Composing Systems of Systems

Author(s):  
Panayiotis Periorellis

Information Systems in general carry or have embedded in their structure, elements that stem from the organization’s strategic, tactical, and operational goals. Finding elements of an organization’s strategic, tactical, or operational goals embedded in computer systems is not at all surprising, since most developers and programmers were taught how to successfully map such goals into the Information System. We are, however, in an era where technology allows us to develop systems that are composed of smaller autonomous parts (sometimes complete systems themselves) that are integrated together despite being bound by their corresponding organizational boundaries. Therefore integration is not only a technical challenge but an organizational one, too. In this chapter we address a number of issues, namely system composition, regulation, evolution, and dependability, using examples from the two case studies we worked on for three years.

2016 ◽  
Vol 6 (2) ◽  
pp. 26-35
Author(s):  
Vladimír Krajčík ◽  
Pavel Vlček

Abstract The article focuses on process management in public administration using the specific case study of the statutory city of Ostrava. Based on the selected part of the PAPRIS methodology, the process management is verified, and conclusions from the application of information system e-SMO ("Electronic Statutory City of Ostrava") are generalized. Ostrava is third the biggest city in Czech Republic with approximately 320 thousand citizen. Article describes experiences with SW implements, which are used for model of process in public administration. Particulary at local authority of Ostrava town. Model of process is a basis for reengineering of process in state administration and preparation for implementation of big information systems. Mapping of process is providing implement and confirmation methodology to identify existing processes. Problem with its using consist in that, senior manager don’t informs, what organization is determination by processes. If are not described in given to organization current processes, or how would have had look new optimum processes, will not endeavour about reengineering successful. Procedural analysis namely offer tool and check methodology to identification current suit („ at") and it is possible him use either as instruction („ how so about to be") for reengineering function handling administrative and self-rule activities. Purpose of the article: The PAPRIS methodology was used when defining the objectives for implementation of the information system for public administration (PAPRIS - Process Approach - Public and Regional Information System). This methodology has been elaborated by one of the authors and published in a very general scheme when solving many case studies (Krajčík, 2006), (Krajčík, 2007), (Krajčík, 2013) (Krajčík, 2014). We assume that the PAPRIS is primarily a methodology with incorporated elements of procedural approach for project management in public administration information systems (PAIS). The specific supporting process of communication between the client and the e-SMO ("Electronic Statutory City of Ostrava") system has been chosen for verification. The model of supporting communication process, created by ARIS tools, is crucial, and the structure of scripts (ICM and IVR) is subsequently made. The aim of this article is to verify that the methodology is sufficient and appropriate to manage such a large project such, undoubtedly, is the e-SMO (Vlček, 2009). Methodology/methods: Defined productive and non-productive processes with their defined process cuts represent a crucial category for the process structure of IS projects. This is fully accepted by the PAPRIS methodology. Process cuts are understood, in the logic modelling according to the PAPRIS methodology, as clearly defined logic directional cuts in three-dimensional space of all project processes. The process set is systemically categorized, in a given logic directional cut, into mutually disjoint process subsets, which are characterized by this particular directional operator. The directional operator always has a clear logical allocation that is based on the construction of a process view. Theoretically, an infinite number of process views can be used. One of the important issues in a methodology for the case studies includes the size of the research sample. It is usually assumed that there is no ideal number of cases and that the number between four and ten usually provides good results. Other authors defining against any quantitative standards for any determination of the sample size of the case studies, since such an approach denies the internal logic of this methodology and the richness of the information obtained from participants in the research. Research which is carried out using case studies does not aspire on compliance with the requirement the representativeness of the sample. (Štrach, 2007). Methodology of case studies is among the established guidelines of qualitative research (Štrach, 2007). Research on using case studies in the last 30 years has seen an extraordinary increase in social-scientific research, including research on business and management (Dul, Hak, 2008). Scientific aim: The essential aim of this study is to describe the way the process cut defines a productive process and non-productive process, in accordance with the PAPRIS methodology using the specific example. While the triggering mechanism of the project production process is an event causing its own production - i.e. the specific output with added value for the customer, the project of non-productive process is caused by the project management event. Therefore, it is caused by the need to control, monitor, track, inspect, evaluate outputs, decide and regulate the project implementation. Findings: Within the support of the communication process, two examples were used to verify the methodology. The global perspective on the process was created in ARIS tools and the communication between the call centre and the client was made in Visio tools. The PAPRIS methodology is based on the concept of process variability, which has been clearly formulated. The fundamental direction of the process development, anticipated changes and the opportunity to react to them in accordance with defined objectives of the PAIS project are guaranteed.


Author(s):  
Ahmad Riza ◽  
Mohamad Alif Irfan Anshori ◽  
Farrah Arrazy ◽  
M. Ainul Yaqin

The Complexity Metric Diagram is a method of measuring software complexity. This method uses Class Diagrams as test parameters. This study uses test data from previous research regarding the design of Information Systems accompanied by Class Diagrams with case studies of School Academic Information Systems. The facts found in the field that school software developers do not conduct application audits so it is not ripe to face problems that will arise in the future. The results of the calculation of the complexity metrics in the School Academic Information System produce an output of 993.32 units.


2011 ◽  
pp. 283-290
Author(s):  
Neil C. Rowe

Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks. Unfortunately, however, government systems can be especially vulnerable (Lucasik, Goodman, & Longhurst, 2003). This is in part because government is distributed over many locations, and therefore, it is hard to protect all of its information systems well. Second, many government systems must be accessible to a wide range of people (even if through a government intermediary), unlike the specialized systems used in other settings, and users will include a few fools and criminals. Third, governments often use popular business software, and the more popular that software is, the more attacks are known against it. Finally, there are many people with antipathy or grudges against governments for one reason or another, and they may seek revenge by attacking a government’s information system and data. With the global Internet, attackers need not be in the same country as the government they attack. Therefore, it is important to become familiar with the kinds of possible attackers, attacks, and countermeasures that governments could encounter on their computer systems and computer networks (Boswoth & Kabay, 2002; Schwartau, 2001).


Author(s):  
Tony Elliman ◽  
Tally Hatzakis ◽  
Alan Serrano

This paper discusses the idea that even though information systems development (ISD) approaches have long advocated the use of integrated organisational views, the modelling techniques used have not been adapted accordingly and remain focused on the automated information system (IS) solution. Existing research provides evidence that business process simulation (BPS) can be used at different points in the ISD process to provide better integrated organisational views that aid the design of appropriate IS solutions. Despite this fact, research in this area is not extensive; suggesting that the potential of using BPS for the ISD process is not yet well understood. The paper uses the findings from three different case studies to illustrate the ways BPS has been used at different points in the ISD process. It compares the results against IS modelling techniques, highlighting the advantages and disadvantages that BPS has over the latter. The research necessary to develop appropriate BPS tools and give guidance on their use in the ISD process is discussed.


Author(s):  
Vitor Santos ◽  
Henrique São Mamede

In this context, the hypothesis to appeal to the capacity of computer systems, based in knowledge or in adaptations of creativity techniques in order to help to produce new combinations and to give unexpected, original, useful and satisfactory answers, focus in one specific context is presented as something extremely challenging. In this article, we consider the concept of "Creative Information System” which introduces us to a proposal of a concrete architecture fact to a Creative Information System based in the technique of creativity named brute thinking (Michalko 1991).


Author(s):  
N. C. Rowe

Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks. Unfortunately, however, government systems can be especially vulnerable (Lucasik, Goodman, & Longhurst, 2003). This is in part because government is distributed over many locations, and therefore, it is hard to protect all of its information systems well. Second, many government systems must be accessible to a wide range of people (even if through a government intermediary), unlike the specialized systems used in other settings, and users will include a few fools and criminals. Third, governments often use popular business software, and the more popular that software is, the more attacks are known against it. Finally, there are many people with antipathy or grudges against governments for one reason or another, and they may seek revenge by attacking a government’s information system and data. With the global Internet, attackers need not be in the same country as the government they attack. Therefore, it is important to become familiar with the kinds of possible attackers, attacks, and countermeasures that governments could encounter on their computer systems and computer networks (Boswoth & Kabay, 2002; Schwartau, 2001).


2017 ◽  
Vol 4 (2) ◽  
pp. 86-94 ◽  
Author(s):  
Imam Muslimin ◽  
Sasongko Pramono Hadi ◽  
Eko Nugroho

In the information systems field, the fit between the components of information systems is a topic that has attracted the attention of many researchers. Various concepts of the fit such as Task-Technology Fit (TTF), Fit between Individuals, Tasks, and Technology (FITT), and Human Organization Technology Fit (HOT-Fit) are proposed and studied in various studies. In those various concept, the fit is one of the keys to the successful implementation and acceptance of information systems. Through a study of relevant literature, this study proposes a model consisting of human, organization, and technology characteristics, and adds the Perceived User Technology Organization Fit (PUTOF) variable as the initiated variable that influences the intention to use. In subsequent research, this model can be tested quantitatively with case studies of the information system implementation in an organization.


2001 ◽  
Vol 14 (3) ◽  
pp. 181-191 ◽  
Author(s):  
David Greatbatch ◽  
Elizabeth Murphy ◽  
Robert Dingwall

This paper examines how qualitative research can contribute to the evaluation of medical information systems. Most qualitative studies of the use of medical computer systems adopt either an interactionist or, less commonly, an ethnomethodological perspective. The paper compares and contrasts the two approaches through the detailed discussion of two case studies, one rooted in each tradition. It identifies the implications of using these different analytical approaches and assesses their strengths and weaknessess. The paper argues that the preference for interactionism has led qualitative researchers to overlook important aspects of the social processess which surround the use of computer systems and that, consequently, a shift in emphasis towards ethnomethodological research is necessary. Nonetheless, it concludes by asserting that both strands of qualitative research can illuminate the organizational impact of medical computer systems.


2001 ◽  
Vol 14 (3) ◽  
pp. 181-191 ◽  
Author(s):  
David Greatbatch ◽  
Elizabeth Murphy ◽  
Robert Dingwall

This paper examines how qualitative research can contribute to the evaluation of medical information systems. Most qualitative studies of the use of medical computer systems adopt either an interactionist or, less commonly, an ethnomethodological perspective. The paper compares and contrasts the two approaches through the detailed discussion of two case studies, one rooted in each tradition. It identifies the implications of using these different analytical approaches and assesses their strengths and weaknessess. The paper argues that the preference for interactionism has led qualitative researchers to overlook important aspects of the social processess which surround the use of computer systems and that, consequently, a shift in emphasis towards ethnomethodological research is necessary. Nonetheless, it concludes by asserting that both strands of qualitative research can illuminate the organizational impact of medical computer systems.


2020 ◽  
Vol 2 (2) ◽  
pp. 128-143
Author(s):  
Tedi Budiman

Financial information system is an information system that provides information to individuals or groups of people, both inside and outside the company that contains financial problems and information about the flow of money for users in the company. Financial information systems are used to solve financial problems in a company, by meeting three financial principles: fast, safe, and inexpensive.Quick principle, the intention is that financial information systems must be able to provide the required data on time and can meet the needs. The Safe Principle means that the financial information system must be prepared with consideration of internal controls so that company assets are maintained. The Principle of Inexpensive, the intention is that the cost of implementing a financial information system must be reduced so that it is relatively inexpensive.Therefore we need technology media that can solve financial problems, and produce financial information to related parties quickly, safely and cheaply. One example of developing information technology today is computer technology and internet. Starting from financial problems and technological advances, the authors make a website-based financial management application to facilitate the parties that perform financial management and supervision.Method of development application program is used Waterfall method, with the following stages: Software Requirement Analysis, Software Design, Program Code Making, Testing, Support, Maintenance.


Sign in / Sign up

Export Citation Format

Share Document