Information Systems: Learning, Adaptation, and Control

Science ◽  
1963 ◽  
Vol 141 (3585) ◽  
pp. 1070-1074
Author(s):  
J. T. Tou
SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402110061
Author(s):  
Ana Maria Magalhães Correia ◽  
Clarissa Figueredo Rocha ◽  
Luiz Carlos Duclós ◽  
Claudimar Pereira da Veiga

This study proposes a management model by business processes for science parks based on the premises and concept of enterprise architecture (EA). The model offers integrating business processes with activities and information that can be generated by adopting customized information systems to meet the science parks’ needs. The proposed model’s main contributions included EA as a means for shaping and enabling reconfiguration through descriptions of the structures of business processes and information systems that connect these structures, forming business and information architecture frameworks. In association with these frameworks, the managers need to define a coherent set of patterns, policies, procedures, and principles that sustain the business processes integrated with the information systems. As a result of the study, this model can help management execute and control activities related to business processes in the parks through interaction and alignment with the information system intended to facilitate the execution. The model will also lead to greater agility and efficiency in these business processes, considering their specific nature and the relationship with the parks’ actors. As a practical contribution, knowledge of these processes aids the management of the parks in their drive for a competitive advantage by maintaining and developing their management models.


2019 ◽  
Vol 5 (15) ◽  
pp. 1448-1455
Author(s):  
Venelin Terziev ◽  
Teodora Petrova

The non-motorized air systems for intelligence, monitoring and control of the earth surface have gained currency and are used for various tactic flight’s tasks and missions. The non-motorized aircrafts (NMA) and the air-monitoring systems that include board and land part are key elements of these systems. The world experience in using NMA for these uses shows that they are most suitable where the exploitation conditions are very extreme and there is an unacceptable risk for operations of piloted aviation. Such are intelligence and observation of strictly guarded sites, zones, where military operations are conducted as well as regions with large scale fires and floods. The use of people in these conditions is connected with actual threat for their lives and practically, NMA as a tool for collecting and processing of information is irreplaceable. Keywords: registration of images, methods, information systems, non-motorized aircrafts.


Author(s):  
Mahir Pradana

Mahir Pradana; The search for as much information as possible is needed to achieve maximum results in a management process. Information is also needed as a source of evaluation of the development of an organization, institutions, companies, and departments. Thus, the management process is inseparable from the use of information systems, which is a set of components that are interconnected, collect, process the store, and distribute information to support decision-making and control in an organization. This article examines the theories of management information system to be used as a reference in the domain of management information systems.Keywords: Management Information Systems, Use Of Information Systems, The Value Of Information Technology.


2021 ◽  
Vol 51 (3) ◽  
pp. 242-244
Author(s):  
Wenjing Shen

In Book Reviews, we review an extensive and diverse range of books. They cover theory and applications in operations research, statistics, management science, econometrics, mathematics, computers, and information systems. In addition, we include books in other fields that emphasize technical applications. The editor will be pleased to receive an email from those willing to review a book, with an indication of specific areas of interest. If you are aware of a specific book that you would like to review, or that you think should be reviewed, please contact the editor. The following books are reviewed in this issue of INFORMS Journal on Applied Analytics, 51(3), May–June: Optimization and Control for Systems in the Big-Data Era: Theory and Applications, Tsan-Ming Choi, Jianjun Gao, James H. Lambert, Chi-Kong Ng, Jun Wang; Pricing Lives: Guideposts for a Safer Society, W. Kip Viscusi.


Author(s):  
Anirban Sengupta ◽  
Chandan Mazumdar

As enterprises become dependent on information systems, the need for effective Information Security Governance (ISG) assumes significance. ISG manages risks relating to the confidentiality, integrity and availability of information, and its supporting processes and systems, in an enterprise. Even a medium-sized enterprise contains a huge collection of information and other assets. Moreover, risks evolve rapidly in today’s connected digital world. Therefore, the proper implementation of ISG requires automation of the various monitoring, analysis, and control processes. This can be best achieved by representing information security requirements of an enterprise in a standard, structured format. This paper presents such a structured format in the form of Enterprise Security Requirement Markup Language (ESRML) Version 2.0. It is an XML-based language that considers the elements of ISO 27002 best practices.


2018 ◽  
pp. 980-1002
Author(s):  
Mohammad Ali Shalan

Mobile Cloud Computing (MCC) is increasingly asserted as the technology with the potential to change the way internet and information systems are being utilized into business enterprises. It is rapidly changing the landscape of technology, and ultimately turning the long-held promise of utility computing into a reality. Nevertheless, utilizing MCC is never a trivial task, thus calling for a special approach to get the benefits, reduce risks and control operations. The main objective of this chapter is to provide some specific guidelines to provide governance directions to align MCC into enterprise strategy and reduce risks resulted from utilizing middle circle providers; In this context, this chapter also promote and discuss some ethics that help client enterprises and MCC providers understand roles and obligations in an ever changing environment.


Author(s):  
Peter Fettke ◽  
Peter Loos

Within the information systems field, reference models have been known for many years. A reference model is a conceptual framework and may be used as a blueprint for information systems development. Despite the relevance of reference model quality, little research has been undertaken on their systematical analysis and evaluation. In this chapter, we describe how reference models can be analyzed from an ontological point of view. Such an analysis consists of four steps: 1) developing a transformation mapping, 2) identifying ontological modeling deficiencies, 3) transforming the reference model, and 4) assessing the results. The usefulness of our method will be demonstrated by analyzing Scheer’s reference model for production planning and control. Although our approach is based on sound theory, we argue that this approach is not inherently superior to other approaches of reference model analysis and evaluation.


Sign in / Sign up

Export Citation Format

Share Document