Self-Organization System Framework of Enterprise Information System Based on CAS

2012 ◽  
Vol 591-593 ◽  
pp. 2628-2631
Author(s):  
Hai Wang Cao ◽  
Chao Gai Xue

In order to avoid enterprise information system (EIS) risk, the self-organization mechanism of EIS based on complex adaptive system (CAS) is studied. Firstly, self-organization properties of EIS are analyzed, which include open system, nonlinear characteristics, far from equilibrium and fluctuations. Secondly, the complex properties and complex adaptive properties of EIS self-organization are studied. The complex properties include multi-agent, active adaptation of agents, multi-level nature, technology complexity, organizational complexity, process complexity and environment complexity. The complex adaptive properties include aggregation mechanism, identification mechanism, non-linear characteristics flow characteristics, diversity characteristics, internal model mechanism and block characteristics. Finally, architecture model of EIS self-organization is proposed as well as its macro and micro models, which provides a new perspective for EIS and helps understand the rules of EIS implementation.

Author(s):  
Lola Yorita Astri ◽  
Ford Lumban Gaol

An integrated information system is needed in an enterprise to support businessprocesses run by an enterprise. Therefore, to develop information system can use enterprisearchitecture approach which can define strategic planning of enterprise information system. SMPNegeri 1 Jambi can be viewed as an enterprise because there are entities that should be managedthrough an integrated information system. Since there has been no unification of different elementsin a unity yet, enterprise architecture model using Enterprise Architecture Planning (EAP) isneeded which will obtain strategic planning of enterprise information system in SMP Negeri 1Jambi. The goal of strategic planning of information system with Enterprise Architecture Planning(EAP) is to define primary activities run by SMP Negeri 1 Jambi and support activities supportingprimary activities. They can be used as a basis for making data architecture which is the entities ofapplication architecture. At last, technology architecture is designed to describe technology neededto provide environment for data application. The plan of implementation is the activity plan madeto implemented architectures by enterprise.


Author(s):  
Valeriy Fedorovich Shurshev ◽  
Iurii Gostiunin

The article considers the problem of damage evaluation in case of failure of the information system. There have been analyzed the practical methods of assessing damage. It has been stated that the methods can reveal the dependence of the damage on the downtime of the information system, but they are unable to evaluate reputation, administrative or any other consequences. An algorithm is proposed by which specialists can conduct a comparative assessment of damage in case of failure of various information systems using expert information. Applying the proposed algorithm to different information systems, it is possible to determine the most critical systems and, on this basis, effectively plan operational impacts to increase the level of service availability.


2018 ◽  
Vol 18 (3) ◽  
pp. 333-338
Author(s):  
E. A. Vitenburg ◽  
A. A. Levtsova

Introduction. Production processes quality depends largely on the management infrastructure, in particular, on the information system (IS) effectiveness. Company management pays increasingly greater attention to the safety protection of this sphere. Financial, material and other resources are regularly channeled to its support. In the presented paper, some issues on the development of a safety enterprise information system are considered.Materials and Methods. Protection of the enterprise IS considers some specific aspects of the object, and immediate threats to IT security. Within the framework of this study, it is accepted that IS are a complex of data resources. A special analysis is resulted in determining categories of threats to the enterprise information security: hacking; leakage; distortion; loss; blocking; abuse. The connection of these threats, IS components and elements of the protection system is identified.  The requirements of normative legal acts of the Russian Federation and international standards regulating this sphere are considered. It is shown how the analysis results enable to validate the selection of the elements of the IS protection system.Research Results. A comparative analysis of the regulatory literature pertinent to this issue highlights the following. Different documents offer a different set of elements (subsystems) of the enterprise IS protection system. To develop an IS protection program, you should be guided by the FSTEC Order No. 239 and 800-82 Revision 2 Guide to ICS Security.Discussion and Conclusions. The presented research results are the basis for the formation of the software package of intellectual support for decision-making under designing an enterprise information security system. In particular, it is possible to develop flexible systems that allow expanding the composition  of the components (subsystems).


2010 ◽  
Vol 26-28 ◽  
pp. 457-461
Author(s):  
Min Peng ◽  
Jun Tang

This paper describes the basic theory of SOA architecture and the related technologies to achieve SOA, presents a simplified information system architecture design based on SOA architecture, one by one analyzes the function of each layer, and in detail designs the object-oriented layer, SOA service bus, finally analyzes the SOA application in enterprise information management systems and its prospect.


Sign in / Sign up

Export Citation Format

Share Document