首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Ohne Zusammenfassung This article is also available in English via http://www.springerlink.com and http://www.bise-journal.org: Winter R, Krcmar H, Sinz EJ, Zelewski S, Hevner AR (2008) What in Fact is Fundamental Research in Business and Information Systems Engineering? Bus Inf Syst Eng. doi: .
Robert WinterEmail:
  相似文献   

3.
Ohne Zusammenfassung
Albert EndresEmail:
  相似文献   

4.
Over the last few years Grid computing has attracted considerable attention from the industry, because it offers opportunities for new on-demand business services for enterprises. In this article, we depict the current trend of enterprises to source Grid services offered by third-party utility providers on a use-on-demand, pay-per-use basis, thus leading to faster IT response to changing business needs. We outline the emerging expansion of Grid computing in industry and discuss the significant challenges still needing to be solved to further promote the adoption of Grid technology in the business domain.  相似文献   

5.
This contribution provides an introduction to the Common Information Model CIM which is an international standard maintained by the International Electrotechnical Commission IEC. Today’s market requirements towards the model are discussed, furthermore, we give an introduction to the history of the CIM, its serializations and scope of application. The contribution concludes with an overview of future use of the CIM for both science and commerce. Briefly, we focus on:
  • Message-based loose coupling of information systems
  • Exchange of power grid topologies with minimal communication and data overhead
  • Data quality assurance using ontology-based meta annotations and
  • Integration of heterogeneous standards in the utility domain. The contribution presents solutions to the use cases providing a better information management for the utility utilizing the Common Information Model.
  •   相似文献   

    6.

    Dokumentation

    Entschlie?ungen vom 24. Juni 2010 Konferenz der Informationsfreiheitsbeauftragten in Deutschland  相似文献   

    7.
    Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items, multiple units, or multiple attributes of an item, as they can be regularly found in procurement. Combinatorial auctions, for example, enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g., decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:
  • It is often necessary to consider qualitative attributes or volume discounts in bundle bids. These complex bid types have not been sufficiently analyzed.
  • The winner determination problem requires the consideration of a number of additional business constraints, such as limits on the spend on a particular supplier or the number of suppliers.
  • Iterative combinatorial auctions have a number of advantages in practical applications, but they also lead to new problems in the determination of ask prices.
  • In this paper, we will discuss fundamental problems in the design of combinatorial auctions and the particularities of procurement applications. Reprint of an article from WIRTSCHAFTSINFORMATIK 47(2)2005:126–134.  相似文献   

    8.

    RezensionenVeranstaltungen

    Dagmar Boedicker, Stefan Hügel Dialektik der Informationssicherheit, Jahrestagung 2011 des FIfF in Kooperation mit der Hochschule München  相似文献   

    9.
    Zusammenfassung  Nachdruck eines Aufsatzes aus elektronische datenverarbeitung 11(11)1969:544–548. This article is also available in English via and : Grochla E (2008) Corporate Information Systems Engineering and Business and Information Systems Engineering as a Necessary Application-Oriented Extension of General Computer Science – Proposals for Enhancing Academic Education in the Field of Automated Data Processing in the Federal Republic of Germany. Bus Inf Syst Eng. doi .
      相似文献   

    10.

    Dokumentation

    Konferenz der Datenschutzbeauftragten des Bundes und der L?nder Entschlie?ung vom 11. Oktober 2008 (bei Enthaltung von Schleswig-Holstein)  相似文献   

    11.
    Am 25. Januar 2012 hat die Europ?ische Kommission eine lang erwartete Neuregelung für den Datenschutz in der Union vorgelegt. Es handelt sich um den Entwurf einer Datenschutz-Grundverordnung und den Entwurf einer Richtlinie im Bereich von Strafverfolgung und Gefahrenabwehr. Der nachfolgende Beitrag befasst sich in erster Linie mit der geplanten Verordnung, die unionsweit ein „vollharmonisiertes“ Datenschutzrecht anstrebt. Inhaltlich bietet der Entwurf wesentliche Neuerungen, die nicht nur den wirtschaftsbezogenen Datenfluss in der Union einheitlichen Standards unterwerfen sollen. Gleichzeitig soll die Regelungsbefugnis der Kommission erheblich ausgebaut und Umsetzungsspielr?ume der Mitgliedstaaten abgebaut werden. Im Ganzen soll die Grundverordnung im Unterschied zur vorausgegangenen Richtlinie aus dem Jahre 1995 in allen Mitgliedstaaten unmittelbar gelten. Der Beitrag befasst sich kritisch mit wesentlichen Fragen der geplanten Neuregelung.  相似文献   

    12.

    Dokumentation

    Konferenz der Datenschutzbeauftragten des Bundes und der L?nder Entschlie?ung vom 16. April 2009  相似文献   

    13.

    Dokumentation

    Entschlie?ungen vom 6./7. November 2008 in Bonn 76. Konferenz der Datenschutzbeauftragten des Bundes und der L?nder  相似文献   

    14.
    Ohne Zusammenfassung This article is also available in English via and : Winter R, Baskerville R (2009) BISE – Call for Papers, Issue 5/2010, Science of Business and Information Systems Engineering. Bus Inf Syst Eng. doi: 10.1007/s12599-009-0047-2.  相似文献   

    15.
    16.
    IT solutions are customer-specific and integrated bundles of hardware products, software products, and services. The SCORE method helps providers of IT solutions to benefit from a successive standardization and reuse of non-differentiating product-service-bundles. As a comprehensive standardization of IT solutions is likely to fail, the SCORE methods supports the successive modularization of IT solutions. In particular, the method suggests identifying system service modules that capture single hardware and software components as well as their associated services to support a simultaneous standardization and reuse of product-service-bundles in the small. An example illustrates how the application of the method improves the development of custom IT solutions.  相似文献   

    17.
    18.

    Dokumentation

    Entschlie?ungen vom 08/09 Oktober 2009 in Berlin 78. Konferenz der Datenschutzbeauftragten des Bundes und der L?nder — Entschlie?ungen  相似文献   

    19.
    The paper argues that attitudes to SOA follow a typical hype cycle from Technological Trigger, Peak of Inflated Expectations, and a Trough of Disillusionment to the more recent realization that SOA is a concept that may offer certain benefits but has several limitations. The main research question studies how the attitude to SOA changes in various phases of the hype cycle, how the SOA implementation cycle and an increase in business process maturity (BPMa) are interconnected and which factors influence the transition between the hype cycle phases. The paper shows that an organization??s success with implementing SOA depends on its ability to match the SOA implementation with an increase in BPMa. The dual purpose of implementing SOA is shown in the first framework: to assure the coherence of IT assets and to assure business/IT alignment. In the second framework, the interconnection of SOA and BPMa and its role in transiting through the hype cycle phases is outlined. The findings are analyzed using a longitudinal case study of a large Slovenian company.  相似文献   

    20.

    DuD Report

    Die Datenschutzbeauftragten in Beh?rde und Betrieb. 9. Auflage der Info 4 des BfDI  相似文献   

    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号