منابع مشابه
change management in business processes
today, change is a definite phenomenon and organizations should make themselves aligned with requirements for survival and success in the competitive market and retain customers. one of the main components of any organization that is undergoing these changes is the business processes of that organization. in other words, in a dynamic business environment, business processes are changed at runti...
متن کاملAligning Legacy Information Systems to Business Processes
Recent years have experienced a growth in demand for re-engineering legacy information systems. The complexity of a development endeavour leading to migration of a legacy system stresses the need for a systematic supporting approach. We argue in this paper that such an approach should facilitate (a) documentation of dependencies between business processes and supporting IS in a way that changes...
متن کاملRecovering business processes from business applications
A business process, such as the process followed when ordering a book, describes the order of executing tasks (e.g., check inventory, verify credit card, and ship book). Business applications implement the business processes for the daily operations of an organization. Organizations must continuously modify their business applications to accommodate changes to business processes. However, busin...
متن کاملBusiness Processes Meet Operational Business Intelligence
As Business Intelligence architectures evolve from off-line strategic decision-making to on-line operational decision-making, the design of the backend Extract-Transform-Load (ETL) processes is becoming even more complex. We describe the challenges in ETL design and implementation, and the approach we are taking to meet these challenges. Our approach is centered around a layered methodology tha...
متن کاملModelling E-Business Security Using Business Processes
Organisations (enterprises, businesses, government institutions, etc.) have changed their way of doing business from a traditional approach to embrace e-business processes. This change makes the perimeter security approach inappropriate for such organisations. The well-known and widely used security mechanisms, including cryptography-based tools and techniques, cannot provide a sufficient level...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tehnički glasnik
سال: 2018
ISSN: 1848-5588,1846-6168
DOI: 10.31803/tg-20170808183458