scispace - formally typeset
Search or ask a question
JournalISSN: 0018-8670

Ibm Systems Journal 

Institute of Electrical and Electronics Engineers
About: Ibm Systems Journal is an academic journal. The journal publishes majorly in the area(s): IBM & Software development. It has an ISSN identifier of 0018-8670. Over the lifetime, 1405 publications have been published receiving 91385 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A model for conceptualizing and directing the emerging area of strategic management of information technology is developed in terms of four fundamental domains of strategic choice: business strategy, information technology strategy, organlzational infrastructure and processes, and information technology Infrastuvture and processes--each with its own underlying dimenslons.
Abstract: It is cleaaar that eventhough information technology (I/T) has evolved form its traditional orientation of administrative support toward a more strategic role within an organization, there is still a glaring lack of fundamental frameworks within which to understand the potential of I/T for tomorrow's organizations. In this paper, we develop a model for conceptualizing and directing the emerging area of strategic management of information technology. This model, termed the Strategic Allgnment Model, is defined in terms of four fundamental domains of strategic choice: business strategy, information technology strategy, organlzational infrastructure and processes, and information technology Infrastuvture and processes--each with its own underlying dimenslons. We illustrate the power of this model in terms of two fundamental characteristics fo strategic management: strategic fit (the interrelationships between external and internal components) and functional Integration (integration between business and functional domains). More specifically, we derive foru perspectives for gulding management practice in this Important area.

3,343 citations

Journal ArticleDOI
John A. Zachman1
TL;DR: Information systems architecture is defined by creating a descriptive framework from disciplines quite independent of information systems, then by analogy specifies information systems architecture based upon the neutral, objective framework.
Abstract: With increasing size and complexity of the implementations of information systems, it is necessary to use some logical construct (or architecture) for defining and controlling the interfaces and the integration of all of the components of the system. This paper defines information systems architecture by creating a descriptive framework from disciplines quite independent of information systems, then by analogy specifies information systems architecture based upon the neutral, objective framework. Also, some preliminary conclusions about the implications of the resultant descriptive framework are drawn. The discussion is limited to architecture and does not include a strategic planning methodology.

3,219 citations

Journal ArticleDOI
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Abstract: Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to which the data must be immune to interception, modification, or removal by a third party. We explore both traditional and novel techniques for addressing the data-hiding process and evaluate these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.

3,037 citations

Journal ArticleDOI
TL;DR: An algorithm is given for computer control of a digital plotter that may be programmed without multiplication or division instructions and is efficient with respect to speed of execution and memory utilization.
Abstract: An algorithm is given for computer control of a digital plotter. The algorithm may be programmed without multiplication or division instructions and is efficient with respect to speed of execution and memory utilization.

2,257 citations

Journal ArticleDOI
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Abstract: Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.

1,709 citations

Network Information
Related Journals (5)
Communications of The ACM
12.2K papers, 1.1M citations
82% related
Ibm Journal of Research and Development
3.2K papers, 165.2K citations
80% related
IEEE Computer
7.1K papers, 451.2K citations
79% related
ACM Computing Surveys
2.4K papers, 395.7K citations
78% related
Information Systems Research
1.4K papers, 245.5K citations
73% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
200851
200750
200646
200554
200441
200353