Principles and Experiences

Author(s):  
Mehmet S. Aktas

The data requirements of e-business applications have been increased over the years. These applications present an environment for acquiring, processing, and sharing data among interested parties. To manage information in such data-intensive application domain, independent enterprise e-business applications have developed their own solutions to information services. However, these solutions are not interoperable with each other, target vastly different systems, and address diverse sets of requirements. They require greater interoperability to enable communication between different systems, so that they can share and utilize each other’s resources. To address these challenges, we discuss principles and experiences for designing and building of a novel enterprise information system. We introduce a novel architecture for a hybrid information service, which provides unification, federation, and interoperability of major Web-based information services. The hybrid information service is designed as an add-on information system, which interacts with the local information services and assembles their metadata instances under one hybrid architecture. It integrates different information services using unification and federation concepts. In this chapter, we summarize the principles and experiences gained in designing and building the semantics, architecture, and implementation for the hybrid information service.

Author(s):  
Mehmet S. Aktas

The data requirements of e-business applications have been increased over the years. These applications present an environment for acquiring, processing, and sharing data among interested parties. To manage information in such data-intensive application domain, independent enterprise e-business applications have developed their own solutions to information services. However, these solutions are not interoperable with each other, target vastly different systems, and address diverse sets of requirements. They require greater interoperability to enable communication between different systems, so that they can share and utilize each other’s resources. To address these challenges, we discuss principles and experiences for designing and building of a novel enterprise information system. We introduce a novel architecture for a hybrid information service, which provides unification, federation, and interoperability of major Web-based information services. The hybrid information service is designed as an add-on information system, which interacts with the local information services and assembles their metadata instances under one hybrid architecture. It integrates different information services using unification and federation concepts. In this chapter, we summarize the principles and experiences gained in designing and building the semantics, architecture, and implementation for the hybrid information service.


2020 ◽  
Vol 3 (1) ◽  
pp. 23-31
Author(s):  
Asep Afandi Afandi

The information system of village-owned enterprises is still done manually, and in delivering information to the people in the village of Sidokayao, Abung Tinggi Subdistrict, North Lampung Regency, so that some people do not know about Sidokayo Village, there are bumdes activities, therefore, an application must be designed using internet facilities that can used by the public in accessing information and can save time, thus in Sidokayo village a website application is needed.With the existence of a mobile web-based village-owned enterprise information system it is hoped that it can facilitate access to information and improve services in marketing businesses in the Sidokayo village managed by BUMDes.


Author(s):  
Valeriy Fedorovich Shurshev ◽  
Iurii Gostiunin

The article considers the problem of damage evaluation in case of failure of the information system. There have been analyzed the practical methods of assessing damage. It has been stated that the methods can reveal the dependence of the damage on the downtime of the information system, but they are unable to evaluate reputation, administrative or any other consequences. An algorithm is proposed by which specialists can conduct a comparative assessment of damage in case of failure of various information systems using expert information. Applying the proposed algorithm to different information systems, it is possible to determine the most critical systems and, on this basis, effectively plan operational impacts to increase the level of service availability.


2018 ◽  
Vol 18 (3) ◽  
pp. 333-338
Author(s):  
E. A. Vitenburg ◽  
A. A. Levtsova

Introduction. Production processes quality depends largely on the management infrastructure, in particular, on the information system (IS) effectiveness. Company management pays increasingly greater attention to the safety protection of this sphere. Financial, material and other resources are regularly channeled to its support. In the presented paper, some issues on the development of a safety enterprise information system are considered.Materials and Methods. Protection of the enterprise IS considers some specific aspects of the object, and immediate threats to IT security. Within the framework of this study, it is accepted that IS are a complex of data resources. A special analysis is resulted in determining categories of threats to the enterprise information security: hacking; leakage; distortion; loss; blocking; abuse. The connection of these threats, IS components and elements of the protection system is identified.  The requirements of normative legal acts of the Russian Federation and international standards regulating this sphere are considered. It is shown how the analysis results enable to validate the selection of the elements of the IS protection system.Research Results. A comparative analysis of the regulatory literature pertinent to this issue highlights the following. Different documents offer a different set of elements (subsystems) of the enterprise IS protection system. To develop an IS protection program, you should be guided by the FSTEC Order No. 239 and 800-82 Revision 2 Guide to ICS Security.Discussion and Conclusions. The presented research results are the basis for the formation of the software package of intellectual support for decision-making under designing an enterprise information security system. In particular, it is possible to develop flexible systems that allow expanding the composition  of the components (subsystems).


Sign in / Sign up

Export Citation Format

Share Document