Relating Enterprise, Application, and Infrastructure Architects

Author(s):  
Eoin Woods ◽  
Nick Rozanski

The architect takes a high-profile role in many IT departments today. In fact, it can be quite difficult in some organizations to find a senior member of IT technical staff whose job title does not include the word “architect.” However there is little consensus in the academic community or amongst practitioners as to the responsibilities of the many different types of architect we encounter – or indeed, what they should even be called. In this chapter, the authors propose a simple, widely applicable taxonomy of architects, namely enterprise architects, application architects, and infrastructure architects. The authors define distinguishing characteristics, their responsibilities, the stakeholders with whom they engage, and the tools and techniques they use. The chapter shows how this taxonomy can be applied to most, if not all, practicing architects in the information systems domain, and explains how it helps us understand how such architects work together to help deliver the organization’s business goals.

Author(s):  
Michele Bisaccia Meitl ◽  
Ashley Wellman ◽  
Patrick Kinkade

PurposeDomestic law enforcement increasingly utilizes military tools and techniques in traditional policing activities. An increased militaristic approach is not without controversy, given the many high-profile incidents involving such tactics that have resulted in tragedy. We seek to assess specific views of policymakers who implement such strategies by measuring the attitudes of Texas sheriffs on these measures.Design/methodology/approachIn late 2019 and early 2020, a census was completed with Texas sheriffs to better understand their attitudes about the use of military tactics. A robust return rate captured the views of 142 (56%) respondents from a diverse set of rural and urban counties. Opinions on the appropriateness, effectiveness and necessity of military techniques were measured.FindingsResults indicate Texas sheriffs strongly support the use of military tools and techniques, believe they protect officer safety and should continue to be taught and utilized by law enforcement when appropriate.Practical implicationsSecondary consequences of police militarization may counteract its desired positive outcomes and lead to significant risks for officers and citizens alike. Strong police support makes the reduction in use of these tactics unlikely, but these results give opportunity for consideration of such policy to all law enforcement agencies.Originality/valueIt is the first study to examine county sheriffs' perceptions of militarization since the events of Ferguson, Missouri and provides a very recent assessment of views from a population of leaders both integrated into policy decisions and intimately accountable for policy implementation.


2019 ◽  
Vol 5 (2) ◽  
pp. 109-115
Author(s):  
Johanes Fernandes Andry ◽  
Gunawan Wang ◽  
Gusti Ngurah Suryantara ◽  
Devi Yurisca Bernanda

PT Hema Indonesia is manufacturing company established in 2001 and has continued to grow. Nowadays the company has supported business processes in various companies, such as the use of information systems. The purpose of this research is to get an overview of the performance of information systems in order to determine the extent of maturity level which is currently running, with a few aspects to consider such as effectiveness and, efficiency. Implementing IT governance, however, is a challenge to organizations. To ensure IT alignment with business goals use standard COBIT. The analytical tool used is the standard procedure COBIT issued by ISACA. In this paper the method to be used is COBIT 4.1. Coverage of Audit IT Domain are Plan Organize (PO), such as PO4, PO5, PO7 and PO8. The conclusion that can be drawn from the research that has been done is IT governance at the company has been done, although still run optimally within each IT process contained in the sub domain average on level repeatable and defined proses.


2021 ◽  
Author(s):  
Victor Pickard

A new disinformation age is upon us—or so it seems. But much of what appears to be unprecedent-ed is not new at all. Concerns about misinformation’s effects on democracy are as old as media. The many systemic failures abetting Trump’s ascendance—as well as more recent election- and pandem-ic-related conspiracies—were decades in the making. Yet, our degraded information systems es-caped sufficient scrutiny for so long. Why?


DEDIKASI PKM ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 121
Author(s):  
Risza Putri Elburdah ◽  
Ugeng Budi Haryoko ◽  
Fauziah Septiani ◽  
Lucia Maduningtias ◽  
Edy Krisyanto

Community service (PKM) is an integral part of the Tri Dharma of Higher Education which in its implementation is inseparable from the other two dharmas, and involves all members of the academic community: lecturers, students, education staff and alumni. Through PKM the academic community can be present in the midst of the community.The location of Nurul Ihsan Foundation is sufficient to enter the village, so that not many people know of its existence. Even though the Foundation has been established since 1994. Besides educational activities (pesantren), Nurul Ihsan Orphanage also organizes skills training for foster children and the surrounding community to cultivate talents and provide them with certain skills for the future. The number of activities above, the need to continue to develop skills is a matter that has always been championed by the management of the Nurul Ihsan Orphanage Foundation and other institutions. To meet these needs, strategic marketing management counseling is carried out so that the name Nurul Ihsan Foundation is increasingly known to the wider community. It is hoped that more donors will continue to help fulfill the education of the students and orphans at the Nurul Iksan Foundation. One solution that resulted from this outreach was about marketing media and marketing personnel that must be owned by the Nurul Iksan Foundation. PKM with the title: "Counseling Strategic Marketing Management in the Development of the Nurul Iksan Foundation" in general went smoothly and impressively. The students and the foundation's management were very enthusiastic in listening to the explanation of the material provided. This is illustrated by the many questions raised and two-way discussions that occur. The enthusiasm continued when the session reviewed cases related to marketing media.Keywords: Marketting Management, Promotion Media ,Development.


Author(s):  
A. Schwinn

The effectiveness and efficiency of information systems are closely related to the degree of integration between applications. In order to support the management of application integration, five success factors are analyzed. For each success factor, appropriate performance indicators are proposed. Since the analysis indicates that the success factors are closely interrelated, these dependencies are discussed and hypotheses are derived.


Author(s):  
Mathew Grubel

This chapter uses experimental archaeology to attempt to learn how soldiers constructed the huts they would live in during the winter at Morristown, New Jersey. For the historic reconstruction, the same tools and techniques were, as much as possible, employed to replicate the technology available in 1777. The research touches on numerous topics that have not seen much attention, such as the integration of the camps with the local economy, the acquisition of provisions for the camps, the historic technology the soldiers used, and the many roles and skills that were necessary for hut building.


Author(s):  
Mehdi Khosrow-Pour, D.B.A.

During the past two decades, the business world has witnessed a technological revolution known today as electronic commerce or ecommerce. This revolution has allowed businesses all over the world to conduct business in ways that were unimaginable two decades ago. Through the use of e-commerce technologies, businesses can share and disseminate information electronically and conduct business online so consumers, regardless of their locations, can obtain goods and services from the businesses. Because of the many opportunities e-commerce technologies offer in today’s competitive marketplace, it is essential for organizations to have e-commerce presence and effectively utilize the Internet to expand their businesses. With this Internet presence, ensuring security of their data and sales experiences is of paramount importance. Through the use of effective e-commerce security tools, business can increase their sales,Guy Fitzgerald is professor of information systems at Brunel University and is head of the Department of Information Systems and Computing. Prior to this he was the cable and wireless professor of business information systems at Birkbeck College, University of London, and before that he was at Templeton College, Oxford University. As well as being an academic, he has also worked in the computer industry with companies such as British Telecom, Mitsubishi, and CACI Inc., International. His research concerns the effective management and development of information systems and he has published widely in these areas. He is probably best known for his work in relation to development techniques and methodologies and is the author of a major text in this area entitled Information Systems Development: Methodologies, Techniques and Tools, now in its fourth edition. He is also well known for his research in the areas of strategy, outsourcing, and executive information systems. His most recent research is concerned with the development of flexible information systems to enhance organizational agility. He is founder and co-editor of the Information Systems Journal (ISJ), an international journal from Blackwell Publishing, and he has been a member of many international Program Committees, including the International Conference on Information Systems (ICIS) and the European Conference on Information Systems (ECIS).


Author(s):  
Paulette Alexander ◽  
Carol Gossett

The process of designing a university curriculum in the information systems discipline needs to follow many of the same processes that professional systems analysts use. Of concern are the product, the stakeholders, the drivers, and the methods; indeed, an information systems curriculum is an information system. This chapter presents a case study of one small regional university’s efforts to create an updated information systems curriculum addressing the challenges of curriculum development using the framework of the very systems analysis and design course content that the students are expected to learn. The chapter identifies each component of the information system curriculum and details the processes supporting each development step along the way, from problem identification to system operation and support. This case study presents a cohesive approach to dealing with the many pressures associated with information systems curriculum development and might be instructive for curriculum development in other disciplines as well.


2011 ◽  
pp. 1805-1825
Author(s):  
Mark C. Shaw ◽  
Bernd Carsten Stahl

Despite decades of research, healthcare information systems have been characterised by cost over-runs, poor specifications and lack of user uptake. A new approach is required which provides organisations with a reason to invest in this type of software. W Edwards Deming argues that quality is not an entity but derives from using feedback, iteratively to seek improvement to processes, in order to increase productivity and to make better use of resources. The authors propose that supporting this form of quality assurance (QA) using information systems (IS) has the potential to deliver a return on investment. An object-oriented analysis, where healthcare is viewed as the delivery of interdependent processes to which Deming’s form of QA is applied, results in a class model of data types that has some useful characteristics. It is able to store data about medical and nonmedical events; to save descriptions of procedures and to represent the QA process itself. With software based on the model, organisations will have a memory of previous attempts at making improvements as well as data about feedback from patients and staff to drive future change. A critical research in information systems (CRIS) analysis of this model proposes a number of criticisms deriving from theories about rationality; concepts of technology; politics and hidden agendas, as well as the social consequences of technology. The view that QA is a standardised, ongoing conversation about the important characteristics of a process pre-empts many of these counter arguments. The CRIS critique also highlights the need to ensure that development is in harmony with the needs of the many stakeholders in healthcare IS. These concepts lead to new directions in healthcare IS research. The class model needs to be tested against clinical and non-clinical use-cases for its viability not only as support for QA but also as an electronic patient record. A standard terminology is required for processes and for how objects from the model should be used to represent them. The model predicts that user interfaces will have to collect more detailed data than hitherto. Also use of the software should be tested in controlled trials to demonstrate whether the required improvements in quality not only benefit the patient but also the organisations managing their care.


Sign in / Sign up

Export Citation Format

Share Document