RQ-Tech, A Strategic-Level Approach for Conceptualizing Enterprise Architectures

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RQ-Tech, A Strategic-Level Approach for Conceptualizing Enterprise Architectures

The purpose of this study is to present a system-theoretic based methodology and corresponding model for Enterprise Architecture development. Enterprise Architecture models can assist managers by illustrating the systemic relationships of their business and the impact their decisions can make. Unfortunately, today’s modeling practices are proprietary, time-consuming, and generally ineffective a...

متن کامل

Strategic Planning for Enterprise Mobility: A Readiness-Centric Approach

Strategic planning for information and communication technologies (ICT) has been a topic of significant interest to both researchers and practitioners. However, the issues pertaining to emerging ICT have remained largely undeveloped. This article examines what enterprises must consider when planning for emerging ICT, with a particular focus on enterprise mobility solutions. Integrating firm-lev...

متن کامل

A Business Process-centered Approach for Modeling Enterprise Architectures

Mastering an Enterprise Architecture is crucial for the entire enterprise to operate most efficiently. However, there is a lack of appropriate means to appropriately visualize and communicate traceability from business processes to other enterprise architectural entities such as e.g. the supporting IT infrastructure. Therefore, systematic in-depth analysis of the entire Enterprise Architecture ...

متن کامل

Strategic Tech Purchasing

DREXEL’s Bielec: Purchasing cards are cheaper and easier. FINDING WAYS TO better manage your purchasing strategy can help save considerable sums not just on purchases, but on back-end support costs. For suggestions on how to cut tech procurement costs and control spending, we spoke with CIOs at two universities and a senior manager of higher ed purchasing at one of the biggest tech product supp...

متن کامل

An Approach to Secure Mobile Enterprise Architectures

Due to increased security awareness of enterprises for mobile applications operating with sensitive or personal data as well as extended regulations form legislative (the principle of proportionality) various approaches, how to implement (extended) two-factor authentication, multi-factor authentication or virtual private network within enterprise mobile environments to ensure delivery of secure...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2012

ISSN: 1877-0509

DOI: 10.1016/j.procs.2012.09.026