Active Initiatives and ICT Innovations for the Formation of Competitive Advantage
The paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selecte...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Czech Society of Systems Integration
2013-04-01
|
Series: | Journal of Systems Integration |
Subjects: | |
Online Access: | http://si-journal.org/index.php/JSI/article/viewFile/153/116 |
id |
doaj-d158960b7b1d4e99bae14d9d3c3e61f4 |
---|---|
record_format |
Article |
spelling |
doaj-d158960b7b1d4e99bae14d9d3c3e61f42020-11-25T01:23:54ZengCzech Society of Systems IntegrationJournal of Systems Integration1804-27242013-04-01423642Active Initiatives and ICT Innovations for the Formation of Competitive AdvantageMilena JanakovaThe paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selected products. This wider analysis brings an overview via operating and database systems, BI, and CRM products. A good starting point is an analysis of selected products by Petri Nets with simulation using a multidimensional and object approach. The realized analysis shows ways of security resolution in selected products and a mutual comparison of these solutions leads to an improved design of solutions in individual implementations. For example, Sugar CRM offers an optimal way of restricting access by date for access control to tabs and visible records for the user. Other positive options are advanced security (validation of IP address, maximum upload file size) or logging slow queries. Improvement requires restricted access for the system administrator (inspired by the Oracle database system) or transparent user identification (as in operating systems). Another benefit would be to simplify the overall concept of the accepted security layer from five components to four by merging the user account and system administrator area or audit and logging with an advanced security area.http://si-journal.org/index.php/JSI/article/viewFile/153/116AnalysisBI and CRM productscompetitive advantageICT innovationsoperating and database systemsPetri Nets |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Milena Janakova |
spellingShingle |
Milena Janakova Active Initiatives and ICT Innovations for the Formation of Competitive Advantage Journal of Systems Integration Analysis BI and CRM products competitive advantage ICT innovations operating and database systems Petri Nets |
author_facet |
Milena Janakova |
author_sort |
Milena Janakova |
title |
Active Initiatives and ICT Innovations for the Formation of Competitive Advantage |
title_short |
Active Initiatives and ICT Innovations for the Formation of Competitive Advantage |
title_full |
Active Initiatives and ICT Innovations for the Formation of Competitive Advantage |
title_fullStr |
Active Initiatives and ICT Innovations for the Formation of Competitive Advantage |
title_full_unstemmed |
Active Initiatives and ICT Innovations for the Formation of Competitive Advantage |
title_sort |
active initiatives and ict innovations for the formation of competitive advantage |
publisher |
Czech Society of Systems Integration |
series |
Journal of Systems Integration |
issn |
1804-2724 |
publishDate |
2013-04-01 |
description |
The paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selected products. This wider analysis brings an overview via operating and database systems, BI, and CRM products. A good starting point is an analysis of selected products by Petri Nets with simulation using a multidimensional and object approach. The realized analysis shows ways of security resolution in selected products and a mutual comparison of these solutions leads to an improved design of solutions in individual implementations. For example, Sugar CRM offers an optimal way of restricting access by date for access control to tabs and visible records for the user. Other positive options are advanced security (validation of IP address, maximum upload file size) or logging slow queries. Improvement requires restricted access for the system administrator (inspired by the Oracle database system) or transparent user identification (as in operating systems). Another benefit would be to simplify the overall concept of the accepted security layer from five components to four by merging the user account and system administrator area or audit and logging with an advanced security area. |
topic |
Analysis BI and CRM products competitive advantage ICT innovations operating and database systems Petri Nets |
url |
http://si-journal.org/index.php/JSI/article/viewFile/153/116 |
work_keys_str_mv |
AT milenajanakova activeinitiativesandictinnovationsfortheformationofcompetitiveadvantage |
_version_ |
1725120186884816896 |