Advances in Business Information Systems and Analytics - Automated Enterprise Systems for Maximizing Business Performance
Latest Publications


TOTAL DOCUMENTS

13
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466688414, 9781466688421

Author(s):  
Arion de Campos Jr. ◽  
Aurora T. R. Pozo ◽  
Silvia R. Vergilio

The Web service composition refers to the aggregation of Web services to meet customers' needs in the construction of complex applications. The selection among a large number of Web services that provide the desired functionalities for the composition is generally driven by QoS (Quality of Service) attributes, and formulated as a constrained multi-objective optimization problem. However, many equally important QoS attributes exist and in this situation the performance of the multi-objective algorithms can be degraded. To deal properly with this problem we investigate in this chapter a solution based in many-objective optimization algorithms. We conduct an empirical analysis to measure the performance of the proposed solution with the following preference relations: Controlling the Dominance Area of Solutions, Maximum Ranking and Average Ranking. These preference relations are implemented with NSGA-II using five objectives. A set of performance measures is used to investigate how these techniques affect convergence and diversity of the search in the WSC context.


Author(s):  
Vicky Manthou ◽  
Constantinos J. Stefanou ◽  
Kalliopi Tigka

ERP systems, supporting and integrating all business processes across functions and offering real time information necessary for taking actions and making decisions, have prevailed in most enterprises worldwide. The costs involved in ERP implementations may be huge and must be justified by the outcomes. However, extant research has reported mixed and in some cases controversial results. In this chapter, certain important dimensions of ERP systems and of business performance are discussed. The chapter has an educational focus and aims at providing an exploration of ERP system's impact on certain business performance dimensions, informing thus scholars, practitioners and students of the issues involved and the areas they should pay attention when considering ERP implementations. Following an extensive literature review, a classification of diverse studies according to their research focus is provided, which reveals the range of business performance dimensions and can help researchers in their future projects.


Author(s):  
Maria Gianni ◽  
Katerina Gotzamani

Information systems collect and disseminate information within organizations based on information technology, while management systems formalize business processes following the standards requirements. Since management standards proliferate, their integrated adoption into a holistic overarching system has emerged as an effective and efficient approach. In this context, this chapter aims to explore the potential synergies among information management and integration. Firstly, a focused literature review is conducted and survey data on the relevant standards evolution are processed in order to provide the information and management practitioners with a clear and oriented depiction of the available norms and their adoption possibilities. Furthermore, a framework is proposed consolidating management sub-systems into an integrated structure including information management and supported by information systems. Finally, the concept of internalization of management systems standards is understood in association with information and knowledge diffusion within an integrated management system.


Author(s):  
Kostas Vergidis

Although it has been more than a decade since the emergence of the concept of business processes, there is still a lack of common ground and agreement about their nature and context, their contribution and benefits to the contemporary business environment. This chapter ‘rediscovers' business processes in the sense that provides a critical review of the multiple definitions by different authors and constructs a schema with the main structural elements that constitute a business process. It also reviews the main modelling approaches and classifies them into three primary groups according to their diagrammatic, formal and execution capabilities. Lastly, the main business process patterns are identified and the main business process modelling techniques are compared based on their pattern support capabilities. The work presented rediscovers business processes by providing a holistic understanding that will lead to their standardisation and further development.


Author(s):  
Myoung-Ah Kang ◽  
François Pinet ◽  
Sandro Bimonte ◽  
Gil De Sousa ◽  
Jean-Pierre Chanet

More and more data are collected via sensors. Wireless networks can be implemented to facilitate the collection of sensors data and to reduce the cost of their acquisition. In this chapter, we present a general architecture combining Wireless Sensor Network (WSN) and Spatial Data Warehouse (SDW) technologies. This innovative solution is used to collect automatically sensor's information and to facilitate the analysis of these data. The WSN used in this application has been deployed by Irstea and tested during several years in vineyards in South of France. The novel contribution presented in this chapter is related to the use of a SDW to manage data produced by geo-referenced sensor nodes. SDW is one of the most appropriate modern technologies for analyzing large data sets at different temporal and spatial scales. This type of databases is a specific category of information system used to integrate, accumulate and analyze information from various sources. These data are usually organized according to a multidimensional schema to facilitate the calculation of indicators. In this chapter, we introduce the development of a SDW storing the data collected by this WSN. The implemented data warehouse can allow users to aggregate and explore interactively data produced by sensors. With this system, it is possible to visualize on a map the results of these aggregations.


Author(s):  
Lediona Nishani

Security nowadays is not a “nice to have,” but a must-have. Cybercriminals have started a new way of encouraging their activities by selling their services on the deep dark web. They are becoming day by day more persistent and smarter than ever. Therefore, the companies have to be smarter in order to face the diversity of new threats every day. The increase of botnets is responsible for an emerging ransomware attacks through cryptolocker. Another modern malware are APT (Advanced persistent threats, sophisticated threats that undertake missions in cyber space). This chapter is about a summary of the most prominent attacks on security threats regarding android mobile devices. In this review chapter we will disclose and analyze chronicles of attack, which cover researching period from 2004 when was discovered the first mobile malware, until 2014. Our research will narrow down just in the two last years because of tremendous surge of android malware that has emerged just in this short period. We have chosen this small research sample in order to provide insights and give significant evidence that in a short period we have to investigate and analyze so many miscellaneous malware and vulnerabilities techniques. In subsequent proceedings, this chapter points out the main threats category we have thought to be more notable or significant to be investigated in this review chapter. Later on, it discusses future trends and some strong recommendation on facing and dealing with the internet technology based area.


Author(s):  
Sofienne Srihi ◽  
Farhat Fnaiech ◽  
Ala Balti ◽  
Habib Hamam

In this chapter, we define Information Security (IS) and elaborate on the different methods and technology used. We proceed to explain some of the IS tools and risks found in private and confidential data. We detail the latest algorithms and systems of security and discuss how to implement those systems in business to upgrade performances and increase profits.


Author(s):  
Vicky Manthou ◽  
Christos Bialas ◽  
Constantinos J. Stefanou

This chapter reports on research investigating the benefits and barriers of e-Enabling Technologies such as e-Sourcing and e-Purchasing in the healthcare sector. The research is based on a case study conducted at the KAT General Hospital (KGH) in Athens, Greece, and examines aspects regarding the implementation of specific e-Sourcing and e- Purchasing tools, such as e-RFx and e-Auctions, focusing on the resulting benefits and the existing barriers of adoption. Findings suggest that although quantifiable benefits were identified, e-Sourcing and e- Purchasing are still at an early stage of maturity in the Greek Healthcare Sector. The chapter entails a literature review, a description of the research methodology used, the findings based on the case study and the final conclusions.


Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


Author(s):  
Loukas K. Tsironis

The chapter proposes a general methodology on how to use data mining techniques to support total quality management especially related to the quality tools. The effectiveness of the proposed general methodology is demonstrated through their application. The goal of this chapter is to build the 7 new quality tools based on the rules that are “hidden” in the raw data of a database and to propose solutions and actions that will lead the organization under study to improve its business processes by evaluating the results. Four popular data-mining approaches (rough sets, association rules, classification rules and Bayesian networks) were applied on a set of 12.477 case records concerning vehicles damages. The set of rules and patterns that was produced by each algorithm was used as input in order to dynamically form each of the quality tools. This would enable the creation of the quality tools starting from the raw data and passing through the stage of data mining, using automatic software was employed.


Sign in / Sign up

Export Citation Format

Share Document