Advertisement

Introduction

  • Boris Shishkov
Chapter
Part of the The Enterprise Engineering Series book series (TEES)

Abstract

How did enterprises look 40–50 years ago today? What were then the rudimentary business process automations [1] and how is this different from the current business process automations that go beyond conventional data manipulation and record-keeping activities [2]? How did enterprises exchange information then, not counting on the global telecommunications and the digital multimedia [3] and what are the differences now when a cell phone alone seems to be capable of supporting video communication, answering complex questions, and providing satellite navigation [4]? Was it possible then (without web services [5] and cloud infrastructures [6]) for associations between different enterprises to combine manufacturing, assembly, wholesale distribution, and retail sales in what is currently called business process externalization [7]? Were software technologists able then to develop really adaptable information systems [8], not counting on sensor technology [9]? We argue that answering those questions would bring us to the conclusion that over the past several decades enterprises have been shifting to experience a growing dependency on ICT (Information and Communication Technology ) [10]. For this reason, it is not surprising that SE (Software Engineering ) [11] gets increasingly relevant with regard to enterprise developments. Hence, even though EE (Enterprise Engineering) [12] and SE have developed separately as disciplines, it is currently important to bring together enterprise modeling and software specification; we argue that this would allow enterprises to adequately utilize current technology.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ammons JC, Govindaraj T, Mitchell CM (1988, Sep/Oct) Decision models for aiding FMS scheduling and control. IEEE Trans Syst Man Cybernet 18(5):744–756CrossRefGoogle Scholar
  2. 2.
    Javaid S, Sufian A, Pervaiz S, Tanveer M (2018) Smart traffic management system using internet of things. In: 20th International conference on advanced communication technology (ICACT), Chuncheon-si Gangwon-do, Korea (South), 2018, pp 393–398Google Scholar
  3. 3.
    Zerbiec TG (1992, March) Considering the past and anticipating the future for private data networks. IEEE Commun Mag 30(3):36–46CrossRefGoogle Scholar
  4. 4.
    Wang Q, Pan W, Li M (2012) Robot’s remote real-time navigation controlled by smart phone. In: IEEE international conference on robotics and biomimetics (ROBIO), Guangzhou, pp 2351–2356Google Scholar
  5. 5.
    Papazoglou M (2008) Web services: principles and technology. Prentice Hall, Upper Saddle River, NJGoogle Scholar
  6. 6.
    Colman-Meixner C, Develder C, Tornatore M, Mukherjee B (2016) A survey on resiliency techniques in cloud computing infrastructures and applications. IEEE Commun Surv Tutor 18(3):2244–2281. thirdquarterCrossRefGoogle Scholar
  7. 7.
    O’Hara B (2012) Approach to information management in an externalized business environment. In: 2012 IEEE international conference on bioinformatics and biomedicine, Philadelphia, PA, pp 1–2Google Scholar
  8. 8.
    AWARENESS (2008) Freeband AWARENESS project. http://www.freeband.nl/project.cfm?id=494&language=en
  9. 9.
    Kopják J, Sebestyén G (2018) Comparison of data collecting methods in wireless mesh sensor networks. In: IEEE 16th world symposium on applied machine intelligence and informatics (SAMI), Kosice and Herlany, Slovakia, 2018, pp 000155–000160Google Scholar
  10. 10.
    Wu J, Guo S, Huang H, Liu W, Xiang Y (2018) Information and communications technologies for sustainable development goals: state-of-the-art, needs and perspectives. IEEE Commun Surv Tutor 20(3):2389–2406. thirdquarterCrossRefGoogle Scholar
  11. 11.
    Brambilla M, Cabot J, Wimmer M (2012) Model-driven software engineering in practice. Morgan & Claypool, New York, NYCrossRefGoogle Scholar
  12. 12.
    Dietz JLG (2006) Enterprise ontology, theory and methodology. Springer, HeidelbergCrossRefGoogle Scholar
  13. 13.
    Manning JG (2018) The open sea: the economic life of the ancient Mediterranean world from the iron age to the rise of Rome. Princeton University Press, Princeton, NJCrossRefGoogle Scholar
  14. 14.
    Urien P (2018) Towards secure elements for trusted transactions in blockchain and blockchain IoT (BIoT) Platforms. Invited paper. In: 4th International conference on mobile and secure services (MobiSecServ), Miami Beach, FL, USA, 2018, pp 1–5Google Scholar
  15. 15.
    Suurmond C (2018) IT systems in business: model or reality? In: Shishkov B (ed) Business modeling and software design. BMSD 2017. Lecture notes in business information processing, vol 309. Springer, ChamGoogle Scholar
  16. 16.
    Shi C, Lan X, Wang Y (2017) Motion planning for unmanned vehicle based on hybrid deep learning. In: International conference on security, pattern analysis, and cybernetics (SPAC), Shenzhen, 2017, pp 473–478Google Scholar
  17. 17.
    Shishkov B (2017) Enterprise information systems, a modeling approach. IICREST Press, SofiaGoogle Scholar
  18. 18.
    Laurenza D (2006) Leonardo’s machines: secrets and inventions in the Da Vinci Codices. Giunti, Florence-MilanGoogle Scholar
  19. 19.
    Ackerman J (1961) The architecture of Michelangelo. University of Chicago Press, ChicagoGoogle Scholar
  20. 20.
    Bloom RL et al (1958) The beginnings of industrialization in England. Pt XIV: The industrial revolution, classical economics, and economic liberalism. Ideas and Institutions of Western Man, Gettysburg College, pp 1–5Google Scholar
  21. 21.
    Landes DS (2003) The unbound prometheus: technical change and industrial development in Western Europe from 1750 to the present. Cambridge University Press, CambridgeCrossRefGoogle Scholar
  22. 22.
    Flood JE (1976, December) Alexander Graham Bell and the invention of the telephone. Proc Inst Electr Eng 123(12):1387–1388MathSciNetCrossRefGoogle Scholar
  23. 23.
    Parker S (1992) Electricity. Dorling Kindersley, LondonGoogle Scholar
  24. 24.
    Parissien S (2014) The life of the automobile: the complete history of the motor car. St. Martin’s Press, New York, NYGoogle Scholar
  25. 25.
    Ford (2018) The website of the Ford Motor Company. http://www.corporate.ford.com
  26. 26.
    Knowles JC (1973) The Rockefeller financial group. Warner Modular Publications, Andover, MAGoogle Scholar
  27. 27.
    Petroski H (2016) The road taken: the history and future of America’s infrastructure. Bloomsbury Publishing, LondonGoogle Scholar
  28. 28.
    Pierce J (1977) Electronics: past, present, and future. Science 195(4283):1092–1095CrossRefGoogle Scholar
  29. 29.
    Greenfield J (1977) Television: the first fifty years. Harry N. Abrams, New York, NYGoogle Scholar
  30. 30.
    Kotler P, Turner R (1995) Marketing management: analysis, planning, and control. Pearson, New York, NYGoogle Scholar
  31. 31.
    Lowe K (2013) Savage continent: Europe in the aftermath of world war II. St. Martin’s Press, New York, NYGoogle Scholar
  32. 32.
    Millard A (2012) Beatlemania: technology, business, and teen culture in cold War America (Johns Hopkins introductory studies in the history of technology). John Hopkins University Press, Baltimore, MDGoogle Scholar
  33. 33.
    Johnson P (2014) Mozart: a life. Penguin Books, LondonGoogle Scholar
  34. 34.
    Norman P (2009) John Lennon: the life. Ecco Press, New York, NYGoogle Scholar
  35. 35.
    Laudon K, Laudon J (2017) Management information systems: managing the digital firm. Pearson, New York, NYzbMATHGoogle Scholar
  36. 36.
    Shishkova T (1986) Exploring the possibilities for creating and implementing high-level programming languages specific to the domain of warehouse management, PhD thesis. Technical University Press, SofiaGoogle Scholar
  37. 37.
    Tanenbaum AS (1996) Computer networks. Prentice Hall, New Jersey, NJzbMATHGoogle Scholar
  38. 38.
    IICREST (2019) The website of the International Institute for Collaboration and Research on enterprise systems and technology. http://www.iicrest.org
  39. 39.
    Shishkov B, Larsen JB, Warnier M, Janssen M (2018) Three categories of context-aware systems. In: Shishkov B (ed) Business modeling and software design. BMSD 2018. Lecture notes in business information processing, vol 319. Springer, ChamGoogle Scholar
  40. 40.
    Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2017) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 3rd IEEE international conference on computer and communications (ICCC), Chengdu, China, 2017, pp 1180–1184Google Scholar
  41. 41.
    Shishkov B (2005) Software specification based on re-usable business components. Delft University Press, DelftGoogle Scholar
  42. 42.
    Stahl T, Völter M, Bettin J, Haase A, Helsen S (2006) Model-driven software development—technology, engineering, management. Wiley, HeidelbergGoogle Scholar
  43. 43.
    Hirschheim R, Klein H, Lyytinen K (1995) Information systems development and data modeling—conceptual and philosophical foundations. Cambridge University Press, CambridgezbMATHCrossRefGoogle Scholar
  44. 44.
    Kotonya G, Sommerville I (1998) Requirements engineering. Wiley, New York, NYGoogle Scholar
  45. 45.
    Ivanov I (2012) Cloud computing in education: the intersection of challenges and opportunities. In: Filipe J, Cordeiro J (eds) Web information systems and technologies 2011. LNBIP, vol 101. Springer, Heidelberg, pp 3–16CrossRefGoogle Scholar
  46. 46.
    Lang J, Pigozzi G, Slavkovik M, van der Torre L (2011) Judgment aggregation rules based on minimization. In: Proceedings of the 13th international conference on theoretical aspects of rationality and knowledge, ACMGoogle Scholar
  47. 47.
    Friedman B, Hendry DG, Borning A (2017) A survey of value sensitive design methods. In: A survey of value sensitive design methods, vol 1. Now Foundations and Trends, Hanover, MA, p 76Google Scholar
  48. 48.
    Avgousti AA (2007) Regulating convergence in Europe. In: ITI 5th International conference on information and communications technology. Cairo, Egypt, pp 325–325Google Scholar
  49. 49.
    Eisen PJ (2013) Accounting. Barron’s Educational Series Inc, New York, NYGoogle Scholar
  50. 50.
    Nikbakht E, Groppelli AA (2012) Finance. Barron’s Educational Series Inc, New York, NYGoogle Scholar
  51. 51.
    Versteegt C, Verbraeck A (2002) Holonic control of large-scale automated logistic systems. In: Proceedings of the IEEE 5th international conference on intelligent transportation systems, pp 898–903Google Scholar
  52. 52.
    Caminha J, Perkusich A, Perkusich M (2018) A smart middleware to detect on-off trust attacks in the Internet of things. In: 2018 IEEE international conference on consumer electronics (ICCE), Las Vegas, NV, USA, pp 1–2Google Scholar
  53. 53.
    Ross JW, Weill P (2006) Enterprise architecture as strategy: creating a foundation for business execution. Harvard Business Press, Boston, MAGoogle Scholar
  54. 54.
    Sousa HPdS, Leite JCdP (2017) Requirement patterns for organizational modeling. In: IEEE 25th international requirements engineering conference workshops (REW), Lisbon, 2017, pp 252–259Google Scholar
  55. 55.
    Mathis RL, Jackson JH (2016) Human resource management. Cengage Learning, Boston, MAGoogle Scholar
  56. 56.
    MOF (2018) The website of the meta-object facility. http://www.omg.org/mof
  57. 57.
    UML (2018) The website of the unified modeling language. http://www.uml.org
  58. 58.
    Wooldridge M (2009) An introduction to multiagent systems. Wiley, New York, NYGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Boris Shishkov
    • 1
    • 2
    • 3
  1. 1.Faculty of Information SciencesUniversity of Library Studies and Information TechnologiesSofiaBulgaria
  2. 2.Institute of Mathematics and InformaticsBulgarian Academy of SciencesSofiaBulgaria
  3. 3.Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and TechnologySofiaBulgaria

Personalised recommendations