26,941 research outputs found

    Modeling Virtual Organization Architecture with the Virtual Organization Breeding Methodology

    Full text link
    While Enterprise Architecture Modeling (EAM) methodologies become more and more popular, an EAM methodology tailored to the needs of virtual organizations (VO) is still to be developed. Among the most popular EAM methodologies, TOGAF has been chosen as the basis for a new EAM methodology taking into account characteristics of VOs presented in this paper. In this new methodology, referred as Virtual Organization Breeding Methodology (VOBM), concepts developed within the ECOLEAD project, e.g. the concept of Virtual Breeding Environment (VBE) or the VO creation schema, serve as fundamental elements for development of VOBM. VOBM is a generic methodology that should be adapted to a given VBE. VOBM defines the structure of VBE and VO architectures in a service-oriented environment, as well as an architecture development method for virtual organizations (ADM4VO). Finally, a preliminary set of tools and methods for VOBM is given in this paper.Comment: 9 pages, 4 figure

    An agent-based framework for selection of partners in dynamic virtual enterprises

    Get PDF
    Advances in computer networking technology and open system standards have made practically feasible to create and manage virtual enterprises. A virtual enterprise, VE, is usually defined as a temporary alliance of enterprises that come together to share their skills, core competencies, and resources in order to better respond to business opportunities, and whose cooperation is supported by computer networks. The materialization of this paradigm, although enabled by recent advances in communication technologies, computer networks and logistics, requires an appropriate architectural framework and support tools. In this paper we propose an agent-based model of a dynamic VE to support the different selection processes that are used in selecting the partners for a dynamic VE, where the partners of a VE are represented by agents. Such a framework will form the basis for tools that provide automated support for creation, and operation, of dynamic virtual enterprises

    Agile and Pro-Active Public Administration as a Collaborative Networked Organization

    Full text link
    In highly competitive, globalized economies and societies of always-on-line people intensively using the Internet and mobile phones, public administrations have to adapt to new challenges. Enterprises and citizens expect public administrations to be agile and pro-active to foster development. A way to achieve agility and pro-activity is application of a model of Collaborative Network Organizations in its two forms: Virtual Organizations (VO) and Virtual Organization Breeding Environments (VOBE). In the paper, advantages are shown of public administration playing a role of a Virtual Organization customer on the one hand, and a Virtual Organization member on the other hand. It is also shown how public administration playing a role of a Virtual Organization Breeding Environment may improve its agility and promote advanced technologies and management methods among local organizations. It is argued in the paper that public administration should provide a Virtual Organization Breeding Environment as a part of public services.Comment: 6 pages, 2 figure

    Value-driven partner search for <i>Energy from Waste</i> projects

    Get PDF
    Energy from Waste (EfW) projects require complex value chains to operate effectively. To identify business partners, plant operators need to network with organisations whose strategic objectives are aligned with their own. Supplier organisations need to work out where they fit in the value chain. Our aim is to support people in identifying potential business partners, based on their organisation’s interpretation of value. Value for an organisation should reflect its strategy and may be interpreted using key priorities and KPIs (key performance indicators). KPIs may comprise any or all of knowledge, operational, economic, social and convenience indicators. This paper presents an ontology for modelling and prioritising connections within the business environment, and in the process provides means for defining value and mapping these to corresponding KPIs. The ontology is used to guide the design of a visual representation of the environment to aid partner search

    Business models and information systems for sustainable development

    Get PDF
    Businesses are expected to explore market opportunities in the area of sustainable development, thus contributing to finding solutions aiming at sustainable quality of life. This will require adaptation and innovation of business models and information systems, with challenges of particular interest to the business modeling and software design community. This paper briefly discusses two relevant topics in this respect, namely (i) goal and value modeling, and (ii) model-driven development. We mention existing work that can be taken as a starting point for addressing sustainability issues, and we make some observations that may be taken into account when extending existing work

    An extensible manufacturing resource model for process integration

    Get PDF
    Driven by industrial needs and enabled by process technology and information technology, enterprise integration is rapidly shifting from information integration to process integration to improve overall performance of enterprises. Traditional resource models are established based on the needs of individual applications. They cannot effectively serve process integration which needs resources to be represented in a unified, comprehensive and flexible way to meet the needs of various applications for different business processes. This paper looks into this issue and presents a configurable and extensible resource model which can be rapidly reconfigured and extended to serve for different applications. To achieve generality, the presented resource model is established from macro level and micro level. A semantic representation method is developed to improve the flexibility and extensibility of the model

    VALIDATING COOPERATIVE SYSTEMS SIMULATION AND REMODELING FOR PUMP COVER DESIGN AND MANUFACTURING IN A VIRTUAL ENTERPRISE

    Get PDF
    In order to integrate the manufacturing systems in virtual environment some changes must be made in manufacturing systems architecture. To support this environment, the basic infrastructure for the enterprise must to consider two main modules: The Internal Module, that represents the autonomous unit of a particular company and includes the manufacturing system, the complete structure of the company information (databases, information system etc.) and all the decision making processes;virtual enterprise, manufacturing systems, remodeling, simulation, cooperative systems

    Value-driven Security Agreements in Extended Enterprises

    Get PDF
    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example
    corecore