To see the other types of publications on this topic, follow the link: Novell software. Business.

Journal articles on the topic 'Novell software. Business'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Novell software. Business.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Campbell-Kelly, Martin. "Not Only Microsoft: The Maturing of the Personal Computer Software Industry, 1982–1995." Business History Review 75, no. 1 (2001): 103–45. http://dx.doi.org/10.2307/3116558.

Full text
Abstract:
In the thirteen years following the introduction of IBM's first personal computer in 1982, Microsoft rose from being a small concern to become the colossus of the PC software industry. However, Microsoft was not the only software company to profit from the PC-software boom: firms like AutoDesk, Lotus Development, WordPerfect Corp., Ashton-Tate, Novell, Borland, Adobe Systems, Aldus, Symantec, and the Santa Cruz Operation all had their time in the sun. Whereas some of these firms lost their markets to Microsoft or stumbled through strategic errors, others remained hugely successful, and their relative obscurity is largely due to the contemporary obsession with Microsoft and its billionaire founder.
APA, Harvard, Vancouver, ISO, and other styles
2

Cagnin, Maria Istela, and Elisa Yumi Nakagawa. "Towards dynamic processes-of-business processes: a new understanding." Business Process Management Journal 27, no. 5 (May 25, 2021): 1545–68. http://dx.doi.org/10.1108/bpmj-08-2020-0349.

Full text
Abstract:
PurposeThe main purpose of this work is to overcome the difficulty to manage large, dynamic business processes formed from the complicated interplay of business processes of distinct organizations, which take part of strategic alliances of organizations (joint ventures and mergers and acquisitions) and have their software systems as part of complex, large software-intensive systems called Systems of Systems (SoS). Hence, the authors introduce the novel concept of Processes-of-Business Processes (PoP), deepening on their characteristics and related key terms.Design/methodology/approachBased on the systematically retrieved and analyzed literature and on the authors’ experience from research/industrial projects, the authors defined PoP and have applied them in the Brazilian public health SoS, which involve several organizations and their business processes and their independent software systems as well.FindingsProvided by PoP, a new understanding of the large, dynamic business processes of alliances of organizations is fundamental to advance both the state of the art and the state of the practice on business process management.Research limitations/implicationsThe adoption of PoP in other real-world scenarios is still required to get quantitative evidence.Practical implicationsThe adoption of PoP can certainly contribute to the success of new businesses and even promoting sustainability and longevity of SoS, which are in fact deeply impacted by business processes.Originality/valueThe concept of PoP can change the mindset of the research community and practitioners about how large, dynamic business processes should be seen and further managed.
APA, Harvard, Vancouver, ISO, and other styles
3

J, Subha, Sujitha S, and Subalakshmi K. "A Novel Online Approach for Jazzy Jewels." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 203–9. http://dx.doi.org/10.5121/ijci.2021.100222.

Full text
Abstract:
The objective of this software is to enable a Jeweller manage all their business workflow through an automated software system which brings more efficiency to their business and interactive/transparency to the user. It also provides automated tools that can be used for Online purchasing and order. Jewellery Automated System can be user friendly between the Jewellery shops and their clients
APA, Harvard, Vancouver, ISO, and other styles
4

Hamadu, Dallah, Ismaila Adeleke, and Ike Ehie. "Using Information Technology In Teaching Of Business Statistics In Nigeria Business School." American Journal of Business Education (AJBE) 4, no. 10 (September 30, 2011): 85–92. http://dx.doi.org/10.19030/ajbe.v4i10.6067.

Full text
Abstract:
This paper discusses the use of Microsoft Excel software in the teaching of statistics in the Faculty of Business Administration at the University of Lagos, Nigeria. Problems associated with existing traditional methods are identified and a novel pedagogy using Excel is proposed. The advantages of using this software over other specialized statistical packages (SPSS, Minitab or Stata) are simplicity, universality, accessibility, increased acquisition of skills, and, more importantly, reduced cost for students and instructors alike particularly for those in developing economies. Several examples are introduced to illustrate the use of Excel in teaching statistics in a business school. Moreover, this proposition is partially motivated by an intervention program funded by the USAID that resulted in the acquisition of information and communication technology (ICT) laboratories.
APA, Harvard, Vancouver, ISO, and other styles
5

Mishra, Debasisha. "A study of business knowledge requirements for software projects." Journal of Global Operations and Strategic Sourcing 14, no. 2 (March 22, 2021): 291–311. http://dx.doi.org/10.1108/jgoss-07-2020-0041.

Full text
Abstract:
Purpose This paper aims to explore the expertise level required in various kinds of business knowledge such as regulatory, domain, strategic, operation process and, business process to execute globally distributed software projects for development, re-engineering and maintenance projects in the Indian outsourcing software industry. Design/methodology/approach This study adopted a questionnaire survey method to collect the expert responses for a knowledge management framework which is suggested in the literature for software development work. The questionnaire survey findings were verified by expert interviews. Findings The research shows that there is a lot of similarity between re-engineering and maintenance projects for different kinds of business knowledge expertise requirements for execution. The development projects require higher expertise in all the business knowledge for execution. Research limitations/implications The research work studies the business knowledge required for the execution of development, re-engineering and maintenance projects in Indian outsourcing software projects. However, the project’s characteristics can vary drastically for a single kind of project. So the study cannot be generalized and instead should be used as a tool for learning. Practical implications The research findings can be used by software project managers to get insight into project planning, which can help the division of work between the onsite, offshore team and individual work allocation. Originality/value The research is novel as there are very few previous attempts to find the business expertise needed to execute various kinds of software projects in the Indian outsourcing industry.
APA, Harvard, Vancouver, ISO, and other styles
6

Achuff, Barbara-Jo, Parag Jain, Brady Moffett, Paul Checchia, and Eric Williams. "7: APPLYING BUSINESS INTELLIGENCE SOFTWARE TO SEDATION CAN IDENTIFY NOVEL QUALITY IMPROVEMENT TARGETS." Critical Care Medicine 44, no. 12 (December 2016): 88. http://dx.doi.org/10.1097/01.ccm.0000508725.31944.df.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

LABROU, YANNIS. "Agents and ontologies for e-business." Knowledge Engineering Review 17, no. 1 (March 2002): 81–85. http://dx.doi.org/10.1017/s0269888902000322.

Full text
Abstract:
Academic work on agents and ontologies is often oblivious to the complexities and realities of enterprise computing. At the same time, the practitioners of enterprise computing, although they are adept at the building of robust, real-life enterprise applications, are unaware of the academic body of work and the opportunities of applying novel approaches of academic origin. Enterprise applications are very complex systems that are designed to support critical business operations. This article outlines the technical and business foundations of enterprise application software and briefly discusses viable opportunities for agents and ontology research.
APA, Harvard, Vancouver, ISO, and other styles
8

Rong Yao, and Wang Jiandong. "Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform." International Journal of Digital Content Technology and its Applications 4, no. 9 (December 31, 2010): 68–79. http://dx.doi.org/10.4156/jdcta.vol4.issue9.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

RAVICHANDRAN, K. S., K. R. SEKAR, and P. SURESH. "A NOVEL APPROACH FOR OPTIMAL GROUPING OF REUSABLE SOFTWARE COMPONENTS FOR COMPONENT BASED SOFTWARE DEVELOPMENT SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 23, no. 07 (September 2013): 895–912. http://dx.doi.org/10.1142/s0218194013500253.

Full text
Abstract:
Component Based Software (CBS) development is the assembling of already developed components and preparing for integration. For the last two decades, researchers have been concentrating much on CBS both in industry and academia, because CBS helps in the reduction of manpower, cost, software development time and better system maintainability. The selection of the best component from the large collection of components is a difficult task and only few researchers have addressed this issue so far by using optimization techniques. In this paper, we propose a new methodology to group the components effectively, based on the software architecture, by using fuzzy concepts. Again, Fuzzy Clustering Technique (FCT) is introduced to find the optimal grouping between the reusable components and the software architectures. The proposed model has the following advantages: (i) the proposed Fuzzy Weighted Relational Coefficient (FWRC) is used to measure the fuzzy relational value of the suggested 9 component parameters; (ii) A mathematical model is established to remove all less utility leveled components before grouping; (iii) FCT performs on newly developed similarity coefficient formula; (iv) Zero — One programming (optimization) technique is used to optimize the group; (v) Fuzzy Weighted Approach is used to find the dominant component among the component grouping, and (vi) Optimal grouping is achieved by the property, namely, maximizing the cohesion and minimizing the coupling when compared to other methods. Finally, the validation of the derived methodology is verified with sample Business Enterprise Applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Gilsing, Rick, Anna Wilbik, Paul Grefen, Oktay Turetken, Baris Ozkan, Onat Ege Adali, and Frank Berkers. "Defining business model key performance indicators using intentional linguistic summaries." Software and Systems Modeling 20, no. 4 (June 15, 2021): 965–96. http://dx.doi.org/10.1007/s10270-021-00894-x.

Full text
Abstract:
AbstractTo sustain competitiveness in contemporary, fast-paced markets, organizations increasingly focus on innovating their business models to enhance current value propositions or to explore novel sources of value creation. However, business model innovation is a complex task, characterized by shifting characteristics in terms of uncertainty, data availability and its impact on decision making. To cope with such challenges, business model evaluation is advocated to make sense of novel business models and to support decision making. Key performance indicators (KPIs) are frequently used in business model evaluation to structure the performance assessment of these models and to evaluate their strategic implications, in turn aiding business model decision making. However, given the shifting characteristics of the innovation process, the application and effectiveness of KPIs depend significantly on how such KPIs are defined. The techniques proposed in the existing literature typically generate or use quantitatively oriented KPIs, which are not well-suited for the early phases of the business model innovation process. Therefore, following a design science research methodology, we have developed a novel method for defining business model KPIs, taking into account the characteristics of the innovation process, offering holistic support toward decision making. Building on theory on linguistic summarization, we use a set of structured templates to define qualitative KPIs that are suitable to support early-phase decision making. In addition, we show how these KPIs can be gradually quantified to support later phases of the innovation process. We have evaluated our method by applying it in two real-life business cases, interviewing 13 industry experts to assess its utility.
APA, Harvard, Vancouver, ISO, and other styles
11

Nhlabatsi, Armstrong, Bashar Nuseibeh, and Yijun Yu. "Security Requirements Engineering for Evolving Software Systems." International Journal of Secure Software Engineering 1, no. 1 (January 2010): 54–73. http://dx.doi.org/10.4018/jsse.2010102004.

Full text
Abstract:
Long-lived software systems often undergo evolution over an extended period. Evolution of these systems is inevitable as they need to continue to satisfy changing business needs, new regulations and standards, and introduction of novel technologies. Such evolution may involve changes that add, remove, or modify features; or that migrate the system from one operating platform to another. These changes may result in requirements that were satisfied in a previous release of a system not being satisfied in subsequent versions. When evolutionary changes violate security requirements, a system may be left vulnerable to attacks. In this article we review current approaches to security requirements engineering and conclude that they lack explicit support for managing the effects of software evolution. We then suggest that a cross fertilization of the areas of software evolution and security engineering would address the problem of maintaining compliance to security requirements of software systems as they evolve.
APA, Harvard, Vancouver, ISO, and other styles
12

Gaševic, Dragan, and Marek Hatala. "Model-Driven Engineering of Service-Oriented Systems." International Journal of Service Science, Management, Engineering, and Technology 1, no. 1 (January 2010): 17–32. http://dx.doi.org/10.4018/jssmet.2010010102.

Full text
Abstract:
Service-oriented architectures (SOA) are an essential platform to provide infrastructures that support widespread collaboration between organizations. These service-oriented systems are a new context for software developers, who must now be equipped with new development methods and technologies. This new context has specific requirements, such as better collaboration and communication between business users and software engineering across organizations and increased agility of the development and maintenance processes to better respond to newly emerged or changed requirements. In this paper, the authors present a research agenda that looks at the use of a novel software engineering discipline—model-driven engineering. By switching the focus from low-level technical details to high-level problem-specific details, model-driven engineering addresses challenges in the development of service-oriented systems. This paper particularly discusses the approach to the development of service-oriented systems based on business process modeling, which integrate business vocabularies and rules in different stages of the development lifecycle. Here, model-driven engineering can provide many promising solutions.
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Quan Yu, Shi Ying, Xiang Yang Jia, Guo Bin Lv, and Yun Shuai. "SOADL-EH: Service-Oriented Architecture Description Language Supporting Exception Handling." Advanced Materials Research 433-440 (January 2012): 3500–3509. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.3500.

Full text
Abstract:
To solve the problem of the construction of service-oriented software architecture with fault tolerant, the paper proposes SOADL-EH, a novel service-oriented software architecture description language supporting exception handling. With the capability of modeling normal SOA and the provision of software architecture elements such as exception handling services, exception handling connectors and exception handling configurations, etc., this language can separate clearly the exception handling logic from the normal business logic of the service-oriented software architecture layer, which makes up the shortage in exception handling capability of the existing Architecture description language.
APA, Harvard, Vancouver, ISO, and other styles
14

Haag, Albert, and Steffen Riemann. "Product configuration as decision support: The declarative paradigm in practice." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 25, no. 2 (April 20, 2011): 131–42. http://dx.doi.org/10.1017/s0890060410000582.

Full text
Abstract:
AbstractProduct configuration is a key technology, which enables businesses to deliver and deploy individualized products. In many cases, finding the optimal configuration solution for the user is a creative process that requires them to decide trade-offs between conflicting goals (multicriteria optimization problem). These problems are best supported by an interactive dialog that is managed by a dedicated software program (the configurator) that provides decision support. We illustrate this using a real example (configuration of a business software system). This productively used application makes the user aware of which choices are available in a given situation, provides assistance in resolving inconsistent choices and defaults, and generates explanations if desired. One of the key configurator components used to manage this is a truth maintenance system. We describe how this component is used and two novel extensions to it: methods for declarative handling of defaults (of varying strength) and the declarative handling of incompleteness. Finally, we summarize our experiences made during the implementation of this application and the pros and cons of declarative versus procedural approaches.
APA, Harvard, Vancouver, ISO, and other styles
15

Mishra, Debasisha, and Biswajit Mahanty. "Business knowledge requirements and onsite offshore work division in Indian software outsourcing projects." Strategic Outsourcing: An International Journal 8, no. 1 (February 16, 2015): 76–101. http://dx.doi.org/10.1108/so-10-2014-0025.

Full text
Abstract:
Purpose – The purpose of the paper is to find out the knowledge requirements and its effect on both onsite and offshore project work division for development, re-engineering and maintenance projects in Indian outsourcing software industry in different phases of software development. Design/methodology/approach – This study employs an expert interview approach in Indian software industry to find out knowledge requirement for project execution and division of work between onsite and offshore locations. The requisite data were collected through expert interviews and direct observations. Findings – The study found that the development projects require higher level of domain, strategic, business process and operation process knowledge in comparison to re-engineering and maintenance projects. So there is a need of higher onsite presence in development projects. The maintenance work is taken up at the offshore location in a phase-wise manner. Research limitations/implications – The implication of the study is in the development of a broad framework of knowledge requirements and work division in on-shore and offshore locations for Indian software outsourcing projects. As the study is based on expert opinion in the context of India, it cannot be generalized for outsourcing scenarios elsewhere. Practical implications – The software project manager can use the findings to get more insight into the project and divide the software team between onsite and offshore location. Originality/value – The study is novel, as there is little attempt at finding the knowledge requirement to execute various kinds of business software development in outsourcing environment in the context of India.
APA, Harvard, Vancouver, ISO, and other styles
16

T. Venkat Narayana Rao et al. "An Emerging Role of Chatbot in Businesses as a Novel Interactive Tool." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 2 (February 28, 2019): 36–39. http://dx.doi.org/10.17762/ijritcc.v7i2.5230.

Full text
Abstract:
Chatbot enables the business people to reach their target customers using popular messenger apps like Facebook, Whatsapp etc. Chatbots are not handled by humans directly. Nowadays, Chatbots are becoming very popular especially in business sector by reducing the human efforts and automated customer service. It is a software which interacts with user using natural language processing, Machine Language and Artificial Intelligence. They allow users to simply ask questions which would simulate interaction with the humans. The popular and well known chatbots are Alex and Siri. This paper focus on review of chatbot, history of chatbot and its implementation along with applications.
APA, Harvard, Vancouver, ISO, and other styles
17

Terano, Takao, Yasuhiro Sasaki, Masaaki Kunigami, and Atsushi Yoshikawa. "Persona Design Method for Evaluating Business Skills." Journal on Innovation and Sustainability. RISUS ISSN 2179-3565 6, no. 1 (March 30, 2015): 58. http://dx.doi.org/10.24212/2179-3565.2015v6i1p58-68.

Full text
Abstract:
This paper describes a novel method to apply the persona design method in marketingscience to the human resource management domain. Using the technique, employees in abusiness firm can identify and rank the images of the business skills the ideal leaders of an ITorientedorganization. To clarify the differences in recognition, we apply the persona technique.The persona technique was started in the user interface field of computer software developmentor marketing strategies, and has spread to the product development field. The proposedmethod uses the following procedure: 1) set persona characters with various attributes, 2)assign the attribute values by the orthogonal design technique, 3) design questionnaires, 4) getquestionnaire data on the personas from subjects, 5) evaluate the data recorded on respondentquestionnaires. Using the proposed method, we successfully detected the ordering of differentemployee images of organization leaders.
APA, Harvard, Vancouver, ISO, and other styles
18

Rangel-Padilla, Mariana. "State-business Relations and Industrial Upgrading in the Digital Era: The Cases of Software and Aerospace Sectors in Mexico (2000–2012)." Business and Politics 23, no. 3 (January 8, 2021): 309–29. http://dx.doi.org/10.1017/bap.2020.18.

Full text
Abstract:
AbstractDeveloping countries face the daunting challenge of stimulating innovation-intensive sectors to increase their participation in the knowledge economy. In this context, two pressing questions arise: What types of state-business relations foster the adoption of industrial upgrading policies? And, what are the mechanisms through which some state-business relations configurations shape the likelihood of policy adoption under more democratic and open conditions? Bridging developmental state and business politics literature, this paper presents a novel framework that posits that the levels of bureaucratic quality and business cohesion generate diverse industrial upgrading policymaking patterns, and thus outcomes. An in-depth case study of the software sector and a cross-case comparison of the aerospace sector in Mexico during the 2000s illustrate and refine the framework. This article makes three main contributions. First, it expands extant political economy theories of industrial upgrading in developing democracies. Second, it improves our understanding of the private sector by carefully analyzing sectoral business cohesion. And third, the paper specifies the mechanisms through which bureaucrats and firms in democratic developing countries collaborate to enact programs that spur high-tech industries in the twenty-first century.
APA, Harvard, Vancouver, ISO, and other styles
19

Kaderják, Gyula. "Customer Relationship Systems and Business Models." Acta Agraria Debreceniensis, no. 34 (September 2, 2009): 99–106. http://dx.doi.org/10.34101/actaagrar/34/2826.

Full text
Abstract:
The object of this study is a comprehensive review of customer relationship management (CRM) systems applied increasingly in several fields of economy. The CRM is not merely a subsequent software technology and application in the field of Business Intelligence, but rather a novel, comprehensive customer-centric approach to an organization’s philosophy in dealing with its customer for the sake of realization of short- and long-range business target contrary to the traditionally widespread productcentric approach. The object of the study, following a shortsynopsis of the theoretical and practical aspects of the CRM systems, is to analyse the range of the actual and potential users and to survey the CRM market. It will be analysed the scope of CRM supported business activities and processes, the terms and possible methods of launching and will be outlined a feasible model, too. The aim of conspectus of different CRM strategies (layers) is to reveal the urging need of turning approach in the field of management.
APA, Harvard, Vancouver, ISO, and other styles
20

Fan, Rui, and Xiao Hui Liu. "Dynamic Modeling of Intelligent Connector." Advanced Materials Research 108-111 (May 2010): 313–18. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.313.

Full text
Abstract:
To construct autonomous, dynamic evolvement software entity, and dynamically assemble them under the Internet environment for the complex software system, a novel intelligent software model is critical. Although there is significant literature on implementation of enterprise software systems, there are fewer contributions that give rigorous formal analyzing. In this paper, we present formal model of intelligent connector for constructing enterprise intelligent applications. As a core of the enterprise intelligence component, our model is presented at different levels of abstraction and formalism by π-calculus, and the characters of dynamic rebuilding, intelligent controlling business chains are formally analyzed. A case is given to illustrate its dynamic properties.
APA, Harvard, Vancouver, ISO, and other styles
21

Alotaibi, Youseef, and Fei Liu. "A novel secure business process modeling approach and its impact on business performance." Information Sciences 277 (September 2014): 375–95. http://dx.doi.org/10.1016/j.ins.2014.02.088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zhou, Junzan, and Shanping Li. "Distance Based Root Cause Analysis and Change Impact Analysis of Performance Regressions." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/690829.

Full text
Abstract:
Performance regression testing is applied to uncover both performance and functional problems of software releases. A performance problem revealed by performance testing can be high response time, low throughput, or even being out of service. Mature performance testing process helps systematically detect software performance problems. However, it is difficult to identify the root cause and evaluate the potential change impact. In this paper, we present an approach leveraging server side logs for identifying root causes of performance problems. Firstly, server side logs are used to recover call tree of each business transaction. We define a novel distance based metric computed from call trees for root cause analysis and apply inverted index from methods to business transactions for change impact analysis. Empirical studies show that our approach can effectively and efficiently help developers diagnose root cause of performance problems.
APA, Harvard, Vancouver, ISO, and other styles
23

Biswas, Baidyanath, and Arunabha Mukhopadhyay. "G-RAM framework for software risk assessment and mitigation strategies in organisations." Journal of Enterprise Information Management 31, no. 2 (March 5, 2018): 276–99. http://dx.doi.org/10.1108/jeim-05-2017-0069.

Full text
Abstract:
Purpose Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the use of software products by organisations. The purpose of this paper is to propose a novel G-RAM framework for business organisations to assess and mitigate risks arising out of software vulnerabilities. Design/methodology/approach The G-RAM risk assessment module uses GARCH to model vulnerability growth. Using 16-year data across 1999-2016 from the National Vulnerability Database, the authors estimate the model parameters and validate the prediction accuracy. Next, the G-RAM risk mitigation module designs optimal software portfolio using Markowitz’s mean-variance optimisation for a given IT budget and preference. Findings Based on an empirical analysis, this study establishes that vulnerability follows a non-linear, time-dependent, heteroskedastic growth pattern. Further, efficient software combinations are proposed that optimise correlated risk. The study also reports the empirical evidence of a shift in efficient frontier of software configurations with time. Research limitations/implications Existing assumption of independent and identically distributed residuals after vulnerability function fitting is incorrect. This study applies GARCH technique to measure volatility clustering and mean reversal. The risk (or volatility) represented by the instantaneous variance is dependent on the immediately previous one, as well as on the unconditional variance of the entire vulnerability growth process. Practical implications The volatility-based estimation of vulnerability growth is a risk assessment mechanism. Next, the portfolio analysis acts as a risk mitigation activity. Results from this study can decide patch management cycle needed for each software – individual or group patching. G-RAM also ranks them into a 2×2 risk-return matrix to ensure that the correlated risk is diversified. Finally the paper helps the business firms to decide what to purchase and what to avoid. Originality/value Contrary to the existing techniques which either analyse with statistical distributions or linear econometric methods, this study establishes that vulnerability growth follows a non-linear, time-dependent, heteroskedastic pattern. The paper also links software risk assessment to IT governance and strategic business objectives. To the authors’ knowledge, this is the first study in IT security to examine and forecast volatility, and further design risk-optimal software portfolios.
APA, Harvard, Vancouver, ISO, and other styles
24

Mishra, Debasisha, and Biswajit Mahanty. "The effect of onsite-offshore work division on project cost, schedule, and quality for re-engineering projects in Indian outsourcing software industry." Strategic Outsourcing: An International Journal 7, no. 3 (November 11, 2014): 198–225. http://dx.doi.org/10.1108/so-06-2014-0010.

Full text
Abstract:
Purpose – The aim of this paper is to make an attempt to find good values of onsite–offshore team strength; number of hours of communication between business users and onsite team and between onsite and offshore team to reduce cost and improve schedule for re-engineering projects in global software development environment. Design/methodology/approach – The system dynamics technique is used for simulation model construction and policy run experimentation. The experts from Indian software outsourcing industry were consulted for model construction, validation and analysis of policy run results in both co-located and distributed software development environment. Findings – The study results show that there is a drop in the overall team productivity in outsourcing environment by considering the offshore options. But the project cost can be reduced by employing the offshore team for coding and testing work only with minimal training for imparting business knowledge. The research results show that there is a potential to save project cost by being flexible in project schedule. Research limitations/implications – The study found that there could be substantial cost saving for re-engineering projects with a loss of project schedule when an appropriate onsite–offshore combination is used. The quality and productivity drop, however, were rather small for such combinations. The cost savings are high when re-engineering work is sent to offshore location entirely after completion of requirement analysis work at onsite location and providing training to offshore team in business knowledge The research findings show that there is potential to make large cost savings by being flexible in project schedule for re-engineering projects. Practical implications – The software project manager can use the model results to divide the software team between onsite and offshore location during various phases of software development in distributed environment. Originality/value – The study is novel as there is little attempt at finding the team distribution between onsite and offshore location in global software development environment.
APA, Harvard, Vancouver, ISO, and other styles
25

Santos, Gabriel, Pedro Faria, Zita Vale, Tiago Pinto, and Juan M. Corchado. "Constrained Generation Bids in Local Electricity Markets: A Semantic Approach." Energies 13, no. 15 (August 2, 2020): 3990. http://dx.doi.org/10.3390/en13153990.

Full text
Abstract:
The worldwide investment in renewable energy sources is leading to the formation of local energy communities in which users can trade electric energy locally. Regulations and the required enablers for effective transactions in this new context are currently being designed. Hence, the development of software tools to support local transactions is still at an early stage and faces the challenge of constant updates to the data models and business rules. The present paper proposes a novel approach for the development of software tools to solve auction-based local electricity markets, considering the special needs of local energy communities. The proposed approach considers constrained bids that can increase the effectiveness of distributed generation use. The proposed method takes advantage of semantic web technologies, in order to provide models with the required dynamism to overcome the issues related to the constant changes in data and business models. Using such techniques allows the system to be agnostic to the data model and business rules. The proposed solution includes the proposed constraints, application ontology, and semantic rule templates. The paper includes a case study based on real data that illustrates the advantages of using the proposed solution in a community with 27 consumers.
APA, Harvard, Vancouver, ISO, and other styles
26

Wit, Bogdan, and Korneliusz Pylak. "Implementation of triple bottom line to a business model canvas in reverse logistics." Electronic Markets 30, no. 4 (May 12, 2020): 679–97. http://dx.doi.org/10.1007/s12525-020-00422-7.

Full text
Abstract:
AbstractWaste generation, especially hazardous waste, can strongly affect the environment and human lives. There is an urgent need to implement sustainable hazardous waste management tools to reduce their harmful impact on the environment stemming from incorrect waste management. However, there is still a lack of business model concepts combining sustainable development and risk management in reverse logistic value chains for hazardous waste. Therefore, the authors develop a novel sustainable business model canvas for both an entity and the logistics system using the Osterwalder’s Business Model Canvas integrated with the concept of sustainable development in economic, social and environmental areas (Triple Bottom Line, TBL) and risk-related elements. Then, using the developed sustainable business model canvas, the model for the logistics system for the treatment of hazardous waste containing asbestos was successfully created. The model was implemented in the prototype of computer software in the form of electronic network services.
APA, Harvard, Vancouver, ISO, and other styles
27

Hovelja, Tomaž, Olegas Vasilecas, Diana Kalibatienė, and Rok Rupnik. "EVALUATING ORGANIZATIONAL CHARACTERISTICS COMPLEMENTARY WITH ENTERPRISE SOFTWARE PRODUCTS." Journal of Business Economics and Management 21, no. 3 (May 12, 2020): 890–913. http://dx.doi.org/10.3846/jbem.2020.12443.

Full text
Abstract:
Implementation, deployment and maintenance of enterprise software pre-configured products are one of the key challenges managers need to address in order to stay competitive in the never ending search to find better ways of conducting business. In the literature there are discovered two general approaches through which managers can use for a successful implementation, deployment and maintenance of enterprise software products. First approach is based on the internal re-deployment of the managerial practices that are already used to manage other fields in the enterprise. Second – the deployment of “world-wide” industry “best practices” that international vendors of enterprise software and their local representatives sell as part of their pre-configured software products. This paper presents a novel model that enables enterprises to systematically evaluate the fit between their specific organizational characteristics and the organizational characteristics complementary with successful deployment of international pre-configured enterprise software products. The proposed model is tested through a comparison of two groups of enter-prises from the population of 1000 biggest enterprises in Slovenia. The first group mostly invests in local, while the second group mostly invests in international enterprise software products. The paper finds that on average there are significant and relevant differences in 44% of the examined organizational characteristics between the groups of enterprises that mostly invest in international or local enterprise software products. The model serves as a comprehensive organizational risk checklist for enterprises that are about to invest in enterprise software products.
APA, Harvard, Vancouver, ISO, and other styles
28

Deepak Kumar Solanki and Kunal Sinha. "Innovation and Development in Information Technology in India: Specific to Software Industry." Journal of Technology Management for Growing Economies 8, no. 2 (October 23, 2017): 129–44. http://dx.doi.org/10.15415/jtmge.2017.82001.

Full text
Abstract:
Information technology (IT) plays an important role in development of business, boosting economic growth and employment by energising higher education sector. Software sector is a major component of IT industry. Development of indigenous software products is necessary for nation’s economy through development in software industry. Under ‘Digital India’ and ‘Make In India programmes major institutions are involved in policies and initiative programmes, R&D and innovation for growth of software industry. The paper attempts to highlight the crucial contribution of key stakeholders such as universities, technical research institute and private-public software firms, STPI and industrial association for development of software products and services. The Indian Government has taken many initiatives for promotion and adoption of Free & Open Source Software for increasing foreign exchanges, developing indigenous products and achieving vendor’s independence. The paper raise question about unavailability of indigenous software products as compared to Microsoft and other foreign vendor’s products in Indian market. Various institutions are still working on creation of indigenous software and in upcoming time novel products and technologies will be provided by India to domestic and global IT market.
APA, Harvard, Vancouver, ISO, and other styles
29

Mishra, Debasisha, and Biswajit Mahanty. "A study of software development project cost, schedule and quality by outsourcing to low cost destination." Journal of Enterprise Information Management 29, no. 3 (April 11, 2016): 454–78. http://dx.doi.org/10.1108/jeim-08-2014-0080.

Full text
Abstract:
Purpose – The purpose of this paper is to find good values of onsite-offshore team strength; number of hours of communication between business users and onsite team and between onsite and offshore team so as to reduce project cost and improve schedule in a global software development (GSD) environment for software development project. Design/methodology/approach – This study employs system dynamics simulation approach to study software project characteristics in both co-located and distributed development environments. The authors consulted 14 experts from Indian software outsourcing industry during our model construction and validation. Findings – The study results show that there is a drop in overall team productivity in outsourcing environment by considering the offshore options. But the project cost can be reduced by employing the offshore team for coding and testing work only with minimal training for imparting business knowledge. The research results show that there is a potential to save project cost by being flexible in project schedule. Research limitations/implications – The implication of the study is that the project management team should be careful not to keep high percentage of manpower at offshore location in distributed software environment. A large offshore team can increase project cost and schedule due to higher training overhead, lower productivity and higher error proneness. In GSD, the management effort should be to keep requirement analysis and design work at onsite location and involves the offshore team in coding and testing work. Practical implications – The software project manager can use the model results to divide the software team between onsite and offshore location during various phases of software development in distributed environment. Originality/value – The study is novel as there is little attempt at finding the team distribution between onsite and offshore location in GSD environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Triantafyllou, Ioannis, Ioannis C. Drivas, and Georgios Giannakopoulos. "How to Utilize My App Reviews? A Novel Topics Extraction Machine Learning Schema for Strategic Business Purposes." Entropy 22, no. 11 (November 17, 2020): 1310. http://dx.doi.org/10.3390/e22111310.

Full text
Abstract:
Acquiring knowledge about users’ opinion and what they say regarding specific features within an app, constitutes a solid steppingstone for understanding their needs and concerns. App review utilization helps project management teams to identify threads and opportunities for app software maintenance, optimization and strategic marketing purposes. Nevertheless, app user review classification for identifying valuable gems of information for app software improvement, is a complex and multidimensional issue. It requires foresight and multiple combinations of sophisticated text pre-processing, feature extraction and machine learning methods to efficiently classify app reviews into specific topics. Against this backdrop, we propose a novel feature engineering classification schema that is capable to identify more efficiently and earlier terms-words within reviews that could be classified into specific topics. For this reason, we present a novel feature extraction method, the DEVMAX.DF combined with different machine learning algorithms to propose a solution in app review classification problems. One step further, a simulation of a real case scenario takes place to validate the effectiveness of the proposed classification schema into different apps. After multiple experiments, results indicate that the proposed schema outperforms other term extraction methods such as TF.IDF and χ2 to classify app reviews into topics. To this end, the paper contributes to the knowledge expansion of research and practitioners with the purpose to reinforce their decision-making process within the realm of app reviews utilization.
APA, Harvard, Vancouver, ISO, and other styles
31

Mirzamohammadi, Saeed, Saeed Karimi, and Mir Saman Pishvaee. "A novel cost allocation method applying fuzzy DEMATEL technique." Kybernetes 49, no. 10 (November 22, 2019): 2569–87. http://dx.doi.org/10.1108/k-07-2019-0513.

Full text
Abstract:
Purpose The purpose of this paper is to develop a new systematic method for a multi-unit organization to cope with the cost allocation problem, which is an extension of the reciprocal method. As uncertainty is the inherent characteristic of business environments, assuming changes in engaged parameters is almost necessary. The outputs of the model determine the total value of each unit/business lines or product. Design/methodology/approach In the proposed method, contrary to existing models, business units are able to transfer their costs to other units, and also, not necessarily transfer the total costs of support units completely. The DEMATEL approach, which finds all relationships between different parts of a system, is also applied for computing effects of the units’ expense paid to each other. Moreover, a fuzzification approach is used to capture linguistic experts’ judgments about related data. Findings Being closer to the real-world problem in comparison to the previous approach, the proposed systematic approach encompasses the other cost allocation models. Practical implications Applying the proposed model for a system like a multi-unit organization, the total price of each unit/business line can be obtained. Moreover, this cost allocation process guides the related decision-makers to better manage the expenses that each unit pays the others. Originality/value In the existing studies, business units cannot pay expense support units. However, in the proposed method, the business units are able to pay expenses for other units, and also, not necessarily pay total expenses for support unit completely. Moreover, considering engaged parameters as fuzzy numbers makes the proposed model closer to real-world problems.
APA, Harvard, Vancouver, ISO, and other styles
32

Misra, Subhas C., and Virender Singh. "Conceptualizing open agile software development life cycle (OASDLC) model." International Journal of Quality & Reliability Management 32, no. 3 (March 2, 2015): 214–35. http://dx.doi.org/10.1108/ijqrm-08-2013-0127.

Full text
Abstract:
Purpose – Software development life cycle (SDLC) has always been the core methodology for any software engineer that depicts the entire development process which an organization is bound to utilize to achieve successful software. The purpose of this paper is to bring forth a conceptual model after analysing the best practices in SDLC, and extracting the best out of agile methodologies and the open source software, thereby bringing forward an optimised structure. Design/methodology/approach – The OASDLC is hypothesized specifically for “Brihaspati” project and is formulated keeping in mind the gaps and limitations posed by existing SDLC models. OASDLC is further put to test for achieving lower costs and efforts involved. The tests are further substantiated by means of hypothesis validation through execution of a survey based research. Findings – It has been observed that the present conceptual model further optimizes the efforts involved while adopting such a practice. Originality/value – This paper proposes a novel SDLC model so as to achieve a best practice for a software project. On analysing the issues involved such as tight budget and timelines, it led the authors to formulate a newer concept “Open Agile Software Development Life Cycle model” (OASDLC).
APA, Harvard, Vancouver, ISO, and other styles
33

Altuntas, Serkan. "A novel approach based on utility mining for store layout: a case study in a supermarket." Industrial Management & Data Systems 117, no. 2 (March 13, 2017): 304–19. http://dx.doi.org/10.1108/imds-01-2016-0040.

Full text
Abstract:
Purpose The purpose of this paper is to propose a novel approach based on utility mining for store layout. Design/methodology/approach A utility mining-based data mining algorithm is utilized in this paper. Findings A real-life case study in a supermarket is conducted to illustrate the proposed approach. The findings show that the proposed approach can be used easily and efficiently to arrange store layout. Research limitations/implications There are two limitations to this study. First, space allocation to each product family is not considered. Second, product placement in each product family is not taken into account in the proposed approach. Originality/value In this paper, a novel approach is proposed for business intelligence in retail business. The proposed approach uses a utility-based data mining approach, namely, the high-utility itemset mining (HUIM) algorithm, to rearrange store layout and to determine the relations among product families. The quantities and prices of items purchased corresponding to product families are taken into account in the proposed approach to address the needs in practice. Business intelligence software is also developed as an integral part of the proposed approach to utilize the HUIM algorithm.
APA, Harvard, Vancouver, ISO, and other styles
34

STUIT, MARCO, and NICK B. SZIRBIK. "TOWARDS AGENT-BASED MODELING AND VERIFICATION OF COLLABORATIVE BUSINESS PROCESSES: AN APPROACH CENTERED ON INTERACTIONS AND BEHAVIORS." International Journal of Cooperative Information Systems 18, no. 03n04 (September 2009): 423–79. http://dx.doi.org/10.1142/s0218843009002063.

Full text
Abstract:
This paper presents the process-oriented aspects of a formal and visual agent-based business process modeling language. The language is of use for (networks of) organizations that elect or envisage multi-agent systems for the support of collaborative business processes. The paper argues that the design of a collaborative business process should start with a proper understanding of the work practice of the agents in the business domain under consideration. The language introduces a novel diagram to represent the wide range of (cross-enterprise) business interactions as a hierarchy of role-based interactions (including their ordering relations) in a tree structure. The behaviors owned by the agents playing the roles in the tree are specified in separate process diagrams. A collaborative business process studied in the context of a case study at a Dutch gas transport company is used to exemplify the modeling approach. Explicit (agent-based) process models can and should be verified using formal methods. In the business process community, design-time verification of a process design is considered vital in order to ensure the correctness and termination of a collaborative business process. The proposed modeling approach is enhanced with a design-time verification method. The direction taken in this research is to combine the interaction tree and the associated agent behaviors into a verifiable hierarchical colored Petri net in order to take advantage of its well-defined (execution) semantics and proven (computerized) verification techniques. The verification method presented in this paper consists of three steps: (1) the translation of the agent-based process design to a hierarchical colored Petri net, (2) the identification of process design errors, and (3) the correction and rollback of process design errors to the agent-based model. The translation technique has been implemented in a software tool that outputs the hierarchical colored Petri net in a format that can be loaded in the widely used CPN Tools software package. Verification results are discussed for the case study model.
APA, Harvard, Vancouver, ISO, and other styles
35

Kujala, Jaakko, Soili Nystén-Haarala, and Jouko Nuottila. "Flexible contracting in project business." International Journal of Managing Projects in Business 8, no. 1 (January 5, 2015): 92–106. http://dx.doi.org/10.1108/ijmpb-10-2013-0062.

Full text
Abstract:
Purpose – The purpose of this paper is to increase the understanding of the main challenges of the contracting process and project contracts in the context of project business characterized by a high level of complexity and uncertainty. The authors argue that understanding contracting as a flexible process and as a business tool will contribute to creating more value in projects which are implemented in constantly changing circumstances or which require gradual and iterative development. Design/methodology/approach – This is a conceptual paper with illustrative examples from the software industry. Findings – A prevailing approach for both managing contracts and the contracting process focuses on careful planning and drafting of contracts that protect each party in the case of conflicts and disagreements. The underlying assumption is that all activities can be planned and documented in a formal contract. According to this approach, the contracting process is seen only as a bargaining negotiation and the project contract as a detailed agreement of the responsibilities and safeguarding clauses to protect one’s position in the event of conflicts and failures. However, in the context of project business characterized by complexity and uncertainty, there is a need for flexible project contracts. The authors suggest that there are two fundamentally different approaches to implementing flexibility in both the contracting process and the project contract: postponing the decision until there is adequate information for decision making or making decisions that allow flexible adaptation to changes during the project lifecycle. Practical implications – The authors suggest that organizations in project business should pay closer attention to how contracts are formed and how flexibility is introduced to projects. Organizations are encouraged to see contracts as a business tool, not as rigid documents which are taken into use in case something goes wrong. Originality/value – This paper contributes to the understanding of how to adapt the contracting process to overcome challenges related to uncertainty, especially during the early phases of the project lifecycle. The authors provide a novel perspective on contracting as a process that extends over the lifecycle of a project and on the project contract as an agreement between parties formed during the contracting process. This perspective includes formal contract documents as well as various other documents, oral communication, commitments, actions and incidents.
APA, Harvard, Vancouver, ISO, and other styles
36

Kambiz Behfar, Stefan, Ekaterina Turkina, and Thierry Burger-Helmchen. "Network tie structure causing OSS group innovation and growth." Problems and Perspectives in Management 15, no. 1 (March 28, 2017): 7–18. http://dx.doi.org/10.21511/ppm.15(1).2017.01.

Full text
Abstract:
Open source software (OSS) development as an inexpensive process to develop software threatens proprietary software business strategies. Providing business strategy to benefit from volunteer developers for the purpose of contributing to existing projects, as well as initiating new OSS projects is of utmost significance for companies in that industry. Therefore, it is important to figure out how groups of volunteer developers are formed as new developers join existing projects, and it is even more important to investigate what causes these developers to initiate new projects. The authors investigate network structure as a causal factor for both new project initiation within a group (representing group innovation) as well as new developers joining existing projects within a group (representing group growth). The authors develop four hypotheses:1. Intra-group coupling has a positive impact on group growth,2. Inter-group coupling has a positive impact on group innovation,3. Inter-group structural hole has a positive impact on group innovation,4. There is a trade-off between the effects of inter-group structural hole and inter-group coupling on group innovation.The authors test these four hypotheses using data from OSS. Developers contributing to project tasks in groups other than their own can explore novel ideas for new project creation, because they can benefit from sharing knowledge, whereas developers contributing to project tasks inside their own group exploit ideas to improve those existing projects with better inside-group search possibility; and this demands more developers to join those group projects.
APA, Harvard, Vancouver, ISO, and other styles
37

Banerjee, Parthasarathi. "Strategies of Subversion: Management of Demand for Software Through Destabilizing Organizational Structure of Your Customer." Metamorphosis: A Journal of Management Research 2, no. 1-2 (July 2003): 77–91. http://dx.doi.org/10.1177/0972622520030107.

Full text
Abstract:
Corporate understanding on strategies of cooperation and outsourcing of business processes has come closer over the years. An outsourced partner is described sometimes as the extended enterprise. Supplier's organizational structure, following the logic of extended enterprise, needs to correspond in a certain strange manner with the customer's organizational structure. We argue that the process of finding a fit between two or more structures is expression of a demand; and, this process being unstable destabilizes all the structures in dynamic interactions resulting in generation of new and novel demands. Thus, struch1res become the sources of demand here. Hence, meeting customer's demand or management of current demand create another demand in consequence. Such a sequel ought to be based on increasing return or an endogenous satisfaction of demand, making it provocative enough to look for an endogenous demand. However, management of an endogenous demand rests with the supplier firm- on how innovative structural solutions can be offered by an extended enterprise. The supplier firm acts here as agent provocateurs as it were.
APA, Harvard, Vancouver, ISO, and other styles
38

Muhammad Rizwan Sabir, Muqqadas Rehman, and Waheed Asghar. "Assessing the Mediating Role of Organization Learning Capability between the Relationship of Green Intellectual Capital and Business Sustainability." Journal of Business and Social Review in Emerging Economies 6, no. 4 (December 4, 2020): 1273–85. http://dx.doi.org/10.26710/jbsee.v6i4.1416.

Full text
Abstract:
There has been a lot of debate on intellectual capital and its dimensions, except green intellectual capital (GIC). The economic benefit of business not only eliminates the neediness of the region but also invigorate the prosperity in the area; however, the heat of financial interest among business competitor causes social inequality and destruction of the environment. This paper is novel conception due to the lack in prior studies as many did not focus on the relationship between green intellectual capital (green human capital, green structural capital and green relational capital) and business sustainability (BS) in the context of a developing country; Pakistan to assess the mediating role organization learning capability (OLC) between the relationship of GIC and BS. The current study tried to link two theories, natural resource-based view and intellectual capital-based view (NRBV& ICBV), to conceptualize the intangible resources that lead to business sustainability by assimilating the "green" into conventional intellectual capital namely green intellectual capital. Data were collected from 154 SME manufacturing companies in Lahore, Pakistan. The simple random sampling technique used for data collection. SPSS and AMOS software is used for data analysis. The results show that all three dimensions of green intellectual capital effect on business sustainability. While discussing the mediation role of organizational learning capability, OLC mediates the relationship between human capital and business sustainability. Furthermore, OLC does not play a mediation role between structural capital, relational capital, and business sustainability. Finally, this study described limitations as well as future directions
APA, Harvard, Vancouver, ISO, and other styles
39

Hinduja, Akshay, and Manju Pandey. "An Integrated Intuitionistic Fuzzy MCDM Approach to Select Cloud-Based ERP System for SMEs." International Journal of Information Technology & Decision Making 18, no. 06 (November 2019): 1875–908. http://dx.doi.org/10.1142/s0219622019500378.

Full text
Abstract:
ERP system is a software package that integrates and manages all the facets of the business and deeply influences the success of a business endeavor. The increasing competition in the market, rapidly changing demands, and increasing intricacy of business procedures induce enterprises to adopt ERP solutions. Adopting an ERP solution increases synchronization between business activities and reinforces managerial decision-making. However, it also involves a large investment, a significant amount of human resources and time, and risk of failure. Therefore, the selection of an ERP solution is a crucial decision for enterprises. To address this decision-making problem, we propose a four-stage multi-criteria decision-making approach in this paper. Three prevalent MCDM techniques, DEMATEL, IF-ANP, and IF-AHP, are used in different stages of the methodology to achieve better outcomes. The methodology incorporates the intuitionistic fuzzy sets to capture uncertainty and hesitancy involved in decision makers’ judgments. In addition, we develop a novel priority method to derive weights from the intuitionistic fuzzy preference relations. To validate the feasibility of the proposed approach, a case study is carried out on the selection of cloud-based ERP system for SMEs in the Chhattisgarh state of India, which indicates that the proposed four-stage approach effectively handles the ERP selection problem.
APA, Harvard, Vancouver, ISO, and other styles
40

Gailly, Frederik, and Guido L. Geerts. "Ontology-Driven Business Rule Specification." Journal of Information Systems 27, no. 1 (February 1, 2013): 79–104. http://dx.doi.org/10.2308/isys-50428.

Full text
Abstract:
ABSTRACT Discovering business rules is a complex task for which many approaches have been proposed including analysis, extraction from code, and data mining. In this paper, a novel approach is presented in which business rules for an enterprise model are generated based on the semantics of a domain ontology. Starting from an enterprise model for which the business rules need to be defined, the approach consists of four steps: (1) classification of the enterprise model in terms of the domain ontology (semantic annotation), (2) matching of the enterprise model constructs with ontology-based Enterprise Model Configurations (EMCs), (3) determination of Business Rule Patterns (BRPs) associated with the EMCs, and (4) use of the semantic annotations to instantiate the business rule patterns; that is, to specify the actual business rules. The success of this approach depends on two factors: (1) the existence of a semantically rich domain ontology, and (2) the strength of the knowledge base consisting of EMC-BRP associations. The focus of this paper is on defining and illustrating the new business rule discovery approach: Ontology-Driven Business Rule Specification (ODBRS). The domain of interest is enterprise systems, and an extended version of the Resource-Event-Agent Enterprise Ontology (REA-EO) is used as the domain ontology. A small set of EMC-BRP associations—i.e., an example knowledge base—is developed for illustration purposes. The new approach is demonstrated with an example.
APA, Harvard, Vancouver, ISO, and other styles
41

Schinagl, Stef, and Abbas Shahim. "What do we know about information security governance?" Information & Computer Security 28, no. 2 (January 25, 2020): 261–92. http://dx.doi.org/10.1108/ics-02-2019-0033.

Full text
Abstract:
Purpose This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG. Design/methodology/approach The intention of the authors was to conduct a systematic literature review. However, owing to limited empirical papers in ISG research, this paper is more conceptually organised. Findings This paper shows that security has shifted from a narrow-focused isolated issue towards a strategic business issue with “from the basement to the boardroom” implications. The key takeaway is that protecting the organisation is important, but organizations must also develop strategies to ensure resilient businesses to take advantage of the opportunities that digitalization can bring. Research limitations/implications The concept of DSG is a new research territory that addresses the limitations and gaps of traditional ISG approaches in a digital context. To this extent, organisational theories are suggested to help build knowledge that offers a deeper understanding than that provided by the too often used practical approaches in ISG research. Practical implications This paper supports practitioners and decision makers by providing a deeper understanding of how organisations and their security approaches are actually affected by digitalisation. Social implications This paper helps individuals to understand that they have increasing rights with regard to privacy and security and a say in what parties they assign business to. Originality/value This paper makes a novel contribution to ISG research. To the authors’ knowledge, this is the first attempt to review and structure the ISG literature.
APA, Harvard, Vancouver, ISO, and other styles
42

Marcinkowski, Bartosz, and Bartlomiej Gawin. "A study on the adaptive approach to technology-driven enhancement of multi-scenario business processes." Information Technology & People 32, no. 1 (February 4, 2019): 118–46. http://dx.doi.org/10.1108/itp-03-2018-0142.

Full text
Abstract:
PurposeProcess-oriented organizations are compelled to be innovative and continuously implement changes to meet customer requirements and gain a competitive advantage in accordance with the business process management approach. In the digital age, organizations develop business process support systems using agile methods and introduce adaptation skills in order to support their core business. Seamlessly integrating both practices into a coherent and practically applicable solution supporting multi-scenario processes infallibly remains a challenge. The paper aims to discuss these issues.Design/methodology/approachThe workshops identifying the key issues in an international capital group that consolidates facility management companies, as well as a related research review, have fueled a two-cycled Canonical Action Research (CAR) study.FindingsThe paper extends the current understanding of IT-enabled agility, proposing an adaptively improved infrastructure with a catalog of digital options that facilitates the composition of multi-scenario business processes.Research limitations/implicationsThe CAR was limited to the members of management board and the managers constituting the focus groups. The agile business process management (ABPM) model proposed focuses on adding novel functionalities/building new processes, leaving functionality lifecycle out-of-scope. ABPM empirical validation is limited to a single business/technical case.Practical implicationsReal-life solution for supporting dynamic business processes was delivered, as rigid IT solutions do not support quick assembly of customized business processes with abundant number of scenarios. The infrastructure enables composition of customer-tailored services based on re-usable digital options directory as well as enhances business process discrepancies/software bugs detection, reducing the cost of maintaining IT infrastructure for entire customer portfolio. A number of issues resulting from building IT solutions within a series of isolated projects with no coherent overall development strategy are mitigated.Originality/valueThe ABPM acts as a reference model for focusing on developing critical functionalities and limiting resources consumed by redundant features.
APA, Harvard, Vancouver, ISO, and other styles
43

Hendrikse, Reijer, David Bassens, and Michiel Van Meeteren. "The Appleization of finance: Charting incumbent finance’s embrace of FinTech." Finance and Society 4, no. 2 (November 30, 2018): 159–80. http://dx.doi.org/10.2218/finsoc.v4i2.2870.

Full text
Abstract:
The rise of financial technology (FinTech) engenders novel business models through integrating financial services and information and communication technologies (ICT). Digital currencies and payments, data mining, and other FinTech applications threaten to radically overhaul the financial sector. This article argues that, while we are becoming aware of how technology giants such as Apple Inc. are making inroads into financial services, we need to become more sensitive to how financial incumbents mimick ICT firms while aiming to neutralize the FinTech challenge. Practices from Silicon Valley are spilling over into ‘traditional’ finance through a process we dub Appleization. We illustrate how incumbents aim to remain indispensable amidst rapid digitization. Mimicking tech strategies, financial incumbents resort to transforming legacy ICT systems into integrated platforms, cultivating entrepreneurial ecosystems where startups are ‘free’ to compete whilst effectively being locked into the incumbent's orbit. We illustrate this by comparing Apple’s business features (locking-in developers, customers and state into a hybrid business model based on a synergy between hardware, software and data-driven platform components) with emerging practices in the financial industry. Our analogy suggests that the Appleization of finance might radically transform, yet not undercut the oligopolistic position of financial incumbents.
APA, Harvard, Vancouver, ISO, and other styles
44

Huang, Daozheng, and Gang Zhao. "A Shared Container Transportation Mode in the Yangtze River." Sustainability 11, no. 10 (May 21, 2019): 2886. http://dx.doi.org/10.3390/su11102886.

Full text
Abstract:
Sharing economy is an emerging concept that has been implemented in several industries and has achieved huge success. Novel solutions, built on the emerging concept of sharing economy, such as Uber, Didi, Mobike, and Cargostream, offer unprecedented opportunities for maritime organizations to reform traditional water transportation. This paper presents an analysis framework of a shared container transportation mode to show the restrictions and benefit of the implementation of the concept of sharing economy in maritime transportation. As a typical inland water area in China, the Yangtze River is selected as the study area. A general shared container transportation framework is designed, including a new waiting mode, business process, and software platform system design. The new business process is developed to overcome the contradiction between the new shared container transportation mode and the traditional shipping process. The potential of the new mode is also discussed. It would contribute to the sustainability of maritime transportation with respect to energy saving.
APA, Harvard, Vancouver, ISO, and other styles
45

Pérez, Lourdes, and Jesús Cambra-Fierro. "Learning to work in asymmetric relationships: insights from the computer software industry." Supply Chain Management: An International Journal 20, no. 1 (January 12, 2015): 1–10. http://dx.doi.org/10.1108/scm-12-2013-0468.

Full text
Abstract:
Purpose – This paper aims to provide guidance for managers so that they may develop advanced supply chain management (SCM) capabilities in the context of asymmetric alliances. These alliances, generally characterised by large dissimilarities between the partners, often facilitate value-creating opportunities. Design/methodology/approach – Using case studies, the paper analyses similarities and differences in SCM between symmetric and asymmetric alliances within supply networks. It focusses on the key dimensions of complementarity, value distribution, relational management and specialisation. Findings – It was found that the question of complementarity, although important, should not be equated to the need for symmetry but to the ability of the firms in the supply network to learn to work together. For small firms who seek co-creation with large partners, this means collaboration, specialisation through relation-specific investments, flexibility and understanding the overall value system in which their business relationships compete is important. Practical implications – Small firms seeking to develop advanced SCM capabilities have to accept responsibility for selecting a reduced number of key partners and managing relationships. Firms should proactively use the contractual process to learn about partners' expectations and goals and to identify committed champions. These factors play an important role in developing communications and trust, as small firms do not have easy access to senior managers in large corporations. Originality/value – This paper discovered a novel concept – dual value appropriation – where partners do not divide the total value generated as frequently proposed in the literature, but that it is fully appropriated, as it represents a different value proposition for each of them.
APA, Harvard, Vancouver, ISO, and other styles
46

Holzmann, Patrick, Robert J. Breitenecker, and Erich J. Schwarz. "Business model patterns for 3D printer manufacturers." Journal of Manufacturing Technology Management 31, no. 6 (June 13, 2019): 1281–300. http://dx.doi.org/10.1108/jmtm-09-2018-0313.

Full text
Abstract:
Purpose The purpose of this paper is to analyze the business models that 3D printer manufacturers apply to commercialize their technologies. The authors investigate these business models and analyze whether there are business model patterns. The paper describes the gestalt of the business model patterns and discusses differences and similarities. Design/methodology/approach The authors review the literatures on business models and 3D printing technology. The authors apply a componential business model approach and carry out an in-depth analysis of the business models of 48 3D printer manufacturers in Europe and North America. The authors develop a framework focusing on value proposition, value creation and value capture components. Cluster analysis is used to identify business model patterns. Findings The results indicate that there are two distinct business model patterns in the industry. The authors termed these patterns the “low-cost online business model” and the “technology expert business model.” The results demonstrate that there is a relationship between business model and technology. The identified patterns are independent of age, company size and country of origin. Research limitations/implications The empirical results complement and extend existing literature on business models. The authors contribute to the discussion on business models in the context of novel technology. The technology seems to influence the gestalt of the business model. The sample is limited to European and North American companies and the analysis is based on secondary data. Originality/value This is the first empirical study on the business models of 3D printer manufacturers. The authors apply an original mixed-methods approach and develop a framework that can function as a starting point for future research. 3D printer manufacturers can use the identified business model patterns as blueprints to reduce the risk of failure or as a starting point for business model innovation.
APA, Harvard, Vancouver, ISO, and other styles
47

Zeng, Qian, Ming Zhong, Yuanyuan Zhu, Tieyun Qian, and Jianxin Li. "Business location planning based on a novel geo-social influence diffusion model." Information Sciences 559 (June 2021): 61–74. http://dx.doi.org/10.1016/j.ins.2021.01.047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Pusnik, Maja, Marjan Hericko, Zoran Budimac, and Bostjan Sumak. "XML schema metrics for quality evaluation." Computer Science and Information Systems 11, no. 4 (2014): 1271–89. http://dx.doi.org/10.2298/csis140815077p.

Full text
Abstract:
In XML Schema development, the quality of XML Schemas is a crucial issue for further steps in the life cycle of an application, closely correlated with the structure of XML Schemas and different building blocks. Current research focuses on measuring complexity of XML Schemas and mainly do not consider other quality aspects. This paper proposes a novel quality measuring approach, based on existing software engineering metrics, additionally defining quality aspect of XML Schemas in the following steps: (1) definition of six schema quality aspects, (2) adoption of 25 directly measurable XML Schema variables, (3) proposition of six composite metrics, applying 25 measured variables and (4) composite metrics validation. An experiment using 250 standard XML Schemas collected from available e-business information systems was conducted. The results illustrate influence of XML Schema characteristics on its quality and evaluate applicability of metrics in the measurement process, a useful tool for software developers while building or adopting XML Schemas.
APA, Harvard, Vancouver, ISO, and other styles
49

Chouiekh, Alae, and El Hassane Ibn El Haj. "Deep Convolutional Neural Networks for Customer Churn Prediction Analysis." International Journal of Cognitive Informatics and Natural Intelligence 14, no. 1 (January 2020): 1–16. http://dx.doi.org/10.4018/ijcini.2020010101.

Full text
Abstract:
Several machine learning models have been proposed to address customer churn problems. In this work, the authors used a novel method by applying deep convolutional neural networks on a labeled dataset of 18,000 prepaid subscribers to classify/identify customer churn. The learning technique was based on call detail records (CDR) describing customers activity during two-month traffic from a real telecommunication provider. The authors use this method to identify new business use case by considering each subscriber as a single input image describing the churning state. Different experiments were performed to evaluate the performance of the method. The authors found that deep convolutional neural networks (DCNN) outperformed other traditional machine learning algorithms (support vector machines, random forest, and gradient boosting classifier) with F1 score of 91%. Thus, the use of this approach can reduce the cost related to customer loss and fits better the churn prediction business use case.
APA, Harvard, Vancouver, ISO, and other styles
50

Yu, Dongjin, Xinfeng Wang, and Xiaoxiao Sun. "Prediction of Regional Commercial Activeness and Entity Condition Based on Online Reviews." International Journal of Software Engineering and Knowledge Engineering 30, no. 11n12 (November 2020): 1689–705. http://dx.doi.org/10.1142/s0218194020400264.

Full text
Abstract:
The activeness of regional business entities, like restaurants, cinemas and shopping malls, represents the evolvement of their corresponding commercial districts, whose prediction helps practitioners grasp the trend of commercial development and provides support for urban layout. On the other hand, online social network services, such as Yelp, are generating massive online reviews toward business entities every day, which provide a solid data source for the prediction of regional commercial activeness and entity condition through big data technology rather than applying business data with limited access and poor time efficiency. Inspired by the outstanding performance of deep learning in the field of image and video processing, this paper proposes a deep spatio-temporal residual network (DSTRN) model for regional commercial activeness prediction using online reviews and check-in records of commercial entities. Furthermore, aiming at predicting business trend of entities, we also propose a novel multi-view entity condition prediction model (SBCE) based on online views, along with business attributes and regional commercial activeness. The experiments on the public Yelp datasets demonstrate that both DSTRN and SBCE outperform the compared approaches.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography