4,573 research outputs found

    Towards an interoperable metamodel suite: size assessment as one input

    Full text link
    In recent years, many metamodels have been introduced in the software engi- neering literature and standards. These metamodels vary in their focus across, for example, process, product, organizational and measurement aspects of software development and have typically been developed independently of each other with shared concepts being only accidental. There is thus an increasing concern in the standards communities that possible conicts of structure and semantics between these various metamodels will hinder their widespread adoption. The complexity of these metamodels has also increased significantly and is another barrier in their appreciation. This complexity is compounded when more than one metamodel is used in the lifecycle of a software project. Therefore there is a need to have interoperable metamodels. As a first step towards engendering interoperability and/or possible mergers between metamodels, we examine the size and complexity of various meta- models. To do this, we have used the Rossi and Brinkkemper metrics-based approach to evaluate the size and complexity of several standard metamodels including UML 2.3, BPMN 2.0, ODM, SMM and OSM. The size and complexity of these metamodels is also compared with the previous version of UML, BPMN and Activity diagrams. The comparatively large sizes of BPMN 2.0 and UML 2.3 suggest that future integration with these metamodels might be more difficult than with the other metamodels under study (especially ODM, SSM and OSM)

    The dynamics of digital platform innovation: unfolding the paradox of control and generativity in Apple's iOS

    Get PDF
    Mobile digital platforms provide an architectural basis for third party innovation of platform complements. Platform owners have property rights, enabling them to establish a boundary of permissible innovation demarcating the permitted from the prohibited. This allows for the curation of complements, which provides a means of controlling for value creation. Consequently, platform innovationthe innovation of platform complements is occasionally refused by platform owners. When this occurs tensions may arise between the two parties over where the boundary of permissible innovation should lie. Tussles may break out, embodied in complex interactions, as each party attempts to get its way. Eventually an outcome is achieved, and a platform innovation is either allowed or prohibited. A body of platform innovation literature is emerging from fields including information systems. Whilst this literature considers many aspects of platform innovation, the dynamics concerning the control of the innovation of platform innovation complements is overlooked. This research attempts to address that gap. Its relevance to information systems concerns the digitalisation of platforms as systemsdigital infrastructures, which affects their capacity for innovation and regulation. This research uses the method of narrative networks to analyse 45 examples of contested platform innovation. This approach, informed by empirical data sourced from over 4500 blog entries, identifies patterned sequences of actions across the examples. These sequences describe how tension builds, how control is asserted, and how control is then resisted. A theory of formal managerial control is used to explain how mechanisms of control are applied by platform owners as well as how developers respond to control. The principle contribution of this research is to theory. It develops and presents a theory to describe and explain the dynamics of contested innovation of complements on curated digital platforms. In doing so, iIt challenges the understanding that the platform owner alone controls platform design rules and concerning which platform complements are allowed, and which are notthe boundary of permissible innovation. Furthermore, tThe study indicates opens up the possibility that the forces of digitalisation provide third parties with the power to affect influence platform architecture, but at the cost of additional means of being controlled

    Improving the Information Security Model by using TFI

    Get PDF
    In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.Monograph's chapter

    The SEC-system : reuse support for scheduling system development

    Get PDF
    Recently, in a joint cooperation of Stichting VNA, SAL Apotheken, the Faculty of Management and Organization, and the University Centre for Pharmacy, University of Groningen in the Netherlands, a Ph.D-study started regarding Apot(he)ek, Organization and Management (APOM). The APOM-project deals with the structuring and steering of pharmacy organization. The manageability of the internal pharmacy organization, and the manageability of the direct environment of pharmacy organization is the subject matter. The theoretical background of the APOM-project is described. A literature study was made to find mixes of objectives. Three mixes of objectives in pharmacy organization are postulated; the product mix, the process mix, and the customer mix. The typology will be used as a basic starting point for the empirical study in the next phase of the APOM-project.

    The use of non-formal information in reverse engineering and software reuse

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Within the field of software maintenance, both reverse engineering and software reuse have been suggested as ways of salvaging some of the investment made in software that is now out of date. One goal that is shared by both reverse engineering and reuse is a desire to be able to redescribe source code, that is to produce higher level descriptions of existing code. The fundamental theme of this thesis is that from a maintenance perspective, source code should be considered primarily as a text. This emphasizes its role as a medium for communication between humans rather than as a medium for human-computer communication. Characteristic of this view is the need to incorporate the analysis of non-formal information, such as comments and identifier names, when developing tools to redescribe code. Many existing tools fail to do this. To justify this text-based view of source code, an investigation into the possible use of non-formal information to index pieces of source code was undertaken. This involved attempting to assign descriptors that represent the code's function to pieces of source code from IBM's CICS project. The results of this investigation support the view that the use of nonformal information can be of practical value in redescribing source code. However, the results fail to suggest that using non-formal information will overcome any of the major difficulties associated with developing tools to redescribe code. This is used to suggest future directions for research

    Adopting or adapting? The tension between local and international mindsets in portuguese management

    Get PDF
    One of the effects of the globalization process has been the diffusion of international management mindsets. Such a process of diffusion may be contributing to an increasing homogeneity of managerial practice around the world, but important differences still remain. The research reported in this article analyzes management as a process in the making, i.e. as a dynamic interplay between local culture, history and conditions, and the diffusion/adoption of international managerial techniques. The topic is approached inductively, through interviews with 71 managers based in Portugal. The article makes two main contributions: it analyzes management as a dialectical interplay between local factors and imported management knowledge, and helps to describe management practice in this Latin European country. Results suggest that the change process occurring in managerial practice in Portugal derives from the tension between a parochial mindset, inherited from almost five decades of dictatorship and its confrontation with a new global mindset. Some managers may be approaching this tension dialectically, through the enactment of a synthesis, which some informants interpret as potentially leading to a new Latin managerial touchglobal management, management in Latin Europe, Portugal, dialectics

    Towards a better understanding of the e-health user: comparing USE IT and Requirements study for an Electronic Patient Record.

    Get PDF
    This paper compares a traditional requirements study with 22 interviews for the design of an electronic patient record (EPR) and a USE IT analysis with 17 interviews trying to understand the end- user of an EPR. Developing, implementing and using information technology in organizations is a complex social activity. It is often characterized by ill-defined problems or vague goals, conflicts and disruptions that result from organizational change. Successfully implementing information systems in healthcare organizations appears to be a difficult task. Information Technology is regarded as an enabler of change in healthcare organizations but (information) technology adoption decisions in healthcare are complex, because of the uncertainty of benefits and the rate of change of technology. (Job) Relevance is recognized as an important determinant for IS success but still does not find its way into a systems design process

    Role-Based Access-Control for Databases

    Get PDF
    Liikudes ĂŒha enam paberivaba ari suunas, hoitakse ĂŒha enam tundlikku informatsiooni andmebaasides. Sellest tulenevalt on andmebaasid rĂŒndajatele vÀÀrtuslik sihtmĂ€rk. Levinud meetod andmete kaitseks on rollipĂ”hine ligipÀÀsu kontroll (role-based access control), mis piirab sĂŒsteemi kasutajate Ă”iguseid vastavalt neile omistatud rollidele. Samas on turvameetmete realiseerimine arendajate jaoks aeganĂ”udev kĂ€sitöö, mida teostatakse samaaegselt rakenduse toimeloogika realiseerimisega. Sellest tulenevalt on raskendatud turva vajaduste osas kliendiga lĂ€birÀÀkimine projekti algfaasides. See omakorda suurendab projekti reaalsete arenduskulude kasvamise riski, eriti kui ilmnevad turvalisuse puudujÀÀgid realisatsioonis. TĂ€napĂ€eva veebirakendustes andmebaasi ĂŒhenduste puulimine (connec-tion pooling ), kus kasutatakse ĂŒht ja sama ĂŒhendust erinevate kasutajate teenindamiseks, rikub vĂ€hima vajaliku Ă”iguse printsiipi. KĂ”ikidel ĂŒhendunud kasutajatel on ligipÀÀs tĂ€pselt samale hulgale andmetele, mille tulemusena vĂ”ib lekkida tundlik informatsioon (nĂ€iteks SQLi sĂŒstimine (SQL injection ) vĂ”i vead rakenduses). Lahenduseks probleemile pakume vĂ€lja vahendid rollipĂ”hise ligipÀÀsu kontorolli disainimiseks tarkvara projekteerimise faasis. RollipĂ”hise ligipÀÀsu kontorolli modelleerimiseks kasutame UML'i laiendust SecureUML. Antud mudelist on vĂ”imalik antud töö raames valminud vahenditega genereerida koodi, mis kontrollib ligipÀÀsu Ă”iguseid andmebaasi tasemel. Antud madaltasemekontroll vĂ€hendab riski, et kasutajad nĂ€evad andmeid, millele neil ligipÀÀsu Ă”igused puuduvad. Antud töös lĂ€biviidud uuring nĂ€itas, et mudelipĂ”hine turvalisuse arendamise kvaliteet on kĂ”rgem vĂ”rreldes programmeerijate poolt kirjutatud koodiga. Kuna turvamudel on loodud projekteerimise faasis on selle semantiline tĂ€ielikkus ja korrektsus kĂ”rge, millest tulenevalt on seda kerge lugeda ja muuta ning seda on lihtsam kasutada arendajate ja klientide vahelises suhtluses.With the constant march towards a paperless business environment, database systems are increasingly being used to hold more and more sensitive information. This means they present an increasingly valuable target for attackers. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. However the implementation of the RBAC policy remains a human intensive activity, typically, performed at the implementation stage of the system development. This makes it difficult to communicate security solutions to the stakeholders earlier and raises the system development cost, especially if security implementation errors are detected. The use of connection pooling in web applications, where all the application users connect to the database via the web server with the same database connection, violates the the principle of minimal privilege. Every connected user has, in principle, access to the same data. This may leave the sensitive data vulnerable to SQL injection attacks or bugs in the application. As a solution we propose the application of the model-driven development to define RBAC mechanism for data access at the design stages of the system development. The RBAC model created using the SecureUML approach is automatically translated to source code, which implements the modelled security rules at the database level. Enforcing access-control at this low level limits the risk of leaking sensitive data to unauthorised users. In out case study we compared SecureUML and the traditional security model, written as a source code, mixed with business logic and user-interface statements. The case study showed that the model-driven security development results in significantly better quality for the security model. Hence the security model created at the design stage contains higher semantic completeness and correctness, it is easier to modify and understand, and it facilitates a better communication of security solutions to the system stakeholders than the security model created at the implementation stage
    • 

    corecore