Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31108
Requirements Engineering via Controlling Actors Definition for the Organizations of European Critical Infrastructure

Authors: Jiri F. Urbanek, Jiri Barta, Oldrich Svoboda, Jiri J. Urbanek


The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes of supply - customer chains and networks. A controlling is generalized capability to have control over situational policy. This paper aims and purposes are to introduce the controlling as quite new necessary process attribute providing for critical infrastructure is environment the capability and profit to achieve its commitment regarding to the effectiveness of the quality management system in meeting customer/ user requirements and also the continual improvement of critical infrastructure organization’s processes overall performance and efficiency, as well as its societal security via continual planning improvement via DYVELOP modelling.

Keywords: Environments, controlling, DYVELOP, added value, process approach

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1481


[1] Barta, J., Sadovska, V., Srnik, A., Urbanek, J. F. Protection of Information and Communication Systems. Environmental Software Systems. Fostering Information Sharing, 2013, vol. 2013, no. 413, p. 302-310. ISSN 1868-4238.
[2] Kral, D., Urbanek, J. F. Enterprise Crisis Continuity Scenarios on the Competitive Environments, In Enterprise and the Competitive Environment 2014 Conference, ECE 2014, Mendel University Press, Brno 2014, ISBN 978-80-87106-74-7.
[3] Ludik, T., Barta, J., Navratil, J. Design Patterns for Emergency Management Processes. In International conference World Academy of Science, Engineering and Technology, 2013, vol. 2013, no. 84, p. 515- 522. ISSN 2010-3778.
[4] Rehak D, Grasseova M. The ways of assessing the security of organization information systems through SWOT analysis, pp. 162-184. DOI: 10.4018/978-1-61350-311-9.ch007. In ALSHAWI, Mustafa, ARIF, Mohammed (eds.). Cases on E-Readiness and Information Systems Management in Organizations: Tools for Maximizing Strategic Alignment. 1st edition. Hershey, PA, USA: IGI Global, 2011. 318 p. ISBN 978-1-61350-311-9. DOI: 10.4018/978-1-61350-311-9
[5] Urbánek, J. F. Dynamic Vector Logistics of Processes. In Philadelphia State University, 1999, ISSN 1091-8043.
[6] Urbanek, J. F., Balaz, T., Barta, J., Prucha, J. Technology of Computer- Aided Adaptive Camouflage. In: WSEAS International Conference on Computers and Computing (ICCC´11). Lanzarote: neuveden, 2011, p. 81-87. ISSN 2223-2753. ISBN 978-1-61804-000-8.
[7] Urbanek, J. F. et al. Crisis Scenarios. Brno: University of Defence, Monika Promotion Ltd. 2013, ISBN 978-80-7231-934-3.
[8] Yourdon, E. Modern structured analysis. Englewood Cliffs: Prentice- Hall, 1989.
[9] Zeigler, B., Praehofer, H., Kim, T. G. Theory of modeling and simulation: Integrating discrete event and continuous complex dynamic systems. Vyd. 2. San Diego: Academic Press, 2000, 510 s. ISBN 0-12- 778455-1
[10] ISO/DIS 22 301-303: 2012; BS 7799-3:2006
[11] ISO 9001, 9004: 2000, 2008