共查询到15条相似文献,搜索用时 187 毫秒
1.
基于Web Services的高技术虚拟企业信息集成 总被引:13,自引:0,他引:13
本文在详细分析Web Services集成应用系统异构问题的基础上,根据高技术企业的特点,运用Web Services技术构建了高技术虚拟企业信息集成模型,论述了引入Web Services技术后高技术虚拟企业的构建过程并设计了一个适合高技术虚拟企业信息集成的网络体系框架,从而为高技术虚拟企业信息平台的建立奠定基础。 相似文献
2.
分析了虚拟企业的发展态势及虚拟企业的信息需求,提出了以虚拟企业为平台研究资源优化新模式、虚拟企业的信息服务内容、虚拟实在信息咨询模式及虚拟信息咨询台模式等形式的虚拟企业的信息咨询服务体系。 相似文献
3.
构建虚拟企业的信息咨询服务体系 总被引:2,自引:1,他引:2
本文分析了虚拟企业的发展态势及虚拟企业的信息需求,提出了以虚拟企业为平台研究资源优化新模式、虚拟企业的信息服务内容、虚拟实在信息咨询模式及虚拟信息咨询台模式等形式的虚拟企业的信息咨询服务体系。 相似文献
4.
本文介绍了虚拟企业的概念和体系框架.提出了虚拟企业的信息问题,并对虚拟企业信息的超链接组织、Web检索、信息递归化处理及如何提高检索效率等问题进行了探讨。 相似文献
5.
6.
根据虚拟企业信息平台的安全需求,结合电子商务安全体系,从虚拟企业信息平台的物理、系统、网络、应用和管理5个安全层面入手,设计了一套虚拟企业信息平台的安全保障体系,来保障信息平台运行时的安全与稳定,并为今后虚拟企业信息平台的研究和实际应用提供一个具有参考价值的安全框架。 相似文献
7.
8.
为适应互联网经济下的消费者灵捷需求,研究了依据客户需求而临时组建并经营的虚拟企业中的信息资源交互机制;运用进化博弈论方法对虚拟企业成员间的信息资源交互的合作方式、合作收益进行分析,得出了虚拟企业构建的经济基础;最后,针对互联网经济下的虚拟企业的知识管理与应用,研究了互联网经济下的虚拟企业信息资源保障机制。通过对互联网经济下的虚拟企业信息资源交互与保障机制的研究,为虚拟企业的信息资源管理提供理论基础与应用指引,以支持互联网经济下的传统企业的虚拟化运营。 相似文献
9.
10.
虚拟企业信息管理系统构建研究 总被引:1,自引:0,他引:1
本文在虚拟企业特征的基础上,分析了虚拟企业组织结构与传统实体企业组织结构的差别,提出了虚拟企业的三层组织结构,并在此基础上提出了具有普遍意义上的虚拟企业信息管理系统的构建模式,为虚拟企业信息的有效沟通提供了保障。 相似文献
11.
12.
Jiun-Hung Ding Roger Chien Shih-Hao Hung Yi-Lan Lin Che-Yang Kuo Ching-Hsien Hsu Yeh-Ching Chung 《International Journal of Information Management》2014
As mobile networks and devices being rapidly innovated, many new Internet services and applications have been deployed. However, the current implementation faces security, management, and performance issues, which are critical to the use in business environments. Migrating sensitive information, management facilities, and intensive computation to security hardened virtualized environment in the cloud provides effective solutions. This paper proposes an innovative Internet service and business model to provide a secure and consolidated environment for enterprise mobile information management based on the infrastructure of cloud-based virtual phones (CVP). Our proposed solution enables the users to execute Android and web applications in the cloud and connect to other users of CVP with enhanced performance and protected privacy. The organization of CVP can be mixed with centralized control and distributed protocols, which emulates the behavior of human societies. This minimizes the need to handle sensitive data in mobile devices, eases the management of data, and reduces the overhead of mobile application deployment. 相似文献
13.
14.
Roberta Lamb 《The Information Society》1996,12(1):17-38
Rational economic arguments focused on achieving efficient and productive IT use often guide discussions about technological infrastructure expansion. I characterize those compelling rational arguments as 'informational imperatives,' and I show that they generate unrealistic expectations based on assumptions about information resource use that do not reflect practice. My 'informational contexts' acknowledge that people value information and information resources based, in part, on the way they relate to the social world in which they live and work. If we base our expectations about information use on actual practice, would that reduce the potential economic benefit of expanding a national information infrastructure? I examine the social and organizational processes that direct IT use, and conclude that economic potential will remain high even if we alter information infrastructure policies to acknowledge and accommodate those processes that enhance expertise and foster socially mediated relationships. 相似文献
15.
《International Journal of Information Management》2016,36(2):215-225
Information technology has dramatically increased online business opportunities; however these opportunities have also created serious risks in relation to information security. Previously, information security issues were studied in a technological context, but growing security needs have extended researchers' attention to explore the management role in information security management. Various studies have explored different management roles and activities, but none has given a comprehensive picture of these roles and activities to manage information security effectively. So it is necessary to accumulate knowledge about various managerial roles and activities from literature to enable managers to adopt these for a more holistic approach to information security management. In this paper, using a systematic literature review approach, we synthesised literature related to management's roles in information security to explore specific managerial activities to enhance information security management. We found that numerous activities of management, particularly development and execution of information security policy, awareness, compliance training, development of effective enterprise information architecture, IT infrastructure management, business and IT alignment and human resources management, had a significant impact on the quality of management of information security. Thus, this research makes a novel contribution by arguing that a more holistic approach to information security is needed and we suggest the ways in which managers can play an effective role in information security. This research also opens up many new avenues for further research in this area. 相似文献