{"title":"Dynamic Semi-Group Model for Reliability Engineering Optimizing the Risk on RTOS","authors":"P. Patra, P. Pradhan","doi":"10.4018/ijsita.2014070104","DOIUrl":"https://doi.org/10.4018/ijsita.2014070104","url":null,"abstract":"The reliability engineering is the high utilization of system Product i.e. Processor, Memory, File, Sh, K & Encryption key Services, Business and Resources at minimal cost. The Real Time Operating System providing highest services at optimal cost and time. The reliability engineering provides the maximum performance, accountability, reliability, scalability, integrity and availability of processor, memory, file, Sh, Kernel and other inter dependency sub-components. The reliability engineering is the ratio of the maximum functionality of individual components to the minimal cost. RE = k P, M, F, K/minimal cost. Where k is the proportionality constant. The RE is inversely proportional to the risk. The RE maximizes the throughput & decision process of business and system as well optimize the risk and down time. We have to develop the reliability engineering model & mechanism for risk optimization over a complex real time operating system for multiple business & technology. This proposed model integrate and mapping the SE, RE, SC with Product, Business & Resources in around the globe. Meanwhile Business, Engineering & Technology keep balance with product, services, operation & services as per CE. This semi-group model definitely resole our objective at high level of satisfaction. When reliability is increases with the fault tolerance increases and mean while the risk will be optimized as per business and resource requirement.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A BPR Approach for e-Governance in Public Transportation","authors":"A. Bharti, S. Dwivedi","doi":"10.4018/ijsita.2014040105","DOIUrl":"https://doi.org/10.4018/ijsita.2014040105","url":null,"abstract":"Information is one of the important entities to affect the decision making, therefore effective and efficient management of information in bureaucratic, strategic planning and decision making will affect the governance process. e-Governance is a panacea for all the problems in government or public sector, public transportation is not the exception too. The public transportation sector has to manage the information, resources, people and process in an effective and efficient manner using information and communication technology to provide effective and efficient services to their commuters. In this paper we discusses about the need of BPR in public transportation, their steps for implementation followed by recommendations and its expected benefits. The paper also elaborates our analytical and foresight based strategic model for e-Governance in the public transportation sector in India. Based on the case study and the issues in the public transportation a set of recommendations for service delivery in the public transportation sector. Following these recommendations sector will be able to deliver integrated and quality services to their citizens of India using National e-Governance Plan (NeGP) service delivery model.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131390599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors","authors":"Clemith J. Houston, D. Sicker","doi":"10.4018/ijsita.2014040104","DOIUrl":"https://doi.org/10.4018/ijsita.2014040104","url":null,"abstract":"This paper provides a literature review and survey of maturity and process capability models, Critical Infrastructure Protection (CIP) tools and frameworks to identify strategies for assessing and measuring resilience and risk management capabilities, with a specific focus on the electricity generating sector. The focus is on the use of models such as CERT-RMM, and others, as a means of addressing challenges associated with cyber security and risk management. Foundational concepts, terminology and definitions are provided; examples of maturity and process capability models are presented and discussed, tools that enable process capability and resilience are identified, including those specific to the electricity generating sector. The evolution of models and how they have addressed challenges is presented, in addition to the characteristics and differences of models and the growth in domains where they can be used. The benefits of the application of process capability and maturity models in maintaining and enhancing resilience and cyber security protection is supported in this paper and recommendations for research opportunities that may yield further insight and measurement capabilities are offered.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated RFOS Model for Risk Assessment on Real Time Operating System","authors":"P. Patra, P. Pradhan","doi":"10.4018/ijsita.2014040103","DOIUrl":"https://doi.org/10.4018/ijsita.2014040103","url":null,"abstract":"The preventive control is the one of the best and well advanced control in all aspects of day to day life. The prevention afforded to an automated system control system in order to attain the highest applicable objectives of preserving the confidentiality, integrity and high availability of information system resources (including hardware, system software, firmware, processor, memory and data).The risk assessment is the process of identifying vulnerabilities and threats to operating system resources to achieving highest business objectives and deciding what counter measures to take in reducing the lowest level of risk. The proposed RFOS model and mechanism provides accountability for individuals who are accessing sensitive information on application, system software, server and network. This accountability is accomplished through access control mechanisms that require Confidentiality, Integrity, Authentication, Access control, Non repudiation, Availability and Privacy through operating system audit function. We have to develop the dynamic RFOS model for risk optimization process on operating system. This paper contributes to the development of an optimization mechanism that aims to determine the optimal cost to be invested into security model and mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory, File System, Kernel). Furthermore, this algebraic model and mechanism optimize the cost, time and resources is supposed to optimize the system risks. The control is inversely proportional to the risk and control is directly proportional to the standard. In this research paper, we are proposing integrated, hierarchical and dynamic way of Relation, Function, Operation and Services Model for optimizing the risk on the real time operating system. Preventive Control is inversely proportional to the Risk and directly proportional to the Quality.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133537305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Telecommunications Entrepreneurial Orientation (TELEO): An Empirical Study Measuring the Significance of Entrepreneurial Orientation on Business Performance of Small-to-Medium Enterprises (SME) in the Telecommunications Industry","authors":"NaShawn Branch, Michael H. McGivern","doi":"10.4018/ijsita.2014040102","DOIUrl":"https://doi.org/10.4018/ijsita.2014040102","url":null,"abstract":"The purpose of this research was to study the significance of entrepreneurial orientation (EO) on business performance of small to medium enterprises (SME) in the telecommunications industry. This study utilized the EO scales with a web-based survey to question executives in the telecommunications industry. The test results with the variables pro-activeness and risk-taking did not show significance. No levels of innovativeness were significant for evaluating business performance. The results demonstrate evidence that testing for pro-activeness and risk taking may be an indicator for testing for entrepreneurial success for small to medium businesses in the telecommunications industry. The key findings suggest trends for utilizing EO scales for testing entrepreneurial ventures in the telecommunications industry. This research proves beneficial to industry practitioners, board members, and venture capitalists seeking tools for evaluating the success of telecommunications companies.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structural Epochs in Software","authors":"Patrick A. Gray, B. Sandén, P. Laplante","doi":"10.4018/ijsita.2014040101","DOIUrl":"https://doi.org/10.4018/ijsita.2014040101","url":null,"abstract":"A way to measure the complexity of object-oriented software involves topological features of the code's hierarchical organization at the method, class, package, and component levels. Sangwan et al (2008) suggested that as certain software products evolve, this complexity shifts from lower to higher structural levels, or vice-versa. They studied three widely used open source software programs and showed that these structural shifts called “epochs†were present and suspected that this phenomenon was pervasive. To support or refute this assertion, 30 open source programs were studied and structural shifts in complexity were found significantly in 27 of them. In those projects where no complexity shift was evident, no refactoring had occurred. These findings further suggest that in large, open source software projects, when refactoring occurs a shifting in complexity from one level to another will occur.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117070299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TIPA Process Assessments: A Means to Improve Business Value of IT Services","authors":"Stéphane Cortina, Alain Renault, M. Picard","doi":"10.4018/ijsita.2013100101","DOIUrl":"https://doi.org/10.4018/ijsita.2013100101","url":null,"abstract":"The goal of this paper is to present how the Tudor's IT Process Assessment TIPA® framework can be used to assess and improve the maturity of IT Service Management ITSM processes, and how its usage can increase the business value of IT services. This paper starts with a presentation of the current and of the future process assessment standards. Then, it explains how the authors of this paper have applied the ISO/IEC 15504 standard to the field of IT Service Management to create the TIPA framework. The paper also presents how assessing and improving the maturity of ITSM processes can, under certain conditions, impact the quality of the services provided by an IT organization and consequently the value these IT services bring to the business. Finally, the paper finishes by depicting the current situation as well as the future of the TIPA framework.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Behavioral Biases in Mixed Human-Proxy Online Auction Markets","authors":"R. Vragov","doi":"10.4018/ijsita.2013100104","DOIUrl":"https://doi.org/10.4018/ijsita.2013100104","url":null,"abstract":"Currently many auction websites directly or indirectly provide support for the use of automated proxies or agents. Buyers can use proxies to monitor auctions and bid at the appropriate time and with the appropriate bid price, sellers can use proxies to set prices or negotiate deals. Proxy complexity varies, however most proxies first require some input on the part of the human trader and then perform the trading task autonomously. This paper proposes and tests a theoretical model of human behavior that can be used to detect behavioral biases in electronic market environments populated by humans and software agents. The paper also quantifies the effect of these biases on individual and business profits.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125687976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Relationship between Emotional Intelligence of a Leader and Employee Motivation to Job Performance","authors":"V. Acha, Kathleen M. Hargiss, Caroline Howard","doi":"10.4018/ijsita.2013100105","DOIUrl":"https://doi.org/10.4018/ijsita.2013100105","url":null,"abstract":"This quantitative study investigated the bond between a leader's emotional intelligence to employee motivation. The research was conducted at a federal government agency resided north bound of the United States of America. Participants consisted of 350 full time employees from various units of the organization. The leader's emotional intelligence was tested with Emotional Social Competence Inventory ESCI tool, whereas employees' motivation was verified with the Four Drive 4-D instrument. The study depicted a link between a leader's emotions and employee interest to excel. Emotional aptitude scored high, which indicates that the leader's emotion affected employees' behavior. Employees likely to stay with the organization displayed strong organizational awareness with high sense of belonging. The different groups observed, revealed results with both positive and negative significant correlations p <.05. The final outcome depicted that a leader's emotional intelligence influenced employees' motivation to excel. As the sample size was large some of the results were generalized.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative Effort Reduction in B2B Schema Integration via a Canonical Data Model","authors":"M. Dietrich, J. Lemcke, Gunther Stuhec","doi":"10.4018/ijsita.2013100102","DOIUrl":"https://doi.org/10.4018/ijsita.2013100102","url":null,"abstract":"Nowadays, B2B integration still remains a big cost driver for companies. On the one hand, standardization efforts were able to reduce the mapping effort between e-Business schemas. However, the effort for creating customized messages from the huge and underspecified standard templates increased. Due to the myriad of different requirements by different companies, a great variety of standards coexist. Instead of forcing companies to adopt huge standards, this article propagates an iteratively improving schema and mapping derivation system in the cloud. Thus, we provide flexibility, but streamline companies' integration efforts based on an evolving canonical data model. This approach reduces the need for explicit standardization to a minimum. Our simulation based on real schemas shows a potential to reduce guide creation effort by 50% and mapping effort from 6% to almost 100%.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131061167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}