get PDF
    Information systems (IS) have become the organisational fabric for intra-and inter-organisational collaboration in business. As a result, there is mounting pressure from customers and suppliers for a direct move away from disparate systems operating in parallel towards a more common shared architecture. In part, this has been achieved through the emergence of new technology that is being packaged into a portfolio of technologies known as enterprise application integration (EAI). Its emergence however, is presenting investment decision-makers charged with the evaluation of IS with an interesting challenge. The integration of IS in-line with the needs of the business is extending their identity and lifecycle, making it difficult to evaluate the full impact of the system as it has no definitive start and/or end. Indeed, the argument presented in this paper is that traditional life cycle models are changing as a result of technologies that support their integration with other systems. In this paper, the need for a better understanding of EAI and its impact on IS lifecycles are discussed and a classification framework proposed.Engineering and Physical Sciences Research Council (EPSRC) Grant Ref: (GR/R08025) and Australian Research Council (DP0344682)

    Value-driven Security Agreements in Extended Enterprises

    Get PDF
    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example

    CoMoNo: A Communication Model and Notation Supporting the Analysis and Planning of Communication Infrastructure

    Get PDF
    The amount of exchanged information and the choice of possible communication media in engineering increased because of the rise of computer mediated communication and web 2.0 technologies in the recent decades. While many people have adopted a broad range of new communication tools in their personal life, the application of these technologies in enterprise environments is lagging behind. Preceding this development, scholars from various domains started to look at the phenomenon communication from a scientific perspective. In 1928, Hartley developed early mathematical models for a quantitative measure of information. Critical Mass Theory analysed the usage patterns involved in the adoption of interactive media while Media Richness Theory, Media Synchronicity Theory, Task-Technology-Fit Theory, and Enterprise 2.0 study the selection of appropriate media. Product development approaches like simultaneous engineering, concurrent design, and the management of trust between cooperation partners enable more complex processes. The resulting lower depth of in-house development in turn leads to an increase in communication intensity and complexity. This increasing elaborateness of interactions in businesses led to the development of new business process modelling approaches. Standards like the Business Process Model and Notation (BPMN) enable automated evaluation of the interactively created models. Although BPMN includes models and diagrams focussing on communication processes, they only capture very basic information. Because of the increasing intensity and complexity of communication in product development, it is necessary to improve the way communication processes and the related infrastructure can be analysed and planned. This dissertation argues that neither media selection theories nor business process modelling alone can offer the benefits an integrated approach can deliver. For a comprehensive analysis of communication processes and the related communication infrastructure, aspects from both fields need to be amalgamated. The concept presented here defines a Communication Model and Notation (CoMoNo) with extended communication characteristics derived from Media Richness Theory, Media Synchronicity Theory, Task-Technology Fit Theory, and the Enterprise 2.0 approach. Based on the extended model and notation, the concept provides methods for the analysis of communication processes and the planned introduction of appropriate communication media. A prototypical implementation of the CoMoNo concept was applied to a case study at the Collaborative Research Center 666 – Integral Sheet Metal Design with Higher Order Bifurcations – Development, Production, Evaluation (CRC 666). In a series of interviews, the communication processes of the CRC666 were captured in order to support the evaluation of the proposed model, notation, and methods. 16 of 18 interviewees judged the model and notation as helpful during the interview. 17 considered the notation as easy to understand. According to the analysis based on the gathered data, the CRC666 has a generally well-adapted communication infrastructure, which could benefit from a desktop video-conferencing solution. As an outlook, the identified remaining discrepancies between communication requirements and existing communication media could be used to drive the development of new media

    CrossFlow: Cross-Organizational Workflow Management for Service Outsourcing in Dynamic Virtual Enterprises

    Get PDF
    In this report, we present the approach to cross-organizational workflow management of the CrossFlow project. CrossFlow is a European research project aiming at the support of cross-organizational workflows in dynamic virtual enterprises. The cooperation in these virtual enterprises is based on dynamic service outsourcing specified in electronic contracts. Service enactment is performed by dynamically linking the workflow management infrastructures of the involved organizations. Extended service enactment support is provided in the form of cross-organizational transaction management and process control, advanced quality of service monitoring, and support for high-level flexibility in service enactment. CrossFlow technology is realized on top of a commercial workflow management platform and applied in two real-world scenarios in the contexts of a logistics and an insurance company

    An extensible manufacturing resource model for process integration

    Get PDF
    Driven by industrial needs and enabled by process technology and information technology, enterprise integration is rapidly shifting from information integration to process integration to improve overall performance of enterprises. Traditional resource models are established based on the needs of individual applications. They cannot effectively serve process integration which needs resources to be represented in a unified, comprehensive and flexible way to meet the needs of various applications for different business processes. This paper looks into this issue and presents a configurable and extensible resource model which can be rapidly reconfigured and extended to serve for different applications. To achieve generality, the presented resource model is established from macro level and micro level. A semantic representation method is developed to improve the flexibility and extensibility of the model

    Planning strategically, designing architecturally : a framework for digital library services

    Get PDF
    In an era of unprecedented technological innovation and evolving user expectations and information seeking behaviour, we are arguably now an online society, with digital services increasingly common and increasingly preferred. As a trusted information provider, libraries are in an advantageous position to respond, but this requires integrated strategic and enterprise architecture planning, for information technology (IT) has evolved from a support role to a strategic role, providing the core management systems, communication networks, and delivery channels of the modern library. Further, IT components do not function in isolation from one another, but are interdependent elements of distributed and multidimensional systems encompassing people, processes, and technologies, which must consider social, economic, legal, organisational, and ergonomic requirements and relationships, as well as being logically sound from a technical perspective. Strategic planning provides direction, while enterprise architecture strategically aligns and holistically integrates business and information system architectures. While challenging, such integrated planning should be regarded as an opportunity for the library to evolve as an enterprise in the digital age, or at minimum, to simply keep pace with societal change and alternative service providers. Without strategy, a library risks being directed by outside forces with independent motivations and inadequate understanding of its broader societal role. Without enterprise architecture, it risks technological disparity, redundancy, and obsolescence. Adopting an interdisciplinary approach, this conceptual paper provides an integrated framework for strategic and architectural planning of digital library services. The concept of the library as an enterprise is also introduced

    Competences of IT Architects

    Get PDF
    The field of architecture in the digital world uses a plethora of terms to refer to different kinds of architects, and recognises a confusing variety of competences that these architects are required to have. Different service providers use different terms for similar architects and even if they use the same term, they may mean something different. This makes it hard for customers to know what competences an architect can be expected to have.\ud \ud This book combines competence profiles of the NGI Platform for IT Professionals, The Open Group Architecture Framework (TOGAF), as well as a number of Dutch IT service providers in a comprehensive framework. Using this framework, the book shows that notwithstanding a large variety in terminology, there is convergence towards a common set of competence profiles. In other words, when looking beyond terminological differences by using the framework, one sees that organizations recognize similar types of architects, and that similar architects in different organisations have similar competence profiles. The framework presented in this book thus provides an instrument to position architecture services as offered by IT service providers and as used by their customers.\ud \ud The framework and the competence profiles presented in this book are the main results of the special interest group “Professionalisation” of the Netherlands Architecture Forum for the Digital World (NAF). Members of this group, as well as students of the universities of Twente and Nijmegen have contributed to the research on which this book is based
    • …
    corecore