Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Automated Architecture Modeling for Enterprise Technology Management Using Principles from Data Fusion: A Security Analysis Case
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems Engineering.ORCID iD: 0000-0003-3089-3885
Swedish Inst Comp Sci, Stockholm, Sweden..
Show others and affiliations
2016 (English)In: PORTLAND INTERNATIONAL CONFERENCE ON MANAGEMENT OF ENGINEERING AND TECHNOLOGY (PICMET 2016): TECHNOLOGY MANAGEMENT FOR SOCIAL INNOVATION / [ed] Kocaoglu, DF Anderson, TR Daim, TU Kozanoglu, DC Niwa, K Perman, G, IEEE , 2016, p. 14-22Conference paper, Published paper (Refereed)
Abstract [en]

Architecture models arc used in enterprise management for decision support. These decisions range from designing processes to planning for the appropriate supporting technology. It is unreasonable for an existing enterprise to completely reinvent itself. Incremental changes are in most cases a more resource efficient tactic. Thus, for planning organizational changes, models of the current practices and systems need to be created. For mid-sized to large organizations this can be an enormous task when executed manually. Fortunately, there's a lot of data available from different sources within an enterprise that can be used for populating such models. The data are however almost always heterogeneous and usually only representing fragmented views of certain aspects. In order to merge such data and obtaining a unified view of the enterprise a suitable methodology is needed. In this paper we address this problem of creating enterprise architecture models from heterogeneous data. The paper proposes a novel approach that combines methods from the fields of data fusion and data warehousing. The approach is tested using a modeling language focusing on cyber security analysis in a study of a lab setup mirroring a small power utility's IT environment.

Place, publisher, year, edition, pages
IEEE , 2016. p. 14-22
Series
Portland International Conference on Management of Engineering and Technology, ISSN 2159-5100
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-242720DOI: 10.1109/PICMET.2016.7806662ISI: 000403104500002Scopus ID: 2-s2.0-85016195766OAI: oai:DiVA.org:kth-242720DiVA, id: diva2:1290226
Conference
Portland International Conference on Management of Engineering and Technology (PICMET), SEP 04-08, 2016, Honolulu, HI
Note

QC 20190220

Available from: 2019-02-20 Created: 2019-02-20 Last updated: 2019-09-19

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopushttp://www.picmet.org/new/conferences/16/

Authority records BETA

Välja, MargusKorman, MatusLagerström, RobertEkstedt, Mathias

Search in DiVA

By author/editor
Välja, MargusKorman, MatusLagerström, RobertEkstedt, Mathias
By organisation
KTHNetwork and Systems EngineeringIndustrial Information and Control Systems
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 6 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf