MODELING COMPLEX TIME LIMITS |
Author : OLEG SVATOS |
Abstract | Full Text |
Abstract : In this paper we analyze complexity of time limits we can find especially in regulated processes of public administration. First we review the most popular process modeling languages. There is defined an example scenario based on the current Czech legislature which is then captured in discussed process modeling languages. Analysis shows that the contemporary process modeling languages support capturing of the time limit only partially. This causes troubles to analysts and unnecessary complexity of the models. Upon unsatisfying results of the contemporary process modeling languages we analyze the complexity of the time limits in greater detail and outline lifecycles of a time limit using the multiple dynamic generalizations pattern. As an alternative to the popular process modeling languages there is presented PSD process modeling language, which supports the defined lifecycles of a time limit natively and therefore allows keeping the models simple and easy to understand. |
|
INFORMATION AND COMMUNICATIONS TECHNOLOGY DEVELOPMENT AND ITS ECONOMIC CONTEXT |
Author : ALES PAJGRT |
Abstract | Full Text |
Abstract : The contribution deals with economic context of Information a Communications Technology (ICT) development’s analysis. Historical data of ICT revenue in USA for last 53 years were analyzed and were compared with the historical data in Czech Republic, Germany, China, India, Japan and Brazil for last 13 years. The ratio of ICT revenues to GDP was used as proper indicator in the examined countries to reflect the influences of the surrounding progress and define the individual progress stages. The formulation of the progress’ general rules and its prediction was done. It was monitored the dynamics of ICT sales, depending on its form and the influence of global economy. |
|
IMPACT OF INFORMATION SECURITY INCIDENTS – THEORY AND REALITY |
Author : JAN DRTIL |
Abstract | Full Text |
Abstract : Information security (understood mainly as confidentiality, availability and integrity) plays more and more important role in every day usage of IT. The aim of this article is describe these characteristics from their theoretical as well as practical part and illustrate, what can happen in case any of them is affected. However, as IT environments still grow and are getting more and more complex, avoidance of information security incidents requires cooperation not only in technological area, but also across strategic, process, and organizational area. Due to growing level of tighter organizations, this is going to be one of the biggest challenges of information security for coming years. |
|
TOWARD A COMPREHENSIVE FRAMEWORK FOR EVALUATING THE CORE INTEGRATION FEATURES OF ENTERPRISE INTEGRATION MIDDLEWARE TECHNOLOGIES |
Author : HOSSEIN MORADI, ARDESHIR BAHREININEJAD |
Abstract | Full Text |
Abstract : To achieve greater automation of their business processes, organizations face the challenge of integrating disparate systems. In attempting to overcome this problem, organizations are turning to different kinds of enterprise integration. Implementing enterprise integration is a complex task involving both technological and business challenges and requires appropriate middleware technologies. Different enterprise integration solutions provide various functions and features which lead to the complexity of their evaluation process. To overcome this complexity, appropriate tools for evaluating the core integration features of enterprise integration solutions is required. This paper proposes a new comprehensive framework for evaluating the core integration features of both intra-enterprise and inter-enterprise Integration's enabling technologies, which simplify the process of evaluating the requirements met by enterprise integration middleware technologies. The proposed framework for evaluating the core integration features of enterprise integration middleware technologies was enhanced using the structural and conceptual aspects of previous frameworks. It offers a new schema for which various enterprise integration middleware technologies are categorized in different classifications and are evaluated based on their supporting level for the core integration features' criteria. These criteria include the functional and supporting features. The proposed framework, which is a revised version of our previous framework in this area, has developed the scope, structure and content of the mentioned framework. |
|
LINKAGE MECHANISMS FOR COMPONENT-BASED SERVICES AND IT GOVERNANCE |
Author : CARSTEN MULLER |
Abstract | Full Text |
Abstract : Insufficient modularizing of services and applications leads to complexity and complication with IT Governance architectures. The problem is that the available IT Governance solutions on the market only offer limited dynamic exchangeable components and/or specialized services, in order to be able to react flexibly to changing conditions within a short time. IT Governance requirements, frameworks, processes and services are insufficiently supported based on the generalization and with that connected inflexibility. In this article an innovative Framework based on Linkage Mechanisms and component-based Services in the context of IT Governance is presented. |
|