The Relationships of Soft Systems Methodology (SSM), Business Process Modeling and e-Government
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 1
Abstract
e-Government have emerged in several countries. Because of many aspects that must be considered, and because of there are exist some soft components in e-Government, then the Soft Systems Methodology (SSM) can be considered to use in e-Government systems development process. On the other hand, business process modeling is essential in many fields nowadays, as well as in e-Government. Some researchers have used SSM in e-Government. Several studies that relate the business processes modeling with e-Government have been conducted. This paper tries to reveal the relationship between SSM and business process modeling. Moreover, this paper also tries to explain how business process modeling is integrated within SSM, and further link that integration to the e-Government.
Authors and Affiliations
Dana Indra Sensuse , Arief Ramadhan
A Tool Design of Cobit Roadmap Implementation
Over the last two decades, the role of information technology in organizations has changed from primarily a supportive and transactional function to being an essential prerequisite for strategic value generation. The org...
MITIGATING BLACK HOLE ATTACK IN MANET BY EXTENDING NETWORK KNOWLEDGE
The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a f...
Mitigating Address Spoofing Attacks in Hybrid SDN
Address spoofing attacks like ARP spoofing and DDoS attacks are mostly launched in a networking environment to degrade the performance. These attacks sometimes break down the network services before the administrator com...
Effective Teaching Methods and Proposed Web Libraries for Designing Animated Course Content: A Review
The primary aim of education system is to improve cognitive and computational skills in students. It cannot be achieved by just using the latest technology. This goal can only be achieved through effective teaching metho...
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
The transmission of the encryption voice over IP is challenging. The voice is recorded, eavesdropping, change and theft voice, etc. The voice over IP is encrypted by using Advance Encryption Standard (AES) Algorithm. AES...