Font Size: a A A

Research On The Surveillance Architecture Of Enterprise Information System Project

Posted on:2008-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:G LiFull Text:PDF
GTID:2189360242473208Subject:Business management
Abstract/Summary:PDF Full Text Request
Nowadays,with the rapid development of technology, the level of informatization of enterprises directly relates to the existence and development of enterprises and even the social advance.As the important security measure in the development of enterprise information system project,surveillance architecture is more and more recognized by government and enterprises.Because information system surveillance is just beginning step, it has no complete surveillance architecture at the developing area of enterprise information system project, which impresses surveillance to produce result. Therefore, it is urgently necessary to advance and establish a perfect surveillance architecture of enterprise information system project, which standardize surveillance work and produce security result.By analyzing the life cycle of enterprise information system, this thesis ensures the stages of enterprise information system and the primary activities of each stage. By making use of the PDCA cycle control to surveil the activities in the enterprise information system project, it designs and submits the surveillance model.Furthermore, this thesis analyzes every act of enterprise information system project, induces detail surveillance specification and develops comparatively complete surveillance architecture. With practice and analysis, this surveillance architecture is optimized.The thesis is organized as follows:Chapter 1 is the introduction. This chapter introduces the background and the significance of the study, indicates the methods and purposes, and induces the innovation of the study.Chapter 2 is the literature review. This chapter summarizes and remarks the theories of System Theory, information system life cycle and the PDCA cycle , and then takes these theories as the theory base and also the point of penetration of the thesis.Chapter 3 is the design of surveillance model in enterprise information system project. By analyzing the information system life cycle and combining with factual experience, this chapter ensures the stages of enterprise information system project and the primary activities of each stage. By making use of the PDCA cycle control to surveil the activities in the enterprise information system project, it designs and submits the surveillance model.Chapter 4 is the analysis and build of the surveillance Architecture in enterprise information system project.This chapter analyzes each activities, gives detailed surveillance specification and builds up surveillance Architecture.At the same time, it analyzes all aims and solved problems of surveillance tasks by surveillance Architecture.Chapter 5 is the sample analysis of surveillance Architecture in enterprise information system project.In this chapter,the surveillance Architecture is validated in a practical information system project.Chapter 6 is the conclusion. This chapter generalizes the research results, summarizes the innovation and meaning, and provides the possible direction of later research.this thesis develops comparatively complete surveillance architecture for the first time, makes use of the PDCA cycle control to surveil the activities in the enterprise information system project, induces detail surveillance specification. After the practice of typical enterprise information system project, the surveillance architectur has broad applicability.This thesis gives surveillance Architecture and specification in enterprise information system project . It is advantaged for surveillance to specify works, enhance work effect, insure executed effect of enterprise information system project. At the same time, it is useful for information system to produce driving result during the development of enterprise.
Keywords/Search Tags:information system of enterprises, information system surveillance, surveillance model, surveillance architecture
PDF Full Text Request
Related items