The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A low-level code of practice is presented in this paper to help information security (IS) risk management professionals manage enterprise IS risks effectively and efficiently using COBIT 5 framework1. The proposed code of practice is the result of the experience gained by the authors over years through working with clients in many industries implementing IS risk management using different international...
A high level of information security in critical infrastructure IT systems and services has to be preserved when migrating their IT services to the cloud. Often various legislative and security constraints have to be met in line with best practice guidelines and international standards to perform the migration. To support the critical infrastructure providers in migrating their services to the cloud...
This paper selected at random 212 Chinese manufacturing companies at the Shenzhen Stock Exchange in 2013 as the research objective in order to study the current situation of the voluntary disclosure. This paper found and summarized the problems of small number, low quality, and accuracy, lack of fixed and standardized forms in the process of the disclosure. Finally based on the study, this paper further...
Business document standards usually cover a hierarchical structure of thousands of elements that may be relevant in any business context (any industry, any geopolitical region, etc.). In order to use a business document standard in a specific context, user groups define so-called implementation guidelines based on a subset consisting usually of 3 – 5% of the overall elements. When one defines a new...
Under the knowledge economic environment, the competitiveness of enterprises is mainly an innovative competition, particularly in high-tech enterprise. Company actively engaged in R & D activities, leading to rapid increase in R & D expenditures. In 2007, the new accounting standards stipulated that corporate spending on independent research and development activities can conditionally capitalized,...
In order to assess the usefulness of de-facto design standards as a guide for designing human-computer interactions, this case study attempts to identify if and which kind of design standards exist for Web-based product configurators - systems that allow consumers to design their own products, and are characterized by a particularly high level of interactivity. Using the world's largest configurator...
Building information modelling (BIM) is only a tool in the procurement of a building, but it is changing the way the whole process is undertaken. Having a single model which is used by all disciplines requires a different management structure and by consequence a restructuring of the resources required to complete a project.These changes are encompassed in Integrated Practice and more recently Integrated...
The construction industry has been facing a paradigm shift to (i) increase; productivity, efficiency, infrastructure value, quality and sustainability, (ii) reduce; lifecycle costs, lead times and duplications, via effective collaboration and communication of stakeholders in construction projects. Digital construction is a political initiative to address low productivity in the sector. This seeks...
Ever since the Federal Communications Commision (FCC) announced that it would open the television (TV) spectrum for opportunistic access, there has been an increased interest in industry as well as academia to come up with proposals that would fit the criteria laid by FCC. To this end, IEEE 802.22 Working Group (WG) is formulating the first worldwide standard for cognitive radio to operate in the...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.