Corporate Security Intelligence Use Cases and Examples

Author(s):  
Crump Justin
Keyword(s):  
2009 ◽  
Vol 38 (38) ◽  
pp. 119-130
Author(s):  
Erika Asnina

Use of Business Models within Model Driven Architecture Model Driven Architecture is a framework dedicated for development of large and complex computer systems. It states and implements the principle of architectural separation of concerns. This means that a system can be modeled from three different but related to each other viewpoints. The viewpoint discussed in this paper is a Computation Independent one. MDA specification states that a model that shows a system from this viewpoint is a business model. Taking into account transformations foreseen by MDA, it should be useful for automation of software development processes. This paper discusses an essence of the Computation Independent Model (CIM) and the place of business models in the computation independent modeling. This paper considers four types of business models, namely, SBVR, BPMN, use cases and Topological Functioning Model (TFM). Business persons use SBVR to define business vocabularies and business rules of the existing and planned domains, BPMN to define business processes of both existing and planned domains, and use cases to define business requirements to the planned domain. The TFM is used to define functionality of both existing and planned domains. This paper discusses their capabilities to be used as complete CIMs with formally defined conformity between planned and existing domains.


2020 ◽  
Vol 16 (12) ◽  
pp. 2363-2380
Author(s):  
S.B. Zainullin ◽  
O.A. Zainullina

Subject. The military-industrial complex is one of the core industries in any economy. It ensures both the economic and global security of the State. However, the economic security of MIC enterprises strongly depends on the State and other stakeholders. Objectives. We examine key factors of corporate culture in terms of theoretical and practical aspects. The article identifies the best implementation of corporate culture that has a positive effect on the corporate security in the MIC of the USA, the United Kingdom, the European Union, Japan ans China. Methods. The study employs dialectical method of research, combines the historical and logic unity, structural analysis, traditional techniques of economic analysis and synthesis. Results. We performed the comparative analysis of corporate culture models and examined how they are used by the MIC corporations with respect to international distinctions. Conclusions and Relevance. The State is the main stakeholder of the MIC corporations, since it acts as the core customer represented by the military department. It regulates and controls operations. The State is often a major shareholder of such corporations. Employees are also important stakeholders. Hence, trying to satisfy stakeholders' needs by developing the corporate culture, corporations mitigate their key risks and enhance their corporate security.


Author(s):  
Christos Katrakazas ◽  
Natalia Sobrino ◽  
Ilias Trochidis ◽  
Jose Manuel Vassallo ◽  
Stratos Arampatzis ◽  
...  

2019 ◽  
Vol 7 (4) ◽  
pp. 716-720
Author(s):  
Deepak Kumar Verma ◽  
Varsha Katheria ◽  
Mazhar Khaliq

Sign in / Sign up

Export Citation Format

Share Document