Aligning IT with Business Requirement

Keyword(s):  
Author(s):  
Teay Shawyun

The importance and issue of strategic business and IT alignment to achieve organization performance, a multifarious IS/IT frameworks, continues to perplex. It is contended that an internal focused IS/IT approach might not meet the needs of its both internal and external customers. This paper proposes a market based push-pull framework to ensure that the push strategy of the organization in what it wants to offer and at a price that it intends to offer is matched with the pull strategy of the market in what it wants to buy and at a price it is willing to pay. Once the market pull and firm push strategy is identified, the alignment of the IT would be based the push-pull effect of the business requirement to serve and satisfy not only the internal customers’ needs but also the external customers’ needs and requirements through the organization’s value proposition. The IT as a key enabler would be the main enabling mechanism to create and deliver on the value as proposed to the customers. This would define the measurable outcomes of the organization performance in creating and delivering the customer value as proposed based on the push-pull effect of the organization.


Author(s):  
S.C. Lenny Koh ◽  
Stuart Maguire

The reason for going ahead with a new information system (IS) development can come from many sources. A new business requirement may force an organization to develop a new IS. An existing IS may be coming to the end of its usefulness. The firm may decide to either update its existing system or develop a completely new system.


2019 ◽  
Vol 2019 ◽  
pp. 1-19
Author(s):  
Maryam Habba ◽  
Mounia Fredj ◽  
Samia Benabdellah Chaouni

Alignment is a very wide subject that can be used to support an organization’s information system. Many authors have dealt with this topic according to various dimensions, including the operational alignment dimension. Our work aims to review approaches that discuss the operational alignment by reducing the gap between business requirement, business process, and software system. Therefore, this study was conducted by a systematic literature review (SLR). In the first step, we gather 1846 papers relative to the subject. In the last step, we filter those articles and select only the most pertinent ones, which leave us with 63 studies to focus on. These primary studies were analyzed according to 9 quality assessment criteria.


1992 ◽  
Vol 3 (3-4) ◽  
pp. 16-18 ◽  
Author(s):  
William E. Degenaro

Author(s):  
Christophe Giraud-Carrier

It is sometimes argued that all one needs to engage in Data Mining (DM) is data and a willingness to “give it a try.” Although this view is attractive from the perspective of enthusiastic DM consultants who wish to expand the use of the technology, it can only serve the purposes of one-shot proofs of concept or preliminary studies. It is not representative of the complex reality of deploying DM within existing business processes. In such contexts, one needs two additional ingredients: a process model or methodology, and supporting tools. Several Data Mining process models have been developed (Fayyad et al, 1996; Brachman & Anand, 1996; Mannila, 1997; Chapman et al, 2000), and although each sheds a slightly different light on the process, their basic tenets and overall structure are essentially the same (Gaul & Saeuberlich, 1999). A recent survey suggests that virtually all practitioners follow some kind of process model when applying DM and that the most widely used methodology is CRISP-DM (KDnuggets Poll, 2002). Here, we focus on the second ingredient, namely, supporting tools. The past few years have seen a proliferation of DM software packages. Whilst this makes DM technology more readily available to non-expert end-users, it also creates a critical decision point in the overall business decision-making process. When considering the application of Data Mining, business users now face the challenge of selecting, from the available plethora of DM software packages, a tool adequate to their needs and expectations. In order to be informed, such a selection requires a standard basis from which to compare and contrast alternatives along relevant, business-focused dimensions, as well as the location of candidate tools within the space outlined by these dimensions. To meet this business requirement, a standard schema for the characterization of Data Mining software tools needs to be designed.


Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

Control and risk are the two parts of the coin. Risk assessment is the process of identifying uncertainties, vulnerabilities and threats to the operating system resources in order to achieve business objectives. Risk evaluation involved deciding what counter measures to take in reducing uncertainty to the lowest level of risk. Control is probably the most important aspect of communications security and becoming increasingly important as basic building block for system security. Advanced Encryption Standard (AES) is a primary method of protecting system resources. AES is inversely proportional to the Risk (C=K/R) & mean while control is directly proportional to the quality of standard. AES Control will be optimize the risk as well as improve the IS standard. Control is directly proportional to risk mitigation & mitigation is directly proportional to standard. This paper contributes to the development of an optimization method that aims to determine the optimal cost to be invested into security method, model & mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory & Encryption). Furthermore, the method & mechanism optimize the cost, time & resources is supposed to optimize the system risks. The proposed model would be update the value of Processor, Memory & Encryption key dynamically as per business requirement and availability of technology & resources. Proposed model is going to be optimizing risk and maximizing the performance. In this study the researchers develop an isomorphic graph model for optimizing risk in the Unix operating system.


2012 ◽  
Vol 263-266 ◽  
pp. 3215-3219
Author(s):  
Chang Liu ◽  
Bin Li ◽  
Qi Chu Chen ◽  
Xiao Hua Ding ◽  
Shi Ming Xu

Through the analysis of electric vehicle cross-regional operation online transaction settlement system(OTSS) business requirement, determine the electric vehicle operations management system(EVOMS) based on using the Tuxedo middleware interface program developed to achieve. Design and development the Tuxedo server, client program, which can realize electric vehicle cross-regional operation online transaction settlement, solve the problem of cross -regional travel electric vehicle users.


2013 ◽  
Vol 748 ◽  
pp. 457-462
Author(s):  
Peng Sun ◽  
Tian Yun Shi ◽  
Wei Jiao Zhang

As the numbers and running distance of Chinese high-speed trains increase, many electric multiple units (EMU) gradually enter into overhaul stage, EMU maintenance bases face challenges of transition from practical exploration, regular production to lean production. In accordance of business requirement, built a model of dynamic resource allocation, task splitting, and soft precedence constraints. By the design of nonlinear decline inertia weight factor, a refined particle swarm optimization (PSO), as well as the corresponding parallel transformation scheme from particle to schedule, is presented. Finally, computational analysis is performed to validate the model and algorithm on optimization capabilities, resource utilization and performance.


2021 ◽  
Author(s):  
Karina Sari ◽  
Herfran Rhama Priwanza ◽  
Sandi Rizky Kharisma ◽  
Rangga Saputra

Abstract Mahakam is a mature gas and oil field that has been in operation since 1966, covering an area of approximately 1500 square kilometers. It is located in East Kalimantan Province, Indonesia and has 7 operating fields. Tunu, Tambora and Handil are fields within the swamp shallow water (Delta), whereas Bekapai, Peciko, Sisi Nubi and South Mahakam are offshore fields with water depths ranging from 45 to 80 meters. The diverse setting of environments requires different methods of site preparation, construction, drilling and logistic. The drilling industrialization necessitates agile and complex well preparation especially in the Deltaic environment, with around 70 wells drilled with three swamp barge rigs each year. In recent drilling development in both Tunu and Handil fields, more shallow wells were drilled. These wells were drilled in the swamp with heavy sedimentation and/or sand banks which necessitated a large amount of dredging and required months of preparation whereas the drilling operation took up to 3 days per wells. The entire well preparation process requires planning, monitoring, and the participation of many team in different entities. Each entity has its own version of well planning database, resulting in data disagreement and lack of data integrity. Thousands of emails are being send and meetings are being organized to guarantee that operations runs well. Due to lack of trustworthy data, personnel movement or team reorganization, it has become serious issues. In 2016, company decided to start the digitalization efforts, by approaching various service company who provides the well planning software. It needed customization to match the corporate needs. However since the digitalization has not yet commonly used by most company, it was then not user friendly, thus several individuals were hesitant to utilize it. An internal team created an application in early 2019. As the business requirement & working flowchart, the team decided to have a clean and mobile-ready yet less complicated form that also enables team collaboration during the design. This ensures that all users, employee from any generation (X, Y, and Z) able to use and enter valid information. Equipped with map visualization, the related entities will be able to have better quick analysis on the condition surrounding wellhead position. The application also implements an adjustable workflow system that able to follow the dynamic of organization structure, ensure each of well planning task is assigned to the correct team. Push notifications are also an important element in this application for keeping the entire team up to date. The application also featured a discussion board and file sharing function, allowing each team to exchange information or files. The manual email exchange has been minimized, and the meeting hour has been reduced significantly. The errors are simply identified and fixed in a single integrated database. The application is continuously improved from well planning only in its early stages into well design to accommodate the whole drilling industrialization process.


Sign in / Sign up

Export Citation Format

Share Document