Protection of the information resources of a library based on analysis of business processes

2016 ◽  
Vol 43 (1) ◽  
pp. 20-27 ◽  
Author(s):  
Z. V. Rodionova ◽  
L. K. Bobrov
2020 ◽  
pp. 102-105
Author(s):  
P.A. Zakharov ◽  
◽  
E.N. Kasyanchuk

Presented is experience of Siberian Federal University in reforming organizational structure of educational supporting departments. History of creation, formation, reforming of the library and publishing complex of university is submitted. Considered is specificity of work of scientific library and publishing house of university. The article describes creation of the resource center as division of the library and publishing complex, responsible for automation and technical support of key business processes. The authors рresent approaches to improving activities of the scientific library and publishing house of university. It is indicated, that automated systems “University Book Provision”, “Publishing of Works of Authors of the Siberian Federal University” have been developed for coordination of activities between divisions. Library and publishing council functions to regulate and coordinate activities of library and publishing processes, integrate them into scientific and educational environment of university. It is noted, that automation of business processes made possible to ensure efficiency of division’s work with parallel optimization of the staffing table. It is emphasized, that unification of the library and the publishing house into one structure made it possible to resolve issue of obtaining information resources. Experience of Siberian Federal University proved to be successful, and that is proved by public recognition, victory of scientific library of Siberian Federal University at All-Russian competition of library innovations and use of practice of Siberian Federal University by other universities of the country.


Author(s):  
Judit Olah ◽  
Ole Axvig

In a modern enterprise environment, many information resources are available to people working to produce valuable output. Due to technology proliferation, remote work access, and multiple geographical locations generating their own solutions for local infrastructure challenges, as well as the fact that modern professionals are tasked to make decisions autonomously, it is not self-evident what types of information resources could or should be accessed in what order in order to move processes towards the desired product outcome. Our integrated model was developed using the results of an empirical study. The model puts a user-centered focus on business process model building by mapping all information interactions surrounding the business processes (i.e. creation, storage, management, retrieval of documents/ contents as well as information and data). The model characterizes the business processes by types of information interaction, analyzes process phases by those interactions and evaluates actual locations of information content extractions.


Author(s):  
Hércules Antonio do Prado ◽  
Aluizio Haendchen Filho ◽  
Míriam Sayão ◽  
Edilson Ferneda

The rapid evolution of Internet has opened a new era in the distributed systems scenery: the bigger part of the information systems currently developed is focused in Web applications. Typically, the information resources in Web systems are dynamic, distributed, and heterogeneous. Since these computing environments are opened, information resources can be connected or disconnected at any time. This ubiquity of Web and its distributed and interconnected characteristics represent a natural field for multiagent systems (MAS), spreading this kind of application. Software agents can dynamically discover, orchestrate, and compose services, check activities, run business processes, and integrate heterogeneous applications. Most of the large organizations adopt heterogeneous and complex information systems. These systems must coordinate their applications in order to provide efficient support to business processes and consistent information management. Unfortunately, the operational software underlying these systems usually does not handle multitask distributed heterogeneous applications. Currently, enterprises are strongly interested in the strategic advantages of adopting distributed infrastructures that are designed to be dynamic, flexible, adaptable, and interoperable. In this context, the demand for agent-based applications has increased, opening new types of applications that include e-commerce, Web services, knowledge management, semantic Web, and information systems in general. Interesting solutions to B2B (business to business), e-business, and also applications that require interoperability based on knowledge about applications and business processes, will definitely benefit from the MAS technology. Also, intelligent information agents are regarded as one of the most promising areas for applying agents’ technology. Intelligent information agents act in fields like collaborative systems on Internet, knowledge discovery from heterogeneous sources, systems for intelligent management of information, and so on. The Web can also be seen as a big distributed database having XML (extensible markup language) and its extensions or modifications as an underlying data model. In this context, the MAS development has received support from new tools in order to make it easier for the developer to cope with specific requirements for Web architectures. It is accepted that these improvements in the technology, mainly by the new tools that are becoming available, will lead MAS technology to be explored in its full potential. So, we can state that the application domain of MAS is going to be strongly enlarged, defining a turning point in the systems development activity. In this chapter, we provide an overview on MAS technology, discuss how this technology is impacting the Web context, and provide a sound description of the concepts that are relevant to the application developers and target users.


2014 ◽  
Vol 30 (4) ◽  
pp. 1003 ◽  
Author(s):  
Yasser Buchana ◽  
Visvanathan Naicker

<p>Managerial decision-making has always involved the use of numerous distinct information resources. Modern managerial decision-making processes require a wealth of information that is enhanced and transformed into knowledge in order to take effective action. Mobility in business is increasingly exercising influence on core business processes of organisations. Recent advances in wireless technologies coupled with the rapid growth of mobile devices in business have led to a new era in business computing. Mobile Business Intelligence (Mobile BI) is a system that has been conceived to assist, accelerate and to enhance the managerial decision-making processes. Drawing from an array of previous studies that attempted to measure the value of Business Intelligence (BI) and other IT systems in organisations, this study develops a new kind of measure which is based on an understanding of the distinct properties of Mobile BI systems in an organisational-oriented context.</p>


Author(s):  
Judit Olah ◽  
Ole Axvig

In a modern enterprise environment, many information resources are available to people working to produce valuable output. Due to technology proliferation, remote work access, and multiple geographical locations generating their own solutions for local infrastructure challenges, as well as the fact that modern professionals are tasked to make decisions autonomously, it is not self-evident what types of information resources could or should be accessed in what order in order to move processes towards the desired product outcome. Our integrated model was developed using the results of an empirical study. The model puts a user-centered focus on business process model building by mapping all information interactions surrounding the business processes (i.e. creation, storage, management, retrieval of documents/ contents as well as information and data). The model characterizes the business processes by types of information interaction, analyzes process phases by those interactions and evaluates actual locations of information content extractions.


2010 ◽  
pp. 325-342
Author(s):  
Judit Olah ◽  
Ole Axvig

In a modern enterprise environment, many information resources are available to people working to produce valuable output. Due to technology proliferation, remote work access, and multiple geographical locations generating their own solutions for local infrastructure challenges, as well as the fact that modern professionals are tasked to make decisions autonomously, it is not self-evident what types of information resources could or should be accessed in what order in order to move processes towards the desired product outcome. Our integrated model was developed using the results of an empirical study. The model puts a user-centered focus on business process model building by mapping all information interactions surrounding the business processes (i.e. creation, storage, management, retrieval of documents/ contents as well as information and data). The model characterizes the business processes by types of information interaction, analyzes process phases by those interactions and evaluates actual locations of information content extractions.


2013 ◽  
Vol 756-759 ◽  
pp. 988-992
Author(s):  
Hong Lin ◽  
Ya Juan Sun ◽  
Bao Hui Wang

Information resource planning is a bridge for information technology planning and implementation, which plays a connecting role. This paper discusses the basic principles and methods of information resources planning. Taking University Information Resource Planning as example, this paper introduces the business process analysis, requirements analysis, business modeling and system modeling of the University core business processes, at last proposes the reference model for practical application from practice.


2020 ◽  
Vol 19 (1) ◽  
pp. 15-22
Author(s):  
Oleksandr Milov ◽  
Hryhorii Kots ◽  
Stanislav Milevskyi

An approach is proposed for assessing the uneven use of information resources in the organization’s business processes. Formal representations of the organization’s business processes and security systems are presented, reflecting both business operations carried out in a certain sequence and information resources that ensure the implementation of the relevant business operations, the place of information resources in the general outline of business processes is indicated. The circuits of the security system business processes of and the business processes of the main object of modeling are considered, including both business processes for managing security and business processes for ensuring security management. The assessment of the non-uniform use of information resources in a business process scheme is based on the consistent construction of an information resource incidence matrix for individual business operations, a frequency relationship matrix reflecting the sharing of information resources, and a matrix of derivatives in a discrete formulation. The proposed approach is demonstrated on a conditional example containing both the notional costs of information resources and weighting factors of the importance of business operations that reflect their criticality in the general contour of business processes. Estimates obtained as a result of applying the approach make it possible to group information resources, focusing on the frequency of their joint use in the business processes, which ultimately makes it possible to justify the choice of information resources for protection against threats from cyber intruders.


2019 ◽  
Vol 23 (3) ◽  
pp. 25-32
Author(s):  
A. V. Gavrilov ◽  
V. A. Sizov

Purpose of the study. In modern conditions, building an effective information security system for an enterprise requires specialists with appropriate professional competencies and systems approach skills in analyzing a combination of factors that influence the state of information security of an enterprise. For the preparation of such kind of specialists, qualitative changes in the content of educational disciplines are required, based on the use of methods and means of system analysis in the process of building an information security system. The current approaches to assessing the risk of an enterprise are based on the formation of a register of its information resources necessary for the further processing of risks. Adequate assessment of the value of a resource is impossible without a correct understanding of the semantics of this resource and its role in the implemented business processes. Modern approaches to the formation of the register of enterprise information resources, according to the authors, do not offer an effective method of identifying resources and estimating their value.This paper considers an approach based on the use of structural and functional analysis methods and CASE-technologies in the formation of a register of information resources of the enterprise in the training of masters in the direction of “Information Security”. Materials and methods. For the formation of the register of enterprise information resources, it is proposed to build a structural-functional enterprise model using the IDEF0 notation. Business process modeling was performed in the Business Studio environment of «Modern Control Technologies». As an example for risk analysis, the activities of a typical IT-industry company engaged in the development and implementation of enterprise management information systems were considered. Results. The technique was successfully tested in the educational process. According to the authors of the article, the use of this technique in conducting laboratory classes for masters enrolled in the “Information Security” direction has made it possible to increase the efficiency of the formation of professional competencies in students and, consequently, in general, the quality of education. The results obtained can be used not only as a training method for specialists in the field of information security. The application of the methodology of forming the register of information resources of an enterprise considered in the article in practical activities to ensure the information security of an enterprise will increase the validity of decisions to protect the information of the enterprise. Conclusion. The paper proposes a method to justify the choice of the main directions for the protection of enterprise information based on the analysis of its business processes. A distinctive feature of the technique is the use of modern CASE-technologies for decision-making in the field of enterprise information security. The implementation of the methodology allows you to create a register of information resources of the enterprise, including an assessment of the likely damage for each resource. The registry shows the bottlenecks in the organization of protection, which should be given priority when planning measures to protect information. On the basis of the data obtained, it is possible to form a strategy and tactics for developing an enterprise information protection system that is reasonable from an economic point of view. 


Sign in / Sign up

Export Citation Format

Share Document