The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Researchers have found that approximately 70% of information systems development projects in Japan have failed, thus increasing the demand for solutions that will raise expected project success rates. It is said that to improve success rates, it is essential that risk management should be conducted at an early stage. Although risk management is an important process that a project focuses on, it is...
Risk assessment in software management involved strategies to estimate and control risk ensuring proper function of the software process without system failure. Software management related to risk assessment has attracted less interest in academic literature. Existing risk assessment models in software process cannot reduce the time involved in carrying out risk assessment; they also don't provide...
Information systems have become indispensable in our daily lives. It is anticipated that if information systems become more huge and complex, more critical failures will occur. However, reports of failures have not been adequately collected. This paper presents failure analyses of communications systems and networks by using public data from newspapers, official governmental information, and news...
Steadily increasing complexity of software systems makes them difficult to configure and use without special IT knowledge. One of the solutions is to improve software systems making them “smarter”, i.e. to supplement software systems with features of self-management, at least partially. This paper describes several software components known as smart technologies, which facilitate software use and...
The aim of this study is to answer the question about risk factors for the information system (IS) projects in public organizations in Poland. These factors were identified based on a critical review of literature, practical collaboration, the case study and logical deduction. The paper continues as follows. Firstly, a relationship between risk factors and a project success is explained and risk factors...
Based upon the synopsis of electronic information system and system product assurance, this paper puts forward the process model and the product assurance framework of electronic information system, and sets forth a series of product assurance technologies, such as integrated design technology, Technology Readiness Level technology, system integration technology, software independent testing technology,...
In this paper, we propose a series of applications that represent a system family for processing Research Data. The whole system is a model of complete data flow of "research", from data capturing, processing, until intelligent data analysis. Data engineering, Software Engineering, Domain Engineering and Ontology Engineering are used for the development of the system. We also described tools...
Dynamic symbolic execution (DSE) is an approach for automatically generating test inputs from source code using constraint information. It is used in fuzzing: the execution of tests while monitoring for generic properties such as buffer overflows and other security violations. Limitations of DSE for fuzzing are two-fold: (1) only generic properties are checked: many deviations from specified behaviour...
Data visualizations play a prominent role in enterprise information systems in various flavors. Traditional bar, line, or pie charts, or timelines, heat maps, geographical maps, dashboard gauges, and complex relationship mappings are examples of visualizations that are frequently used in business application scenarios. Despite their extensive use, however, there is only few theoretic reflection on...
Developers often take much time and effort to find buggy program elements. To help developers debug, many past studies have proposed spectrum-based fault localization techniques. These techniques compare and contrast correct and faulty execution traces and highlight suspicious program elements. In this work, we propose constrained feature selection algorithms that we use to localize faults. Feature...
Quality requirements prioritization is a complex multi-criteria decision making process that stakeholders face in any phase of software development. Several surveys have been carried out to identify the most important quality requirements considered in various domains and stakeholder perspectives. There is a lack of understanding, however, about how the perceived importance of these qualities can...
With the rapid advances in information technology (IT) in last few decades, software development has become a high-growth industry. While the software development process is an extremely complicated, iterative, unpredictable, knowledge-intensive, as well as an expensive process, a supportive collaborative information system (CIS) is indispensible for allowing complex interdependencies among globally...
While agile approaches have been widely adopted, our theoretical understanding of their foundations and impacts remains limited. This is due to conflating two entirely different meanings of "agile." We therefore unpack these two meanings and present our tentative understanding as a process theory. The theory posits that agility emerges from a dialectic interplay between recognizing and responding...
This paper describes the pedagogy of how the 7-week course on computer fundamentals is introduced and taught to a class of 700 first year undergraduate students from the schools of business and computing. The computer fundamentals course itself covers theoretical topics such as the hardware and software of computers, information systems and programming basics as well as practical topics such as using...
In information systems, objects have to be not only legally accessed in presence of illegal accesses but also data in a suspicious object is not allowed to flow to another object. A transaction illegally and suspiciously reads an object if the transaction reads the object which includes data in other objects which are not allowed to be read and the object which is suspicious, respectively. A transaction...
Electronic health information standards have been developed in several countries, which are in different formats. The Clinical Document Architecture (CDA) is the most acceptable and widely used. In addition, Hospital and Experience (HOSxP) is a Healthcare Information System (HIS) developed by Bangkok Medical Software (BMS), which is currently deployed by medium-sized hospitals in Thailand. However,...
Targeting local e-governments of Japan, this study examines whether the web system can reduce information system cost or not, namely provide cost efficiency. First, in this study, we analyzed the relationships between the cost efficiency of web systems and the software development approach. By doing so, we demonstrated that a web system and non-customized package is common in the easy structuring...
Informatization is the ultimate way out for audit method in China. In order to improve audit quality, the auditee's information system always needs to be restored on the auditors' environment by re-installing them. The kind of audit model brings great pressure to the auditors, not only is the heavy workload at each audit project, but also there is incompatibility problems between different operating...
One of many challenges in a web information systems is the capability of staying stable and available as the number of users and requests increase rapidly, what we call scalability. This paper provides a model based on development of events-oriented applications, non-blocking in the environment Node.JS with the non-relational database model (MongoDB), preparing to establish scalability and a comparison...
The financial institutions face risk daily regarding disposition of liquid resources to meet the request from customers, such conflicts found in the information systems potential tools for right decisions. This work present the software architectural design and implementation of information system called Liquidity Risk Management (LRM) helping the collection measures of information in real time for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.