20,543 research outputs found

    A General Framework for Complex Network Applications

    Full text link
    Complex network theory has been applied to solving practical problems from different domains. In this paper, we present a general framework for complex network applications. The keys of a successful application are a thorough understanding of the real system and a correct mapping of complex network theory to practical problems in the system. Despite of certain limitations discussed in this paper, complex network theory provides a foundation on which to develop powerful tools in analyzing and optimizing large interconnected systems.Comment: 8 page

    Using Design Patterns, Analysis Pattern, and Case-Based Reasoning to Improve Information Modeling and Method Engineering in Systems Development

    Get PDF
    Information modeling (IM) is the process of identifying information needs and models based onuser requirements and systems analysts’ perceptions during systems analysis and design. WhenIM is done correctly, it facilitates communication between the analysts and end-users about thefinal software product. In addition, successful IM provides a formal basis for both the analystsand the end-users about the tools and techniques that will be used in software development(SD), which, in turn, reduces costly overruns in time and money during systemsimplementation. Method engineering (ME) is the process of designing, constructing, andadapting information modeling methods for information systems development. As Siau (2003)and Kavakli (2005) point out that, while there has been a steady increase in IM and ME research(e.g. Kawalek & Wastell 2003, Kavakli 2005, Matulevicius 2005), most of the models reportedin recent literature are still primarily based on common sense approach, and, as a result, lack aslid theoretical foundation.This paper discusses the feasibility of combining design patterns (DPs), analysis patterns (APs) andcase-based reasoning (CBR) to improve information modeling and method engineering. Recentresearch in DP, AP, and CBR has proven that all those methods are effective in softwaredevelopment. In this paper, we propose a model that combines DP, AP and CBR as a tool toimprove IM and ME. We believe that the use of DP and AP, along with CBR will facilitate easiercommunication among systems analysts, end-users and software engineers thus improve on heefficiency in software development. In the paper, we also provide illustrative examples fromaccounting systems design to show the effectiveness of our proposed model. Finally, we provideevidence in this paper that the practical application of DPs, APs and CBR to systems developmentmakes it possible to identify and resolve critical issues and risks at earlier stages in IM and ME, andeventually lead to high quality end product

    Value-driven Security Agreements in Extended Enterprises

    Get PDF
    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example

    The ecological system of innovation: A new architectural framework for a functional evidence-based platform for science and innovation policy

    Get PDF
    Models on innovation, for the most part, do not include a comprehensive and end-to-end view. Most innovation policy attention seems to be focused on the capacity to innovate and on input factors such as R&D investment, scientific institutions, human resources and capital. Such inputs frequently serve as proxies for innovativeness and are correlated with intermediate outputs such as patent counts and outcomes such as GDP per capita. While this kind of analysis is generally indicative of innovative behaviour, it is less useful in terms of discriminating causality and what drives successful strategy or public policy interventions. This situation has led to the developing of new frameworks for the innovation system led by National Science and Technology Policy Centres across the globe. These new models of innovation are variously referred to as the National Innovation Ecosystem. There is, however, a fundamental question that needs to be answered: what elements should an innovation policy include, and how should such policies be implemented? This paper attempts to answer this question.Innovation; Delphi Method; Balanced Scorecard; Quadruple Helix Theory; Analytic Hierarchy Process; Ecological System of Innovation, Framework, Systems Dynamics

    A Conceptual Model for Scholarly Research Activity

    Get PDF
    This paper presents a conceptual model for scholarly research activity, developed as part of the conceptual modelling work within the ???Preparing DARIAH??? European e-Infrastructures project. It is inspired by cultural-historical activity theory, and is expressed in terms of the CIDOC Conceptual Reference Model, extending its notion of activity so as to also account, apart from historical practice, for scholarly research planning. It is intended as a framework for structuring and analyzing the results of empirical research on scholarly practice and information requirements, encompassing the full research lifecycle of information work and involving both primary evidence and scholarly objects; also, as a framework for producing clear and pertinent information requirements, and specifications of digital infrastructures, tools and services for scholarly research. We plan to use the model to tag interview transcripts from an empirical study on scholarly information work, and thus validate its soundness and fitness for purpose

    A framework for selecting workflow tools in the context of composite information systems

    Get PDF
    When an organization faces the need of integrating some workflow-related activities in its information system, it becomes necessary to have at hand some well-defined informational model to be used as a framework for determining the selection criteria onto which the requirements of the organization can be mapped. Some proposals exist that provide such a framework, remarkably the WfMC reference model, but they are designed to be appl icable when workflow tools are selected independently from other software, and departing from a set of well-known requirements. Often this is not the case: workflow facilities are needed as a part of the procurement of a larger, composite information syste m and therefore the general goals of the system have to be analyzed, assigned to its individual components and further detailed. We propose in this paper the MULTSEC method in charge of analyzing the initial goals of the system, determining the types of components that form the system architecture, building quality models for each type and then mapping the goals into detailed requirements which can be measured using quality criteria. We develop in some detail the quality model (compliant with the ISO/IEC 9126-1 quality standard) for the workflow type of tools; we show how the quality model can be used to refine and clarify the requirements in order to guarantee a highly reliable selection result; and we use it to evaluate two particular workflow solutions a- ailable in the market (kept anonymous in the paper). We develop our proposal using a particular selection experience we have recently been involved in, namely the procurement of a document management subsystem to be integrated in an academic data management information system for our university.Peer ReviewedPostprint (author's final draft

    Open semantic service networks

    Get PDF
    Online service marketplaces will soon be part of the economy to scale the provision of specialized multi-party services through automation and standardization. Current research, such as the *-USDL service description language family, is already defining the basic building blocks to model the next generation of business services. Nonetheless, the developments being made do not target to interconnect services via service relationships. Without the concept of relationship, marketplaces will be seen as mere functional silos containing service descriptions. Yet, in real economies, all services are related and connected. Therefore, to address this gap we introduce the concept of open semantic service network (OSSN), concerned with the establishment of rich relationships between services. These networks will provide valuable knowledge on the global service economy, which can be exploited for many socio-economic and scientific purposes such as service network analysis, management, and control
    corecore