An Applied Mathematical Model for Business Transformation and Enterprise Architecture: The Holistic Global Security Management System (HGSMS)

An Applied Mathematical Model for Business Transformation and Enterprise Architecture: The Holistic Global Security Management System (HGSMS)

Copyright: © 2020 |Pages: 37
DOI: 10.4018/978-1-7998-1009-4.ch010

Abstract

The business and societal transformation project (B&STP) of a modern business and global environment needs a well-designed holistic global security management system (HGSMS) that, in turn, depends on measurable success factors; these factors are used for the evolution of the transformation process. During the last decade, due to the global insecurity and financial crisis, the security strategies were not efficient. That is mainly due to the fact that businesses depend on security standards, law, cyber and information technology evolution, enterprise architecture, business engineering, and multilevel interoperability. They are restricted to blindfolded infrastructure security operations and/or martial like legal cases. Major B&STPs are brutally wrecked by various security violations that may cause a no-go decision. Most of such security misfits are used for internal politics, while highly important issues and teams' problems are simply ignored.
Chapter Preview
Top

Introduction

They are restricted to blindfolded infrastructure security operations and/or martial-like legal cases. Major B&STPs are brutally wrecked by various security violations that may cause a no-go decision. Most of such security misfits are used for internal politics, while highly important issues and teams' problems are simply ignored. The most damaging fact is that business environments lose their transformational momentum, what can negatively affect their business sustainability and leave it open to security breaches and financial loses. Financial Technology (FinTech) is the latest technology buzzword that aims to change the traditional financial environment in the delivery of interactive financial services. In this chapter, the author proposes a set of managerial recommendations on how to avoid such critical situations. Today many security architectures exist, and even when very advanced, unfortunately they often follow a silo model.

Key Terms in this Chapter

TOGAF: The Open Group’s architecture framework.

RQ: Research question.

ICs: Information and communication system.

ADM: Architecture development method.

Manager: Business transformation manager.

DMS: Decision-making system.

Project: Business transformation project.

CSA: Critical success area.

TKM&F: Trad Kalpic methodology and framework.

Complete Chapter List

Search this Book:
Reset