• OpenAccess
    • List of Articles framework

      • Open Access Article

        1 - Proposing a model for IT services based assessment approach, based on IT Governance Model
        seyyed ahmad tabatabaei skch skch
        Nowadays one of the biggest problems of IT organizations in less developed countries is paying too much attention to infrastructure and technology of organizations. This is due to the point that many managers in organizations believe that existence of IT infrastructure More
        Nowadays one of the biggest problems of IT organizations in less developed countries is paying too much attention to infrastructure and technology of organizations. This is due to the point that many managers in organizations believe that existence of IT infrastructure and technology by itself is a sign of maturity of an organization. Although technical facilities and infrastructure such as networks, hardware, software etc., is essential for providing appropriate services and optimal performance, but these features cannot provide a competitive advantage and increase the maturity of the organization. The missing link in these organizations, which have been less considered, is how to use these features to achieve organizational goals. In different areas, there are several standards and optimal methods for defining and optimizing processes. Some of the most complex models which should be considered in different units of information technology are, models and frameworks related to IT governance. IT governance focuses on implementation and management of quality of IT services so as to meet business needs. IT governance is done by service providers through an appropriate combination of people, process and information technology. The purpose of this paper is to examine different models and frameworks of IT governance models, in order to propose a framework for assessing IT services Manuscript profile
      • Open Access Article

        2 - Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework
        Ali Razi reza rezaei ahmadali یزدان پناه
        The Iran’s national enterprise architecture framework (INEAF) has been adapted from the TOGAF framework and its architectural development method. In this framework, the use of agility paradigm is emphasized, but there is no basis for using agile methods and techniques. More
        The Iran’s national enterprise architecture framework (INEAF) has been adapted from the TOGAF framework and its architectural development method. In this framework, the use of agility paradigm is emphasized, but there is no basis for using agile methods and techniques. Based on the results obtained for the researcher, the studied sources did not indicate all the necessary solutions and features to develop an agile methodology based on the Iran’s national EA framework. According to Mr. Gill research, each modeling standard is different in scope and function, and since a modeling standard alone cannot support all the requirements of agile enterprise architecture, combining modeling standards is a suitable solution. In this paper, an agile enterprise architecture modeling methodology including ten solutions with a combination of six modeling standards ArchiMate, UML, BPMN, FAML, SoaML and BMM based on the Iran’s national EA framework is presented. The evaluation of the applicability of the proposed methodology is performed by the combined method (qualitative + quantitative). Qualitative evaluation is performed through a case study and quantitative evaluation is performed using multi-criteria decision making methods including ANP and DEMATEL. Data collection and information gathering and determining options and criteria, is performed through library studies and field methods, and using questionnaire, interview and observation tools. Based on the case study, combination of six standards by agile enterprise architecture modeling method based on the Iran’s national enterprise architecture framework is applicable. For quantitative evaluation of applicability in this paper, according to experts, four options have been proposed, which are based on the final weight: support by known tools, the ability to cover the artifacts of the Iran’s national enterprise architecture framework, efficiency or effectiveness, ease of learning or teachability. Manuscript profile
      • Open Access Article

        3 - Application identification through intelligent traffic classification
        Shaghayegh Naderi
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network More
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network is encrypted by secure communication protocols such as HTTPS. Encrypted traffic reduces the possibility of monitoring and detecting suspicious and malicious traffic in communication infrastructures (instead of increased security and privacy of the user) and its classification is a difficult task without decoding network communications, because the payload information is lost, and only the header information (which is encrypted too in new versions of network communication protocols such as TLS1.03) is accessible. Therefore, the old approaches of traffic analysis, such as various methods based on port and payload, have lost their efficiency, and new approaches based on artificial intelligence and machine learning are used in cryptographic traffic analysis. In this article, after reviewing the traffic analysis methods, an operational architectural framework for intelligent traffic analysis and classification has been designed. Then, an intelligent model for Traffic Classification and Application Identification is presented and evaluated using machine learning methods on Kaggle141. The obtained results show that the random forest model, in addition to high interpretability compared to deep learning methods, has been able to provide high accuracy in traffic classification compared to other machine learning methods. Finally, tips and suggestions about using machine learning methods in the operational field of traffic classification have been provided. Manuscript profile
      • Open Access Article

        4 - Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
        Mona Jami Pour Shahnaz Akbari Emami Safora Firozeh
        IT strategy is a key factor in improving the process and performance of companies in using IT. Hence, many companies have a strategic planning process, but only a few succeed in implementing strategies efficiently. Therefore, the purpose of this study is to design a pro More
        IT strategy is a key factor in improving the process and performance of companies in using IT. Hence, many companies have a strategic planning process, but only a few succeed in implementing strategies efficiently. Therefore, the purpose of this study is to design a process framework for implementing IT strategy; To identify the drivers, processes and consequences of implementing IT strategy in organizations. The present study is a qualitative research with a phenomenological approach and in order to collect data, open and in-depth interviews were conducted with 10 experts in the field of IT using theoretical sampling. The results of the analysis show that the inputs under the headings of IT strategy implementation include environmental requirements of business continuity, structural-system cohesion, technology-oriented human resources, IT strategic leadership, skill requirements and common values. The second aspect of the IT strategy implementation model includes the dimensions of IT program monitoring and communication, structural appropriateness, development of support policies, budgeting and resource allocation, appropriate training, and the development of supportive culture. Finally, the implications of implementing an IT strategy, including those related to finance, internal process, customer, and growth and learning, were categorized. Manuscript profile
      • Open Access Article

        5 - The framework of the national macro plan for transparency and information release based on the grounded theory method
        Mahdi Azizi MehmanDoost Mohammad Reza Hosseini reza taghipour Mojtaba Mazoochi
        The purpose of this research is to present the framework of the national plan for transparency and information release. The research employs an integrated approach (qualitative and quantitative) and grounded theory as its research methodology. In the qualitative part، w More
        The purpose of this research is to present the framework of the national plan for transparency and information release. The research employs an integrated approach (qualitative and quantitative) and grounded theory as its research methodology. In the qualitative part، with an in-depth and exploratory review of upstream laws and documents، models، theories، plans، and white papers of different countries related to transparency and information release، data analysis was done until theoretical saturation through three stages of open، axial، and selective coding. To acquire the dimensions، components، and subcomponents of this framework، 129 concepts were extracted from 620 primary codes، which were reduced to 593 secondary codes by removing the duplicated elements. Finally، 24 subcategories were placed under the five main components based on the paradigm model. In the quantitative section، the results of the analysis of the questionnaire indicated that، from a validity standpoint، the total value of the questionnaire، in different dimensions، was between 0.87 and 0.92، and the reliability coefficient was between 0.73 and 0.78. Based on data analysis، the establishment of a supranational management institution for transparency and information release، the precise determination of exceptions، network governance، demanding transparency، adherence to frameworks، maximum disclosure and support for legitimate disclosure، and the establishment of a data governance center are among the subcategories emphasized in this framework. Manuscript profile
      • Open Access Article

        6 - Application Identification Through Intelligent Traffic Classification
        Shaghayegh Naderi
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network More
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network is encrypted by secure communication protocols such as HTTPS. Encrypted traffic reduces the possibility of monitoring and detecting suspicious and malicious traffic in communication infrastructures (instead of increased security and privacy of the user) and its classification is a difficult task without decoding network communications, because the payload information is lost, and only the header information (which is encrypted too in new versions of network communication protocols such as TLS1.03) is accessible. Therefore, the old approaches of traffic analysis, such as various methods based on port and payload, have lost their efficiency, and new approaches based on artificial intelligence and machine learning are used in cryptographic traffic analysis. In this article, after reviewing the traffic analysis methods, an operational architectural framework for intelligent traffic analysis and classification has been designed. Then, an intelligent model for Traffic Classification and Application Identification is presented and evaluated using machine learning methods on Kaggle141. The obtained results show that the random forest model, in addition to high interpretability compared to deep learning methods, has been able to provide high accuracy in traffic classification (95% and 97%) compared to other machine learning methods. Finally, tips and suggestions about using machine learning methods in the operational field of traffic classification have been provided. Manuscript profile