RQ-Tech, A Strategic-Level Approach for Conceptualizing Enterprise Architectures
نویسندگان
چکیده
منابع مشابه
RQ-Tech, A Strategic-Level Approach for Conceptualizing Enterprise Architectures
The purpose of this study is to present a system-theoretic based methodology and corresponding model for Enterprise Architecture development. Enterprise Architecture models can assist managers by illustrating the systemic relationships of their business and the impact their decisions can make. Unfortunately, today’s modeling practices are proprietary, time-consuming, and generally ineffective a...
متن کاملStrategic Planning for Enterprise Mobility: A Readiness-Centric Approach
Strategic planning for information and communication technologies (ICT) has been a topic of significant interest to both researchers and practitioners. However, the issues pertaining to emerging ICT have remained largely undeveloped. This article examines what enterprises must consider when planning for emerging ICT, with a particular focus on enterprise mobility solutions. Integrating firm-lev...
متن کاملA Business Process-centered Approach for Modeling Enterprise Architectures
Mastering an Enterprise Architecture is crucial for the entire enterprise to operate most efficiently. However, there is a lack of appropriate means to appropriately visualize and communicate traceability from business processes to other enterprise architectural entities such as e.g. the supporting IT infrastructure. Therefore, systematic in-depth analysis of the entire Enterprise Architecture ...
متن کاملStrategic Tech Purchasing
DREXEL’s Bielec: Purchasing cards are cheaper and easier. FINDING WAYS TO better manage your purchasing strategy can help save considerable sums not just on purchases, but on back-end support costs. For suggestions on how to cut tech procurement costs and control spending, we spoke with CIOs at two universities and a senior manager of higher ed purchasing at one of the biggest tech product supp...
متن کاملAn Approach to Secure Mobile Enterprise Architectures
Due to increased security awareness of enterprises for mobile applications operating with sensitive or personal data as well as extended regulations form legislative (the principle of proportionality) various approaches, how to implement (extended) two-factor authentication, multi-factor authentication or virtual private network within enterprise mobile environments to ensure delivery of secure...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2012
ISSN: 1877-0509
DOI: 10.1016/j.procs.2012.09.026