首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到15条相似文献,搜索用时 187 毫秒
1.
基于Web Services的高技术虚拟企业信息集成   总被引:13,自引:0,他引:13  
本文在详细分析Web Services集成应用系统异构问题的基础上,根据高技术企业的特点,运用Web Services技术构建了高技术虚拟企业信息集成模型,论述了引入Web Services技术后高技术虚拟企业的构建过程并设计了一个适合高技术虚拟企业信息集成的网络体系框架,从而为高技术虚拟企业信息平台的建立奠定基础。  相似文献   

2.
刘慎河 《情报杂志》2003,22(7):29-31
分析了虚拟企业的发展态势及虚拟企业的信息需求,提出了以虚拟企业为平台研究资源优化新模式、虚拟企业的信息服务内容、虚拟实在信息咨询模式及虚拟信息咨询台模式等形式的虚拟企业的信息咨询服务体系。  相似文献   

3.
构建虚拟企业的信息咨询服务体系   总被引:2,自引:1,他引:2  
刘慎河 《情报科学》2003,21(10):1066-1068,1087
本文分析了虚拟企业的发展态势及虚拟企业的信息需求,提出了以虚拟企业为平台研究资源优化新模式、虚拟企业的信息服务内容、虚拟实在信息咨询模式及虚拟信息咨询台模式等形式的虚拟企业的信息咨询服务体系。  相似文献   

4.
杜伟 《情报科学》2004,22(4):403-406
本文介绍了虚拟企业的概念和体系框架.提出了虚拟企业的信息问题,并对虚拟企业信息的超链接组织、Web检索、信息递归化处理及如何提高检索效率等问题进行了探讨。  相似文献   

5.
高技术虚拟企业信息集成管理平台研究   总被引:1,自引:0,他引:1  
翟丽丽  单子丹  许宁 《情报科学》2007,25(3):435-439
通过对现有企业信息管理模式、技术及设计原理的比较,结合高技术虚拟企业分布式拓扑组织结构的特点,建立其信息管理模型,进而从体系层次、网络模块和功能设计三方面对网络环境下的高技术企业虚拟化经营搭建信息集成管理平台,以形成在柔性、分布环境中协同工作的虚拟企业信息集成管理系统。  相似文献   

6.
杜航  翟丽丽 《科技与管理》2007,9(5):107-110
根据虚拟企业信息平台的安全需求,结合电子商务安全体系,从虚拟企业信息平台的物理、系统、网络、应用和管理5个安全层面入手,设计了一套虚拟企业信息平台的安全保障体系,来保障信息平台运行时的安全与稳定,并为今后虚拟企业信息平台的研究和实际应用提供一个具有参考价值的安全框架。  相似文献   

7.
从SOA理念及Web服务标准角度出发,对虚拟企业的信息集成建模进行了详细分析,并从软件工程的角度研究了虚拟企业信息集成的各个阶段任务及作用,给出了相应的信息集成流程图及实现方法,主要包括虚拟企业集成的图形化建模方法及从抽象流程到执行流程的实现过程,该方法可有效实现对虚拟企业的信息集成。  相似文献   

8.
为适应互联网经济下的消费者灵捷需求,研究了依据客户需求而临时组建并经营的虚拟企业中的信息资源交互机制;运用进化博弈论方法对虚拟企业成员间的信息资源交互的合作方式、合作收益进行分析,得出了虚拟企业构建的经济基础;最后,针对互联网经济下的虚拟企业的知识管理与应用,研究了互联网经济下的虚拟企业信息资源保障机制。通过对互联网经济下的虚拟企业信息资源交互与保障机制的研究,为虚拟企业的信息资源管理提供理论基础与应用指引,以支持互联网经济下的传统企业的虚拟化运营。  相似文献   

9.
虚拟企业中的信息集成技术   总被引:1,自引:0,他引:1  
陈晓波 《现代情报》2002,22(9):122-123
本文讲述了虚拟企业中的信息集成技术,包括建立信息集成模型、实现技术。  相似文献   

10.
虚拟企业信息管理系统构建研究   总被引:1,自引:0,他引:1  
修国义  齐攀 《情报科学》2006,24(6):904-906
本文在虚拟企业特征的基础上,分析了虚拟企业组织结构与传统实体企业组织结构的差别,提出了虚拟企业的三层组织结构,并在此基础上提出了具有普遍意义上的虚拟企业信息管理系统的构建模式,为虚拟企业信息的有效沟通提供了保障。  相似文献   

11.
林健  黄瑞华  彭晓春 《情报科学》2004,22(8):944-947,963
本文研究虚拟企业中盟主的动态管理过程中的信息活动.运用Mowshowitz过程原理构建了虚拟企业盟主动态管理过程模型,详尽分析了盟主动态管理中的信息活动的特征和过程模型各阶段内的信息流.  相似文献   

12.
As mobile networks and devices being rapidly innovated, many new Internet services and applications have been deployed. However, the current implementation faces security, management, and performance issues, which are critical to the use in business environments. Migrating sensitive information, management facilities, and intensive computation to security hardened virtualized environment in the cloud provides effective solutions. This paper proposes an innovative Internet service and business model to provide a secure and consolidated environment for enterprise mobile information management based on the infrastructure of cloud-based virtual phones (CVP). Our proposed solution enables the users to execute Android and web applications in the cloud and connect to other users of CVP with enhanced performance and protected privacy. The organization of CVP can be mixed with centralized control and distributed protocols, which emulates the behavior of human societies. This minimizes the need to handle sensitive data in mobile devices, eases the management of data, and reduces the overhead of mobile application deployment.  相似文献   

13.
王弘钰  刘宇清 《情报科学》2002,20(7):753-755
本文在国外信息集成研究的基础上,针对我国企业信息集成管理框架的要求,采用Client/Server模式和面向对象技术,提出了适合企业特点的开放性信息集成框架的体系结构,并结合通讯服务器,信息服务器等实现技术阐述了具体的实施方法。  相似文献   

14.
Rational economic arguments focused on achieving efficient and productive IT use often guide discussions about technological infrastructure expansion. I characterize those compelling rational arguments as 'informational imperatives,' and I show that they generate unrealistic expectations based on assumptions about information resource use that do not reflect practice. My 'informational contexts' acknowledge that people value information and information resources based, in part, on the way they relate to the social world in which they live and work. If we base our expectations about information use on actual practice, would that reduce the potential economic benefit of expanding a national information infrastructure? I examine the social and organizational processes that direct IT use, and conclude that economic potential will remain high even if we alter information infrastructure policies to acknowledge and accommodate those processes that enhance expertise and foster socially mediated relationships.  相似文献   

15.
Information technology has dramatically increased online business opportunities; however these opportunities have also created serious risks in relation to information security. Previously, information security issues were studied in a technological context, but growing security needs have extended researchers' attention to explore the management role in information security management. Various studies have explored different management roles and activities, but none has given a comprehensive picture of these roles and activities to manage information security effectively. So it is necessary to accumulate knowledge about various managerial roles and activities from literature to enable managers to adopt these for a more holistic approach to information security management. In this paper, using a systematic literature review approach, we synthesised literature related to management's roles in information security to explore specific managerial activities to enhance information security management. We found that numerous activities of management, particularly development and execution of information security policy, awareness, compliance training, development of effective enterprise information architecture, IT infrastructure management, business and IT alignment and human resources management, had a significant impact on the quality of management of information security. Thus, this research makes a novel contribution by arguing that a more holistic approach to information security is needed and we suggest the ways in which managers can play an effective role in information security. This research also opens up many new avenues for further research in this area.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号