Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Business

Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar Mar 2020

Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar

Electronic Theses, Projects, and Dissertations

Having a solid enterprise architecture foundation is critical to the success and growth of a business. Considering the volatility of many industries, businesses must consistently grow, innovate, and advance their technology to ensure high availability of their products and systems. Seeing that projects fail more than they succeed, it stresses the importance of having a strong enterprise architecture (Schneider, 2020). With this said, it is imperative that a business creates a proper collaborative environment to ensure that all future implementations and developments within their environments are successful. Without these foundations, an enterprise will fail to grow.

This project provides an …


Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre Jan 2010

Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre

Journal of International Technology and Information Management

Enterprise systems need reliable, flexible and secure means for making public and confidential information available to users in a secured and trusted manner. Although enterprise systems have variety of choice to authenticate these users, organizations face significant issues when granting access and providing a manageable structure for valuable access control. Logon functionalities such as user name and password algorithm have been used to grant authentication and authorization into enterprise systems network resources. Since most systems clients prefer the ease of using passwords, and since passwords are easily compromised, the urgency for a stronger authentication process becomes paramount. This study performed …


Enterprise Modelling Using Unified Framework Supporting Distributed Object Computing, Manuj Darbari, Bhaskar Karn Jan 2008

Enterprise Modelling Using Unified Framework Supporting Distributed Object Computing, Manuj Darbari, Bhaskar Karn

Journal of International Technology and Information Management

This paper provides a support for the analysis phase in the life cycle of the enterprise distributed computing systems. The major goal of our work is to provide a small but powerful set of enterprise modeling concepts. We will be extending the concept of Enterprise Modeling using EDOC inter-agent system using OPEN Framework.


Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo Jan 2007

Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo

Journal of International Technology and Information Management

Modern organizations adopt Enterprise Resource Planning systems (ERP) to integrate their organizational data resources into unified systems. Researchers tend to concentrate on ERP implementation issues with only a handful studying ERP system effectiveness or success in adopting organizations. In fact, none has studied how key organizational actors prioritize or rank relevant measures or items related to the effectiveness of such systems. This study is designed to fill this gap in research as it aims at investigating how two organizational stakeholder groups, i.e. information technology (IT) professionals and business managers prioritize relevant measures related to ERP systems effectiveness. Using surveys in …


Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka Jan 2006

Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka

Journal of International Technology and Information Management

The Internet has created unprecedented opportunities for both organizations and individuals. However, these opportunities also have created a double-edge sword as organizations attempt to connect trading partners, customers, and remote users while providing adequate security measures that are flexible and cost-effective. This paper explores why secured socket layer (SSL) may be better tool for secured remote access and extranets by comparing it to internet protocol security virtual private networks (IPSec-based VPNs).


Organizational Learning Stages Of Assimilation, Integration And Optimization And Their Relationship With User Satisfaction Of Enterprise Resource Planning Systems, Edith Galy, Jane Lemaster Jan 2006

Organizational Learning Stages Of Assimilation, Integration And Optimization And Their Relationship With User Satisfaction Of Enterprise Resource Planning Systems, Edith Galy, Jane Lemaster

Journal of International Technology and Information Management

Literature on organizational learning suggests that various processes have to occur in order for an organization to learn. This study provides empirical evidence for measuring organizational learning in three stages: assimilation, integration and optimization. A path model of organizational learning was tested establishing the significance and magnitude of the total effect of assimilation, integration and optimization on the satisfaction level of top information executives in firms with Enterprise Resource Planning systems. The model indicates that the optimization-satisfaction path is the strongest, followed by the integration-satisfaction path. Measuring and improving the factors composing organizational learning is essential for successful implementation of …


A Methodology For Evaluating Data And Output Misfits In Commercial Off-The-Shelf Erp Systems, Jen-Her Wu, Chang-Tseh Hsieh, Shin-Shing Shin, Chi-Cheng Wu Jan 2005

A Methodology For Evaluating Data And Output Misfits In Commercial Off-The-Shelf Erp Systems, Jen-Her Wu, Chang-Tseh Hsieh, Shin-Shing Shin, Chi-Cheng Wu

Journal of International Technology and Information Management

This paper presents a methodology based on the task-technology fit theory to identify data and output misfits in the ex-ante evaluation of an off-the shelf enterprise resources planning (ERP) package. The proposed methodology consists of two stages: output misfit analysis and data misfit analysis. The purpose of the first stage is to identify corresponding field (output misfits) and data glossary for data misfit analysis. The latter stage identifies data misfits for every corresponding activity in the business process sequence. The proposed methodology provides a systematic approach to alleviate the difficulty and complexity in identifying data and output misfits. The identification …


Task-Technology Fit In Data Warehousing Environments: Analyzing The Factors That Affect Utilization, Richard V. Mccarthy, George F. Claffey Jan 2005

Task-Technology Fit In Data Warehousing Environments: Analyzing The Factors That Affect Utilization, Richard V. Mccarthy, George F. Claffey

Journal of International Technology and Information Management

Enterprise data warehouses are an expensive investment in both time and resources. The promise of data warehouses is improved decision-making through user empowerment and enablement of sophisticated decision support tools. Have organizations been able to achieve this goal? Task- technology fit defines a model that suggests that for a technology to be utilized, it must meet the needs of a user and provide features that support the fit of the requirements of the task; performance impacts will result. When an organization commits the time and resources necessary to develop an enterprise data warehouse, their expectation will be a high task-technology …