26,941 research outputs found
Modeling Virtual Organization Architecture with the Virtual Organization Breeding Methodology
While Enterprise Architecture Modeling (EAM) methodologies become more and
more popular, an EAM methodology tailored to the needs of virtual organizations
(VO) is still to be developed. Among the most popular EAM methodologies, TOGAF
has been chosen as the basis for a new EAM methodology taking into account
characteristics of VOs presented in this paper. In this new methodology,
referred as Virtual Organization Breeding Methodology (VOBM), concepts
developed within the ECOLEAD project, e.g. the concept of Virtual Breeding
Environment (VBE) or the VO creation schema, serve as fundamental elements for
development of VOBM. VOBM is a generic methodology that should be adapted to a
given VBE. VOBM defines the structure of VBE and VO architectures in a
service-oriented environment, as well as an architecture development method for
virtual organizations (ADM4VO). Finally, a preliminary set of tools and methods
for VOBM is given in this paper.Comment: 9 pages, 4 figure
An agent-based framework for selection of partners in dynamic virtual enterprises
Advances in computer networking technology and open system standards have made practically
feasible to create and manage virtual enterprises. A virtual enterprise, VE, is usually defined as a
temporary alliance of enterprises that come together to share their skills, core competencies, and
resources in order to better respond to business opportunities, and whose cooperation is supported by
computer networks.
The materialization of this paradigm, although enabled by recent advances in communication
technologies, computer networks and logistics, requires an appropriate architectural framework and
support tools.
In this paper we propose an agent-based model of a dynamic VE to support the different selection
processes that are used in selecting the partners for a dynamic VE, where the partners of a VE are
represented by agents. Such a framework will form the basis for tools that provide automated support
for creation, and operation, of dynamic virtual enterprises
Agile and Pro-Active Public Administration as a Collaborative Networked Organization
In highly competitive, globalized economies and societies of always-on-line
people intensively using the Internet and mobile phones, public administrations
have to adapt to new challenges. Enterprises and citizens expect public
administrations to be agile and pro-active to foster development. A way to
achieve agility and pro-activity is application of a model of Collaborative
Network Organizations in its two forms: Virtual Organizations (VO) and Virtual
Organization Breeding Environments (VOBE). In the paper, advantages are shown
of public administration playing a role of a Virtual Organization customer on
the one hand, and a Virtual Organization member on the other hand. It is also
shown how public administration playing a role of a Virtual Organization
Breeding Environment may improve its agility and promote advanced technologies
and management methods among local organizations. It is argued in the paper
that public administration should provide a Virtual Organization Breeding
Environment as a part of public services.Comment: 6 pages, 2 figure
Value-driven partner search for <i>Energy from Waste</i> projects
Energy from Waste (EfW) projects require complex value chains to operate effectively. To identify business partners, plant operators need to network with organisations whose strategic objectives are aligned with their own. Supplier organisations need to work out where they fit in the value chain. Our aim is to support people in identifying potential business partners, based on their organisation’s interpretation of value. Value for an organisation should reflect its strategy and may be interpreted using key priorities and KPIs (key performance indicators). KPIs may comprise any or all of knowledge, operational, economic, social and convenience indicators. This paper presents an ontology for modelling and prioritising connections within the business environment, and in the process provides means for defining value and mapping these to corresponding KPIs. The ontology is used to guide the design of a visual representation of the environment to aid partner search
Business models and information systems for sustainable development
Businesses are expected to explore market opportunities in the area of sustainable development, thus contributing to finding solutions aiming at sustainable quality of life. This will require adaptation and innovation of business models and information systems, with challenges of particular interest to the business modeling and software design community. This paper briefly discusses two relevant topics in this respect, namely (i) goal and value modeling, and (ii) model-driven development. We mention existing work that can be taken as a starting point for addressing sustainability issues, and we make some observations that may be taken into account when extending existing work
An extensible manufacturing resource model for process integration
Driven by industrial needs and enabled by process technology and information technology, enterprise integration is rapidly shifting from information integration to process integration to improve overall performance of enterprises. Traditional resource models are established based on the needs of individual applications. They cannot effectively serve process integration which needs resources to be represented in a unified, comprehensive and flexible way to meet the needs of various applications for different business processes. This paper looks into this issue and presents a configurable and extensible resource model which can be rapidly reconfigured and extended to serve for different applications. To achieve generality, the presented resource model is established from macro level and micro level. A semantic representation method is developed to improve the flexibility and extensibility of the model
VALIDATING COOPERATIVE SYSTEMS SIMULATION AND REMODELING FOR PUMP COVER DESIGN AND MANUFACTURING IN A VIRTUAL ENTERPRISE
In order to integrate the manufacturing systems in virtual environment some changes must be made in manufacturing systems architecture. To support this environment, the basic infrastructure for the enterprise must to consider two main modules: The Internal Module, that represents the autonomous unit of a particular company and includes the manufacturing system, the complete structure of the company information (databases, information system etc.) and all the decision making processes;virtual enterprise, manufacturing systems, remodeling, simulation, cooperative systems
Value-driven Security Agreements in Extended Enterprises
Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example
- …