Active Initiatives and ICT Innovations for the Formation of Competitive Advantage

The paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selecte...

Full description

Bibliographic Details
Main Author: Milena Janakova
Format: Article
Language:English
Published: Czech Society of Systems Integration 2013-04-01
Series:Journal of Systems Integration
Subjects:
Online Access:http://si-journal.org/index.php/JSI/article/viewFile/153/116
id doaj-d158960b7b1d4e99bae14d9d3c3e61f4
record_format Article
spelling doaj-d158960b7b1d4e99bae14d9d3c3e61f42020-11-25T01:23:54ZengCzech Society of Systems IntegrationJournal of Systems Integration1804-27242013-04-01423642Active Initiatives and ICT Innovations for the Formation of Competitive AdvantageMilena JanakovaThe paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selected products. This wider analysis brings an overview via operating and database systems, BI, and CRM products. A good starting point is an analysis of selected products by Petri Nets with simulation using a multidimensional and object approach. The realized analysis shows ways of security resolution in selected products and a mutual comparison of these solutions leads to an improved design of solutions in individual implementations. For example, Sugar CRM offers an optimal way of restricting access by date for access control to tabs and visible records for the user. Other positive options are advanced security (validation of IP address, maximum upload file size) or logging slow queries. Improvement requires restricted access for the system administrator (inspired by the Oracle database system) or transparent user identification (as in operating systems). Another benefit would be to simplify the overall concept of the accepted security layer from five components to four by merging the user account and system administrator area or audit and logging with an advanced security area.http://si-journal.org/index.php/JSI/article/viewFile/153/116AnalysisBI and CRM productscompetitive advantageICT innovationsoperating and database systemsPetri Nets
collection DOAJ
language English
format Article
sources DOAJ
author Milena Janakova
spellingShingle Milena Janakova
Active Initiatives and ICT Innovations for the Formation of Competitive Advantage
Journal of Systems Integration
Analysis
BI and CRM products
competitive advantage
ICT innovations
operating and database systems
Petri Nets
author_facet Milena Janakova
author_sort Milena Janakova
title Active Initiatives and ICT Innovations for the Formation of Competitive Advantage
title_short Active Initiatives and ICT Innovations for the Formation of Competitive Advantage
title_full Active Initiatives and ICT Innovations for the Formation of Competitive Advantage
title_fullStr Active Initiatives and ICT Innovations for the Formation of Competitive Advantage
title_full_unstemmed Active Initiatives and ICT Innovations for the Formation of Competitive Advantage
title_sort active initiatives and ict innovations for the formation of competitive advantage
publisher Czech Society of Systems Integration
series Journal of Systems Integration
issn 1804-2724
publishDate 2013-04-01
description The paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selected products. This wider analysis brings an overview via operating and database systems, BI, and CRM products. A good starting point is an analysis of selected products by Petri Nets with simulation using a multidimensional and object approach. The realized analysis shows ways of security resolution in selected products and a mutual comparison of these solutions leads to an improved design of solutions in individual implementations. For example, Sugar CRM offers an optimal way of restricting access by date for access control to tabs and visible records for the user. Other positive options are advanced security (validation of IP address, maximum upload file size) or logging slow queries. Improvement requires restricted access for the system administrator (inspired by the Oracle database system) or transparent user identification (as in operating systems). Another benefit would be to simplify the overall concept of the accepted security layer from five components to four by merging the user account and system administrator area or audit and logging with an advanced security area.
topic Analysis
BI and CRM products
competitive advantage
ICT innovations
operating and database systems
Petri Nets
url http://si-journal.org/index.php/JSI/article/viewFile/153/116
work_keys_str_mv AT milenajanakova activeinitiativesandictinnovationsfortheformationofcompetitiveadvantage
_version_ 1725120186884816896