Active Initiatives and ICT Innovations for the Formation of Competitive Advantage

The paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selecte...

Full description

Bibliographic Details
Main Author: Milena Janakova
Format: Article
Language:English
Published: Czech Society of Systems Integration 2013-04-01
Series:Journal of Systems Integration
Subjects:
Online Access:http://si-journal.org/index.php/JSI/article/viewFile/153/116
Description
Summary:The paper is centered on the active initiatives from the ICT (information and communication technology) field using analysis and comparison of adopted solutions in ICT products for the support of competitive advantages. Confrontation of existing options is demonstrated on a security layer of selected products. This wider analysis brings an overview via operating and database systems, BI, and CRM products. A good starting point is an analysis of selected products by Petri Nets with simulation using a multidimensional and object approach. The realized analysis shows ways of security resolution in selected products and a mutual comparison of these solutions leads to an improved design of solutions in individual implementations. For example, Sugar CRM offers an optimal way of restricting access by date for access control to tabs and visible records for the user. Other positive options are advanced security (validation of IP address, maximum upload file size) or logging slow queries. Improvement requires restricted access for the system administrator (inspired by the Oracle database system) or transparent user identification (as in operating systems). Another benefit would be to simplify the overall concept of the accepted security layer from five components to four by merging the user account and system administrator area or audit and logging with an advanced security area.
ISSN:1804-2724