共查询到20条相似文献,搜索用时 250 毫秒
1.
针对当前网络环境中基于用户真实身份安全管控需求与用户隐私保护需求之间的矛盾,引入主管机构作为可信方,将用户的真实身份管理与虚拟业务账号管理独立开来,建立两层架构的可信身份服务平台。平台通过身份绑定机制,建立用户业务账号与其真实身份之间的映射关系,实现基于真实身份的信任保障;并根据业务的应用场景配置策略为其提供用户属性,以保障用户隐私安全。 相似文献
2.
Although business model innovations are decisive for a company's long‐term success or failure, they are still poorly understood compared to product innovations. Thus, their execution is imperfectly supported, and their organizational accountability is insufficiently regulated. In this paper, we systematically investigate similarities and differences between product and business model innovation to assess the potential of transferring insights and best practices. Therefore, we condense key findings of product innovation management into a framework as a basis for the analysis of 11 current cases of business model innovation. This paper intends to contribute to a better understanding of the options that exist for business model innovation. We derive implications for an improved management of business model innovation based on the cases analysed. For the innovation process and its organizational anchoring, we disclose potential benefits of a more structured and holistic approach. 相似文献
3.
Mitsuru Kodama 《Creativity & Innovation Management》2000,9(2):115-130
This paper discusses the basic framework of strategic community management. It will be argued that a community producer creates, based on his vision, a concept of a business community comprised of diverse types of businesses and processes to achieve business innovation. The producer serves an important function in creating a strategic community. A regional initiative towards electronic networking will be studied that illustrates the use of information and multimedia technologies as an instance of the latest business case of strategic community management. It shows how a community producer has created a strategic community in which the central government, regional government, universities, hospitals, private businesses and Not for Profit Organizations take part in the advancement of regional electronic networking. 相似文献
4.
Research on dynamic capabilities is an emerging field: it studies the activities of firms during turbulent administrative environments. Current management interests are also focused on knowledge management as a major determinant of business excellence and competitive advantage. Our motivation for this paper was to answer the research question: Does knowledge management (KM) contribute to the enhancement of dynamic capabilities and thus to the enhancement of business excellence and competitive advantage? Our effort examined the use of KM in enhancing dynamic capabilities. Based on results from a survey of major Taiwanese firms, we tested a set of hypotheses with regression models. Empirical findings suggest that management of both endogenous and exogenous knowledge through IT applications significantly enhances dynamic capabilities. 相似文献
5.
6.
Since its market release in late 1994, the FirstSTEP toolset developed by Interfacing Technologies of Montreal, Canada has been proven to be one of the most practical solutions for business process management initiatives. Being a methodology independent enterprise modeling and simulation application, FirstSTEP has been adopted by industry leaders from such diversified sectors as manufacturing, finance, telecom, healthcare, public, and others. Its concept and approach are compatible to the
framework. Most notably is the user front-end simplicity that has enabled its acceptance by the typical business manager who is not usually academic in his/her approach. The paper presents the FirstSTEP tool suite, its concept and approach and demonstrates its capabilities using an application with a most recent FirstSTEP user — America Online. 相似文献
7.
《Information Security Journal: A Global Perspective》2013,22(3):128-134
ABSTRACT Business impact analysis (BIA) is an important process that probes into business processes to determine and list critical processes that are vital to keep the business going. It is necessary to understand business environments, gather data and information, identify critical processes needed to carry out vital business operations and finally prepare a BIA report enlisting your findings to be submitted to the top management. Efforts toward consideration of internal and external environments and risks that impact financial position as well as the goodwill of the organization must be considered. Effectiveness of the business impact analysis is reflected by the management's commitment of people and technological resources to mitigate risks of business continuity projected by your findings. Buy-in is important to make the Business Continuity Management System efficient and sustainable by providing funding and setting a system for management oversight on a continuous basis. 相似文献
8.
The goal of this research is to define a method for configuring a collaborative business rules management solution from a value proposition perspective. In an earlier published study (Business rules management solutions: added value by means of business interoperability. In: van Sinderen M, Oude Luttighuis P, Folmer E, Bosms S (eds), International IFIP working conference on enterprise interoperability, vol 144. Springer, Twente, pp 145–157, 2013) we took a business rules perspective on interorganisational collaboration optimization, when we addressed the question what the relation was between types of business interoperability and an organisation’s business rules management solution. Different types of collaboration were defined and subsequently combined with eleven identified types of service systems; these service systems together make up the business rules management solution. In this paper we re-address and -present our earlier work, yet based on the findings, we extend it with the construction of a method for determining the configuration of collaborative business rules management solutions. This method is tested by applying it to a case study at an alliance of airlines. Presented results provide a grounded basis from which empirical and practical research on business rules management solutions can be further explored. 相似文献
9.
张宗利 《数字社区&智能家居》2010,(1)
提出了基于B/S和C/S混合模式的高校留学生教务管理信息系统的开发设计方案,根据留学生教育和教学管理的具体特点,分析了留学生教务管理系统的业务流程、结构、基本功能及实现方法。 相似文献
10.
Moisés Castelo Branco Yingfei Xiong Krzysztof Czarnecki Jochen Küster Hagen Völzer 《Software and Systems Modeling》2014,13(3):913-940
Organizations that adopt process modeling often maintain several co-existing models of the same business process. These models target different abstraction levels and stakeholder perspectives. Maintaining consistency among these models has become a major challenge for such organizations. Although several academic works have discussed this challenge, little empirical investigation exists on how people perform process model consistency management in practice. This paper aims to address this lack by presenting an in-depth empirical study of a business-driven engineering process deployed at a large company in the banking sector. We analyzed more than 70 business process models developed by the company, including their change history, with over 1,000 change requests. We also interviewed 9 business and IT practitioners and surveyed 23 such practitioners to understand concrete difficulties in consistency management, the rationales for the specification-to-implementation refinements found in the models, strategies that the practitioners use to detect and fix inconsistencies, and how tools could help with these tasks. Our contribution is a set of eight empirical findings, some of which confirm or contradict previous works on process model consistency management found in the literature. The findings provide empirical evidence of (1) how business process models are created and maintained, including a set of recurrent patterns used to refine business-level process specifications into IT-level models; (2) what types of inconsistencies occur; how they are introduced; and what problems they cause; and (3) what stakeholders expect from tools to support consistency management. 相似文献
11.
12.
随着知识管理第二阶段的到来,大多数企业中基于客户机/服务器或浏览器/服务器架构的知识管理系统的弊端日益突出。以指数级增长的网络信息资源及其访问量以及以同样速度递增的网络用户,极大地阻碍了人们有效地共享和管理各种网络资源。而现有的网络存储技术并不能有效地缓解存储压力。因此,论文提出了基于信息空间模型的网络信息资源存储网格方案来解决现有知识管理系统中存在的若干问题。在系统分析了导致现有知识管理系统存在相关弊端的根源并介绍了存储网络的相关研究后,详细介绍了信息空间模型,并在此基础上对各种网络信息资源进行了统一的、标准化的描述。然后给出了基于信息空间模型的网络信息资源存储网格的系统框架。在该环境下,统一组织和描述的各种网络信息资源分别存储在每一个分布式的网络终端,不仅有效解决了指数级增长的信息对存储容量的需求,而且能够有效消除“信息孤岛”现象,实现了负载均衡。而且,终端用户利用统一的语义映像能够实现对各种网络信息资源的共享与管理,极大地提高了资源的利用效率。基于信息空间模型的网格信息资源存储网格方案还极大地提高了系统的动态扩展性能。 相似文献
13.
Enterprises in today’s networked economy face numerous information management challenges, both from a process management perspective
as well as a decision support perspective. While there have been significant relevant advances in the areas of business process
management as well as decision sciences, several open research issues exist. In this paper, we highlight the following key
challenges. First, current process modeling and management techniques lack in providing a seamless integration of decision
models and tools in existing business processes, which is critical to achieve organizational objectives. Second, given the
dynamic nature of business processes in networked enterprises, process management approaches that enable organizations to
react to business process changes in an agile manner are required. Third, current state-of-the-art decision model management
techniques are not particularly amenable to distributed settings in networked enterprises, which limits the sharing and reuse
of models in different contexts, including their utility within managing business processes. In this paper, we present a framework
for decision-enabled dynamic process management that addresses these challenges. The framework builds on computational formalisms,
including the structured modeling paradigm for representing decision models, and hierarchical task networks from the artificial
intelligence (AI) planning area for process modeling. Within the framework, interleaved process planning (modeling), execution
and monitoring for dynamic process management throughout the process lifecycle is proposed. A service-oriented architecture
combined with advances from the semantic Web field for model management support within business processes is proposed. 相似文献
14.
In organisations where information security has historically been a part of management and for which the risk assessment methodologies
have been designed there are established methods for communicating risk. This is the case for example in the banking and military
sectors. However in organisations where information security is not embedded into management thinking and where the relationship
between information security and the business is less clear-cut, communicating the risks to the business is less straightforward.
In such circumstances it has been observed during field research that information security risk assessments frequently output
findings to which the business cannot relate and the process is consequently often viewed as a “tick box” exercise, as opposed
to one that provides real value to the business. In such a situation the information security risk assessment is divorced
from the business process and not embedded into the organisation’s processes or thinking. The research for this paper was
undertaken in order to identify what needs to be done in order to ensure that businesses of this type find the risk assessment
process valuable in practice.
Lizzie Coles-Kemp is a postgraduate research student in Computer Science and Richard E. Overill is a Senior Lecturer in Computer
Science. 相似文献
15.
16.
17.
Pradeep Ray Michael Fry Bhumip Khasnabish 《Journal of Network and Systems Management》1999,7(1):105-126
With the increasing implementation by networkedmission-critical applications, an enterprise network isbecoming the lifeline of an organization. Massiveinvestments are being made in the modernization of enterprise networks of diverse serviceorganizations, such as telecommunications andhealth-care providers. Organizations need to adapt tochanging business environment, such as the deregulationof telecommunication services. This necessitates a seamlessintegration of business management processes withenterprise network management processes. Hence there isa need for the formulation of new methodologies for there-engineering of management solutions (with focus onintegrated business processes), though most present daysolutions concentrate on the management of networkequipment only. This paper presents a new methodologyfor the reengineering of the management processesfor enterprise networks, based on Computer SupportedCooperative Work (CSCW) techniques. 相似文献
18.
In this paper we address the concept of business architecture. We explain the concept and, based on a case study, discuss
its relevance, operation, relationship with strategy and business models, and value for an organization. We also shortly discuss
the approach that was taken to create the business architecture; how it was based on and derived from the business strategy.
Business architectures contribute to clarify the complexity within an organization and form a useful starting point from which
to develop subsequent functional, information, process and application architectures. We clarify these relationships through
an architecture linkage model. Having an explicit business architecture also helps to structure the responsibilities within
an organization, and to shape outsourcing activities, within the primary process as well as with regard to ICT-support. Business
architectures contribute to an adequate ICT-governance in order to orchestrate the resources for critical business activities
and how to manage the development and support for e-business efficiently.
Gerrit Versteeg is managing partner/business architect for FourPoints Intelligence and has almost twenty years of experience in designing
architectures for a variety of large customers. He graduated with honors in Strategic Management at Rotterdam School of Management
(Erasmus University) and is currently pursuing his PhD researching the field of Business Architecture at Delft University
of Technology.
Harry Bouwman is an associate professor at Delft University of Technology, Information and Communication Technology, Faculty Technology,
Policy and Management. He served as an interim chair of the ICT-section in the period 2000–2002 and in 2004. He studied political
science at the Free University of Amsterdam (1979). He is specialized in research methods and techniques, statistic and communication
sciences. He followed courses in the domain of Computer Science at the Open University (1985–86). He received his PhD at Catholic
University Nijmegen in 1986 at the Faculty of Social Science. Fields of interest:—ICT and organizations, strategic management
in relation to ICT-management, Business Architecture;- Business models, Customer Value, Network formation, specifically with
regard to 3G+ Mobile telecommunications services;- Innovation Management, ICT-entrepreneurship, high-tech ICT clusters or
technopoles, incubators, role of national and local governments, and - Technology neutral regulation of telecommunication,
(history of) Internet, Interconnection issues, QoS, telecommunication management. 相似文献
19.
20.
John Diebold 《WIRTSCHAFTSINFORMATIK》2009,51(1):94-97
The potentialities of computers have not been fully exploited in the U.S. because management has underestimated the task of putting them to proper use. Management has believed that computers themselves are automation. But automation places a premium on good management. Without careful management planning, business resources are wasted in terms of managerial and technical time and abilities. Since computers are capable of handling many tasks simultaneously, it is only by casting aside the departmental concept and substituting the integrated systems approach that the true value of these machines begins to be appreciated. Automatic data processing provides for the tighter control that is important in competitive markets. The key to the whole problem of putting automation to work is education of personnel. Knowledge of equipment and techniques is not enough. Automation, by permitting handling of many jobs simultaneously, is in direct conflict with the concept of division of labor. The businessman, faced with wholesale reorganization of work, must train more basically and broadly. Current training for this field is largely dependent upon specialized courses offered by the manufactures of computers. The responsibility for training these people is largely that of private business, and it is a larger task than most managers realize. If a businessman is to feel confident that his company’s data processing is not just a gamble, he must accept this new challenge to management. Reprint of a paper from elektronische datenverarbeitung 1(1)1959:20–23. 相似文献