首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper addresses executive information systems (EIS) development in an emerging economy. In particular, it examines EIS development in Thailand, a nation that is more representative of the majority of emerging economies in the South East Asian region than the four Asian Tigers (Singapore, Hong Kong, Taiwan and South Korea). Case studies of the development of four systems in large Thai organizations are presented. The analysis of the cases and their comparison to a benchmark study gives rise to the concept of EIS cultural fit, a concept that adds to our understanding of the reasons for the success and failure of EIS projects in emerging economies. The cases also raise questions about using outsourcing as a development strategy for EIS in emerging economies.  相似文献   

2.
The origins and history of a single case study of large-scale Information Technology (IT) outsourcing in the 1994–99 period is investigated in the United Kingdom Defence sector. Such deals are high risk and the paper describes types of risk and how the client organization sought to mitigate these. These risks and mitigation approaches are then analysed against a distinctive risk framework formulated for IT outsourcing. Risks emerging in terms of type and scope of outsourcing, vendor selection criteria and process, the role of the contract, retained capabilities and management processes, and partnering and relationship dimensions are then assessed against prior research findings. Two additional distinctive risks are identified from the case history arising from the public sector context and supplier long-term market strategy. A contribution of the paper is the revised risk framework for analysing IT outsourcing that is then presented. Finally, the implications of these findings for future research and practice are highlighted.  相似文献   

3.
The Semantic Web application framework extends Ruby on Rails to enable rapid development of integrated Semantic Web mash-ups. Web applications are mostly database driven. Developers design a database schema and then construct the application logic (which generates Web pages for user interaction) on top of the schema. These applications are centralized and rely on their own relational database, limiting the possibilities for data integration. Mash-ups (often called Web 2.0 applications) are an emerging Web development paradigm that combines functionality from different Web applications.  相似文献   

4.
物流外包信息支持系统的规划与设计   总被引:3,自引:0,他引:3  
刘小群  马士华 《计算机应用》2006,26(2):478-0481
对供应链管理环境下物流外包双方的关系特点进行了研究,并详细分析了这些特点对信息支持系统的具体要求。基于多代理技术和互联网技术,对物流外包信息支持系统的体系结构进行了构建。以知识查询与操纵语言规范(KQML)作为代理间的通讯语言,使用基于消息/对话的形式实现物流外包各参与方间的信息通讯。最后,在对物流外包实施过程中的调度和协调规则进行简要分析后,详细阐述了信息支持系统中各代理相互激活的流程。  相似文献   

5.
In this paper we model schema evolution for XML by defining formal language operators on Visibly Pushdown Languages (VPLs). Our goal is to provide a framework for efficient validation of streaming XML in the realistic setting where the schemas of the exchanging parties evolve and thus diverge from one another. We show that Visibly Pushdown Languages are closed under the defined language operators and this enables us to expand the schemas (for XML) in order to account for flexible or constrained evolution.  相似文献   

6.
How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.  相似文献   

7.
8.
In this paper we consider an approach to developing complex database schemas. Apart from the theoretical model of the approach, we also developed a CASE tool named Integrated Information Systems*Case, R.6.2 (IIS*Case) that supports the practical application of the approach. In this paper the basis of our approach to the design and integration of database schemas and ways of using IIS*Case is outlined. The main features of a new version of IIS*Case, developed in Java, are described. IIS*Case is based on the concept of ‘form type’ and supports the conceptual modelling of a database schema, generating subschemas and integrating them into a relational database schema in 3NF. IIS*Case provides an intelligent support for complex and highly formalized design and programming tasks. Having an advanced knowledge of information systems and database design is not a compulsory prerequisite for using IIS*Case. IIS*Case is based on a methodology of gradual integration of independently designed subschemas into a database schema. The process of independent subschema design may lead to collisions in expressing real‐world constraints. IIS*Case uses specialized algorithms for checking the consistency of constraints embedded in a database schema and its subschemas. This paper briefly outlines the application of the process of detecting collisions, and actions the designer may take to resolve them. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

9.
This paper concerns project scheduling under resource constraints. Traditionally, the objective is to find a unique solution that minimizes the project makespan, while respecting the precedence constraints and the resource constraints. This work focuses on developing a model and a decision support framework for industrial application of the cumulative global constraint. For a given project scheduling, the proposed approach allows the generation of different optimal solutions relative to the alternate availability of outsourcing and resources. The objective is to provide a decision-maker an assistance to construct, choose, and define the appropriate scheduling program taking into account the possible capacity resources. The industrial problem under consideration is modeled as a constraint satisfaction problem (CSP). It is implemented under the constraint programming language CHIP V5. The provided solutions determine values for the various variables associated to the tasks realized on each resource, as well as the curves with the profile of the total consumption of resources on time.  相似文献   

10.
文章在分析云计算安全风险的基础上,阐述了云计算中的密码应用模式,包括密码应用模式框架和云计算中用户数据的加密方式,重点针对云计算中动态数据的机密性,从可信计算平台、安全虚拟机、密码协处理器和虚拟桌面技术等四方面,讨论了密码应用的新模式。  相似文献   

11.
Model independent assertions for integration of heterogeneous schemas   总被引:3,自引:0,他引:3  
Due to the proliferation of database applications, the integration of existing databases into a distributed or federated system is one of the major challenges in responding to enterprises' information requirements. Some proposed integration techniques aim at providing database administrators (DBAs) with a view definition language they can use to build the desired integrated schema. These techniques leave to the DBA the responsibility of appropriately restructuring schema elements from existing local schemas and of solving inter-schema conflicts. This paper investigates theassertion-based approach, in which the DBA's action is limited to pointing out corresponding elements in the schemas and to defining the nature of the correspondence in between. This methodology is capable of: ensuring better integration by taking into account additional semantic information (assertions about links); automatically solving structural conflicts; building the integrated schema without requiring conforming of initial schemas; applying integration rules to a variety of data models; and performing view as well as database integration. This paper presents the basic ideas underlying our approach and focuses on resolution of structural conflicts.  相似文献   

12.
This paper focuses on an intervention programme based on the concept of participatory ergonomics. The study was designed within the framework of a multidisciplinary project concerned with identifying the work conditions and problems necessary to improve the working life of VDT operators with routine data-entry and data-dialogue tasks. The intervention programme was evaluated in two follow-up studies. The evaluation criteria covered the proposals for improvement emerging from (1) the intervention programme's final joint decisions (of experts and employees) on measures needed, and (2) workers' views of the effectiveness of the programme itself. As the implementation period was marked by increasing turbulence caused by recession in many branches of the Swedish economy, attention was paid to the impact of the restructuring and rationalization effected by company management in the workplaces under study. To obtain a better understanding of the outcome of the intervention programme, the follow-up was extended systematically to explore the disturbing organizational factors operating during the implementation period. The results of the evaluation offer increased knowledge of organizational barriers to the implementation of ergonomics measures decided upon within the framework of intervention research.  相似文献   

13.
Information technology (IT) outsourcing ventures have been termed successful or less successful in achieving their expected outsourcing objectives according to the operational effectiveness of the ensuing client–upplier relationship. Yet researchers and practitioners share no consistent understanding of the actual operational characteristics of these IT outsourcing relationships. The paper bridges this gap by adopting the International Marketing and Purchasing (IMP) group's dyadic ‘interaction Approach’, which delineates carefully the context, parties, interaction and behavioural dimensions of buyer–supplier-type relationships. Applied to outsourcing, this ‘approach’ enables us to shed some light on the crucial dimensions of IT outsourcing relationships. Exploratory research into 12 organisations identifies the potential of the ‘interaction approach’, in providing a comprehensive, consistent, holistic set of constructs to guide analysis. The constructs of ‘interaction’ and ‘atmosphere’ proved particularly useful in providing in-depth insights. However, other interaction constructs of ‘environment’, ‘parties’ and ‘institutionalisation and adaptation’ were limited in their operationalisability. The paper suggests how these can be supplemented, and how IT outsourcing relationships can then be studied over time more satisfactorily. The interaction approach, as applied to the qualitative research data, also helped to identify a number of management issues that warrant careful consideration if IT outsourcing relationship management is to be improved. At the same time, the research identified certain factors in IT outsourcing relationships not captured satisfactorily by the interaction approach, namely the centrality of the contract, the importance of formal processes, and the hidden costs of relationship management. One suggested way forward is to combine interaction, contract and transaction cost perspectives.  相似文献   

14.
XML正迅速成为互联网上数据表示和交抉的标准,用关系数据库存储XML数据是XML存储策略之一。为了将XML数据存储到关系数据库中,人们研究了很多从DTD到关系模式的映射方法。Hybrid Inlining方法是一种比较常用的映射方法,此方法将多个元素内联到一个表中,从而可以降低查询时连接操作的次数,但同时也存在一些诸如删除异常、插入异常的问题。本文将Hybria Inlining方法运用在从Schema到关系模式的转抉中,同时在Hybrid Inlining方法的基础上做进一步改进,从而解决删除、插入异常等问题。最后给出其具有无损连接性以及锨持函数依赖的证明。  相似文献   

15.
16.
Successful outsourcing experiences are not based on the levying of penalties for failure but on the accrual of expected benefits by both parties involved in the outsourcing agreement. For these benefits to accrue, IS managers must implement a proactive, forward-looking oversight mechanism designed to ensure that the outsourcing provider operates in a performance zone that provides the expected business value. Outsourcing oversight metrics—key performance-monitoring parameters built into the outsourcing agreement and assessed on an on-going basis—form the basis of such a mechanism.  相似文献   

17.
Lumpy demand forces capacity planners to maximize the profit of individual factories as well as simultaneously take advantage of outsourcing from its supply chain and even competitors. This study examines a business model of capacity planning and resource allocation in which consists of two profit-centered factories. We propose an ant algorithm for solving a set of non-linear mixed integer programming models of the addressed problem with different economic objectives and constraints of negotiating parties. An individual factory applies a specific resource planning policy to improve its objective while borrowing resource capacity from its peer factory or lending extra capacity of resources to the other. The proposed method allows a mutually acceptable capacity plan of resources for a set of customer tasks to be allocated by two negotiating parties, each with private information regarding company objectives, cost and price. Experiment results reveal that near optimal solutions for both of isolated (a single factory) and negotiation-based (between the two factories) environments are obtained.  相似文献   

18.
19.
IT executives entering into information technology (IT) outsourcing arrangements seek various strategic, economic, and technological benefits. However, although several cases of IT outsourcing are considered successful, cases of failure can also be observed. Problems and challenges associated with IT outsourcing often not only relate to the strategic decision whether or not to outsource, but to the operational level as well. Especially organizations with little experience of implementing larger IT outsourcing programs face problems with the steering of external outsourcing providers. In this paper, we propose a reference framework that structures the required processes for an effective steering of IT outsourcing relationships. The research is based on the design science paradigm in information systems research. In a first step, we derive a framework from related literature and knowledge in this particular area. We then undertake extensive fieldwork, including expert interviews and field studies to evaluate our framework and to develop it further. The suggested framework proves to be a viable instrument to support the systematic analysis of current processes and the definition of suitable target processes for the steering of IT outsourcing programs. This paper??s primary contribution therefore lies in providing an applicable instrument for practitioners as well as in extending the existing body of knowledge on IT outsourcing governance.  相似文献   

20.
《Information & Management》1996,31(3):165-175
Frameworks intended for identifying and organizing issues associated with offshore outsourcing of software development have focused on project or site selection. Existing frameworks are not comprehensive because they do not fully address one or more of the following issues: (1) the relationship between project characteristics and site suitability, (2) financial and intellectual property issues in the context of software development, and (3) the role of agents outside the outsourcing and vendor firms in the offshore outsourcing process. To overcome these limitations, we propose a more comprehensive framework that links projects (which require resource) and sites (which possess resources). It also includes environmental agents whose actions affect resource availability at the sites. The framework serves as an useful tool to systematically address the issues that arise in the context of offshore outsourcing of software development. We use the framework to review and classify existing literature.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号