The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Activity based costing (ABC) can be integrated with Unified modeling methodology (UMM) to identify the required activities and further calculate the cost. Specifying right activities for ABC is a challenge and involves a complicated process, but UMM helps discovering all activities and facilitates the specification of the critical activities.
In order to, proliferate capabilities of information systems as a managerial leverage and a means of decision making, organizations need the support of software, hardware and humanware infrastructures. Without such support, implementation efforts may adversely suffer from excessive development costs, delays or may even fail before completion. Hence, readiness assessment studies and exploration of...
This article is based on the theory of knowledge transfer and takes the implementation of ERP for example. It analyses the knowledge transfer system and establishes a comprehensive system of knowledge transfer model. The purpose is to improve the effectiveness of ERP implementation. Firstly, starts with the basic principles, the whole text explains the concept of knowledge transfer, the activities...
Software process improvement (SPI) is a means to change software organizationpsilas processes to better meet the business objectives. Process assessments reveal opportunities for process improvements. An assessment typically utilizes a model, which includes a set of good practices as assessment indicators. The potential for improvements is derived by comparing the indicators with the actual processes.
Enterprises today face an increasing need to easily access and process knowledge they produce as well as automate their business processes. This need may be fulfilled by taking advantage of the Semantic Web and Semantic Web services technologies and implementing the concept of Semantic Business Process Management. In order to fulfil this vision, an enterprise and the specified part of the knowledge...
While corporate entrepreneurship (CE) was regarded important to revitalize companies and improve their financial performance, the relationship between CE and firm performance is more complex than linear. Of many factors moderating corporate entrepreneurship-performance relationship, governance form is one that received inadequate research attention. The study studied the moderating effect that governance...
E-business will change the ways that all companies do business, and most traditional businesses will evolve from their current business model to a combination of place and space via e-business model, so itpsilas important to construct a theory system to help enterprise make e-business transformation strategy. The main objective of this paper is to investigate a framework for analyzing e-business transformation...
We present features of an education system entirely based on a 7-months project, performed by a 6-students team within a virtual company and tutored by an experimented software engineer. We describe some aspects of a past project: functions of the system, technology, deliverables, and assessment. Students' outcomes are drafted in term of roles.
Software product-line development lets organizations better optimize software development efficiency by building a shared set of assets for reuse in multiple products. This process introduces many challenges, not least of which is creating the initial set of reusable software assets. To accomplish this, organizations often establish a central software platform group. Such a group faces a serious problem:...
Modern business process modeling languages such as BPMN or EPC provide users with more constructs to represent real world situations than their predecessors such as IDEF or Petri Nets. But this apparent increase in expressiveness is accompanied by an increase in language complexity. In practice many organizations choose to only use a subset of the available modeling constructs. Using a well established...
SEAM is an enterprise architecture method based on RM-ODP part 2. In this paper, we present an example of a SEAM hierarchical model where the behavioral part is formalized in Alloy. We introduce four kinds of actions and their relationships to properties that specify object state. We show that the Alloy formalization enables us to check that the SEAM model conforms to the required aspects of the universe...
Process modeling and rule modeling languages are both used to document organizational policies and procedures. However, little work has been done to understand their synergies and overlap. Understanding the relationship between the two modeling types would allow organizations to maximize synergies and reduce their modeling effort. In this paper we use the well-established Bunge-Wand-Weber (BWW) representation...
An important issue to the adoption of any enterprise architectural approach is the availability of tools to support the development, storage, presentation, analysis, improvement and evolution of enterprise architecture representations. As with enterprise architecture methodologies, enterprise architecture tools to support the architectural development process are still emerging. Most important software...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.