The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Engineer-To-Order business, which encompasses companies producing a broad range of capital goods, is becoming increasingly complex. In order to improve their profitability, engineering organizations in this business use standardization programs. While decomposition aspects in such programs are already in an advanced state, the integration of components, modules or subsystems into a customer-specific...
Business process management (BPM) is a widely adopted approach for identifying, documenting, and improving business processes. One of the main goals of BPM is to assure that the business processes of an organization constantly produce the desired outcome. One considerable challenge in this context is that not every process can be fully anticipated in advance. Particularly so-called knowledge intensive...
This article introduces a framework for assessing IT integration risk in acquisitions. We illustrate the framework's merits for the management of high-risk acquisitions and identification of low-risk acquisitions with the experience of Trelleborg AB, a global industrial company with acquisitions as integrated components of its corporate strategy. Based on the insights gained from Trelleborg, we provide...
The complexity of application landscapes (AL) has been identified as one of the major challenges in enterprise architecture (EA) management for quite some time. Since there is no agreed upon definition of the term complexity in general or in the context of EA management in particular, literature offers a broad variety of concepts and measurements. Therefore, the main purpose of this paper is to (1)...
In this paper, we consider the influence maximization problem in social networks. The aim is to find a subset of k — nodes called seeds, which maximizes the influence spread. We propose a new approach based on the Independent Cascade Model (ICM) which extracts an acyclic spanning graph from the social network. The extraction method used to build the acyclic spanning graph is based on the existing...
The role of human resources has become a key factor for the success of an organization. Based on a research collaboration with an aeronautical company, the paper proposes a comparison of two different approaches for the reconstruction of a collaborative social network in the business realm: the use of traditional Social Network Analysis and novel statistical inference models. Both approaches were...
Software Configuration Management (SCM) auditing is the fourth of four sub processes recommended by the IEEE and the ACM in this area. This research is the continuation of ongoing experiments in the use of heuristics for predicting fault rates in systems that support SCM. This paper allocates financial indicators to the business model for a hypothetical Telecommunications company and predicts the...
The Barabási-Albert-model is commonly used to generate scale-free graphs, like social networks. To generate dynamics in these networks, methods for altering such graphs are needed. Growing and shrinking is done simply by doing further generation iterations or undo them. In our paper we present four methods to merge two graphs based on the Barabási-Albert-model, and five strategies to reverse them...
The problem of effort estimates in software development projects is important issue in small and medium-sized development companies and agile teams. In this paper, we propose a method for personal capability assessment of each individual team member. In assessing the ability of the project team members 18 parameters were defined with appropriate criteria, values and weight factors for assessing personal...
Extensive exploitation of technology is strategically planned so far only in very few research institutions and companies. Thereby a great technological as well as economic potential remains untapped. A major reason for the neglect of the exploitation potential is that a situational assessment of exploitation opportunities throughout the entire technology life cycle has not yet been systematically...
Integrating operational and managerial activities, Enterprise Resource Planning (ERP) systems are strategic tools to get a better market position, reduce costs and raise process efficiency and service quality. This case study aims to explore further the barriers that arise during the implementation of these systems, particularly in the hospitality industry. We found that the main reason for adopting...
Enhance the efficiency of energy usage and lower energy costs have gained attention in the recent years. Prior research has neglected the transaction structure of energy management service. This study investigated the ex ante and ex post transaction costs with respect the contracting between Energy Service Company (ESCOs) and energy demanders. Combined with the internal control mechanisms and the...
In order to stay globally competitive, manufacturing enterprises face an increasing pressure to bring new products and applications to the markets, to enhance existing products technologically and to produce them at a lower price. New technological findings can enable enterprises to meet these challenges. In practice, technology developments with a long-time horizon are given a low priority compared...
Highly customized products lead to irreproducible complexity in product development and manufacturing. Additionally order processing becomes very complex. Today's product design and IT-tools reduce this complexity insufficiently. Potentials in administration and manufacturing are not fully in line. Most of the relevant approaches for designing products focus on the product without considering interactions...
Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition...
Change management in modern companies is usually complexity management. The economic environment of companies developed more and more complex over the last years. Technological innovations, especially in the field of e-business, have reinforced the globalization process and have threatened the domestic market with a strong competition by competitors from abroad. Actually the e-business strategies...
The logistical network of a company is adaptive, so co-evolves with the environment, constantly changing their connections with suppliers, and internally among its staff structure and processes with distributors, dealers and customers. This coupled with the dynamic growth of organizations, the use of information systems and technologies, the diversity of products and the high degree of market uncertainty,...
Software estimates are an important input to project selection, planning, monitoring as well assessment of projects' success. However, the practice of estimation is also a challenging activity for many practitioners, and there is a continuing need to understand and improve it. To contribute to the existing knowledge of this process, an in-depth study was conducted where 18 practitioners from eight...
Decision making about launching (or not) an innovation project remains an uncertain task for managers, since each project have different characteristics representing a new challenge for the company. Indeed, the development and introduction of a new product involve changes on the way the firm designs, produces, distributes or sells its products. So decision-making tools are needed to take into account...
There are large, medium, and small enterprises which develop software projects that can be influenced by a risk. Identifying risk is first step of perfectly assessing and controlling risks in a project. In the literature, a lot of researchers identified risk factors in software projects but none of these can be generalized as base of risk factors in the software projects as they differ in time, culture,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.