Refine
Year of publication
- 2017 (57) (remove)
Document Type
- Conference Proceeding (57) (remove)
Language
- English (57) (remove)
Keywords
- Actuators (1)
- Ambidexterity (1)
- B-spline activation function (1)
- Barriers to Business Model Innovation (1)
- Business Model Innovation (1)
- Business Plan (1)
- Business model (1)
- Business plan (1)
- Cables (1)
- Camera characteristic (1)
Institute
Shadow information technology systems (SITS) coexist with formal enterprise systems in organisations. SITS pose risks but also increase flexibility of business units. Practice shows that SITS emerge, despite that Enterprise Architecture Management (EAM) aims at controling all IT systems in an organization. Studies acknowledge this problem in general. However, they neither show the specific influencing areas of SITS nor provide approaches to address them. To close this gap, we use a literature review to analyse examples of practical SITS and their interference with EAM concerns. Thus, we find that they hinder especially transparency, reduction of EA complexity and governance. Research has focused on achieving transparency, governing the evolution of the EA but lacks strategies for reducing complexity. This study contributes to research and practice by uncovering the main influencing areas of SITS on EAM, as well as by laying a foundation for future research on this topic.
The evolution of strain induced martensite in austenitic stainless steel AISI 304 was investigated in a rolling contact on a two-discs-tribometer. The effects of surface roughness, slip and normal force as well as the number of load cycles were examined. In comparison to the investigations of martensitic phase transformation during cold rolling, the applied stresses are considerably lower. The formation of strain induced martensite was detected in-situ by means of a FERITSCOPE MP30 and ex-situ by optical microscopy after etching with Kane etchant. Both number of load cycles and magnitude of normal force appeared to be the main influencing factors regarding strain induced martensitic evolution in low stress rolling contacts.
Steps to the stage
(2017)
Many secure software development methods and tools are well-known and understood. Still, the same software security vulnerabilities keep occurring. To find out if new source code patterns evolved or the same patterns are reoccurring, we investigate SQL injections in PHP open source projects. SQL injections are well-known and a core part of software security education. For each common part of SQL injections, the source code patterns are analysed. Examples are pointed out showing that developers had software security in mind, but nevertheless created vulnerabilities. A comparison to earlier work shows that some categories are not found as often as expected. Our main contribution is the categorization of source code patterns.