首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Today's business world is facing a plethora of managerial and technological changes beyond the capacity of any firm to control and absorb them. Customer satisfaction, development of new products, and introduction of new technologies are well-known driving forces, but their fast mutation and turmoil are making them unpredictable. Business process reengineering (BPR) is considered the most disruptive approach for designing organizations that can thrive in this turbulent environment. Although there is an increasing number of experiences that testify to its positive results, at present it is used mainly in large companies, and small and medium firms consider it as a risky and expensive activity. Within this framework, this article discusses a methodology for designing and implementing BPR, developed to overcome most of the limits that still bind its diffusion. This methodology supports firms in embedding reengineered processes knowledge owned by organizational units and in integrating available software and hardware, The focus of this article is on linking business and software modeling to allow the development of ad hoc new business processes while reducing risk of wasting time and money for useless requirements or for stiff solutions. The proposed methodology, starting from organizational requirements derived from business modeling, supports the analysis of costs, lead time, and quality or completeness trade-off of developed solutions. The phases of the methodology are discussed in detail together with an application example and results obtained from existing successful applications.  相似文献   

2.
During the past two decades, e-government information systems have become less paper-based and more computer-based. Those information systems usually take the form of workflow systems. Due to the large social impact of e-government systems, computer security plays a pivotal role in ensuring its efficiency and effectiveness. Access control is one of the key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this article, we argue that a formal context-sensitive access control model can improve the development of e-government workflow systems and present a particular context-sensitive access control model. The subject of the article is a specification of the context-sensitive access control model for business processes (COBAC). By using a context-sensitive access control, it is possible to define more sophisticated access control policies that cannot be implemented by existing access control models. The COBAC's context is modeled using Web Ontology Language (OWL) in order to provide formal representation of context, rich representation of diverse contextual information, semantic interoperability between various context-aware systems, and a high degree of inference making. The presented model is applicable in different e-government systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by a case study on a real e-government business process—the national petty offense trial proceedings.  相似文献   

3.
Advanced digital technologies, such as the Internet of Things, blockchain, big data analytics and augmented reality, are gradually transforming the way multinational firms do business. Due to the extent of this transformation many scholars argue that the integration of these technologies marks the commencement of the fourth industrial revolution (Industry 4.0). However, the question how these advanced technologies impact international business activities needs further attention. To this end, we adopt a multidisciplinary approach to review the related literature in international business (IB), general management, information systems, and operations research. We include the two latter fields, because advanced technologies have received more attention in these bodies of literature. Based on our analysis, we discuss the implications of these technologies for international business. Further, we highlight the drivers of technology utilisation by multinational firms and likely outcomes. We also provide future research avenues.  相似文献   

4.
The small business sector is one of the fastest growing sectors of the economy. The firms in this sector are becoming increasingly dependent on information systems (IS) for their operations. Traditional research in IS has primarily focused on large corporations. The problems, opportunities, and management issues encountered by small business in the IS area are unique, and research is too limited to provide useful guidelines. This study compares the research literature on IS implementation and research on IS in small business, examines the commonality and differences, and identifies research gaps. An overall research framework is developed to review the research in the two areas and determine areas of opportunity. As a follow-up of this analysis, a research model is developed to explore the factors influencing the adoption of computer-mediated communication technologies in small business. The model incorporates some of the innovation factors that are identified as potential gaps in the earlier analysis. The research model evaluates the impact of 6 factors-perceived usefulness, cost, compatibility, top management support, competitive advantage, and size-on the adoption of computer-mediated communications technologies. A telephone interview was used to collect data from 207 firms. The results of data analysis reveal that competitive advantage, top management support, and size are important determinants of adoption of computer-mediated communication technologies.  相似文献   

5.
Participatory democracy is one of several conceptions of democracy which strives to create opportunities for all members of a group to contribute to the decision making process. Recent developments in information technologies in general and Internet technologies in particular are affecting the existing democratic mechanisms, hence enabling citizens and organizations to participate widely, efficiently and transparently in the decision making process and, most importantly, to arrive at better decisions faster, through negotiation. E-negotiation systems rely on such technologies to implement protocols ranging from motion raising and voting to auctions, and to make them available on the web for general use. E-negotiation systems can be used for political and societal decision making as well as business dealings within e-government and B2B settings. In order for these systems to fulfill their promise of bringing decision making opportunities to all, we need a structured approach and a configurable framework for designing, implementing and deploying them. The resulting systems should be web-based, easy to use, affordable, traceable, reliable, secure, flexible, efficient, and open for integration with other systems. This paper starts by examining leading research initiatives to devise such a framework and discussing the motivations behind them. We then introduce several design requirements derived from the expectations of e-negotiation systems providers and users. We argue that meeting these requirements fosters a more democratic and efficient decision making process. We also present our approach and vision of a configurable framework for designing, implementing and deploying e-negotiation systems.  相似文献   

6.
A main challenge in managing projects is identification and understanding of interactions between subtasks. These interactions give rise to dependencies between activities in the project plan. The resulting interdependence between members of the project team requires them to coordinate extensively during project execution. Project managers need a systematic methodology for describing and analyzing coordination requirements on project teams. This need is not met in traditional tools for project planning and scheduling. In this article, we describe an object-oriented framework for modeling projects and a methodology for formalizing these models such that they can be used for discrete event simulation of information processing and coordination in project execution. Our modeling framework represents projects in terms of objective (requirements), product (solution deliverables), process (activities), and organization (participants and relations). We then use matrix techniques to explicate the constraints between project requirements and deliverables (complexity), the contingencies in information flow between activities (uncertainty), and the resulting coordination requirements between project team members. The model and coordination measures can be used as input for simulation of project execution and give predictions for the probable effects of carrying out proposed changes in planning and managing projects. To illustrate how enterprise modeling and analysis can inform project planing and execution, we apply our framework and methodology to model and simulate a simplified project for development of hydraulic systems. Our simulation results demonstrate how project performance is contingent on the fit between the project policies and the objectives and preferences of the project team.  相似文献   

7.
ABSTRACT

This paper presents a methodology for designing and deploying electronic enterprises–a step beyond intuitive or rule-based approaches. As a starting point, the paper presents a cyclical-model consisting of three e-business development phases: conceptualization, simulation, and implementation. Since an e-business “idea” rarely springs forth complete and ready to go, realizing the idea–that is, turning it into a commercial product, system, process, or profitable enterprise–requires business development. Business development requires analysis of the potential organizational structures, IT architectures, HR policies and procedures, strategies, market niche, partnership agreements, and so on, until a satisfactory enterprise design is found. Such consideration and experimentation can be done mentally (intuitively), or by drawing on a napkin (informally), or more logically using strategic and marketing analysis, revenue/cost/asset/operational business models, computer simulations, and other quantitative and qualitative management practices and techniques. In any case, only rarely is the result of the first development effort completely satisfactory, perhaps the business system or process will be too difficult to develop, too complex, or too costly to implement, maintain, or sell. So, once again the business idea goes into the cycle of developing, testing, redeveloping, implementing, and re-testing. Succinctly, the methodology advocated in this paper provides a framework for guiding the e-business development process.  相似文献   

8.
A growing number of international companies operate in a standard business systems environment. This suggests that standard business system solutions, e.g. from SAP R/3, might be adopted rather than introducing new problem specific systems solutions for new business requirements. This could be a cost efficient alternative in a situation when supply chain sophistication and integration demands from customers are increasing. In the Nordic countries vendor managed inventory (VMI) is an example of a new way of doing business that can give pioneers a competitive edge. The vendor in this case is the first supplier to go into a full-scale VMI relationship with the wholesaler – and has, through this, substantially reduced delivery costs to the retail trade. The case VMI implementation demonstrates that it is possible to arrive at a simple but efficient solution in a standard systems environment. The case shows how VMI can be implemented in a SAP R/3 environment based on the EDIFACT inventory report.  相似文献   

9.
The central idea advanced by this article is that thecombination of the Internet and the book in networkinglearning technologies while teaching business ethicsis not only a matter of methodology, but also a matterof educational message. The concept of reflectiveequilibrium underlies the curriculum of a one semestercourse in business ethics. A Phase-model of moraldecision making in business serves as the central axisof the course schedule. Each phase outlines theframework of the ``class' discussion as the courseprogresses. The actual teaching experiencedemonstrates that networking may enrich bothindividual and group learning processes, and advancethe growth of business leadership capable ofincorporating moral considerations within managerialdecisions.  相似文献   

10.
The emergence of Industry 4.0 offers firms internationalization opportunities employing digital platforms and emerging technologies. Relying upon the Uppsala model as applied in light of a firm case study, we contribute to the validity of the Uppsala model 2017. We respond to the counterpoint by Coviello, Kano, and Liesch (2017) to the Uppsala 2017 model, answering the question, What is the impact of Industry 4.0 on the validity of the 2017 version of the Uppsala model? This study builds on a qualitative research methodology through a single case study of Delivery Hero, a global service provider firm. We adopt an extensive longitudinal approach to understand a startup firm’s digital business concept and business evolution, including its internationalization paths. We conclude that the mechanisms of the Uppsala model are valid, but their characteristics have changed by digital and globalized value-adding processes. The dynamic capabilities possessed by the founding entrepreneur turn out to constitute a critical micro foundation for the firm’s international business success. Our findings explain these change mechanisms, illustrating the stepwise progression process led by entrepreneurial decision-making. Industry 4.0 technologies have changed the very manner by which ?rms arrange their value-adding activities with their business stakeholders in course of the firm’s internationalization. By relying on reasonable business targets, algorithms, and data management systems, real-time market monitoring enables international startup firms to learn and adopt local identities faster, thereby efficiently alleviating liabilities of foreignness.  相似文献   

11.
The German energy market is facing several challenges due to changes in regulation, technical advancements as well as increasing energy costs and climate achievements like CO2 reduction. This results in changing requirements for companies in the energy market and thus business information systems, which support their core tasks and processes. Software product managers in energy and software developing companies in charge of driving the functional development of information systems have to deal with these challenges and need to develop new information systems or enhance existing ones. Conceptual models proved helpful to design and implement information systems within several industries. However, identification and management of models as well as impact analysis of model changes results difficult. This contribution describes methods to construct, use and maintain a domain specific reference model catalogue to support requirements analysis for software product manager in the German electricity and gas market.  相似文献   

12.
Mobile technologies have pushed the connectivity of IT systems to the limit, enabling people and things to connect to one another at all times. The amount of information companies have at their disposal has increased exponentially, thanks largely to geolocation and to the vast array of sensors that have been integrated into mobile devices. This information can be used to enhance business activities and processes, but it can also be used to create new business models. Focusing on business models, we analyze mobile technologies as enablers of activity changes. We consider the differentiating characteristics of mobile technologies and examine how these can support different business functions. A study based on fuzzy-set qualitative comparative analysis (fsQCA) of 30 cases across different industries allows us to identify mobile technology success factors for different core activities. The results show that several combinations of mobile technology initiatives provide a competitive advantage when these initiatives match the business model.  相似文献   

13.
5G移动通信系统新应用场景和新技术带来新的安全需求和挑战,因此,在对3GPP 和IMT-2020发布的5G安全架构研究的基础上,分析了现有安全框架可能存在的安全风险,从安全系统、安全功能、安全服务等多维度提出了5G移动通信系统的安全框架,梳理了5G无线接入、网络、业务以及特殊行业等方面的安全机制要求和解决思路,可为5G安全技术的发展提供总体指导和规范约束。  相似文献   

14.
Today, even the development of business information systems is subject to the global offshoring trend. With the division of development work in an inter-organizational and intercultural context, requirements specifications become the central means to communicate the development scope as explicitly as possible. The suitability of requirements specifications hence often is mission critical in offshore projects. To assess their suitability, we first present eight quality criteria for requirements specifications. We then discuss five critical compensating factors that may potentially balance out an insufficient specification quality during the offshore project. On this basis, we describe a method to rationally evaluate the suitability of requirements specifications for instantiating an offshore project. We illustrate the application of the method by elaborating on a large case study that has been conducted with an industry partner. The results achieved by applying our method were confirmed during the further course of the actual project.  相似文献   

15.
Realistic requirements of mobile business applications often exceed the capabilities of their respective local environments. In order to overcome such restrictions of specific mobile devices, services, and resources, this contribution introduces the concept of context-based cooperation. It is based on mobile processes which enable applications to cross boundaries of individual systems and thereby allow combining both mobile and stationary resources in order to realize highly dynamic individual applications. This contribution presents an approach for realizing context-based cooperation built upon on a respective context management infrastructure and execution environment. It also identifies specific requirements and proposes related enhancements for mobile business applications.  相似文献   

16.
E‐learning was thought to be one of the fastest growing industries on both sides of the Atlantic and has been frequently heralded as a transforming influence on global corporate training and higher education. Despite such rhetoric, the adoption, diffusion and exploitation have been slower than anticipated. In this paper we attempt to explain why this might have been the case in Europe by drawing on an increasingly influential body of management literature on the absorptive capacity (ACAP) of organizations to acquire, assimilate and use new technologies and ideas. We supplement this work on absorptive capacity with two other streams of literature on learners and on the business systems or institutionalist perspective, which focuses on the embeddedness of unique organizational forms, ideas and human resource development approaches in particular national business systems. We develop a model of absorptive capacity for e‐learning in organizations (ACAP for eL), which we argue has important theoretical implications for business and management academics in developing a model of technology transfer and diffusion, key lessons for HRD practitioners and politicians associated with furthering e‐learning developments in their organizations, and also for policy makers at government level wishing to spread the e‐learning message.  相似文献   

17.
Knowledge-intensive business services accounted for a rapid growth in transition economies after 1989. The growth in value added outpaced growth in employment, which indicated increasing labour productivity in this sector. Studies based on input–output tables found that development of business services was closely related to development of communication services in advanced EU member countries. The input–output analysis did not confirm this relation for Slovakia and the Czech Republic and found a medium to strong level of correlation for Hungary. Development of a market economy was likely to be a major factor behind development of business services. This assumption was tested on empirical data. The use of communication and business services could be a proxy for introduction of new technologies in production functions. The functions indicated that these industries made a significant contribution to economic growth both in advanced and transition economies. Output elasticity coefficients were quite similar in the Czech Republic, Hungary and Slovakia and the EU member countries.  相似文献   

18.
胡正华 《商业研究》2003,(1):116-118
电子商务技术作为一种新兴的技术,它已经在很多领域中得到广泛的应用。但是,不是企业的所有商务活动都适合用电子商务技术加以解决。从商务活动的流程出发,通过建立商务活动模型、应用电子商务技术的合理性评价模型,以及从成本与效益的角度,探讨电子商务技术对不同类型的商务活动,以及商务处理过程中的不同阶段的适用性,从而为我国企业应用电子商务技术提供参考依据。  相似文献   

19.
Internet-based, real-world applications require appropriate security mechanisms because potentially millions of users and their agents (or participants) will access billions of objects of information content in complex workflow processes (e.g., commerce, learning, healthcare). Security is one of the strategic technologies that will increase the value and utility of the Internet and Internet-based applications. Traditional security issues deal with the authentication and authorization of users in network domains. Today there are numerous novel security issues concerning users, information content, and application systems in information domains. Among these, we will consider a novel role/object-based access control mechanism for both participants and objects in workflow processes of information domains. In particular, we will present our implementation of this mechanism for digital libraries.  相似文献   

20.
Networked computer systems simultaneously destroy and build up old and new kinds of global and local jobs. Digitally networked ultra-modern structures in work, company and administration bring us turbulent times. This development is analyzed from an ethical, technological and economical point of view and illustrated by empirical data. The main emphasis of this article is placed on considerations, from the point of view of business ethics, of the conception of workplaces – in the office, at home and abroad (mobile work) – equipped for computer-supported information exchange. In order to make better use of these new technologies, ethical, action-oriented guidelines should be considered.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号