The use of information technology that is aligned with the company's goals will be
achieved if supported by a good governance planning system. Therefore, to develop
information technology can use the Enterprise Architecture approach as a guideline
or blueprint in the development of information technology. The XYZ company is an oil
palm plantation company that develops information technology services to support the
company's business operations. In order for the purpose of developing XYZ company
information technology services in line with the company's vision, mission and
objectives, an appropriate framework is needed in preparing strategic planning. This
study aims to provide recommendations for designing IT blueprints using the
Enterprise Architecture TOGAF framework for the development of information
technology that can be applied in XYZ companies
This document discusses different types of e-commerce including B2B, B2C, and intra-organizational. B2B e-commerce involves business selling products to other businesses using technologies like EDI. B2C e-commerce is direct sales from businesses to consumers using websites. Key features of B2C include advertising, investments in technology, and customer support. The document also discusses disintermediation and re-intermediation in e-commerce supply chains.
Building the Business Case for E-CommerceSAP Ariba
The document discusses building a business case for e-commerce by considering a company's maturity and culture. It presents three types of company cultures - operational excellence, product leadership, and customer intimacy - and explains how an e-commerce business case should support the company's existing culture. For example, an operational excellence culture primarily focuses on decreasing costs, so an e-commerce case for such a company should focus on how e-commerce can reduce costs of manufacturing, delivery, and customer service. The document also cites research showing the benefits companies have experienced from e-commerce, such as increased sales opportunities and reduced costs of adoption.
A bank ticket vending machine allows a commuter to start a session, request and receive trip information, request and provide payment information to process payment either by card or cash, and then dispenses the ticket. If paying by card and cash is provided, change is also dispensed after the ticket. The machine then displays a thank you message concluding the transaction.
Online Movie or theater ticket booking system Details Requirement.Niloy Biswas
It's about Online Movie or theater ticket booking system. We create Use case, Story Boarding, Activity Diagram, Functional & Non-Functional requirement, User Profile, & Database Design for this system.
Studied technology involved in E-Wallets and how it helps in payment process,market place model, revenue generation of Paytm,its marketing strategy,demonitisation and its after effects.
Google uses the Google File System (GFS) to organize and manipulate huge files across its distributed computing system. The GFS breaks files into 64MB chunks that are each stored in 3 copies on different computers. A master server coordinates the system and tracks metadata while chunkservers store and serve the file chunks. The GFS architecture is made up of clients, a master server, and chunkservers and uses chunk handles and replication to improve reliability, availability, and performance at massive scales.
EDI is the electronic transmission of business documents like purchase orders and invoices between companies in a standard format. It streamlines information flow, reducing paperwork and costs. EDI uses layers including physical infrastructure, standards translation, and transport. It is widely used in international trade to facilitate customs clearance, in healthcare for insurance claims processing, and in manufacturing/retail for just-in-time and quick response procurement. Larger companies directly use EDI while smaller companies employ third-party services.
E-BANKING EMERGING ISSUES AND OPPORTUNITIESVinit Varma
Innovation in technology, enlarged completion, globalization and changing environments are the crucial aspects that have forced our Banking services to change. With the diminishing cost of computers and digital gadgets like tables and smart phones along with decreasing charges and easy accessibility of internet and Wifi etc would certainly boosted the awareness of technology which resulted into increasing usage of E-banking day by day. Electronic Banking is a beautiful tool to deliver banking services at customers’ convenient place like office, home etc. E-Banking is not just only help in providing quick and efficient services but it also helps in reducing transaction and delivery costs. It improves profitability providing a platform for cross selling and cost effective product information. But there are some challenges in front E-banking like security threads, lack of awareness and knowledge of end users, peoples’ perceptions, user interface, failure of bank transitions, etc. But apart from any barriers, electronic banking is the future of modern banking and this is the stage where e-banking is helping to delineate the role of a bank branch and taking branches away from that transactional banking to become customer service centres but this transformation is not that much simple and it needs a lot of innovative steps, planning and investment. This paper throws light on emerging issues and opportunities of Electronic Banking. Here, an attempt would be made to highlight some issues in E-Banking and its prospects.
This document discusses different types of e-commerce including B2B, B2C, and intra-organizational. B2B e-commerce involves business selling products to other businesses using technologies like EDI. B2C e-commerce is direct sales from businesses to consumers using websites. Key features of B2C include advertising, investments in technology, and customer support. The document also discusses disintermediation and re-intermediation in e-commerce supply chains.
Building the Business Case for E-CommerceSAP Ariba
The document discusses building a business case for e-commerce by considering a company's maturity and culture. It presents three types of company cultures - operational excellence, product leadership, and customer intimacy - and explains how an e-commerce business case should support the company's existing culture. For example, an operational excellence culture primarily focuses on decreasing costs, so an e-commerce case for such a company should focus on how e-commerce can reduce costs of manufacturing, delivery, and customer service. The document also cites research showing the benefits companies have experienced from e-commerce, such as increased sales opportunities and reduced costs of adoption.
A bank ticket vending machine allows a commuter to start a session, request and receive trip information, request and provide payment information to process payment either by card or cash, and then dispenses the ticket. If paying by card and cash is provided, change is also dispensed after the ticket. The machine then displays a thank you message concluding the transaction.
Online Movie or theater ticket booking system Details Requirement.Niloy Biswas
It's about Online Movie or theater ticket booking system. We create Use case, Story Boarding, Activity Diagram, Functional & Non-Functional requirement, User Profile, & Database Design for this system.
Studied technology involved in E-Wallets and how it helps in payment process,market place model, revenue generation of Paytm,its marketing strategy,demonitisation and its after effects.
Google uses the Google File System (GFS) to organize and manipulate huge files across its distributed computing system. The GFS breaks files into 64MB chunks that are each stored in 3 copies on different computers. A master server coordinates the system and tracks metadata while chunkservers store and serve the file chunks. The GFS architecture is made up of clients, a master server, and chunkservers and uses chunk handles and replication to improve reliability, availability, and performance at massive scales.
EDI is the electronic transmission of business documents like purchase orders and invoices between companies in a standard format. It streamlines information flow, reducing paperwork and costs. EDI uses layers including physical infrastructure, standards translation, and transport. It is widely used in international trade to facilitate customs clearance, in healthcare for insurance claims processing, and in manufacturing/retail for just-in-time and quick response procurement. Larger companies directly use EDI while smaller companies employ third-party services.
E-BANKING EMERGING ISSUES AND OPPORTUNITIESVinit Varma
Innovation in technology, enlarged completion, globalization and changing environments are the crucial aspects that have forced our Banking services to change. With the diminishing cost of computers and digital gadgets like tables and smart phones along with decreasing charges and easy accessibility of internet and Wifi etc would certainly boosted the awareness of technology which resulted into increasing usage of E-banking day by day. Electronic Banking is a beautiful tool to deliver banking services at customers’ convenient place like office, home etc. E-Banking is not just only help in providing quick and efficient services but it also helps in reducing transaction and delivery costs. It improves profitability providing a platform for cross selling and cost effective product information. But there are some challenges in front E-banking like security threads, lack of awareness and knowledge of end users, peoples’ perceptions, user interface, failure of bank transitions, etc. But apart from any barriers, electronic banking is the future of modern banking and this is the stage where e-banking is helping to delineate the role of a bank branch and taking branches away from that transactional banking to become customer service centres but this transformation is not that much simple and it needs a lot of innovative steps, planning and investment. This paper throws light on emerging issues and opportunities of Electronic Banking. Here, an attempt would be made to highlight some issues in E-Banking and its prospects.
A payment gateway is an ecommerce service that processes credit card and other payments for online businesses. It works by encrypting payment information entered by customers and transferring it between payment portals like websites and banks. The gateway authorization process involves routing the transaction data through the merchant's processor, credit card association, and issuing bank to approve or deny the payment within seconds, though funds may take 1-2 days to be deposited. Payment gateways offer businesses security, simplicity, flexibility and other benefits for accepting electronic payments.
Online Book Store Project Presentation by Moin Khan & Sejda E JannatSejdaEJannat
The main objective of the project is to create an online book store that allows users to search and purchase a book based on title and category. The selected books are displayed in a tabular format and the user can order their books online and payment is done through cash on delivery. The administrator will have additional functionalities when compared to the common user.
The document discusses identifying goals for a company's web presence. It explains that a company's web site needs to achieve certain goals such as attracting visitors, creating a positive image, and encouraging return visits. The document outlines factors to consider for web design like content, structure, aesthetics, and technology. It also discusses how to make a web page look good with consistency, selective graphics, careful color choice, and effective page design. Maintaining an effective web presence involves conveying an integrated company image, offering accessible company facts, and sustaining visitor attention. Metrics for measuring a site include advertising, visitation rates, time spent on pages, and email/call volumes.
This document describes an online book store project created using ASP.NET and SQL Server. It includes an introduction to .NET technologies, objectives to simulate an actual online book store and allow browsing/purchasing of books, requirements including minimum hardware/software specifications, screenshots of the home, contact, and admin login pages, and advantages like cost and time savings. The conclusion restates that the online book store allows customers to search, select, and purchase books online.
The document discusses electronic data interchange (EDI), which allows for the electronic exchange of business documents like purchase orders and invoices between organizations. It provides an overview of EDI standards and infrastructure, how EDI streamlines processes like supply chain management, and benefits organizations through reduced costs and faster transactions. Examples are given of how EDI has been implemented in various industries and applications in India like customs, banking, insurance, and retail procurement. Career opportunities and skills needed for EDI professionals are also outlined.
Online Loan Application & Its Verification SystemSoban Ahmad
In This report we included the Online Loan Application & its verification, Detailed about the Requirements & Explain it with Modelling Including Contextual, UML, Sequence, class, state Machine & Activity Diagram.
This document introduces the key components of a telecommunication billing system, including services, accounts, ratings, invoices, payments, and billing types. It describes how a billing system processes usage records, determines rates, generates invoices, and collects payments. Specifically, it outlines a system where users can order services, those services are linked to accounts, and usage is tracked to produce postpaid or prepaid invoices depending on the billing type.
I way - Network Infrastructure for e-Commercemc aa
Al Gore introduced the concept of the Information Superhighway in 1994 as a global communications network allowing people to share information and connect worldwide. It refers to a physical network of modern, high-speed links connecting everyone at home or work to everything else through broadband connections, functioning similarly to the internet. The network can carry data, voice, video and other services worldwide using technologies like satellite, fiber optics and cellular networks. It requires large investments and alliances between different industries to share costs and acquire expertise.
Electronic payments allow for financial transactions to be conducted online between buyers and sellers. There are various methods of electronic payment including credit cards, electronic cash, e-wallets, and micropayments. Payment gateways act as intermediaries that process transactions between payment networks like Mastercard and Visa and certification authorities. While traditional payment systems had issues with convenience, security, eligibility, and support for small transactions, electronic payment methods address these problems and enable online commerce.
This document summarizes a student's term paper on an object-oriented programming course project involving a railway reservation system developed in C++. The paper includes sections on the proposed system, system development life cycle, source code, testing, data flow diagram, advantages, and hardware/software requirements. Key aspects of the railway reservation system project include using object-oriented programming principles in C++ and following standard phases of the system development life cycle.
The document discusses a manufacturer business model and electronic payment systems presented by a group of students. It defines business models and e-commerce business models. It then covers the key components of a business model including value proposition, revenue model, market opportunity, and competitive advantage. The document also discusses electronic payment systems including e-cash, e-wallets, smart cards, and credit cards. It covers the capabilities of a B2C e-commerce model and the advantages and risks of different electronic payment methods.
M-commerce refers to mobile commerce or the use of mobile devices and wireless networks to conduct commerce transactions. Key activities include entertainment, information access, communication, and financial transactions. The growth of m-commerce is driven by increasing mobile connectivity worldwide and the benefits of ubiquity, reachability, convenience, and personalization for users. However, limitations like small screens, bandwidth constraints, and device capabilities present challenges. Standards like WAP and technologies aim to bridge mobile networks and the internet to support m-commerce applications and services.
The document discusses digital wallets, including what they are, their need and benefits, types and components, architecture, technologies used, features, advantages and disadvantages. A digital wallet refers to an electronic device that allows electronic payments using financial instruments like credit cards without physical cards. It discusses the different types of digital wallets and their components. Digital wallets provide benefits like flexibility, convenience and rewards but also have disadvantages like security and system outage risks.
The document outlines the requirements for a railway reservation system. It includes sections on the overall description, functional requirements, non-functional requirements, and diagrams. The system will allow users to search for trains between destinations, select a train, review details and passengers, pay, and cancel reservations. It aims to automate the reservation process and provide 24/7 availability while meeting security, reliability, and maintainability standards. Diagrams including use case, class, and sequence diagrams will model the system functionality and interactions.
FINTECH DEVELOPMENT AND ITS IMPACT TO THE FINANCIAL SERVICES INDUSTRY IN INDONESIA
The document discusses the development of fintech and its impact on the financial services industry in Indonesia. It defines fintech and describes various fintech business models. It also analyzes why fintech is becoming more dynamic, provides an overview of the fintech landscape in Indonesia, and discusses opportunities and challenges for banks, insurance companies, and fintech companies. The document concludes that fintech encourages financial services companies to be more efficient and innovative while providing solutions to complexity in the industry.
Cyber crimes negatively impact businesses. They include hacking, phishing, and denial of service attacks. The National Bank of Pakistan experienced a major cyber attack where a criminal gang hacked ATMs and withdrew millions of rupees. The bank suspended its ATM service with other banks and is working with law enforcement to investigate the incident. While Pakistan has cyber crime laws, experts note that more awareness and stronger enforcement is still needed.
Lecture 04-components of electronic commerce website-khalid khanKhalid Khan
The document provides an overview of key components needed for a successful e-commerce website. It discusses:
1) The need for e-commerce software, a merchant account, hosting, traffic generation, analytics, security measures, fulfillment systems, and payment options.
2) Components of the website itself including product listings, images, descriptions, navigation, feedback systems, and privacy policies.
3) Additional features that improve sales such as personalization, reviews/ratings, related product recommendations, and order tracking.
4) The importance of planning the website thoroughly before development to avoid costly mistakes.
National Payment System Architecture
This document discusses India's national payment system architecture. It defines payment systems and describes various payment instruments and infrastructure components like transaction, clearing and settlement systems. It explains processes like cheque clearing and electronic funds transfer. The key objectives of the national payment system are establishing safe, secure, sound and efficient systems. Recent initiatives include expanding electronic payment coverage and introducing innovations like real-time gross settlement, cheque truncation and the national financial switch to improve efficiency.
Some company that has
has not yet been able to follow up on the future architecture in the EA. This study aims
to design and make prototypes
application based on TOGAF
the correlation between EA and SOA to
based application using Enterprise Service Bus (ESB
Management (BPM) tools. The research sample is an EA document
finance company in Jakarta. The results of the study show t
EA and SOA can be realized as a prototype of a SOA
executed.
A payment gateway is an ecommerce service that processes credit card and other payments for online businesses. It works by encrypting payment information entered by customers and transferring it between payment portals like websites and banks. The gateway authorization process involves routing the transaction data through the merchant's processor, credit card association, and issuing bank to approve or deny the payment within seconds, though funds may take 1-2 days to be deposited. Payment gateways offer businesses security, simplicity, flexibility and other benefits for accepting electronic payments.
Online Book Store Project Presentation by Moin Khan & Sejda E JannatSejdaEJannat
The main objective of the project is to create an online book store that allows users to search and purchase a book based on title and category. The selected books are displayed in a tabular format and the user can order their books online and payment is done through cash on delivery. The administrator will have additional functionalities when compared to the common user.
The document discusses identifying goals for a company's web presence. It explains that a company's web site needs to achieve certain goals such as attracting visitors, creating a positive image, and encouraging return visits. The document outlines factors to consider for web design like content, structure, aesthetics, and technology. It also discusses how to make a web page look good with consistency, selective graphics, careful color choice, and effective page design. Maintaining an effective web presence involves conveying an integrated company image, offering accessible company facts, and sustaining visitor attention. Metrics for measuring a site include advertising, visitation rates, time spent on pages, and email/call volumes.
This document describes an online book store project created using ASP.NET and SQL Server. It includes an introduction to .NET technologies, objectives to simulate an actual online book store and allow browsing/purchasing of books, requirements including minimum hardware/software specifications, screenshots of the home, contact, and admin login pages, and advantages like cost and time savings. The conclusion restates that the online book store allows customers to search, select, and purchase books online.
The document discusses electronic data interchange (EDI), which allows for the electronic exchange of business documents like purchase orders and invoices between organizations. It provides an overview of EDI standards and infrastructure, how EDI streamlines processes like supply chain management, and benefits organizations through reduced costs and faster transactions. Examples are given of how EDI has been implemented in various industries and applications in India like customs, banking, insurance, and retail procurement. Career opportunities and skills needed for EDI professionals are also outlined.
Online Loan Application & Its Verification SystemSoban Ahmad
In This report we included the Online Loan Application & its verification, Detailed about the Requirements & Explain it with Modelling Including Contextual, UML, Sequence, class, state Machine & Activity Diagram.
This document introduces the key components of a telecommunication billing system, including services, accounts, ratings, invoices, payments, and billing types. It describes how a billing system processes usage records, determines rates, generates invoices, and collects payments. Specifically, it outlines a system where users can order services, those services are linked to accounts, and usage is tracked to produce postpaid or prepaid invoices depending on the billing type.
I way - Network Infrastructure for e-Commercemc aa
Al Gore introduced the concept of the Information Superhighway in 1994 as a global communications network allowing people to share information and connect worldwide. It refers to a physical network of modern, high-speed links connecting everyone at home or work to everything else through broadband connections, functioning similarly to the internet. The network can carry data, voice, video and other services worldwide using technologies like satellite, fiber optics and cellular networks. It requires large investments and alliances between different industries to share costs and acquire expertise.
Electronic payments allow for financial transactions to be conducted online between buyers and sellers. There are various methods of electronic payment including credit cards, electronic cash, e-wallets, and micropayments. Payment gateways act as intermediaries that process transactions between payment networks like Mastercard and Visa and certification authorities. While traditional payment systems had issues with convenience, security, eligibility, and support for small transactions, electronic payment methods address these problems and enable online commerce.
This document summarizes a student's term paper on an object-oriented programming course project involving a railway reservation system developed in C++. The paper includes sections on the proposed system, system development life cycle, source code, testing, data flow diagram, advantages, and hardware/software requirements. Key aspects of the railway reservation system project include using object-oriented programming principles in C++ and following standard phases of the system development life cycle.
The document discusses a manufacturer business model and electronic payment systems presented by a group of students. It defines business models and e-commerce business models. It then covers the key components of a business model including value proposition, revenue model, market opportunity, and competitive advantage. The document also discusses electronic payment systems including e-cash, e-wallets, smart cards, and credit cards. It covers the capabilities of a B2C e-commerce model and the advantages and risks of different electronic payment methods.
M-commerce refers to mobile commerce or the use of mobile devices and wireless networks to conduct commerce transactions. Key activities include entertainment, information access, communication, and financial transactions. The growth of m-commerce is driven by increasing mobile connectivity worldwide and the benefits of ubiquity, reachability, convenience, and personalization for users. However, limitations like small screens, bandwidth constraints, and device capabilities present challenges. Standards like WAP and technologies aim to bridge mobile networks and the internet to support m-commerce applications and services.
The document discusses digital wallets, including what they are, their need and benefits, types and components, architecture, technologies used, features, advantages and disadvantages. A digital wallet refers to an electronic device that allows electronic payments using financial instruments like credit cards without physical cards. It discusses the different types of digital wallets and their components. Digital wallets provide benefits like flexibility, convenience and rewards but also have disadvantages like security and system outage risks.
The document outlines the requirements for a railway reservation system. It includes sections on the overall description, functional requirements, non-functional requirements, and diagrams. The system will allow users to search for trains between destinations, select a train, review details and passengers, pay, and cancel reservations. It aims to automate the reservation process and provide 24/7 availability while meeting security, reliability, and maintainability standards. Diagrams including use case, class, and sequence diagrams will model the system functionality and interactions.
FINTECH DEVELOPMENT AND ITS IMPACT TO THE FINANCIAL SERVICES INDUSTRY IN INDONESIA
The document discusses the development of fintech and its impact on the financial services industry in Indonesia. It defines fintech and describes various fintech business models. It also analyzes why fintech is becoming more dynamic, provides an overview of the fintech landscape in Indonesia, and discusses opportunities and challenges for banks, insurance companies, and fintech companies. The document concludes that fintech encourages financial services companies to be more efficient and innovative while providing solutions to complexity in the industry.
Cyber crimes negatively impact businesses. They include hacking, phishing, and denial of service attacks. The National Bank of Pakistan experienced a major cyber attack where a criminal gang hacked ATMs and withdrew millions of rupees. The bank suspended its ATM service with other banks and is working with law enforcement to investigate the incident. While Pakistan has cyber crime laws, experts note that more awareness and stronger enforcement is still needed.
Lecture 04-components of electronic commerce website-khalid khanKhalid Khan
The document provides an overview of key components needed for a successful e-commerce website. It discusses:
1) The need for e-commerce software, a merchant account, hosting, traffic generation, analytics, security measures, fulfillment systems, and payment options.
2) Components of the website itself including product listings, images, descriptions, navigation, feedback systems, and privacy policies.
3) Additional features that improve sales such as personalization, reviews/ratings, related product recommendations, and order tracking.
4) The importance of planning the website thoroughly before development to avoid costly mistakes.
National Payment System Architecture
This document discusses India's national payment system architecture. It defines payment systems and describes various payment instruments and infrastructure components like transaction, clearing and settlement systems. It explains processes like cheque clearing and electronic funds transfer. The key objectives of the national payment system are establishing safe, secure, sound and efficient systems. Recent initiatives include expanding electronic payment coverage and introducing innovations like real-time gross settlement, cheque truncation and the national financial switch to improve efficiency.
Some company that has
has not yet been able to follow up on the future architecture in the EA. This study aims
to design and make prototypes
application based on TOGAF
the correlation between EA and SOA to
based application using Enterprise Service Bus (ESB
Management (BPM) tools. The research sample is an EA document
finance company in Jakarta. The results of the study show t
EA and SOA can be realized as a prototype of a SOA
executed.
This study examined the alignment between IT planning and business planning in three large Indian software companies. The researcher collected data through questionnaires sent to IT and business managers, as well as reviewing companies' public documents. The findings showed similarities in how the companies plan and implement IT systems to support business processes. Specifically, executive management had overall responsibility for IT planning and implementation, with input from business operations on directions and opportunities. The companies also experienced both positive and negative effects of implementing IT systems. While efficiency improved, some implementations initially required more staff. There was evidence that IT resources supported business objectives, indicating alignment between IT and business plans. However, the study noted more formal planning processes could be developed.
Presenting VALIT Frameworks and Comparing between Them and Other Enterprise A...Eswar Publications
It is necessary for each organization to move towards process-focused that it is supported and presided by information technology (IT). IT is considered as a part of processes field. In the information technology era, especially with the advent of network-based economy, organizations plans must be performed based on an architectural design deserving Information Society. Enterprise Architecture provides a framework to design organization based on Information Technology. Val IT framework is not related to enterprise architecture frameworks, but rather to IT governance. IT governance is indeed a paradigm in which it is attempted to make all activities and enterprise mechanisms for the planning, organizing, implementation and control of IT aligned and
consistent. This study first discusses the introduction of this framework; then, a comparison between this framework and COBIT as well as between enterprise architecture and Val IT will be done.
This document summarizes a research paper on applying a Service-Oriented Enterprise Architecture (SOEA) framework to align business and IT strategies. The SOEA framework aims to seamlessly align business needs with IT capabilities. It consists of four layers: 1) Enterprise Strategic Architecture layer defines the vision, strategy and context; 2) Domain Architecture addresses business capabilities; 3) Solution Architecture identifies services and ensures SOA compliance; 4) Solution Implementation realizes the architectures through service design, deployment and management. The framework provides an integrated, holistic approach to architectural alignment that avoids complexity and adds new technologies incrementally.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
The document describes an Agent-SSSN system that uses a multi-agent approach and ontology to develop a strategic scanning system for business intelligence. The system aims to integrate expert knowledge through cooperative information gathering from the web. It uses various agent roles like information retrieval agents, mediator agents, and notification agents. Ontologies are used to represent shared domain concepts and expert knowledge to enable knowledge sharing between agents. The system is modeled using the O-MaSE methodology, with goals, roles, and capabilities defined for each agent.
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
Technology and Information are vital to the success of companies.
To leverage the successes in IT projects, companies have at their
disposal, references globally accepted as good practices (COBIT,
ITIL, PMBOK, ISO, TOGAF, etc.). In spite of this, it is still great
the magnitude of spending on IT projects poorly designed or
improperly implemented. This paper presents a brief description
of standards and good practices related to governance and
management of enterprise IT, defines the Lean Thinking, Lean IT, the Processes Management, the Portfolio, Program and Project
Management, and the Work System Theory, and highlights the
purpose of them, showing their characteristics and suggests a
Framework of Lean Governance and Management of Enterprise
IT, by demonstrating how the standards and good practices
presented can work together, because it advocates that the Lean
Thinking, the Process, Portfolio, Program, and Project
Management, and the Work System Theory complement the
standards and good practices of Governance and Management of
Enterprise IT with an approach not referenced in these standards
and good practic
CRITICAL SUCCESS FACTORS (CSFS) OF ENTERPRISE RESOURCE PLANNING (ERP) SYSTEM ...cscpconf
This document provides a literature review on critical success factors for implementing enterprise resource planning (ERP) systems in higher education institutions. It begins with definitions of ERP systems and discusses motivations for adopting them and their benefits. It then covers challenges to ERP implementation and defines critical success factors as areas that must go well for successful implementation. The document focuses on ERP implementation in higher education and the unique characteristics of higher education institutions that differentiate them from business organizations.
Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...csandit
Nowadays, Information Technology (IT) plays an impo
rtant role in efficiency and effectiveness of the
organizational performance. As an IT application, E
nterprise Resource Planning (ERP) systems is
considered one of the most important IT application
s because it enables the organizations to connect a
nd
interact with its administrative units in order to
manage data and organize internal procedures. Many
institutions use ERP systems, most notably Higher E
ducation Institutions (HEIs). However, many project
s
fail or exceed scheduling and budget constraints; t
he rate of failure in HEIs sector is higher than in
other
sectors. With HEIs’ recent movement to implement ER
P systems and the lack of research studies examinin
g
successful implementation in HEIs, this paper provi
des a critical literature review with a special foc
us on
Saudi Arabia. Further, it defines Critical Success
Factors (CSFs) contributing to the success of ERP
implementation in HEIs. This paper is part of a lar
ger research effort aiming to provide guidelines an
d
useful findings that help HEIs to manage the challe
nges for ERP systems and define CSFs that will help
practitioners to implement them in the Saudi contex
t.
Unit V Case StudyFor this assignment, you will use the following.docxouldparis
Unit V Case Study
For this assignment, you will use the following case study.
Vandaveer, V. V. (2012). Dyadic team development across cultures: A case study. Consulting Psychology Journal: Practice and Research, 64(4), 279–294. Retrieved from https://libraryresources.columbiasouthern.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=85301202&site=ehost-live&scope=site
Given this scenario, include the following topics:
· Explain how culture can affect perceptions of team members in a group.
· Discuss strategies for working with leaders or team members who originate from a different culture than you.
· Expound on the significance of using the best type of verbiage to communicate with other members of a team in order to prove successful in task completion.
· Share the benefits of connecting with humor to build team camaraderie.
· Explain how personality traits, social factors, and styles of leadership can affect the competence and loyalty of a team member.
· Determine the different career options an employee might consider when having trouble working with a cohort or leader of a department.
Formulate your response to these questions using APA format in a minimum of a two-page paper that includes at least two outside sources. Therefore, two additional sources, in addition to the case study, are required. Please use the CSU Online Library databases to find academic journals as sources.
INFORMATYKA EKONOMICZNA BUSINESS INFORMATICS 3(37) • 2015
ISSN 1507-3858
e-ISSN 2450-0003
Radosław Wójtowicz
Uniwersytet Ekonomiczny we Wrocławiu
e-mail: [email protected]
THE IMPLEMENTATION OF THE ENTERPRISE
CONTENT MANAGEMENT SYSTEMS IN A COMPANY
WDRAŻANIE SYSTEMÓW ZARZĄDZANIA TREŚCIĄ
W PRZEDSIĘBIORSTWIE
DOI: 10.15611/ie.2015.3.08
JEL Classification: M150
Summary: Modern technological possibilities referring to business intelligence and
knowledge management support in an organization comprise mainly software which supports
groupware, software used for workflow management, intranets and corporal portals, tools
for remote learning, data warehouse and Enterprise Content Management systems. The
latter of the mentioned information technologies currently seems to be one of the most
crucial structural foundations of business intelligence and knowledge management systems
which have been developing rapidly over recent years. The main objective of this paper is
to present the author’s general methodology of the implementation of the ECM systems in
the organization resulting from the preliminary literature review and the extensive practical
experience. The first part of the study concentrates on the main definitions. The next and the
most important part presents the details of the proposed methodology.
Keywords: Enterprise Content Management, IT-projects, document management.
Streszczenie: Nowoczesne technologie informatyczne, służące wspieraniu rozwiązań klasy
business intelligence i zarządzania wiedzą, obejmują głównie ...
EA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONSijseajournal
Higher education institutions require a proper standard and model that can be implemented to enhance
alignment between business strategy and existing information technologies. Developing the required model
is a complex task. A combination of the EA, MDA and SOA concepts can be one of the solutions to
overcome the complexity of building a specific information technology architecture for higher education
institutions. EA allows for a comprehensive understanding of the institution’s main business process while
defining the information system that will assist in optimizing the business process. EA essentially focuses on
strategy and integration. MDA relies on models as its main element and places focuses on efficiency and
quality. SOA on the other hand uses services as its principal element and focuses on flexibility and reuse.
This paper seeks to formulate an information technology architecture that can provide clear guidelines on
inputs and outputs for EA development activities within a given higher education institution. This proposed
model specifically emphasises on WIS development in order to ensure that WIS in higher education
institutions has a coherent planning, implementation and control process in place consistent with the
enterprise’s business strategy. The model will then be applied to support WIS development and
implementation at University of Lampung (Unila) as the case study.
This document discusses a study on the use of information technology (IT) resources in three different companies located in Pau dos Ferros, Brazil. The study found that while the small company (Company A) uses basic IT systems and does not utilize all functionality, the larger companies (Companies B and C) fully leverage sophisticated IT systems across their internal structures. Specifically, the companies were found to use different information systems - Company A uses SYSPDV, Company B uses SoftCom, and Company C uses CissPoder. The networks also differed, with Company A using a local area network and Companies B and C employing wide area networks due to their larger size and multiple locations.
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...IRJET Journal
This document proposes designing and implementing a consulting company for management information systems (CCFMIS). It discusses analyzing the system using UML diagrams, including use case, context, and entity relationship diagrams. The CCFMIS would allow customers to request consultations from advisers and administrators to manage users. The system would be built using Microsoft Access and Visual Studio ASP.NET to offer an adaptable architectural model.
This document discusses key information resources including data, application software, technology, information specialists, users, and facilities. It describes the role of the Chief Information Officer (CIO) in managing information resources, their responsibilities, priorities, and required competencies. The document also covers strategic planning for information systems, aligning IS strategy with organizational strategy, and issues around end-user computing.
The organizations can bring beneficial information through data technologies like Y2k, Bubble etc. There are many other benefits of these technologies, like they can help in utilizing and analyzing the information more comfortably and generate accurate financial reports within the organization. With the application of modern technology and automated systems, employees, stakeholders and consumers can be protected, because these systems help in making genuine report design. Organizations can maintain information system such as record keeping system on any Oracle or SQL server program. In order to avoid misuse of the data and analysis recorded in the system, the U.S designed SOX law procedures in July 2002 that needed to be followed.
Critical Success Factors for Implementing an ERP System within University Con...IJMIT JOURNAL
Nowadays, Information Technology (IT) plays an important role in efficiency and effectiveness of the organizational performance. As an IT application, Enterprise Resource Planning (ERP) systems is considered one of the most important IT applications because it enables the organizations to connect and interact with its administrative units in order to manage data and organize internal procedures. Many institutions use ERP systems, most notably Higher Education Institutions (HEIs). However, many projects fail or exceed scheduling and budget constraints; the rate of failure in HEIs sector is higher than in other sectors. With HEIs’ recent movement to implement ERP systems and the lack of research studies examining successful implementation in HEIs, this paper provides a critical literature review with a special focus on Saudi Arabia. Further, it defines Critical Success Factors (CSFs) contributing to the success of ERP implementation in HEIs. This paper is part of a larger research effort aiming to provide guidelines and useful findings that help HEIs to manage the challenges for ERP systems and define CSFs that will help practitioners to implement them in the Saudi context.
CRITICAL SUCCESS FACTORS FOR IMPLEMENTING AN ERP SYSTEM WITHIN UNIVERSITY CON...IJMIT JOURNAL
Nowadays, Information Technology (IT) plays an important role in efficiency and effectiveness of the
organizational performance. As an IT application, Enterprise Resource Planning (ERP) systems is
considered one of the most important IT applications because it enables the organizations to connect and
interact with its administrative units in order to manage data and organize internal procedures. Many
institutions use ERP systems, most notably Higher Education Institutions (HEIs). However, many projects
fail or exceed scheduling and budget constraints; the rate of failure in HEIs sector is higher than in other
sectors. With HEIs’ recent movement to implement ERP systems and the lack of research studies examining
successful implementation in HEIs, this paper provides a critical literature review with a special focus on
Saudi Arabia. Further, it defines Critical Success Factors (CSFs) contributing to the success of ERP
implementation in HEIs. This paper is part of a larger research effort aiming to provide guidelines and
useful findings that help HEIs to manage the challenges for ERP systems and define CSFs that will help
practitioners to implement them in the Saudi context.
The document discusses the key components of the TOGAF (The Open Group Architecture Framework) architecture framework. It outlines the four main architecture components in TOGAF - business, data, application, and technology architecture. It also describes the phase-wise TOGAF Architecture Development Method for designing an enterprise architecture in a collaborative manner while managing requirements.
Development of a Practical ERP Pre – Implementation Assessment Model for Orga...IRJET Journal
This document presents a proposed model for assessing the pre-implementation of an enterprise resource planning (ERP) system in organizations in Tanzania. ERP implementation is complex, costly, and challenging, especially in developing countries. The model aims to help organizations prepare for and increase the chances of success of an ERP implementation. The document provides background on ERP technology, implementation processes, enterprise architecture, strategic planning, and critical success factors. It argues that ERP pre-implementation assessment requires a decision-making approach that considers multiple interrelated factors. A practical pre-implementation assessment model could help Tanzanian organizations better implement ERP systems and realize benefits like improved productivity and competitiveness.
This document provides an overview of information technology (IT) concepts including the functions and types of IT systems used in organizations. It discusses IT infrastructure, support organizations, and how IT can provide functions like decision support, e-learning, web conferencing, wikis, and electronic directories. It also describes enterprise systems for transaction processing, resource planning, and interorganizational information sharing. The document outlines managers' key responsibilities regarding IT, including identifying opportunities, facilitating adoption, and mitigating risks. It discusses factors influencing IT acceptance and provides examples of various IT risks organizations may face.
Similar to DESIGNING IT BLUEPRINT WITH TOGAF FOR INFORMATION TECHNOLOGY DEVELOPMENT (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
2. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 838 editor@iaeme.com
not to use all SAP modules. As a result, the application of information technology is still not
optimal and affects the company's business service activities.
At present the company has its own IT infrastructure to support information system
services. In carrying out its functions, IT infrastructure has experienced service disruption for
741 hours in the period 2017-2018. So that it affects the information system services.
Of the several constraints that exist, the company does not have strategic planning, so it
has an impact on IT services. In order for the purpose of developing the company's
information technology services in line with the company's vision, mission and objectives,
strategic planning is needed.
Enterprise Architecture is one method that can be used as a guide in developing
information technology effectively and efficiently. Enterprise Architecture can be defined as a
blueprint [4], to place optimal resources and concrete targets in the IT environment as the last
support of business functions. This study aims to provide recommendations for designing IT
blueprints using the Enterprise Architecture TOGAF framework for the development of
information technology that can be applied in XYZ companies.
2. LITERATURE REVIEW
2.1. Information Systems Definition
An information system can be an organized combination consisting of users, hardware,
software, communication networks, data sources and procedure policies that store, retrieve,
change, and disseminate information within an organization. Humans rely on information
systems to communicate with each other using various physical devices, hardware,
instructions and procedures for processing information software, network communication
channels or data sources [5].
An information system collects, processes, stores, analyzes and disseminates information
for specific purposes [6].
Information systems are interrelated components and work together to collect, process,
store and disseminate information to support decision making, coordination, control, analysis,
and visualization in an organization [3].
An information system is collecting, processing, storing, analyzing, and disseminating
information for certain purposes [10].
Information system is a system that brings together four critical components to collect,
process, manage, analyze, and distribute information; the four components are human,
technology, process and data [12].
2.2. Information Technology Definition
The collection of computing systems used by organizations is called information technology.
Information technology in its narrow definition refers to the technological side of an
information system. Often the term information technology is used interchangeably with
information systems. In his book the term information technology in the broad sense to
describe a collection of organizational information systems, users, and management who
oversee them. For the most part, the term information technology and information systems are
considered the same thing [11].
Information technology is a general term that describes any technology that helps produce,
manipulate, store, communicate, and disseminate information [13].
3. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 839 editor@iaeme.com
2.3. Information Technology Infrastructure Definition
Understanding information technology infrastructure is a shared technology resource that
provides a platform for enterprise-specific information system applications. IT infrastructure
includes investments in hardware, software, and services such as consulting, education and
training [3].
Some characteristics of information technology infrastructure [7], As follows:
1. Physically connected with and as the foundation of the structure above.
2. More permanent and static than the structure it supports.
3. Broader than the structure above in use.
4. Is a support service.
5. Apart from the structure that it supports in terms of the life cycle.
2.4. Enterprise Architecture Definition
Enterprise is a collection of organizations that have a series of general objectives. For
example, government agencies, divisions within a company, a single department or a chain of
organizations that are geographically separated and linked together for joint ownership. The
term company in the context of architecture is used to show the entire company, which
includes all information services, technology, infrastructure and certain domains within the
company [9].
The definition of architecture is the fundamental organization of a system, which is
embodied in its components, their relationships with each other and the environment and the
principles that govern the design and evolution of it [1].
Description of Enterprise Architecture is all coherent principles, methods and models used
in the design and realization of corporate organizational structures, business processes,
information systems, and infrastructure. Enterprise architecture captures the essence of
business, IT, and its evolution. The idea is that important things are far more stable than
specific solutions found for the problem at hand. Therefore, architecture helps in maintaining
the essence of business, while still allowing maximum flexibility and adaptivity according to
[2].
2.5. Framework Definition
A framework is a structure for content or processes that can be used as a tool for structuring
thoughts, ensuring consistency and completeness [2].
The selection of the right framework can facilitate the implementation of information
technology architectures in organizations [8]. Many frameworks have the same main purpose,
namely collaborating the strengths between:
1. Aspects of a business plan: goals, vision, strategies and principles of governance.
2. Operational aspects of the business: business terms, organizational structure,
processes and data.
3. Aspects of automation: information systems and databases.
4. Aspects of business determinants of technological infrastructure such as
computers, operating systems, and networks.
The Open Group Architecture Framework (TOGAF) is a detailed method framework and
supporting tools for developing enterprise architecture. TOGAF can be used freely by any
organization that wants to develop company architecture.
4. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 840 editor@iaeme.com
In TOGAF there are methods used to design an architecture called the Architecture
Development Method (ADM). ADM can be used as a guide for modeling enterprise
architecture development. ADM contains the stages of activity divided in phases that have
been tested in architectural development. The activities contained in ADM include: the
creation of an architectural framework, building the contents and components of the
architecture, the process of migration from the current system and architectural governance to
be built.
3. RESEARCH METHODOLOGY
The research method is a case study that provides reviews of enterprise architecture design
activities based on company problems. The research phase, starting from determining the
problem, literature study and data collection. Then the IT blueprint design is carried out using
the TOGAF ADM framework. The results of the IT blueprint design, in the form of a
blueprint for the development of information technology. Figure 1 is the phase of the research
method.
Research Methodology
TOGAF Architecture Development Method
Architecture
Vision
Business
Architecture
Information
Systems
Architecture
Technology
Architecture
Opportunities and
Solutions
Architecture
Change
Management
Implementation
Governance
Migration
Planning
Preliminary
Phase
Preliminary
Start
Formulation of
the problem
Study of literature
Data collection
Designing IT
blueprint
Designing
recommendations
Conclusions
Primary Data
End
Secondary Data
Scope
Principles of Architecture
Profile, Mission, Vision, Goals
Value Chain Analysis
Organizational Constraints
Concept of Solution
Baseline Arcitecture Business
Target Architecture Business
Baseline Arcitecture Data
Target Architecture Data
Baseline Arcitecture Application
Target Architecture Application
Baseline Arcitecture Technology
Target Architecture Technology
Gap Analysis
Figure 1 Research Methodology
In TOGAF ADM, there are 9 continuous phases, as follows: Preliminary, Architecture
Vision, Business Architecture, Information System Architecture, Technology Architecture,
Opportunities and Solutions, Migration Planning, Implementation Governance, and
Architecture Change Management. In this research, the phase of Migration Planning,
Implementation Governance and Architecture Change Management was not carried out.
Because of the time limits of research and company management policies.
4. RESULTS AND DISCUSSION
4.1. Preliminary
This phase defines enterprise architecture to determine the framework and methodology,
scope and principles of architecture.
5. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 841 editor@iaeme.com
4.1.1. Determination of the Framework and Methodology
The framework used for designing this enterprise architecture is TOGAF with the
Architecture Development Method (ADM) design methodology. In designing enterprise
architecture, TOGAF ADM consists of 4 domains, as follows:
1. Business Architecture
2. Data Architecture
3. Application Architecture
4. Technology Architecture
4.1.2. Enterprise Scope
Enterprise architecture design refers to the main business activities and supporting activities,
including:
1. Estate Management activities are the main operational activities in the oil palm
plantation industry.
2. Mill Management activities are the main activities in processing fresh fruit
bunches (FFB) production into CPO and PK. The output of this activity is CPO
and PK products.
3. Marketing and Sales Management activities are marketing activities and sales of
CPO and PK products.
4. Supporting activities, including activities in order to support key business
processes. The activities are supporting activities, namely:
a. Human Resources Management is a human resource management activity, the
activities of these activities are: organizational management, administration
personnel, time management and payroll management.
b. Finance Management is a corporate financial administration management activity
including general ledgers, accounts payable, accounts receivable, bank accounting
and asset accounting.
c. Procurement Management is an administrative support activity for the
procurement and purchase of goods or services needed by my government
interests.
4.1.3. Principles of Architecture
Architectural principles are principles derived from the TOGAF framework. These principles
are based on advice from management, so that the principles are relevant to the needs of the
company. The architectural principles are as follows:
a. Principles of Business Architecture
b. Business Continuity
c. Compliance with Law
d. Principles of Business Architecture
e. Data is an Asset
f. Data is Shared
g. Data Security
h. Principles of Business Architecture
i. Ease-of-Use
j. Technology Independence
6. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 842 editor@iaeme.com
k. Principles of Business Architecture
l. Interoperability
m. Avaibaility
n. Re-Use of existing infrastructure
4.2. Architecture Vision
This phase is an architectural development that includes constraints and expectations of
achieving architectural vision and validating a context and agreed work architecture
statement.
4.2.1. Company Profile
XYZ company is a company engaged in oil palm plantations, including planting, maintaining,
harvesting and producing FFB, processing FFB into CPO and PK, trading CPO and PK.
Location of plantations in Jambi, East Kalimantan and Central Kalimantan provinces.
1. Vision: Building the Best Plantation for the World.
2. Mission: Developing Eco-friendly Plantations that Are Able to Improve the Life
Level of Many People.
3. Motto: Passion to Achieve the Best.
4.2.2. Goals
1. Deliver Optimal Value for Stakeholders.
2. Optimizing Productivity.
3. Be a Preferred Supplier.
4. The implementation of Best-Agriculture and Mill Practices.
5. Sustainable Growth.
6. Optimizing Mill Productivity.
7. Long-Term Sustainable Environment and Community.
8. Improve Operation Relentlessly.
4.2.3. Organizational Constraints and Concept of Solution
After the company's business activities are known, the next stage is an analysis of the
problems that exist. This problem analysis needs to be done so that the factors that can hinder
the company's success in achieving the vision and mission are identified.
Table 1 Organizational Constraints and Concept of Solution
Business
Activity
Constraints Pattern Solution
Human Resource Management
Recruitment
Management
The process of recruiting prospective
employees is still done manually,
allowing human error and requiring a
long time in the employee selection
process.
Automation of prospective
employee recruitment processes.
Automation of the profile
processing of prospective
employees.
Availability of a multifunctional
employee recruitment system.
7. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 843 editor@iaeme.com
Business
Activity
Constraints Pattern Solution
Travel
Management
The travel management administration
process is done manually by filling in
the submission form to the HR
department and asking for approval from
each supervisor and returning the form
of official travel to HR so that it takes a
long time and allows human error.
Automation of employee travel
management processes.
Automation of employee travel
management financing
processes.
Availability of a multifunctional
employee travel management
system.
Training and
Event
Management
The administrative process of employee
training and development submissions is
still done manually by filling out the
training application form from the HR
department and requesting the approval
of their respective supervisors, so that it
takes a long time.
Automation of employee
training and event management
processes.
Automation of employee
training and event management
financing processes.
Availability of a multifunctional
employee training management
system.
Procurement Management
Purchase
Requisition
of Goods and
Services
Approval of the procurement of goods
and services in the SAP system is a
maximum of eight user levels due to
SAP user licenses, while the company's
needs average more than eight user
approvals, so that control of goods
purchases does not meet the company's
control standards.
Making a system for the
procurement of goods and
services and integrated with the
SAP system.
Adding user approval and
controlling as needed.
Estate Management
Mature
Plantation
The administrative process of recording
palm oil yields (FFB) is recorded using
paper, then the data is inputted into the
SAP system, this can cause human error,
and requires a long time.Recording of
harvest data in the field still uses paper
which is at risk of losing data and
damaged if exposed to water and rain.
Making a supporting application
system in the administrative
process of recording the harvest
and integrated with The SAP
system.
Automation of the process of
recording FFB yields.
Estate
Control
The process of administering field
inspections is still done manually by the
field assistant, the results are then
reported to the estate manager and
evaluation. Because it is recorded
manually, it allows human error and data
loss.
Making a supporting application
system in the field inspection
process.
Automation of the field
inspection process.
Mill Managament
Grading
Process
The process of receiving FFB harvests is
carried out manually by looking at the
scales indicator, then the data is input
into the excel template and uploaded
into the SAP system which can cause
human error, error recording and takes a
long time.
Making a supporting application
system in the FFB reception
process at the Mill and
integrated with the SAP system.
Automation of the FFB
weighing process at the Mill.
8. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 844 editor@iaeme.com
4.3. Business Architecture
This phase is developing business processes in an architecture to support vision architecture.
This phase is described as a business process that involves a description of the architecture
and identifies the needs of the organization to build an architecture roadmap based on current
conditions and expected architectural targets.
4.3.1. Baseline Business Architecture
Baseline Business Architecture is the business process that is used now. Consisting of several
business processes that are interconnected with each other. The current process of business
architecture is shown in Figure 2.
Baseline Business Architecture
REQUEST TO RECEIVE (RTR)
Grading Process
CPO and PK
Production
CPO and PK
Production
Administration
Finish Good
Management
Co Product
Management
Product
Expenditure
Nursery Planting
Insfrastructure Workshop
Immature
Plantation
Mature
Plantation
Land
Acquisition
Purchase Requisition
of Goods and
Services
Vendor Selection
Inventory
Movement
SALES AND MARKETING MANAGEMENT
Pre-Sales Management of
CPO and PK
Sales Order
Management
Shipping Management Billing Management
CUSTOMER
Work Plan
ORDER TO SUPPLY
MILL MANAGEMENT
SUPPLIER
PROCUREMENT MANAGEMENT
Purchase Order Goods Receipt Invoice Receipt
ESTATE MANAGEMENT
Accounts Payable
Asset Accounting
SUPPLIER INVOICE TO PAYMENT (STP)
General LedgerBank Accounting
Accounts Receivable
Fixed Asset
Management
Organizational
Management
Payroll
Management
Time
Management
Personnel
Administration
Cash Opname
Dropping
Bank
Reconciliation
Acknowledgment of Account
Receipt
Receipt
Recognition of
Account Payment
Payment
Closing
Add COA
Journal Voucher
CUSTOMER INVOICE TO RECEIPT
HUMAN RESOURCE MANAGEMENT
Maintenance
FINANCE MANAGEMENT
Estate Design
Figure 2 Baseline Business Architecture
Baseline Business Architecture, divided into 6 business processes, each of which is
interconnected and has business subprocesses, the explanation of which is as follows:
1. Estate Management is a business process that is in charge of oil palm plantation
development activities, part of its business subprocess: estate design, land
acquisition, nursery, planting, immature plantation, mature plantation,
maintenance, work plan, infrastructure and workshop. The result of this activity is
the fresh fruit bunch (FFB).
2. Mill Management is a business process that is responsible for FFB processing
activities into CPO and PK, part of its business subprocess: grading process, crude
palm oil and palm kernel production, crude palm oil and palm kernel production
administration, finish good management, co-product management, co-
administration of product management and product expenditure. The output of this
activity is CPO and PK products.
3. Marketing and Sales Management is a business process that is responsible for the
process of marketing and selling CPO and PK, part of its business subprocess: pre-
sales management of CPO and PK, sales order management, shipping management
and billing management.
9. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 845 editor@iaeme.com
4. Procurement Management is a business process carried out by stakeholders in
realizing procurement, whether goods or services, equipment and machinery or
buildings / construction as well as repairs or maintenance of assets owned, part of
the subprocess of their business: purchase requisition, vendor selection, purchase
order, goods receipt, invoice receipt, and inventory movement.
5. Finance Management is a business process that is responsible for financial
administration between investors, suppliers, customers and internal companies,
part of its business subprocess: general ledgers, accounts payable, accounts
receivable, bank accounting and asset accounting.
6. Human Resource Management is a business process that is responsible for
employee administrative management and human resource development, part of its
business subprocess: organizational management, administration personnel, time
management and payroll management.
4.3.2. Target Business Architecture
Target Business Architecture is to identify the business processes needed to support business
processes based on business principles, business objectives, business architecture
requirements and organizational constraints. Figure 3 is the target of business architecture. As
a result of the identification of business process needs, there are 4 new business processes and
3 business processes that are partially / replace. For an explanation of the target business
architecture can be seen in Table 2.
Target Business Architecture
Legend
REQUEST TO RECEIVE (RTR)
Grading Process
CPO and PK
Production
CPO and PK
Production
Administration
Finish Good
Management
Co Product
Management
Product
Expenditure
Nursery Planting
Insfrastructure Workshop
Immature
Plantation
Mature
Plantation
Land
Acquisition
Purchase Requisition
of Goods and
Services
Vendor Selection
Inventory
Movement
SALES AND MARKETING MANAGEMENT
Pre-Sales Management of
CPO and PK
Sales Order
Management
Shipping Management Billing Management
CUSTOMER
Work Plan
ORDER TO SUPPLY
MILL MANAGEMENT
SUPPLIER
PROCUREMENT MANAGEMENT
Purchase Order Goods Receipt Invoice Receipt
ESTATE MANAGEMENT
Accounts Payable
Asset Accounting
SUPPLIER INVOICE TO PAYMENT (STP)
General LedgerBank Accounting
Accounts Receivable
Fixed Asset
Management
Organizational
Management
Payroll
Management
Time
Management
Personnel
Administration
Cash Opname
Dropping
Bank
Reconciliation
Acknowledgment of Account
Receipt
Receipt
Recognition of
Account Payment
Payment
Closing
Add COA
Journal Voucher
CUSTOMER INVOICE TO RECEIPT
HUMAN RESOURCE MANAGEMENT
Maintenance
FINANCE MANAGEMENT
Estate Design
Training and
Event
Management
Travel
Management
Recruitment
Management
Estate
Control
Partially ReplaceNew Still
Figure 3. Target Business Architecture
Table 2 List of Target Business Architecture
Business
Process
Description
Status
Human Resource Management
Recruitment
Management
This business process provides functionality to
support the process of recruiting prospective
employees.
New
Travel This business process provides functionality to New
10. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 846 editor@iaeme.com
Management support the employee travel management
administration process.
Training and
Event
Management
This business process provides functionality to
support the administrative activity process for
employee training and development submissions.
New
Procurement Management
Purchase
Request
This business process provides functionality to
support the process of procurement of goods and
services.
Partially / replace from
the Subprocess Purchase
Requisition of Goods and
Services.
Estate Management
Harvesting
Management
This business process provides functionality to
support the administrative process activities for
recording palm oil yields.
Partially / replace from
Subprocess Mature
Plantation.
Estate Control
Management
This business process provides functionality to
support the field inspection administrative process
activities.
New
Mill Managament
Weighbridge
Management
This business process provides functionality to
support FFB harvest receipts.
Partially / replace from
the Subprocess Grading
Process
4.4. Data Architecture
This phase first analyzes the data architecture to identify and define various types of data that
will support the application.
4.4.1. Baseline Data Architecture
To find out Baseline Data Architecture, it is necessary to identify data requirements for
business activities. The following data architecture is currently in accordance with baseline
business architecture. Figure 4 baseline data architecture. The explanation for baseline data
architecture in Table 3.
Baseline Data Architecture
FINANCE MANAGEMENT
ESTATE MANAGEMENT
Estate Design
Data
MARKETING AND SALES MANAGEMENT
PROCUREMENT MANAGEMENT
MILL MANAGEMENT
Grading Data
CPO and PK
Production Data
CPO and PK
Production
Administration Data
Finish Good
Management
Data
Co Product
Management
Data
Product
Expenditure Data
Nursery Data Planting Data
Insfrastructure Data Workshop Data
Immature
Plantation
Data
Mature
Plantation
Data
Land
Acquisition
Data
Purchase Requisition
Data
Vendor Selection
Data
Inventory
Movement Data
Pre-Sales Data Sales Order Data Shipping Data Billing Data
Work Plan Data
Purchase Order
Data
Goods Receipt
Data
Invoice Receipt
Data
Accounts Payable Data
Asset
Accounting
Data
General
Ledger Data
Bank
Accounting
Data
HUMAN RESOURCE MANAGEMENT
Accounts Receivable Data
Organizational
Data
Payroll Data
Time
Management
Data
Personnel Data
Maintenance
Data
Figure 4 Baseline Data Architecture
11. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 847 editor@iaeme.com
Table 3 List of Baseline Business Architecture
Business
Function
Business Service Data Entity
Human Resource
Management
Organizational Management Master Organization Data
Personnel Administration Employee Data
Time Management Attendance Data
Payroll Management Payroll Data
Finance
Management
General Ledger General Ledger Data
Accounts Payable Payment Document
Accounts Receivable Receivement Document
Bank Accounting Bank Accounting Data
Asset Accounting Asset Document
Procurement
Management
Procurement of goods and
services
Procurement of goods and services Data
Delivery of goods Delivery of goods Document
Receiving Goods and
Services
Receiving Goods and Services Data
Inventory Movement Inventory Data
Estate
Management
Estate Design Estate Design Data
Land Acquisition Land Acquisition Data
Nursery Nursery Data
Planting Planting Data
Immature Plantation Immature Plantation Data
Mature Plantation Mature Plantation Data
Maintenance Maintenance Data
Work Plan Work Plan Data
Infrastructure Infrastructure Data
Workshop Workshop Data
Mill Management
Grading Process FFB Sorting Data
CPO and PK Production Production CPO and PK Data
CPO and PK Production
Administration
CPO and PK Production Administration
Data
Finish Good Management Finish Good Management Document
Co Product Management Co Product Management Data
Co Administration of
Product Management
Co Administration of Product Management
Data
Product Expenditure Expenditure Data
Marketing and
Sales
Management
Pre-Sales Management of
CPO and PK
Pre-Sales Management of CPO and PK
Data
Sales Order Management Sales Order Management Data
Shipping Management Shipping Data
12. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 848 editor@iaeme.com
Billing Management Billing Management Data
4.4.2. Target Data Architecture
This phase is done by identifying the data architecture needed to support the proposed
business process, based on organizational constraints and the concept of the solution in the
previous sub-chapter. The results of identification of data architecture needs as shown in
Figure 5. There are 4 new data architectures and 3 data architectures partially / replace.
Explanation of the target data architecture above can be seen in Table 4.
Target Data Architecture
FINANCE MANAGEMENT
ESTATE MANAGEMENT
Estate Design
Data
MARKETING AND SALES MANAGEMENT
PROCUREMENT MANAGEMENT
MILL MANAGEMENT
Grading Data
CPO and PK
Production Data
CPO and PK
Production
Administration Data
Finish Good
Management
Data
Co Product
Management
Data
Product
Expenditure Data
Nursery Data Planting Data
Insfrastructure Data Workshop Data
Immature
Plantation
Data
Mature
Plantation
Data
Land
Acquisition
Data
Purchase Requisition
Data
Vendor Selection
Data
Inventory
Movement Data
Pre-Sales Data Sales Order Data Shipping Data Billing Data
Work Plan Data
Purchase Order
Data
Goods Receipt
Data
Invoice Receipt
Data Accounts Payable Data
Asset
Accounting
Data
General
Ledger Data
Bank
Accounting
Data
HUMAN RESOURCE MANAGEMENT
Accounts Receivable Data
Organizational
Data
Payroll Data
Time
Management
Data
Personnel Data
Maintenance
Data
Training and
Event
Management
Data
Travel
Management
Data
Recruitment Data
Estate
Control Data
Legend Partially ReplaceNew Current
Figure 5 Target Data Architecture
Table 4 List of Target Data Architecture
Business
Function
Business Service Data Entity Status
Human
Resource
Management
Recruitment
Management
Recruitment
Management Data
New Data
Travel
Management
Travel Management
Data
New Data
Training and Event
Management
Training and Event
Management Data
New Data
Procurement
Management
Purchase Request
Management
Purchase Request Data
Partially / replace from the
Subprocess Purchase
Requisition of Goods and
Services Data.
Estate
Management
Harvesting
Management
Harvesting
Management Data
Partially / replace from
Subprocess Mature
Plantation Data.
Estate Control
Management
Estate Control
Management Data
New Data
Mill
Managament
Weighbridge
Management
Weighbridge
Management Data
Partially / replace from the
Subprocess Grading Process
Data.
4.5. Application Architecture
13. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 849 editor@iaeme.com
In this phase includes the preparation of the company's current application architecture, and
target application architecture according to the company's business needs.
4.5.1. Baseline Application Architecture
To find out what applications have been used, it is necessary to do an inventory of documents
and interviews with company management. An explanation baseline application architecture
explained in Table 5. This list helps determine the scope of changes that can affect certain
types of applications.
Baseline Application Architecture
SUB APLIKASI UTAMA
APLIKASI UTAMA
ERP SYSTEM
SAP
Checkroll Module
SAP
Financial Controlling
Module
SAP
Material Management
Module
SAP
Estate Management
Module
SAP
Production Process
Module
SAP
Sales and Distribution
Module
Attendance
Management System
Budgeting and
Planning System
Tax Invoice System
APLIKASI PENDUKUNG
Document
Management System
Web Portal Helpdesk Ticketing
System
Geographic
Information System
Push Report System Business Intelligence
E-mail System
Figure 6 Baseline Application Architecture
Table 5 List of Baseline Appliction Architecture
No Application Logical Component Physical Component
1 SAP - Checkroll Module
Human Resource
Management
ERP System - Human Resource
2
SAP - Finance Controlling
Module
Finance Controlling
Management
ERP System - Finance
Controlling
3
SAP - Material
Management Module
Procurement Management
ERP System - Procurement
Management
4
SAP - Estate Management
Module
Estate Management
ERP System - Estate
Management
5
SAP - Production Process
Module
Mill Management ERP System - Mill Management
6
SAP - Sales and
Distribution Module
Marketing and Sales
Management
ERP System - Marketing and
Sales Management
7
Document Management
System
Document Management Document Management System
8 Tax Invoice System Tax Invoice tool Tax Invoice System
14. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 850 editor@iaeme.com
No Application Logical Component Physical Component
9 Web Portal Company Information Company Information System
10
Helpdesk Ticketing
System
Helpdesk Ticketing
Management
Helpdesk Ticketing System
11
Attendance Management
System
Attendance Management
tool
Attendance Management System
12
Budgeting and Planning
System
Budgeting and Planning
Management
Budgeting and Planning System
13
Geographic Information
System
Geographic Information
Management
Geographic Information System
14 Push Report System Push Report Management Push Report System
15
Business Intelligence
System
Business Intelligence
Management
Business Intelligence System
16 E-mail System
Electronic Mail
Mangement
E-mail System
4.5.2. Target Application Architecture
This phase is done by identifying the applications needed to support business processes with
architectural vision guidelines. Based on company problems and solution concepts discussed
in the previous sub-chapter, figure 7 is the target of application architecture, there are 7 new
applications, consisting of 4 new applications and 3 applications that are partially replaced by
removing submodules from the SAP system. Table 6 is a list of target applications including
descriptions and functions.
Target Application Architecture
SUB APLIKASI UTAMA
APLIKASI UTAMA
ERP SYSTEM
SAP
Checkroll Module
SAP
Financial Controlling
Module
SAP
Material Management
Module
SAP
Estate Management
Module
SAP
Production Process
Module
SAP
Sales and Distribution
Module
Attendance
Management System
Budgeting and
Planning System
Tax Invoice System
APLIKASI PENDUKUNG
Document
Management System
Web Portal Helpdesk Ticketing
System
Geographic
Information System
Push Report System Business Intelligence
E-mail System
Recruitment
Management System
Harvesting
Management System
Purchase Request
System
Travel
Management System
Weighbridge System
Estate Control
System
Training
Managamenet System
Legend Partially ReplaceNew Current
Figure 7 Target Application Architecture
15. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 851 editor@iaeme.com
Table 6 List of Target Application Architecture
Application Description Application Platform Status
Human Resource Management
Recruitment
Management
System
This application provides functionality to
support prospective employee recruitment
activities.
Web
Application
New Application
Travel
Management
System
This application provides functionality to
support employee travel management
administration activities.
Web
Application
New Application
Training and
Event
Management
System
This application provides functionality to
support administrative activities for
employee training and development
submissions.
Web
Application
New Application
Procurement Management
Purchase
Request System
This application provides functionality to
support the procurement of goods and
services.
Web
Application
Partially / replace
from the
Submodule
Purchase
Requisition of
Goods and
Services.
Estate Management
Harvesting
Management
System
This application provides functionality to
support the administrative process activities
of recording palm oil yields.
Mobile
Application
Partially / replace
from Submodule
Mature Plantation.
Estate Control
System
This application provides functionality to
support the field inspection administrative
process activities.
Mobile
Application
New Application
Mill Managament
Weighbridge
System
This application provides functionality to
support the activity of receiving FFB
harvests.
Desktop
Application
Partially / replace
from the
Submodule
Grading Process.
4.6. Technology Architecture
Technology architecture addresses the needs of technology including network services,
security services, infrastructure, data services, application services, and support services.
4.6.1. Baseline Technology Architecture
Based on data collection conducted through analysis of company documents and interviews
with the IT Infrastructure Manager. Explanation of current technology architecture:
16. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 852 editor@iaeme.com
The data center used by the company is its own data center with a Tier 1 classification.
The location is inside the company's office which is managed independently and does not
have a disasater recovery center (DRC).
Server hardware used by virtual machine devices.
Storage used is a type of Storage Area Network (SAN), currently storage capacity for
prosuction database backups is not proportional to the capacity of database production.
Network hardware used is in table 7. In the table the number of core switches as main
switches is only 1 unit and for firewall devices also 1 unit, so there is no backup device.
Network topology that is used to connect between the head office and the site. The topology
used only has 1 unit of firewall device that connects the server Demilitarized Zone (DMZ)
area. Whereas the Farm Server area does not use firewall devices.The data network service
used has 2 types of connections between head office and site, namely satellite and terrestrial
connections.
Based on current technology security identification analysis, including:
1. There is no control access for access to infrastructure and information systems.
2. There is no management control access related to network users. and monitoring
log.
3. There is only one layer of firewall that limits access to data servers and application
servers from the internet or outside networks.
4. There is no system for preventing intrusion to maintain data confidentiality.
Table 7 List of Network Device
No
Device
Type
Product Type Operating System Qty Description
1 Router Mikrotik RB1100AH RouterOS 1 Router Vendor 1
2 Router Mikrotik RB1200 RouterOS 1 Router Vendor 2
3 Router Cisco 2800 Cisco IOS 1 Wan Router 1
4 Router Cisco 2911 Cisco IOS 1 Internet Router
5 Router MikroBits Dinara RouterOS 1 Wan Router 2
6 Router SOPHOS SG-450 Sophos Firewall OS 1 Firewall
7 Switch Cisco Catalyst 2960X Cisco Catalyst OS 1 Switch Gis
8 Router Cisco 2800 Cisco IOS 1 Router Vendor 3
9 Switch Cisco Catalyst 3750X Cisco Catalyst OS 1 Core Switch
10 Switch Cisco Catalyst 3560G Cisco Catalyst OS 1 Server Farm
11 Switch Cisco Catalyst 2960 Cisco Catalyst OS 1 Server Farm
12 Switch Cisco Catalyst 2960S Cisco Catalyst OS 1 Server DMZ
13 Switch HP 2510G Switch Procurve OS 1 Router Vendor 4
14 Switch Cisco Catalyst 2960 Cisco Catalyst OS 1 Switch AP
4.6.2. Target Technology Architecture
This stage is done by identifying the technological architecture needed to support the
application architecture. The following is an explanation of the target technology architecture.
The data center used by the company is a data center with Tier 1 classification, meaning
that IT equipment is served by one distribution channel (non-redundat), or one uplink per one
server. Thus, the availability of data center technology services is likely to experience a lot of
downtime. For this reason, it is necessary to increase the classification to Tier 2 by adding
17. Maulana Ibrohim, and Abba Suganda Girsang
http://www.iaeme.com/IJMET/index.asp 853 editor@iaeme.com
redundant components by adding backup resources equipped with generators in preparation
for a power outage. The current data center does not yet have a disaster recovery center
(DRC), so if the datacenter function occurs, the call is not redundant, so it is necessary to
procure the DRC.
With the addition of applications, also requires appropriate resources to use, so that the
server performance is maintained. For this reason, it is necessary to procure new server
devices for the backup server to maintain service availability.
Data storage media every day diminishes, for that additional storage is needed based on
the needs needed. Currently the storage capacity for backup database production is only 8
terabytes while the database production capacity is 10 terabytes, so it is not proportional to the
amount of data to be backed up.
The condition of the network hardware used by the company today, there is still Single
Point of Failure, meaning that it still has a dependency on a function, if the function fails then
the entire system does not work. In table 7network hardware, the core switch device as the
main switch is only 1 unit and for the firewall device is also 1 unit, so there is no backup
device. For this reason, a redundant or a backup device is needed in preparation for the core
switch and firewall functions to occur.
The network topology used only has 1 unit of firewall device that connects the server
Demilitarized Zone (DMZ) area. While the Server Farm area does not use firewall devices, so
it does not have layered security. This allows an attack and disrupts the performance of Server
Farm as the company's operational application server services. The internet site service
facility is currently being distributed from the Jakarta head office, thus disrupting application
service lines, thereby reducing the speed of business application usage performance. For this
reason, it is necessary to separate the internet data path and application data path.
The data network service used by the company has 2 types of connections between head
office and site, namely satellite and terrestrial connections. Differences in satellite
connections and teriserial data transfer rates. The use of satellite connections data
transmission speeds is slower than terrestrial. For this reason, a connection standard is needed
so that data transmission stability is guaranteed by using a terrestrial network connection.
Based on current technological security analysis.Services used to support administration
of access rights related to information and monitoring in the form of:Identity management,
authorization, authentication, and access control management, control logging and log
management, auditing ability, Control monitoring and event management, Data encryption /
decryption control and key management controls, physical access, intrusion detection, and
surveillance controls.
5. CONCLUSION
This study focuses on enterprise architecture recommendations as a blueprint for the
development of XYZ company information technology, which consists of business asset
model recommendations, information system architecture and technology architecture.
The recommended business architecture model is a subprocess that was previously done
manually can be done in a system, so that it can reduce the manual workload and support the
business needs of the XYZ company optimally.
The recommended information system architecture model is modular application
development, so that the main SAP system applications are still used. Business functions that
are not yet available on the SAP system can be developed with integrated support
applications, or by developing new partially replace submodules from SAP submodules, so as
to reduce the cost of user licenses in SAP without reducing existing business functions.
18. Designing It Blueprint with Togaf For Information Technology Development
http://www.iaeme.com/IJMET/index.asp 854 editor@iaeme.com
The recommended technology architecture model is that the use of technology is still
being used, but it is necessary to add and update the quality of technology to optimize the
company's information technology services.
Designing IT blueprint using TOGAF ADM can be used as a reference to provide
integrated business, data, information and technology recommendations to optimize the
development of information technology.
REFERENCES
[1] Jen, L., & Lee, Y. (2000). Working Group. IEEE recommended practice for architectural
description of software-intensive systems. In IEEE Architecture. Citeseer.
[2] Lankhorst, M. (2009). Enterprise architecture at work (Vol. 352). Springer.
[3] Laudon, K. C., & Laudon, J. P. (2018). Management information systems: managing the
digital firm. Pearson.
[4] Minoli, D. (2008). Enterprise architecture A to Z: frameworks, business process modeling,
SOA, and infrastructure technology. Auerbach Publications.
[5] O’brien, J. A., & Marakas, G. M. (2005). Introduction to information systems (Vol. 13).
New York City, USA: McGraw-Hill/Irwin.
[6] Rainer, R. K., Cegielski, C. G., Splettstoesser-Hogeterp, I., & Sanchez-Rodriguez, C.
(2013). Introduction to information systems. John Wiley & Sons.
[7] Robertson, B., & Sribar, V. (2002). The adaptive enterprise: IT infrastructure strategies to
manage change and enable growth. Addison-Wesley Longman Publishing Co., Inc.
[8] Schekkerman, J. (2004). How to survive in the jungle of Enterprise Architecture
Frameworks. Framework. Trafford Publishing.
[9] TO Group. (2011). TOGAF Version 9.1. The Open Group Architecture Framework, The
Open Group.
[10] Turban, E. (2007). Information technology for management: Transforming organizations
in the digital economy. John Wiley & Sons, Inc.
[11] Turban, E., & Volonino, L. (2011). Information Technology for Management: Improving
Strategic and Operational Performance, Eight Edition. John Wiley & Sons, Inc.
[12] Wallace, P. M. (2015). Introduction to information systems. Pearson Boston, MA.
[13] Williams, B. K., & Sawyer, S. C. (2007). Using information technology: A practical
introduction to computers & communications.