National Repository of Grey Literature 99 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Creation of the Enterprise Architecture model according to the TOGAF framework
Čapek, Jan ; Doucek, Petr (advisor) ; Zeman, Petr (referee)
The present diploma thesis aims at introducing the Enterprise Architecture and creating an abstract model of a company. The primary focus is on application and process layers as defined in the architecture framework TOGAF. The thesis is divided into theoretical and practical part. The theoretical chapter starts with a business model analysis which means to describe mission vision and companys values as a part of the strategy framework. Furthermore the business processes are described in the latter part of this section. This chapter attempts to explain how to map a business process and to categorize it by nature and maturity level. Penultimate chapter introduces the Enterprise Architecture in general. This section includes arguments as to why the companies should be concerned with the Enterprise Architecture advantages of the Enterprise Architecture implementation into the companys documentation relationship of companys core business and IT and examples of the Enterprise Architecture frameworks. The last chapter deals with the TOGAF framework where Architecture Development Method is described. This means how Enterprise Architecture model is created and how to implement changes into the layers according to the TOGAF framework. Simultaneously the last section of this chapter describes the reference models which provide graphical overview of all abstractions layers. The practical part of the thesis elaborates on the theoretical part using the Architecture Development Method process in order to create the Enterprise Architecture model according to TOGAF framework. Same as the theoretical part it only focuses on the application and process layer. Firstly the business model is decomposed into vision mission and companys values to the companys strategy and business goals in order to grasp further understanding of business processes detailed description. Subsequently the abovementioned aspects are recomposed to create process map which provides the management overview. The application layer undergoes the same process; nonetheless the process map is replaced by information system description and reference model creation. Once the models are created the thesis compares them with the business and strategic goals. The benefit brought by this thesis is critical evaluation of current status to propose changes to achieve target architacture according business and strategic goals established by management.
A method for selecting a portfolio of tools for online marketing activities and supporting their management
Smutný, Zdeněk ; Doucek, Petr (advisor) ; Stříteský, Václav (referee) ; Novotný, Ota (referee) ; Hynek, Josef (referee)
Online marketing activities play an increasingly important role for organization in connection with the development of internet based technologies and their positive reception by the society. The aim of this dissertation is to design an artefact that would support the decision making of marketing specialists and thus the management of online marketing activities. The starting point is an explorative research among Czech companies, which identifies the issues felt as problematic and the needs of the selected set of organizations. Introduced at the same time is the current state of use of selected tools for online marketing by these organizations, and the situation is compared with worldwide development. The output of this explorative research, the examination of scientific literature, and a critical analysis serve as a basis for designing an own method, Genoma, whose purpose is to support the decision making of marketing specialists, and thereby also the management of marketing activities in internet-mediated environment. This method is presented as Deming (PDCA) cycle, which enables it to be used not only separately, but also as part of other frameworks for the management of marketing activities (e.g. the frameworks PMF, MCPF and RACE, which are presented in the dissertation). The Genoma method uses mainly the genetic algorithm for selecting a suitable portfolio of online marketing tools for a particular campaign. The selection is made on the basis of expected feedback at the level of social interaction, meeting the given marketing targets, and the financial demands of the individual tools. The prerequisite of using this method is a knowledge base that includes the area of sociotechnical interaction, which is based on interpreting phenomena related to the internet-mediated environment and the features of complex networks. Methodically, this dissertation builds on the complementary relationship of the behavioural (social informatics) and the design type of research (design science research). The final assessment of the suitability of the proposed method is done on the basis of a multiple case study, which uses also an own program created in C#, implementing the genetic algorithm used in the Genoma method.
Traffic analysis of information system of data boxes
Zahrádka, Adam ; Doucek, Petr (advisor) ; Luc, Ladislav (referee)
This diploma thesis describes information system of data boxes (ISDS). This system is characterized in terms of law about electronic operations and authorized conversion of documents no. 300/2008 commissioning the entire system. Based on statistical data provided by Ministry of the Interior, the system traffic and financial expenses are analyzed. Examined period is the start of the system in June 2009 and the end of period is October 2015. After analysis there is comparison with the period prior to launch of ISDS. Then I applied Multiple-criteria decision method on those two periods. Outcome of Multiple-criteria decision indicates that the ISDS is beneficial for users, rapidly enhances and accelerates electronic communication
Application of multi-criteria evaluation for renewal of server infrastructure in a chosen company
Jacunov, Vít ; Doucek, Petr (advisor) ; Klimánek, David (referee)
The aim of this master's thesis is to select a suitable option to replace outdated hardware equipment of the company RR Donnelley Prague s.r.o.. In the theoretical part, terms 'virtualization', 'cloud' and their models are explained. Next, RR Donnelley Prague is described and the current situation in terms of hardware infrastructure and outsourced services is analysed. The practical part contains a recommendation of possible solutions of the situation described and, particularly, a selection of criteria assessed and a multi-criteria evaluation of proposed solutions. To estimate weights of the criteria, a scoring method and a paired comparison method is applied. The multi-criteria evaluation of options uses the weighted sum method and TOPSIS. In the end, results of the applied methods are compared and benefits of the thesis for the company and the author are quantified.
Framework for on-line service security risk management
Mészáros, Jan ; Buchalcevová, Alena (advisor) ; Čermák, Igor (referee) ; Doucek, Petr (referee) ; Jirovský, Václav (referee)
This dissertation thesis is dedicated to on-line services security management from service provider's and service consumer's viewpoints. The main goal is to propose a framework for on-line services security risk management, to develop a supporting software tool prototype and to validate them through a case study performed in a real-world environment. The key components of the proposed framework are a threat model and a risk model. These models are designed to fit specific features of on-line services and the surrounding environment. A risk management process is an integral part of the framework. The process is suitable for frequent and recurrent risk assessments. The process comprises of eight steps, related roles and responsibilities are defined for each step. The process execution results in identification and execution of proper tasks which contribute to treatment of identified security risks and deficiencies. Documentation and reporting of an overall level of on-line services security over time is possible if the process is executed on a regular basis. The proposed framework was validated through a case study performed in a large enterprise environment.
Compliance Algorithms in dynamic service oriented systems
Šabatová, Ivana ; Doucek, Petr (advisor) ; Ivánek, Jiří (referee) ; Kreslíková, Jitka (referee) ; Gregor, Jiří (referee)
Compliance achievement and assurance of processes and services with regulatory requirements, standards, and business requirements becomes an actual task that should be resolved already in the stage of information systems design and implementation. If the particular business process or business service is supported with an IT system, then the compliance assurance relates also to this supporting system. This dissertation thesis presents the concept of continual compliance management in service oriented systems with a special focus on application of advanced process automation tools. The aim of this thesis was design of methods and procedures for reliability and credibility of business processes both internally in single domain, and in case of business process outsourcing including iterated and/or dynamic outsourcing i.e. in multi-domain environment with a special emphasis on automation level maximization. Particular process and/or service is considered to be reliable and credible if we are able to prove its compliance with the defined requirements in a trusted way. The first part of this thesis is dedicated to traditional methods for compliance achievement and assurance as a basis and inspiration for methods based on high level of automation. The second part of this thesis presents the concept of design, implementation and verification of compliance in service oriented systems. It introduces the terms of ideal target process, Key Assurance Indicator (KAI) and Key Security Indicator (KSA). For multi-domain environment there is the concept of Protection Level Agreement (PLA). This part also covers a new method of business process analysis designed for their automation as well as a concept of business rules design, testing and automation integration. The third part named Conceptual Model of Compliance Assurance in BPMS and Service Oriented Systems Environment brings a method inspired by well-known Deming Cycle (Plan, Do, Check, Act), description of the notations selected for compliance algorithm and target process modelling, and first of all the compliance algorithm design. This concept is demonstrated on two case studies of real business processes analyzed in Hospital San Raffaele in Milan, Italy. First of them is an internal business process regulated by regional law, the second study is an example of compliance with business requirement achievement and assurance in multi-domain environment of iterated dynamic outsourcing. These case studies were verified by simulation with subject matter experts and business process activities performers of the hospital personnel.
The Impact of the ISDS on Users
Řehořek, Tomáš ; Doucek, Petr (advisor) ; Řemelka, Tomáš (referee)
This thesis work is to do with the Information system of data boxes (ISDS) which is introduced from legislation's and user's point of view. Because the introduction of this system has influenced hundreds of thousands of subjects the main target of this thesis is to find out about the impact of the ISDS on users with the help of the analysis method. In this work firstly the data provided by the Ministry of Internal Affairs are examined and interpreted, secondly the results of the poll conducted by the author and then a cost-benefit analysis of the system from the users' point of view is carried out. The results of the work show that the ISDS was at the end of the examined period (2009 -- 2013) beneficial for its users and the total economic benefit for the respective period is 3.6 billion Czech crowns. This means that every crown spent on the operation of the system by the Ministry of Internal Affairs represents savings of 2 Czech crowns. The author of this work has come to the conclusion that the system is from a legislative, technological and economic point of view very well created. The author recommends to the system administrator its further development and also recommends to use its potential among thousands of OSVČ (the self-employed).
The significance of IT controls for statutory audit
Reich, Jan ; Doucek, Petr (advisor) ; Kitto, Zuzana (referee)
Over the last few decades, organizations have become increasingly dependent on information technology for the support of their business processes. IT has brought many benefits to the operations of organizations, as well as new risks. Internal control systems implemented to mitigate business risks thus needed to be extended to include a new group of IT controls. One of the areas of business operations that has been strongly associated with IT since the beginning of its widespread use is accounting. This master's thesis examines the effect of IT controls on financial statements of an organization as well as an audit of these financial statements. Principal aim of this thesis is to identify a set of IT controls relevant for a statutory audit. Emphasis is placed on controls covering the areas of information security, computer operations and change management related to information systems. A secondary aim is an analysis of control weaknesses (their nature and frequency of occurence) noted in the presented set of IT controls in a sample of statutory audits conducted in the last four years. For the most common control weaknesses, risks as well as possible causes are discussed and recommendations for improvement are provided.
The role of ICT in the economy of selected European countries
Dvořáková, Dominika ; Doucek, Petr (advisor) ; Veber, Jaromír (referee)
The aim of this thesis is to determine whether the role of ICT in the economies of selected European countries is important on the basis of macroeconomic, statistical indicators and characteristics of selected economies. In the first part the role of ICT in the Czech Republic will be compared with the role of ICT in the neighbouring countries on the basis of share of ICT goods in exports and also on the basis of ICT goods exports and imports. Further with use of WSA method it will be listed, how are ICT used by individuals in these countries. The aim of the second part is to compare advanced economies of selected countries (Germany , France and GB) on the basis of details of economies represented in top 250 ICT firms. The third part will be dealing with the role of ICT in OECD, concretely with ICT services, goods, exports and imports. The outcomes of each chapter will be then compared with characteristic of each economy.
Payment cards security
Fuchs, Michal ; Doucek, Petr (advisor) ; Veber, Jaromír (referee)
This thesis aims to identify and evaluate the risks related to payment cards and their use. The main focus is the methods used to commit card related fraud and possible methods of protection related to this topic. First of all, the technology that is nowadays used in relation with the payment cards is analyzed and its weaknesses and attacks used to gather card information are described. After that, statistical data related to card fraud are analyzed in relation with different world regions. Qualitative analysis of risk related to payment card use is performed on the statistical data of ECB for the cards issued in Czech Republic. The qualitative analysis is then followed by recommendations that are designed to limit the risk's impact or probability. To verify the recommendations, a survey is carried out.

National Repository of Grey Literature : 99 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.