You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book introduces the idea of Coherency Management, and asserts that this is the primary outcome goal of an enterprise's architecture. With submissions from over 30 authors and co-authors, the book reinforces the idea that EA is being practiced in an ever-increasing variety of circumstances - from the tactical to the strategic, from the technical to the political, and with governance that ranges from sell to tell. The characteristics, usages, value statements, frameworks, rules, tools and countless other attributes of EA seem to be anything but orderly, definable, classifiable, and understandable as might be hoped given heritage of EA and the famous framework and seminal article on the subject by John Zachman over two decades ago. Notably, EA is viewed as an Enterprise Design and Management approach, adopted to build better enterprises, rather than a IT Design and Management approach limited to build better systems.
Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.
The Engineering Management discipline remains complex and multidisciplinary, and has progressed and broadened in scope significantly over the last 10–20 years. Previously, the discipline has been fragmented and not aligned with the purposes of economic development, mega-project delivery, and technological progress. Digital engineering has revolutionized the field of engineering by introducing digital tools and technologies to the design, creation, operation, and maintenance of physical systems, products, and services. It has enabled more efficient, effective, and sustainable solutions, and has the potential to drive significant innovation and improve the way we design, build, and operate p...
[Administration (référence électronique)].
"This book explores the value of information and its management by highlighting theoretical and empirical approaches in the economics of information systems, providing insight into how information systems can generate economic value for businesses and consumers"--Provided by publisher.
Enterprise Architecture, Integration, and Interoperability and the Networked enterprise have become the theme of many conferences in the past few years. These conferences were organised by IFIP TC5 with the support of its two working groups: WG 5. 12 (Architectures for Enterprise Integration) and WG 5. 8 (Enterprise Interoperability), both concerned with aspects of the topic: how is it possible to architect and implement businesses that are flexible and able to change, to interact, and use one another’s s- vices in a dynamic manner for the purpose of (joint) value creation. The original qu- tion of enterprise integration in the 1980s was: how can we achieve and integrate - formation and ma...
Supply chain security encompasses measures preventing theft, smuggling, and sabotage through heightened awareness, enhanced visibility, and increased transparency. This necessitates the adoption of a security-by-design paradigm to achieve effective and efficient security measures, yielding additional benefits such as diminished supply chain costs. Given their vulnerability, transportation and logistics service providers play a pivotal role in supply chain security. This thesis leverages systems security engineering and security-by-design to provide a methodology for designing and evaluating security measures for physical transport goods. It formulates nine principles that define security-by-design and establishes a supply chain security framework. An adaptation of the TOGAF architecture development facilitates the creation of secure-by-design enterprise architectures. Security measures are documented using security-enhanced processes based on BPMN. This enables an analysis and compliance assessment to ascertain the alignment of security with business objectives and the adequate implementation of requirements. The culmination of these efforts is exemplified through a case study.
Comprehensive coverage of critical issues related to information science and technology.
"This multi-volume reference examines critical issues and emerging trends in global business, with topics ranging from managing new information technology in global business operations to ethics and communication strategies"--Provided by publisher.
Enhances libraries worldwide through top research compilations from over 250 international authors in the field of e-business.