Enterprise Architecture Characteristics in Context Enterprise Governance Base On COBIT 5 Framework

Author(s):  
Heru Nugroho ◽  
Tutut Herawan

<em><span>The existence of the enterprise architecture is an attempt of managing and planning over the evolution of information systems in the sphere of an enterprise with model-based. In developing the enterprise architecture, there are several tools definition of components in the system. This tool is known as enterprises architecture (EA) framework. In this paper, we present a method to build a model of enterprise architecture in accordance with the needs of the Organization by Understanding the characteristics of the EA framework such as Zachman, TOGAF, and FEAF. They are selected as the EA framework will be used to determine the characteristics of an EA because the framework is most widely used in corporate or Government. In COBIT 5 framework, there is a process associated with enterprise architecture it is APO03 Manage Enterprise Architecture. At this stage of the research, we describe the link between the characteristics of the EA with one process in COBIT 5 framework. The results contribute to give a recommendation how to design EA for organization based on the characteristic of EA in Context Enterprise Governance using COBIT 5 Framework.</span></em>

Author(s):  
Mara Nikolaidou ◽  
Nancy Alexopoulou

System design is an important phase of system engineering, determining system architecture to satisfy specific requirements. System design focuses on analyzing performance requirements, system modeling and prototyping, defining and optimizing system architecture, and studying system design tradeoffs and risks. Modern enterprise information systems (EIS) are distributed systems usually built on multitiered client server architectures, which can be modeled using well-known frameworks, such as Zachman enterprise architecture or open distributed processing reference model (RM-ODP). Both frameworks identify different system models, named views, corresponding to discrete stakeholder’s perspectives, specific viewpoints, and could serve as a basis for model-based system design. The main focus of this chapter is to explore the potential of model-based design for enterprise information systems (EIS). To this end, the basic requirements for model-based EIS design are identified, while three alternative approaches are discussed based on the above requirements, namely, rational unified process for systems engineering (RUP SE), UML4ODP and EIS design framework.


2014 ◽  
Author(s):  
Sofia Larissa Da Costa ◽  
Valdemar Vicente Graciano Neto ◽  
Juliano Lopes De Oliveira ◽  
Bruno dos Reis Calçado

This paper presents a model-based approach to build Information Systems User Interfaces (ISUI). In this approach, UI presentation and behavioral aspects are modeled as UI Stereotypes, which are high level abstractions of UI appearance and interaction features. A taxonomy of ISUI elements is proposed as the basis for definition of UI stereotypes. These elements are orchestrated on a software architecture which manages model-based UI building and integration with the IS applications. The proposed approach reduces software development efforts and costs, facilitating maintenance and evolution of ISUI. Moreover, UI stereotypes improve usability, consistency, reuse and standardization of both presentation and behavior of ISUI.


2020 ◽  
Vol 2 (1) ◽  
pp. 114-122
Author(s):  
Agustinus Fritz Wijaya ◽  
Mahendra Wahyu Prasetyo

Semarang City Public Works Department is a state-owned enterprise that works in the area of public services in the city of Semarang. Most of the technological conditions in the Public Works Department are still in manual data management, which is hampering business processes from going well. Therefore this research was conducted to design an Information System at the Semarang City Public Works Department using the Enterprise Architecture Planning (EAP) method which includes a SWOT analysis and Value Chain analysis. The existing framework in the Enterprise Architecture Planning (EAP) method can help align the data architecture and application architecture to get the expected results, which is achieving the business objectives of the City of Semarang Public Works Department so that business functions can run by the desired business processes. This research resulted in several proposals for the development of Information Systems and Information Technology in organizations including the development of several applications in the next 5 years.


Examples of the value that can be created and captured through crowdsourcing go back to at least 1714, when the UK used crowdsourcing to solve the Longitude Problem, obtaining a solution that would enable the UK to become the dominant maritime force of its time. Today, Wikipedia uses crowds to provide entries for the world’s largest and free encyclopedia. Partly fueled by the value that can be created and captured through crowdsourcing, interest in researching the phenomenon has been remarkable. For example, the Best Paper Awards in 2012 for a record-setting three journals—the Academy of Management Review, Journal of Product Innovation Management, and Academy of Management Perspectives—were about crowdsourcing. In spite of the interest in crowdsourcing—or perhaps because of it—research on the phenomenon has been conducted in different research silos within the fields of management (from strategy to finance to operations to information systems), biology, communications, computer science, economics, political science, among others. In these silos, crowdsourcing takes names such as broadcast search, innovation tournaments, crowdfunding, community innovation, distributed innovation, collective intelligence, open source, crowdpower, and even open innovation. The book aims to assemble papers from as many of these silos as possible since the ultimate potential of crowdsourcing research is likely to be attained only by bridging them. The papers provide a systematic overview of the research on crowdsourcing from different fields based on a more encompassing definition of the concept, its difference for innovation, and its value for both the private and public sectors.


SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402110061
Author(s):  
Ana Maria Magalhães Correia ◽  
Clarissa Figueredo Rocha ◽  
Luiz Carlos Duclós ◽  
Claudimar Pereira da Veiga

This study proposes a management model by business processes for science parks based on the premises and concept of enterprise architecture (EA). The model offers integrating business processes with activities and information that can be generated by adopting customized information systems to meet the science parks’ needs. The proposed model’s main contributions included EA as a means for shaping and enabling reconfiguration through descriptions of the structures of business processes and information systems that connect these structures, forming business and information architecture frameworks. In association with these frameworks, the managers need to define a coherent set of patterns, policies, procedures, and principles that sustain the business processes integrated with the information systems. As a result of the study, this model can help management execute and control activities related to business processes in the parks through interaction and alignment with the information system intended to facilitate the execution. The model will also lead to greater agility and efficiency in these business processes, considering their specific nature and the relationship with the parks’ actors. As a practical contribution, knowledge of these processes aids the management of the parks in their drive for a competitive advantage by maintaining and developing their management models.


Author(s):  
José Balsa-Barreiro ◽  
Pedro M. Valero-Mora ◽  
Mónica Menéndez ◽  
Rashid Mehmood

Abstract A better understanding of Driving Patterns and their relationship with geographical driving areas could bring great benefits for smart cities, including the identification of good driving practices for saving fuel and reducing carbon emissions and accidents. The process of extracting driving patterns can be challenging due to issues such as the collection of valid data, clustering of population groups, and definition of similar behaviors. Naturalistic Driving methods provide a solution by allowing the collection of exhaustive datasets in quantitative and qualitative terms. However, exploiting and analyzing these datasets is complex and resource-intensive. Moreover, most of the previous studies, have constrained the great potential of naturalistic driving datasets to very specific situations, events, and/or road sections. In this paper, we propose a novel methodology for extracting driving patterns from naturalistic driving data, even from small population samples. We use Geographic Information Systems (GIS), so we can evaluate drivers’ behavior and reactions to certain events or road sections, and compare across situations using different spatial scales. To that end, we analyze some kinematic parameters such as speeds, acceleration, braking, and other forces that define a driving attitude. Our method favors an adequate mapping of complete datasets enabling us to achieve a comprehensive perspective of driving performance.


Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2881
Author(s):  
Muath Alrammal ◽  
Munir Naveed ◽  
Georgios Tsaramirsis

The use of innovative and sophisticated malware definitions poses a serious threat to computer-based information systems. Such malware is adaptive to the existing security solutions and often works without detection. Once malware completes its malicious activity, it self-destructs and leaves no obvious signature for detection and forensic purposes. The detection of such sophisticated malware is very challenging and a non-trivial task because of the malware’s new patterns of exploiting vulnerabilities. Any security solutions require an equal level of sophistication to counter such attacks. In this paper, a novel reinforcement model based on Monte-Carlo simulation called eRBCM is explored to develop a security solution that can detect new and sophisticated network malware definitions. The new model is trained on several kinds of malware and can generalize the malware detection functionality. The model is evaluated using a benchmark set of malware. The results prove that eRBCM can identify a variety of malware with immense accuracy.


2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Yudi Mulyanto

Construction and development of enterprise architecture and information systems are appropriately planned and well designed and suit to the needs and the abilities of the organization. Good planning will provide great benefits for construction and development of enterprise architecture, both in terms of human resources, budget and organization's readiness to implement the plan. In this study did not use all the phases of TOGAF ADM, this study only uses seven from nine phases TOGAF ADM namely the preliminary phase, architecture vision phase, business architecture phase, architecture of information systems phase, technology architecture phase, opportunity and solution phase and migration planning phase. The first phase of the enterprise architecture development is the prelimary phase, output from the preliminary phase becomes input to the early phases of the TOGAF ADM phases, which is named architecture vision phase and from that input device produced the new organizational structure that will be proposed. In the next phase of business phase was also analyzed using Value Chain analysis.


Sign in / Sign up

Export Citation Format

Share Document