首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
Enterprise architecture, EA, is an established approach for the model-based and holistic management of IT. The scope of EA is however wide and the predominant EA frameworks suggest the creation of broad and detailed models. IT management cannot control all areas spanned by the present frameworks for EA models. In order to ensure well-informed decisions, IT management has a series of questions that need to be answered. This paper proposes an assessment framework that can be used to identify relevant questions for assessments of EA and EA scenarios, within the areas of EA that IT management can control. Three top dimensions in the proposed framework are presented: IT organization, IT systems, and Business organization. The framework further includes sub dimensions for identifying questions. An application of the assessment framework, as it was applied to assess EA scenarios in a power company, is also described.  相似文献   

2.
The business capabilities of modern enterprises crucially rely on the enterprises’ information systems and underlying IT infrastructure. Hence, optimization of the business-IT alignment is a key objective of Enterprise Architecture Management (EAM). To achieve this objective, EAM creates, maintains and analyzes a model of the current state of the Enterprise Architecture. This model covers different concepts reflecting both the business and the IT perspective and has to be constantly maintained in response to ongoing transformations of the enterprise. In practice, EA models grow large and are difficult to maintain, since many stakeholders from various backgrounds have to contribute architecture-relevant information. EAM literature and two practitioner surveys conducted by the authors indicate that EA model maintenance, in particular the manual documentation activities, poses one of the biggest challenges to EAM in practice. Current research approaches target the automation of the EA documentation based on specific data sources. These approaches, as our systematic literature review showed, do not consider enterprise specificity of the documentation context or the variability of the data sources from organization to organization. The approach presented in this article specifically accounts for these factors and presents a situational method for EA documentation. It builds on four process-supported documentation techniques which can be selected, composed and applied to design an organization-specific documentation process. The techniques build on a meta-model for EA documentation, which is implemented in an EA-repository prototype that supports the configuration and execution of the documentation techniques. We applied our documentation method assembly process at a German insurance company and report the findings from this case study in particular regarding practical applicability and usability of our approach.  相似文献   

3.
Enterprise Architecture (EA) is a relatively new domain that is rapidly developing. “The primary reason for developing EA is to support business by providing the fundamental technology and process structure for an IT strategy” [TOGAF]. EA models have to model enterprises facets that span from marketing to IT. As a result, EA models tend to become large. Large EA models create a problem for model management. Concern-based design methods (CBDMs) aim to solve this problem by considering EA models as a composition of smaller, manageable parts—concerns. There are dozens of different CBDMs that can be used in the context of EA: from very generic methods to specific methods for business modeling or IT implementations. This variety of methods can cause two problems for those who develop and use innovative CBDMs in the field of Enterprise Architecture (EA). The first problem is to choose specific CBDMs that can be used in a given EA methodology: this is a problem for researchers who develop their own EA methodology. The second problem is to find similar methods (with the same problem domain or with similar frameworks) in order to make a comparative analysis with these methods: this is a problem of researchers who develop their own CBDMs related to a specific problem domain in EA (such as business process modeling or aspect oriented programming). We aim to address both of these problems by means of a definition of generic Requirements for CBDMs based on the system inquiry. We use these requirements to classify twenty CBDMs in the context of EA. We conclude with a short discussion about trends that we have observed in the field of concern-based design and modeling.  相似文献   

4.
Producing accurate and reliable project cost estimations at an early stage of a project’s life cycle remains a substantial challenge in the information technology field. This research benchmarks the performance of various approaches to estimating IT project effort and duration. Empirical data were gathered from various “real-world” organizations including several prominent Israeli high-tech companies as well as from the International Software Benchmarking Standards Group (ISBSG) IT project database. The study contrasts two types of models that have been employed to estimate project duration and effort separately: linear regression estimation models and models deriving from a more novel approach based on artificial neural networks (ANNs).  相似文献   

5.
Nowadays, business processes are increasingly supported by IT services that produce massive amounts of event data during the execution of a process. These event data can be used to analyze the process using process mining techniques to discover the real process, measure conformance to a given process model, or to enhance existing models with performance information. Mapping the produced events to activities of a given process model is essential for conformance checking, annotation and understanding of process mining results. In order to accomplish this mapping with low manual effort, we developed a semi-automatic approach that maps events to activities using insights from behavioral analysis and label analysis. The approach extracts Declare constraints from both the log and the model to build matching constraints to efficiently reduce the number of possible mappings. These mappings are further reduced using techniques from natural language processing, which allow for a matching based on labels and external knowledge sources. The evaluation with synthetic and real-life data demonstrates the effectiveness of the approach and its robustness toward non-conforming execution logs.  相似文献   

6.
Today large companies operate 100s of computer-based information systems (IS), also called applications, to support their businesses. Enterprise Architecture (EA) is regarded as a promising concept to cope with the complexity caused by large application portfolios (AP). This article focuses on senior IT managers’ decision-making with regard to their AP, and EA’s role therein. Through multiple case studies in large companies, we found that these managers consider and balance a set of aspects, each of which is supported by partial EA models maintained by specific groups within their IT departments. These models are, however, not sufficiently integrated. Based on the empirical findings, we propose indicators for each of the partial EA models to aggregate the AP-relevant characteristics per application, which are then integrated into an AP dashboard to support senior IT managers’ holistic AP management. Consequently, a decision-oriented view is created of the overall EA, which the managers of the case studies companies deemed to be very helpful for steering their AP.  相似文献   

7.
Ensuring that IT and business have a more mature alignment relationship is recognized as being critical to an organization’s success. To achieve alignment leveraging, enterprise architecture (EA) is considered fundamental as a comprehensive approach to planning and managing IT actions within the organization, based on its business requirements. This paper reports on a study to assess the effect of successful EA projects on the business-IT alignment in Iranian organizations, using the Luftman’s maturity model as the assessment tool. The implications of our findings in this study as well as its limitations are discussed to assist in detecting the flaws in the existing EA frameworks and to propose improvements.  相似文献   

8.
The correct configuration of the control code is a critical part of every process control system engineering project. To ensure the conformity of the implemented control functions with the customer’s specifications, test activities, e.g., the factory acceptance test (FAT), are conducted in every control engineering project. For the past several years, control code tests have increasingly been carried out on simulation models to increase test coverage and timeliness. Despite the advantages that simulation methods offer, the manual effort for generating an applicable simulation model is still high. To reduce this effort, an automated model generation is proposed in this paper. The models automatically generated by this approach provide a modeling level of detail that matches the requirements for the tests of the control code on the base automation level. Therefore, these models do not need to be as detailed as the high-fidelity models which are used for, e.g., model predictive control (MPC) applications. Within this paper, the authors describe an approach to automatically generate simulation models for control code tests based on given computer aided engineering (CAE) planning documents.  相似文献   

9.
10.
Enterprise architecture (EA) is a coherent whole of principles, methods, and models that are used in the design and realization of an enterprise’s organizational structure, business processes, information systems, and IT infrastructure. Recent research indicates the need for EA in small and medium-sized enterprises (SMEs), important drivers of the economy, as they struggle with problems related to a lack of structure and overview of their business. However, existing EA frameworks are perceived as too complex and, to date, none of the EA approaches are sufficiently adapted to the SME context. Therefore, this paper presents the CHOOSE metamodel for EA in SMEs that was developed and evaluated through action research in an SME and further refined and validated through case study research in five other SMEs. This metamodel is based on the essential dimensions of EA frameworks and is kept simple so that it may be applied in an SME context. The final CHOOSE metamodel includes only four essential concepts (i.e. goal, actor, operation, object), one for each most frequently used EA focus. As an example, an extract is included from the specific model that was created for the SME used in our action research. Finally, the CHOOSE metamodel is evaluated according to the dimensions essential in EA and the requirements for EA in an SME context.  相似文献   

11.
12.
Cost-Sensitive Active Visual Category Learning   总被引:1,自引:0,他引:1  
We present an active learning framework that predicts the tradeoff between the effort and information gain associated with a candidate image annotation, thereby ranking unlabeled and partially labeled images according to their expected ??net worth?? to an object recognition system. We develop a multi-label multiple-instance approach that accommodates realistic images containing multiple objects and allows the category-learner to strategically choose what annotations it receives from a mixture of strong and weak labels. Since the annotation cost can vary depending on an image??s complexity, we show how to improve the active selection by directly predicting the time required to segment an unlabeled image. Our approach accounts for the fact that the optimal use of manual effort may call for a combination of labels at multiple levels of granularity, as well as accurate prediction of manual effort. As a result, it is possible to learn more accurate category models with a lower total expenditure of annotation effort. Given a small initial pool of labeled data, the proposed method actively improves the category models with minimal manual intervention.  相似文献   

13.
Automatic image annotation using supervised learning is performed by concept classifiers trained on labelled example images. This work proposes the use of clickthrough data collected from search logs as a source for the automatic generation of concept training data, thus avoiding the expensive manual annotation effort. We investigate and evaluate this approach using a collection of 97,628 photographic images. The results indicate that the contribution of search log based training data is positive despite their inherent noise; in particular, the combination of manual and automatically generated training data outperforms the use of manual data alone. It is therefore possible to use clickthrough data to perform large-scale image annotation with little manual annotation effort or, depending on performance, using only the automatically generated training data. An extensive presentation of the experimental results and the accompanying data can be accessed at .  相似文献   

14.
15.
We consider recent research in IS, as well as recent advances in the fields of psychology and sociology. As an alternative to existing models, we propose a new strategic path to study IT use through users’ IT culture and IT needs. Our contributions are (1) theoretical: we investigate the predictive value for IT usage of several new constructs and show that both expectancy-based and needs-based theories of motivation should be taken into account in acceptance models, (2) methodological: we adopt an exploratory, mixed-method, grounded theory approach and use both quantitative and qualitative data and methods, an unusual approach in IS research that allows new perspectives, and (3) practical: our results highlight the fact that highly IT-acculturated users may hinder (rather than facilitate) new-IT acceptance if their situational IT needs are ignored. Therefore, when the strategic decision of implementing new IT is made, managerial attention must be focused on these users in order to drive toward the alignment of their IT needs and managerially-perceived organizational IT needs.Our work opens the way to numerous avenues for future research.  相似文献   

16.
Presentation and exchange of business models with CIMOSA-XML   总被引:4,自引:0,他引:4  
In the modern competitive business world there is a frequent need for enterprises to modify their structure of business processes to become more effective in the market place. The solution to this management demand is an improved business integration which is only successful when it is supported by effective IT systems. The Esprit project PRIMA aims to create a competitive advantage for European companies in the process sector by providing a route to ‘smarter' IT investments that are effective across the whole enterprise. A process repository which will store business process models in suitable formats would provide users with appropriate views of the models, focusing only on their information needs. However, the existence of many incompatible modelling methodologies and tools makes it impossible to unify the modelling approach. Therefore it would be desirable to have a high level common modelling language. The PRIMA project has identified CIMOSA as the basis for common semantics of the business model language and the XML format, as a suitable format for the transfer of the model structure and content. The PRIMA working group, in an effort to elaborate these concepts, has developed the Document Type Definition concept (DTD) of the CIMOSA-XML meta-model, which can be used to build the partial enterprise models related to the Business Functional Requirements (BFR) of the PRIMA Process Methodology.  相似文献   

17.
Enterprise architecture (EA) models can be used in order to increase the general understanding of enterprise systems and to perform various kinds of analysis. This paper presents instantiated architectural models based on a metamodel for enterprise systems modifiability analysis, i.e. for assessing the cost of making changes to enterprise-wide systems. The instantiated architectural models detailed are based on 21 software change projects conducted at four large Nordic companies. Probabilistic relational models (PRMs) are used for formalizing the EA analysis approach. PRMs enable the combination of regular entity-relationship modeling aspects with means to perform enterprise architecture analysis under uncertainty. The modifiability metamodel employed in the analysis is validated with survey and workshop data (in total 110 experts were surveyed) and with the data collected in the 21 software change projects. Validation indicates that the modifiability metamodel contains the appropriate set of elements. It also indicates that the metamodel produces estimates within a 75% accuracy in 87% of the time and has a mean accuracy of 88% (when considering projects of 2000 man-hours or more).  相似文献   

18.
IT departments in non-IT small companies lack guidelines for defining the services they provide and for assigning costs to these services. This article compares international models and standards and describes an approach that can be used by these companies in order to define and implement their service catalog to be used as an input for their IT financial management. The proposed solution is based on the concept of a process asset library. The proposal has been tested in a non-IT small company. The results provide useful insights for companies interested in defining their own service catalog from a standard service catalog.  相似文献   

19.
The recent rapid development in information systems (ISs) has resulted in a critical need for integration and interoperability between heterogeneous ISs in various domains, using specific commonalities. However, stovepipe systems have been caused due to inconsistencies in planning IS architecture among stakeholders. So far, there has been no research on an enterprise architecture framework (EAF) that can satisfy with the coefficient factors of system architecture (SA) and enterprise architecture (EA). This paper proposes a new EAF that can resolve the problems inherent in existing legacy EAFs and their features. EAFoC (Enterprise Architecture Framework based on Commonality) is based on commonality that can be satisfied as the coefficient factors in both SA and EA within a common information technology (IT) domain. Thus, it should be possible to integrate an established heterogeneous framework for each stakeholder's view. Consequently, the most important contribution of this paper is to establish the appropriate EAFoC for the development of consistent IS architecture, smooth communication among stakeholders, systematic integration management of diversified and complicated new IT technologies, interoperability among heterogeneous ISs, and reusability based on commonality with other platforms.  相似文献   

20.
ContextThe use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, and hence the potential cost and consequences of the materialization of threats could produce catastrophic loss for organizations. Therefore, the early selection of security controls that mitigate risks is a real and important necessity. Nevertheless, there exists an enormous range of IT security controls and their configuration is a human, manual, time-consuming and error-prone task. Furthermore, configurations are carried out separately from the organization perspective and involve many security stakeholders. This separation makes difficult to ensure the effectiveness of the configuration with regard to organizational requirements.ObjectiveIn this paper, we strive to provide security stakeholders with automated tools for the optimal selection of IT security configurations in accordance with a range of business process scenarios and organizational multi-criteria.MethodAn approach based on feature model analysis and constraint programming techniques is presented, which enable the automated analysis and selection of optimal security configurations.ResultsA catalogue of feature models is determined by analyzing typical IT security controls for BPMSs for the enforcement of the standard goals of security: integrity, confidentiality, availability, authorization, and authentication. These feature models have been implemented through constraint programs, and Constraint Programming techniques based on optimized and non-optimized searches are used to automate the selection and generation of configurations. In order to compare the results of the determination of configuration a comparative analysis is given.ConclusionIn this paper, we present innovative tools based on feature models, Constraint Programming and multi-objective techniques that enable the agile, adaptable and automatic selection and generation of security configurations in accordance with the needs of the organization.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号