The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recognizing the potential that software can help in the socio-economic development of the country, the government of Botswana has identified software industry as one of the strategic priority areas in ICT with research focus on areas such as software engineering practices and software process improvement. To realize this vision, the state of software development practice has to be formally assessed...
The context of software architecting increasingly reflects webs of IT companies pooling resources together for software development. What results is a networked organization, populated by heterogeneous development communities connected via internet. How does this scenario change the process of software architecting? Pivoting around this research question, this paper presents architecture concerns...
The success of software ecosystems highly depends on the variety and quality of end-user applications. Therefore, attracting third-party developers and facilitating application development is crucial. Platform boundary resources enable third-party developers to create the applications. Thus, the platform boundary resources expose and extend the platform architecture. We conducted an industrial case...
Planning an Virtual Organization in a reasonable time to make proposal by Focal Player to the potential customer is quite challenging. There is a need to understand existing capabilities and their availabilities in the Partner Network and if there are determined some constraints, the external companies should be called in. The current article analyzes and proposes an approach how the Focal Player...
Organizations around the world executes by people and/or other types of resources thousands even millions operations per day, depending on its size. Managing of the organization requires to get to know almost each its element. The best way for identification of these elements is to create a model of the organization. Usually organizations reject to create such model because there is no standard approach...
Recent scandals have stressed the need for information sharing among companies and governments. The sharing of information is not easy as companies want to keep their administrative burden low, whereas governments need high information quality. These drivers have resulted in the initiating of programs for developing infrastructures for information sharing. In these programs public and private organizations...
In this research, we investigated the differences in the roles and responsibilities across the CIO's job across three main regions of one country - China. In particular, we studied how CIOs of Hong Kong, mainland China, and Taiwan varied across the regions. We found that the roles and responsibilities of China's CIOs were influenced by the region's government strategy and the maturity of its technology...
Collaboration technologies offer benefits for organizations to make teamwork more productive and creative. Yet the organizational transition towards using particular types of collaboration technologies is often fraught with challenges. A key condition for successfully transitioning towards a new way of working is that the stakeholders are committed to the outcomes of the new collaboration process...
IT governance is crucial for managers to regulate the decision rights and responsibilities that the desired IT behaviors and business objectives are aligned with each other. Additionally, culture in national, organizational or group level can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the impact of culture...
Efficient und successful development of platform-based product architectures requires a thorough understanding of the organizational structure, its interaction with the product architecture and the development processes. As individual research papers in existing literature are mostly focused on single aspects of the organizational domain, an overview of possible influencing factors on platform-based...
This is the third and final paper of a series bringing a philosophical investigation to matters of design and innovation. With the others examining: first, the urges to reconsider innovation from a creative, specifically design, direction [4]; and second, the type of dynamic innovation that may be thus reconsidered [5]; this paper will investigate a way of constructing this type of design-driven innovation...
Almost everyone in the industries has heard of lean and hailed it as a resolution to solve operational issues in production and logistic systems. However, many of those who believe in lean, especially Singapore local Small and Medium Enterprises (SMEs), are facing great challenges to truly apply the lean method for continuous improvement in performance. They need guidance and a suitable methodology...
One of the factors in successful information security management is the integration of security policies, processes, people and technologies. The deployment of identity management integrates these factors and provides benefits to management. This paper aims to establish the process flow for a system of identity and access management (IdM) of a multinational company in the mining sector, in order to...
Currently, the lack of standardization of abbreviation for the same organization name gives rise to the omission in the various kinds of major industrys' anti-money laundering and anti-fraud blacklist filter system. In view of this, a method of Chinese organization name abbreviation recognition based on similarity is proposed, which calculates the integrated similarity of Chinese organization names...
Measuring Security is a clear need widely spread in the field of Cyber Security. It is part of the standardized risk management, such as ISO 27001, and it is an essential tool in the PDCA cycle of continuous improvement.
The task of selecting the methodology for managing a specific project is analyzed. The method, consisting of 2 stages, is suggested. At the first stage a project manager has to fill out a questionnaire. Based on the obtained results, a corresponding project management methodology is suggested. The second stage is devoted to evaluation of the work content of managing the project with the methodologies...
This paper is devoted to Knowledge Management Maturity Models and corporate Knowledge Management. The maturity levels and management visibility are shown as well as the p points of KM usage in customer orientation, the support of the corporate strategy and the core business as well as Customer Interaction Management model. The author proposes Key Process Category to be added to the existing areas...
Recent years have seen large-scale litigation of standard-essential patents (SEPs) between companies like Apple, Samsung, Motorola, Nokia, Google, HTC, Microsoft, Kodak, and Research in Motion. Such patents are particular because they are, by definition, indispensable to any company wishing to implement a technical standard. Such patents bring substantial benefits to their owners and firms that do...
The software process improvement is initiated to achieve the quality of the software processes which lead to quality of final software products. Software processes are improved by implementing software process standards. These standards are often called software process improvement frameworks or standards. Software process improvement is necessary to increase the efficiency and productivity of software...
This research was carried out with aims to develop the company KMS and provide the solution based on the existing situation. This research involved quantitative assessment in measuring Knowledge Management (KM) success and qualitative survey to analyze the company problems by using designed methodologies accompanied by data collection through surveying and interviewing several employees involved in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.