Journal•ISSN: 0018-8670
Ibm Systems Journal
About: Ibm Systems Journal is an academic journal. The journal publishes majorly in the area(s): IBM & Software development. It has an ISSN identifier of 0018-8670. Over the lifetime, 1405 publication(s) have been published receiving 91385 citation(s).
Topics: IBM, Software development, Software, Software system, Business rule
Papers published on a yearly basis
Papers
More filters
TL;DR: A model for conceptualizing and directing the emerging area of strategic management of information technology is developed in terms of four fundamental domains of strategic choice: business strategy, information technology strategy, organlzational infrastructure and processes, and information technology Infrastuvture and processes--each with its own underlying dimenslons.
Abstract: It is cleaaar that eventhough information technology (I/T) has evolved form its traditional orientation of administrative support toward a more strategic role within an organization, there is still a glaring lack of fundamental frameworks within which to understand the potential of I/T for tomorrow's organizations. In this paper, we develop a model for conceptualizing and directing the emerging area of strategic management of information technology. This model, termed the Strategic Allgnment Model, is defined in terms of four fundamental domains of strategic choice: business strategy, information technology strategy, organlzational infrastructure and processes, and information technology Infrastuvture and processes--each with its own underlying dimenslons. We illustrate the power of this model in terms of two fundamental characteristics fo strategic management: strategic fit (the interrelationships between external and internal components) and functional Integration (integration between business and functional domains). More specifically, we derive foru perspectives for gulding management practice in this Important area.
3,216 citations
IBM1
TL;DR: Information systems architecture is defined by creating a descriptive framework from disciplines quite independent of information systems, then by analogy specifies information systems architecture based upon the neutral, objective framework.
Abstract: With increasing size and complexity of the implementations of information systems, it is necessary to use some logical construct (or architecture) for defining and controlling the interfaces and the integration of all of the components of the system. This paper defines information systems architecture by creating a descriptive framework from disciplines quite independent of information systems, then by analogy specifies information systems architecture based upon the neutral, objective framework. Also, some preliminary conclusions about the implications of the resultant descriptive framework are drawn. The discussion is limited to architecture and does not include a strategic planning methodology.
3,107 citations
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Abstract: Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to which the data must be immune to interception, modification, or removal by a third party. We explore both traditional and novel techniques for addressing the data-hiding process and evaluate these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
2,947 citations
TL;DR: An algorithm is given for computer control of a digital plotter that may be programmed without multiplication or division instructions and is efficient with respect to speed of execution and memory utilization.
Abstract: An algorithm is given for computer control of a digital plotter.
The algorithm may be programmed without multiplication or division instructions and is efficient with respect to speed of execution and memory utilization.
2,124 citations
IBM1
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Abstract: Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.
1,601 citations