**8. References**


**Fifthly** the increasing inter-connections between IS systems **makes more and more difficult the estimation (and by consequent he management) of a given risk** by the traditional

The purpose of seeing the IS security models (like the ICT Security Company's System, the formula of Security and all the others mentioned in the publication) is to create a scientific approach to understand the nature of Is security issues, and to manage the connected problems in the most possible consistent way. The main advantage of an analytical approach is not only the possibility of always estimating costs, but also proficiency, adaptations and re-usability of an IS security architecture. Actually the IS security is perceived as a common sense knowing where the dominant perception is linked to experience; but the build-up of security performing rules requires a point of view beyond the pure empirical reports. The main perspective of IS security analysis is to create a "reference lay-out, in order to make global, measurable and repeatable lay-

The creation of models should be done by accurately considering and analyzing also the growing of interdependency of the complex integrated information systems that will continue and accelerate as more technologies are integrated to deliver rich services. Today we have no way to globally model, understand, monitor and manage the risks presented by the growth of these systems in other words to have the risk assessment in the forensics

The build-up of an interactive set of controlled models is the most suitable way for maintaining a "risk estimation forensics capacity" that should be able to evaluate, make real-time understandable, monitor and manage the measured rate of the security defensive profile of interconnected systems, align information architectures with organizational goals,

The applications are inclusive of all the IS architecture and a scientific analytical approach should became a the necessary doctrinal baseline when entering in an unplanned "systems

The impact of implementing the above mentioned solutions in terms of social, political, economical costs compared with the improvements of market benefits and if it is taken

Abbo D. – Sun L. (Feb - 2009) "*Security analysis of information systems*" IADIS International

Abbo D. – Sun L. (May - 2009) *"The patterns for information system security*" ICEIS 11th

Conference - e-Society Proceedings Vol II – Edited by Piet Kommers and Pedro

International Conference on Enterprise Information Systems- Proceedings of Information System Analysis and Specification – Edited by Josè Cordeiro and

statistical and /or among different information infrastructures.

outs.

domain.

**8. References** 

and help these process to cooperate.

of systems" where functionality override resilience.

Isaìas Barcellona – SPAIN.

Joaquim Filipe Milan – ITALY.

seriously by the Government can positively influence the GDPs


http://www.hyperdictionary.com/computing/national+information+infrastrucure.


**8** 

Stuart So

*Australia* 

*The University of Queensland,* 

**RFID, an Emerging Wireless Technology for** 

The main applications in the first wave of RFID have been in the supply chain mainly for improving the distribution of physical assets in the systems (Hardgrave and Miller, 2008; Sarma, 2008). The burgeoning use of RFID technology extends its applications to both upstream (supplier management) and downstream (retail and service) of manufacturing supply chains. RFID tags, also called "smart labels", together with other pervasive computing technologies realizes lean thinking in real-life and creates a smarter operating environment through adding *value* not only to customers with user-friendly shopping experience but also to merchants with agile and responsive store operations. Harrison and Hoek (2008), define *value* as relative advantage in general which is specified as *perceived benefit* obtained from the products or services in terms of the final customer, while as *economic profitability* in terms of the management, and the concept can be extended to other supply chain stakeholders as *value stream* which represents the *value-adding processes* beginning as raw materials from suppliers that are progressively converted into finished product bought by end-customers, such as aluminum is converted into one of the constituents of a can of coke. Being one of the management best practices, lean thinking preaches simplification and elimination of wasteful tasks, which is applicable to overly complex and nonintegrated processes that are inefficient and provide little added value. The firms following these practices have seen such dramatic improvement in performance that lean has spread across entire supply chains leading users to map their business processes to drive out *wastes* in operations, and becoming a lean enterprise has the potential to improve

operations, reduce costs and deliver services with shorter lead times (King, 2009).

Ohno (1988) identified seven kinds of manufacturing *waste* that need to be eliminated: *overproduction*; *transportation*; *inventory*; *motion*; *defects*; *over-processing*; and *waiting*. These seven wastes represent the most commonly wasted resources and associated wasteful manufacturing activities which do not add value or are unproductive, in which the concept can be applied in non-manufacturing. Womack and Jones (2003) defined the eighth waste, i.e. delivering goods or services *not meeting customer need*, which represents a key attribute of a customer-centric lean enterprise. Lean thinking is proved to be an effective management system for manufacturing to improve overall efficiency and to enhance the work environment, in which the "getting more with less" concept can be applied in any type of business upon value creation (Aikens, 2011; Russell and Taylor, 2009). By offering the benefits of reducing complexity, improving efficiency, speeding delivery, and

**1. Introduction** 

**Sustainable Customer Centric Operations** 

