The Business Transformation Framework and Enterprise Architecture Framework for Managers in Business Innovation: The Role of Cyber and Information Technology Security in Automated Business Environments

The Business Transformation Framework and Enterprise Architecture Framework for Managers in Business Innovation: The Role of Cyber and Information Technology Security in Automated Business Environments

Antoine Trad (Institute of Business and Information Systems Transformation Management, France) and Damir Kalpić (University of Zagreb, Croatia)
DOI: 10.4018/978-1-5225-5927-6.ch002

Abstract

The business transformation project (BTP) of a modern business environment needs a well-designed information and cyber technology security automation concept (ITSAC) that, in turn, depends on measurable success factors. These factors are used for the evolution of the transformation process. During the last decade, due to the global insecurity and financial crisis, the security strategies are not efficient. That is mainly due to the fact that businesses depend on security standards, cyber and information technology evolution, enterprise architecture, business engineering, and multilevel interoperability. They are restricted to blindfolded infrastructure security operations. Major BTPs are brutally wrecked by various security violations that may cause a no-go decision.
Chapter Preview
Top

Background

In a holistic cybersecurity architecture, the Business Transformation Manager’s (BTM) role is important and his or her (for simplicity, in further text – his) decisions are aided by using factors within an implemented applied mathematical model. A large set of factors can influence such a mathematical model, including: a) the role of the cybersecurity enforcement control by using ITSAC; b) global geopolitical factors; c) political and cultural setup; d) level of skills; e) cyber and technological conditions; f) financial competition and financial greediness; and g) security, financial and legal control mechanisms. A systems approach is the optimal to model such controls (Daellenbach & McNickle, 2005; Trad & Kalpić, 2016a). As shown in Figure 1, the decision model interacts with the external world via an implemented framework to manage the security risks and that is this article’s focus.

Figure 1.

The research framework’s concept

978-1-5225-5927-6.ch002.f01
Source: Trad & Kalpić (2016a)

Key Terms in this Chapter

Environment: This research’s framework.

Critical Success Factors: Can be used to manage the statuses and gaps in various project plans and gives the Projects the capacity to proactively and automatically recognize erroneous building blocks and to just-in-time reschedule the project plan(s).

Project: Business transformation project.

AofABE: Architect of adaptive business environments.

Manager: Business transformation manager.

ADM: Architecture development method.

TOGAF: The open group’s architecture framework.

Complete Chapter List

Search this Book:
Reset