The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes

Author(s):  
Marite Kirikova ◽  
Raimundas Matulevičius ◽  
Kurt Sandkuhl
2006 ◽  
Vol 6 (3-4) ◽  
pp. 305-335 ◽  
Author(s):  
Peter Herrmann ◽  
Gaby Herrmann

2019 ◽  
Vol 17 (2) ◽  
pp. 130-144
Author(s):  
O. G. Leonova

To achieve success in the production sphere, any business entity must be able to quickly adapt to changing market conditions. Its financial and economic activities largely depend on speed of obtaining information, besides financial data, about factors influencing the results of both the daily work of the enterprise and achievement of long-term strategic goals. One of the effective methods of implementing the strategy in a form that is acceptable for a competitive environment is Balanced Score Card (BSC).The article substantiates the need for its implementation in the practice of Russian repair shipyards, proposes a method for determining key performance indicators considering the customer focused business processes, targeted labour motivation and corporate psychology of personnel. The suggested model was adapted to the practices of an enterprise, model KPI were proposed and discussed.


2020 ◽  
Vol 8 (5) ◽  
pp. 3550-3558

The last few decades have shown an incredible rise in the production of different types of software according to the user’s needs. Requirement Elicitation techniques for security requirements are one of the most crucial stage of software development life cycle. Based on the Analytical Network Process (ANP) process, this paper analyzes the weighting of elicitation techniques for security requirements in the production of software applications. In other words, the elicitation strategies of security requirements play an important role in the development of secure software. It also analyzes the relationship between security requirement elicitation techniques and their objectives through the use of ANP method and also demonstrates the application of fuzzy ANP method to achieve higher accuracy. When developing a secure software framework, the results provide a better platform. With these facts in mind, the proposed study will also clarify the priority weights of security requirement elicitation techniques that can be used to analyze trade-offs between competing software security requirement elicitation techniques and provide a new way for developers when constructing the secure software.


2007 ◽  
Vol E90-D (9) ◽  
pp. 1374-1387 ◽  
Author(s):  
C. GUTIERREZ ◽  
E. FERNANDEZ-MEDINA ◽  
M. PIATTINI

Author(s):  
Ivan J. Jureta ◽  
Stephane Faulkner ◽  
Manuel Kolp

This chapter introduces an agent-oriented enterprise model for conducting enterprise modeling during the early stages of information system requirements engineering. The enterprise model integrates a set of concepts and relationships that the analyst instantiates when building a model of the part of the organization in which the future information system will operate. The aim is to allow the analyst to produce an enterprise model which captures knowledge about an organization and its business processes, and which can be used to build an agent-oriented requirements specification of the future system and of its organizational environment. Compared to similar models, the present one integrates concepts and relationships allowing the analyst to capture the relevant intrinsic characteristics, such as autonomy and intentionality of human and software agents that are to participate in the future system.


2019 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Anjas Tryana

With the development of technology today, it is very important for every company to plan and develop a system to support business processes in each company. Achieving the goals of an enterprise faces challenges and changes that require strategies for effective measures and efficient use of resources. One important and increasingly widely used strategy is the use and improvement of information system support for the enterprise. This plan can utilize enterprise architecture planning methodology that produces data architecture, application architecture, technology architecture, and the direction of its implementation plan for the enterprise.CV Biensi Fesyenindo is engaged in retail garment, with branches throughout Indonesia, covering the areas of Kalimantan, Sulawesai, NTB, NTT, Bali, Java and Sumatra. In their daily activities, they carry out production to distribution processes to meet market and employee needs.The enterprise architecture model used in this study is by using Enterprise Architecture Planning (EAP). EAP is a process of defining enterprise architecture that focuses on data architecture, applications and technology in supporting business and plans to implement the architecture, where the EAP method has several stages, starting from planning in planning, business modeling , Current System and Technology (Current System & Technology), Data Architecture (Data Architecture), Application Architecture (Applications Architecture), Technology Architecture (Technology Architecture), Implementation Plans (Implementation Plans).The results of this study are recommendations for information systems for Fesyenindo Biensi CV in the form of enterprise architecture planing blue print planning that is successful in defining 5 main business processes, which consist of application architecture data architecture and for technological architecture to produce technology architecture proposals divided into 5 chapters 110 pages .


2020 ◽  
Vol 17 (1) ◽  
pp. 68-77
Author(s):  
V. E. Zaikovsky ◽  
A. V. Karev

Project success depends on the ability to respond to risks and make correct decisions in a timely manner. The project approach provides a better framework for implementing a new management system into the company’s business processes. The risk management framework developed by the company comprises a risk management infrastructure, a set of standards, human resources, and a risk management information system. To improve staff compliance, it is necessary to provide training and to communicate the goals of the project effectively. It is also important to develop a motivation system because well trained and motivated staff are able to work more efficiently.


Sign in / Sign up

Export Citation Format

Share Document