...Viewing Business-Process Security from Different Perspectives Author(s): Gaby Herrmann and Günther Pernul Source: International Journal of Electronic Commerce, Vol. 3, No. 3, Developing the Business Components of the Digital Economy (Spring, 1999), pp. 89-103 Published by: M.E. Sharpe, Inc. Stable URL: http://www.jstor.org/stable/27750897 . Accessed: 31/01/2015 04:15 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . Viewing Business-Process Security fromDifferent Perspectives Gaby Herrmann and G?nther Pernul are crucial success factors inelectronic commerce. ABSTRACT: Security and integrity a framework that includes the securityand integrity This paper offers requirementsof business processes in businessprocess execution. An themodeling and refinement securityand integrity of requirements. High-level security of requirements business processes are viewed fromfivedifferent perspectives. The tasks involved in the different perspectives are described, and the modeling of security re quirements isoutlined by focusingon the example of the legal binding of contracts. KEYWORDS binding, important part of the framework is AND PHRASES: Business process, business-process reengineering, legal semantics. security of markets in recent years, many enterprises Because of the globalization have located their offices and production sites all...
Words: 6003 - Pages: 25
...PRENTICE HALL MA NAGEMENT INFORMATION SYSTEMS TITLES MIS: Brown/DeHayes/Hoffer /Martin/Perkins, Managing Information Technology 6/e © 2009 JessuplValacich, Information Systems Today 31e © 2008 Kr oenke, Using MIS 21e © 2009 Kr oenke, Experiencing MIS © 2008 Laudon/Laudon, Management Information Systems 10le © 2007 Laudon/Laudon, Essentials of Management Information Systems 81e © 2009 Luftman et aI., Managing the IT Resource © 2004 Malaga, Information Systems Technology © 2005 McKeen/Smith, IT Strategy in Action © 2009 McLeod/Schell, Management Information Systems 10le © 2007 McNurlin/Spr ague, Information Systems Management In Practice 7Ie © 2006 Miller, MIS Cases: Decision Making with Application Software 41e © 2009 Senn, Information Technology 31e © 2004 Database Management: BordoloilBock, Oracle SOL © 2004 Bordoloi/Bock, SOL for SOL Server © 2004 Fr ost/DaylVanSlyke, Database Design and Development: A Visual Approach © 2006 Hoffer/Prescott/Topi, Modern Database Management 91e © 2009 Kroenke/Auer, Database Concepts 31e © 2007 Kroenke, Database Processing 10Ie © 2006 Perry/Post, Introduction to Oracle10g, © 2007 Per ry/Post, Introduction to SOL Server 2005 © 2007 Systems Analysis and Design: Hoffer /GeorgelValacich, Modern Systems Analysis qnd Design 5'/e © 2008 Kendall/Kendall, Systems Analysis and Design 7Ie © 2008 Valacich/George/Hoffer, Essentials of Systems Analysis and Design 31e © 2006 Object-Oriented Systems Analysis and Design: ...
Words: 39287 - Pages: 158
...87 .,~. Peer Tutoring and the "Conversation of Mankind" by Kenneth A. Bruffee The beginnings of peer tutoring lie in practice, not in theory. A decade or so ago, faculty and administrators in a few institutions around the country became aware that, increasingly, students entering college had difficulty doing as well in academic studies as their abilities suggested they should be able to do. Some of these students were in many ways poorly prepared academically. Many more of them, however, had on paper excellent secondary preparation. The common denominator among the poorly prepared and the apparently well prepared seemed to be that, for cultural reasons we may not yet fully under stand, all these students had difficulty adapting to the traditional or "normal" conventions of the college classroom. One symptom of the difficulty was that many of these students refuSed .help when it was offered. Mainly, colleges offered ancillary programs staffed by professionals. Students avoided them in droves. Many solutions to this problem were suggested and tried, from mandated programs to sink-or-swim. One idea that seemed at the time among the most exotic and unlikely (that is, in the jargon of the Sixties, among the most "radical") turned out to work rather well. Some of us had guessed that students were refusing the help we were providing because it seemed to them merely an extension of the work, the expectations, and above all the social structure of traditional classroom learning. And...
Words: 5727 - Pages: 23
...Projet de Fin d’Etudes Pour l’Obtention du Diplôme Master en Ingénierie Informatique et Internet Intitulé : Gestion et centralisation des logs avec leurs corrélations Présenté par : BENZIDANE KARIM Le, 06/07/2010 Encadrants : Moussaid Khaild , Faculté des Sciences, Casablanca Zoubir Sami , Crédit du Maroc, Casablanca Ouali Youness, Crédit du Maroc, Casablanca Membres du Jury : Mr Abghour, Faculté des Sciences, Casablanca Mr Bouzidi, Faculté des Sciences, Casablanca Mme Fetjah, Faculté des Sciences, Casablanca Année Universitaire 2009 / 2010 1 Remerciements J’adresse mon remercîment à Mr. Zoubir sami pour sa disponibilité et écoute ainsi de m’avoir accepté dans son département et m’avoir permis le choix du sujet. Je remercie également Mr. Youness OUALI pour ses valeureux conseils ainsi que son encadrement au cours de ce stage allant de la démarche du travail jusqu’au technique de déploiement. Je remercie également Mr Abderahim SEKKAKI pour nous avoir donnée l’opportunité d’acquérir ces connaissances, ainsi que tous les enseignants que j’ai eu au long de ces 2 années du Master. Un grand merci à mon encadrant Mr Moussaid pour son aide et conseil pour que ce stage soit réalisé et finalisé. Je tiens aussi à remercier toute l’équipe du plateau ou j’étais à CDM, pour leur aide afin de me fournir les informations nécessaires pour le bon déroulement du projet . Mes remerciements aux membres des jurys qui m’ont honoré en acceptant de juger ce travail. 2 Table des matieres Liste...
Words: 19106 - Pages: 77
...Abstract Economic globalisation and internationalisation of operations are essential factors in integration of suppliers, partners and customers within and across national borders, the objective being to achieve integrated supply chains. In this effort, implementation of information technologies and systems such as enterprise resource planning (ERP) facilitate the desired level of integration. There are cases of successful and unsuccessful implementations. The principal reason for failure is often associated with poor management of the implementation process. This paper examines key dimensions of implementation of ERP system within a large manufacturing organisation and identifies core issues to confront in successful implementation of enterprise information system. A brief overview of the application of ERP system is also presented and in particular, ERP software package known as SAP R/3, which was the ERP software package selected by Rolls-Royce plc. The paper takes an in-depth look at the issues behind the process of ERP implementation via acasestudy methodology. It focuses on business and technical as well as cultural issues at the heart of the Rolls-Royce implementation. The casestudy also looks at the implementation time scales and assesses the benefits from the project both tangible and intangible. Keywords * ERP; * Information systems; * Implementation; * Success factors; * Rolls-Royce Enterprise information systems project implementation:...
Words: 9387 - Pages: 38
...MODERN DATABASE MANAGEMENT / JfFFREY A. HOFFER . Warehousing Success 426 Data Warehouse Architectures 428 Generic Two-Level Architecture 428 Independent Data Mart Data Warehousing Environment 426 429 C O NTENTS Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach Logical Data Mart and Real-Time Data Warehouse Architecture 432 Three-Layer Data Architecture 435 Role of the Enterprise Data Model 435 Role of Metadata 436 Some Characteristics of Data Warehouse Data Status Versus Event Data 437 Transient Versus Periodic Data 438 An Example of Transient and Periodic Data 438 Transient Data 438 Periodic Data 439 Other Data VVarehouse Changes 440 The Reconciled Data Layer 441 Characteristics of Data after ETL 441 The ETL Process 442 Extract 442 Cleanse 444 Load and Index 446 Data Transformation 447 Data Transformation Functions 448 Record-Level Functions 448 Field-Level Functions 449 More Complex Transformations 451 Tools to Support Data Reconciliation 451 Data Quality Tools 451 Data Conversion Tools 452 Data Cleansing Tools 452 Selecting Tools 452 The Derived Data Layer 452 Characteristics of Derived Data 452 The Star Schema 453 Fact Tables and Dimension Tables 453 Example Star Schema 454 Surrogate Key 455 Grain of Fact Table 456 Duration of the Database 456 Size of the Fact Table 457 Modeling Date and Time 458 Variations of the Star Schema 458 Multiple Fact Tables 458 Factless Fact Tables...
Words: 80097 - Pages: 321
...Technology Ventures From Idea to Enterprise is p r bite ohi d. se The pre na limi ry p s age are p are rep d fo r s ent tud s of D ho r. T ma Any s. yer sB oth e e r us se The pre na limi ry p s age are p are rep d fo r s ent tud s of D ho r. T ma Any s. yer sB oth e e r us is p r bite ohi d. Technology Ventures From Idea to Enterprise d. Thomas H. Byers Stanford University se The pre na limi ry p s age are p a Richard C. Dorf . Thom f Dr University of California, Davis so t den stu r d fo Andrew J. Nelson are rep University of Oregon Any s. yer sB oth e e r us is p r bite ohi TECHNOLOGY VENTURES: FROM IDEA TO ENTERPRISE, THIRD EDITION Published by McGraw-Hill, a business unit of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY 10020. Copyright @ 2001 by The McGraw-Hill Companies, Inc. All rights reserved. Previous editions © 2008 and 2005. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Some ancillaries, including electronic and print components, may not be available to customers outside the...
Words: 60653 - Pages: 243
...B2B Brand Management Philip Kotler ´ Waldemar Pfoertsch B2B Brand Management With the Cooperation of Ines Michi With 76 Figures and 7 Tables 12 Philip Kotler S. C. Johnson & Son Distinguished Professor of International Marketing Kellogg School of Business Northwestern University 2001 Sheridan Rd. Evanston, IL 60208, USA p-kotler@kellogg.northwestern.edu Waldemar Pfoertsch Professor International Business Pforzheim University Tiefenbronnerstrasse 65 75175 Pforzheim, Germany waldemar.pfoertsch@pforzheim-university.de ISBN-10 3-540-25360-2 Springer Berlin Heidelberg New York ISBN-13 978-3-540-25360-0 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2006930595 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered...
Words: 104254 - Pages: 418
...July 25, 1999 Chapter 2: Normative Accounting Theory The purpose of this chapter is to identify those characteristics of accounting information that are thought to make one system of accounting better than another. Since the material is based on eighty years of accounting research, by countless researchers, it is clearly neither possible nor desirable to review all the arguments, or even the main arguments, used by advocates of all the different competing accounting systems. For instance, it would be difficult to improve on Henderson and Peirson's [1983] 268-page thorough, balanced, well-documented portrayal of the evolutionary development of accounting thought from the "pre-theory period" (1494-1800), through the "general scientific theory period" (1800-1955), and the "general normative theory period" (1956-1970), to the "scientific theory period" (post-1970). The approach adopted for this chapter is therefore to aim for a concise summary of the products of normative accounting theory. The objective is to search for common ground wherever possible, without ignoring important differences. What is reported is intended to cover most of what is said to be "good", "useful", or "desirable" about accounting information. The four-step structure of this chapter is depicted in Figure 2.1 (next page). To begin with, a search of the literature identifies three main Objectives of Accounting. This list of objectives, which is presented and discussed in Section 2.1, is intended...
Words: 12883 - Pages: 52
...DATABASE MODELING AND DESIGN The Morgan Kaufmann Series in Data Management Systems (Selected Titles) Joe Celko’s Data, Measurements and Standards in SQL Joe Celko Information Modeling and Relational Databases, 2nd Edition Terry Halpin, Tony Morgan Joe Celko’s Thinking in Sets Joe Celko Business Metadata Bill Inmon, Bonnie O’Neil, Lowell Fryman Unleashing Web 2.0 Gottfried Vossen, Stephan Hagemann Enterprise Knowledge Management David Loshin Business Process Change, 2nd Edition Paul Harmon IT Manager’s Handbook, 2nd Edition Bill Holtsnider & Brian Jaffe Joe Celko’s Puzzles and Answers, 2 Joe Celko nd Location-Based Services ` Jochen Schiller and Agnes Voisard Managing Time in Relational Databases: How to Design, Update and Query Temporal Data Tom Johnston and Randall Weis Database Modeling with MicrosoftW Visio for Enterprise Architects Terry Halpin, Ken Evans, Patrick Hallock, Bill Maclean Designing Data-Intensive Web Applications Stephano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, Maristella Matera Mining the Web: Discovering Knowledge from Hypertext Data Soumen Chakrabarti Advanced SQL: 1999—Understanding Object-Relational and Other Advanced Features Jim Melton Database Tuning: Principles, Experiments, and Troubleshooting Techniques Dennis Shasha, Philippe Bonnet SQL: 1999—Understanding Relational Language Components Jim Melton, Alan R. Simon Information Visualization in Data Mining and Knowledge Discovery Edited by Usama Fayyad, Georges G. Grinstein...
Words: 89336 - Pages: 358
...file:///C|/Documents%20and%20Settings/Administrator/Deskto...0BILL%20-%20BUSINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT BUSINESS AT THE SPEED OF THOUGHT by bill Gates ALSO By BILL GATES The Road Ahead BUSINESS AT THE SPEED OF THOUGHT: USING A DIGITAL NERVOUS SYSTEM BILL GATES WITH COLLINs HEMINGWAY 0 VMNER BOOKS A Time Warner Company To my wife, Melinda, and my daughter, Jennifer Many of the product names referred to herein are trademarks or registered trademarks of their respective owners. Copyright (D 1999 by William H. Gates, III All rights reserved. Warner Books, Inc, 1271 Avenue of the Americas, New York, NY 10020 Visit our Web site at www.warnerbooks.com 0 A Time Warner Company Printed in the United States of America First Printing: March 1999 10 9 8 7 6 5 4 3 2 1 ISBN: 0-446-52568-5 LC: 99-60040 Text design by Stanley S. Drate lFolio Graphics Co Inc Except as file:///C|/Documents%20and%20Settings/Admini...SINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT (1 of 392)12/28/2005 5:28:51 PM file:///C|/Documents%20and%20Settings/Administrator/Deskto...0BILL%20-%20BUSINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT indicated, artwork is by Gary Carter, Mary Feil-jacobs, Kevin Feldhausen, Michael Moore, and Steve Winard. ACKNOWLEDGMENTS I first want to thank my collaborator, Collins Hemingway, for his help in synthesizing and developing the material in this book and for his overall management of this project. I want to thank four CEOs who read a late draft of the manuscript and...
Words: 146627 - Pages: 587
...those tragic occurrences. “The lecture this evening ...” From the minutes of the Geographical Society meeting of November 194-, London I The Villa SHE STANDS UP in the garden where she has been working and looks into the distance. She has sensed a shift in the weather. There is another gust of wind, a buckle of noise in the air, and the tall cypresses sway. She turns and moves uphill towards the house, climbing over a low wall, feeling the first drops of rain on her bare arms. She crosses the loggia and quickly enters the house. In the kitchen she doesn’t pause but goes through it and climbs the stairs which are in darkness and then continues along the long hall, at the end of which is a wedge of light from an open door. She turns into the room which is another garden—this one made up of trees and bowers painted over its walls and ceiling. The man lies on the bed, his body exposed to the breeze, and he turns his head slowly towards her as she enters. Every four days she washes his black body, beginning at the destroyed feet. She wets a washcloth and holding it above his ankles squeezes the water onto him, looking up as he murmurs, seeing his smile. Above the shins the burns are worst. Beyond purple. Bone. She has nursed him for months and she knows the body well, the penis sleeping like a sea horse, the thin tight hips. Hipbones of Christ, she thinks. He is her despairing saint. He lies flat on his back, no pillow, looking up...
Words: 83532 - Pages: 335
...THE PDMA HANDBOOK OF NEW PRODUCT DEVELOPMENT T HIRD E DITION Kenneth B. Kahn, Editor Associate Editors: Sally Evans Kay Rebecca J. Slotegraaf Steve Uban JOHN WILEY & SONS, INC. Cover image: © Les Cunliffe/iStockphoto Cover design: Elizabeth Brooks This book is printed on acid-free paper. Copyright © 2013 by John Wiley & Sons, Inc. All rights reserved Published by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 7486008, or online at www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with the respect to the accuracy or completeness of the contents of...
Words: 165678 - Pages: 663
...YAPS Pet Store sous NetBeans par Saïd Eloudrhiri Date de publication : 08/12/2008 Dernière mise à jour : 18/06/2009 Cet article va présenter le portage de l'application "Yaps Pet Store", présentée par Antonio Goncalves dans son livre "Java EE 5", sous NetBeans. YAPS Pet Store sous NetBeans par Saïd Eloudrhiri I - Introduction..............................................................................................................................................................5 II - Conventions............................................................................................................................................................7 II-A - Langue...........................................................................................................................................................7 II-B - Mots clés....................................................................................................................................................... 7 II-C - Répertoires....................................................................................................................................................7 II-D - Commandes.................................................................................................................................................. 7 II-E - Messages..............................................................................................................................................
Words: 29021 - Pages: 117
...ANNUAL REPORT 2010-2011 Department of Telecommunications Ministry of Communications & Information Technology Government of India New Delhi ANNUAL REPORT 2010-11 DEPARTMENT OF TELECOMMUNICATIONS MINISTRY OF COMMUNICATIONS & IT GOVERNMENT OF INDIA NEW DELHI CONTENTS I. II. III. Indian Telecom Sector: An Overview ...................................................................................1-14 Telecom Commission.................................................................................................................... 15 Department of Telecommunications .....................................................................................17-29 III. 1. III. 2. III. 3. III. 4. III. 5. III. 6. III. 7. III. 8. III. 9. IV. V. VI. VII. Wireless Planning and Coordination ..................................................................30-39 Telecom Engineering Centre .................................................................................40-42 Universal Service Obligation Fund .....................................................................43-47 Controller of Communication Accounts Offices ...............................................48-50 Vigiliance Activities .................................................................................................51-52 Telecom Network Security ....................................................................................53-56 Empowerment of Women .............................................
Words: 50069 - Pages: 201