The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Strategic planning aims at improving both the financial and behavioral performance of an enterprise. It concerns the enterprise and its desired future, helping set priorities, concentrate capabilities and resources on key operations, ensure that stakeholders are working toward common goals and assess and adjust the enterprise's direction. Although it motivates and drives Enterprise Architecture (EA)...
This paper takes a practitioner's perspective on the problem of organisational decision-making. Industry practice follows a refinement based iterative method for organizational decision-making. However, existing enterprise modelling tools are not complete with respect to the needs of organizational decision-making. As a result, today, a decision maker is forced to use a chain of non-interoperable...
This paper uses MaSE to build the application model of city traffic monitoring system based on MAS, establishes the model of static and dynamic Agent model which were combined with the characteristics of the monitoring system by using UML. This model maps the entity state change into the model for analysis and simulation using autoregressive Markov probability model, has improved the efficiency of...
Understanding the dynamic of covert organization is the first step to intervene in the crime activities and to develop strategies. Covert organization/network shows dynamical structure as the members adaptively change the relations to fulfil the demand of the organizational goal. The same structure can generate diverse dynamic under different operational process, and it is important to find out how...
By using the one-off and the repeated game model, this paper analyzes the counter-terrorism cooperation behavior of the Shanghai Cooperation Organization (SCO) member states. Furthermore, by introducing the cooperation institution as an external factor, the influence of institution's involvement on the cooperation behavior of the SCO member states is analyzed.
Since the first loyalty program was introduced in the 1980s, many sectors and industries have adopted and configured these schemes to meet their specific requirements. But it is just recently that technological innovation has enabled the transfer of these schemes into the online environment, and, more concretely, to the increasing number of online platforms. Operating on two-sided markets, platforms...
The R&D of aviation complex products new technology is an important component to realize the strategy of building an innovative country, it plays a decisive role in improving national competitiveness, but because of the high risks in new technology research and development (R&D) of aviation complex products, the new technology of aviation complex products could be realized only through comprehensive...
Organizational performance is one of the most important aspects of today's project management research. Many factors can be indicators for organizational performance beyond the financial measures. Predicting the performance will allow the organization to identify the areas with the highest improvement potentials, thus leading to better performance and profit increasing. The fragmented and unique nature...
This study aimed to provide a hybrid method of assessing the importance of public research projects and determining strategy in early stage of commercialization. The author uses an empirical case of Industrial Technology Research Institute (ITRI) to test the method. As the result of his analysis, the author categorized ITRI's projects into four groups according to benefits and risk factors extracted...
Application of Big Data analytics to exploit for insight and assist in decision making have seen phenomenal growth among organizations in recent years. Although many organizations have invested heavily in Big Data technologies, there still seems to be a lack of common reference framework for organizations to derive business values and answer critical business questions from Big Data Analytics (BDA)...
Crowdsourcing is a new wave of outsourcing which has become a new society paradigm that might change the outsourcing landscape in the future. Crowdsourcing offers substantial benefits to the involved parties. For crowdworkers, crowdsourcing offers flexibility in terms of time, locations and durations of doing tasks given to them and the most important is crowdsourcing will give them additional income...
Based on a survey of 243 service providing enterprises in South China, this study investigates the effects of relational embeddedness and network competence on service innovation performance respectively, the mechanisms by which network competence mediates the relationship between relational embeddedness and service innovation were also discussed. Results show that both relational embeddedness and...
Physical Distribution is a bottleneck in E-commerce and reverse logistics has become a bottleneck restricting the development of e-commerce. This paper constructs the distribution system in E-commerce logistics based on gridding management, via the comparison analysis between grid and non-grid distribution system in E-commerce logistics through computer simulation, verifies the grid used in e-commerce...
Today ICT networks are the economy's vital backbone. While their complexity continuously evolves, sophisticated and targeted cyber attacks such as Advanced Persistent Threats (APTs) become increasingly fatal for organizations. Numerous highly developed Intrusion Detection Systems (IDSs) promise to detect certain characteristics of APTs, but no mechanism which allows to rate, compare and evaluate them...
Cyber security has become a serious challenge for organizations due to growing use of the Internet and increasing values of information that are stored in organizations' information systems. Because of the complexity and the number of different variables involved with information security, a special analytical tool is required to address the problem of how to balance the investment in different parts...
The paper contains a description of Methodology and its supporting online tools which allow for efficient identification of optimization problems in transport organizations and for fast development of prototype solution. The proposed Methodology benefits from the agile approach to software development. The result of applying the Methodology with support of the Process Optimization Platform in context...
Disease risk assessment plays an important role in controlling the diffusion of infectious diseases. It needs a large number of environmental, social, and economic development data in order to discover the pathogenic factors of a given disease. However, the conventional disease risk assessment is carried out mainly through the analysis of geographic data and non-geographic data released by officials...
Deception is pervasive, often leading to adverse consequences for individuals, organizations, and society. Information systems researchers are developing tools and evaluating sensors that can be used to augment human deception judgments. One sensor exhibiting particular promise is the eye tracker. Prior work evaluating eye trackers for deception detection has focused on the detection and interpretation...
Examining the relation between global microlending and corruption may inform how trust and influence propogate through crowds. Building this understanding may help U.S. Army intelligence officers leverage crowds for humanitarian efforts as well as, to detect signs of adversarial influence. A dataset was created combining open source data from Kiva, a non-profit microfinancing institution, and Transparency...
In the 15 years since inception, extensive research has been conducted on various proposed features associated with the cognitive radio paradigm. This paper proposes an analytical framework to assess different cognitive radio characteristics through a systems capability model and tests the framework by applying it through one cognitive radio feature; namely that of Dynamic Spectrum Access. Even a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.