275,509 research outputs found
Recommended from our members
A Semantic-based framework for discovering business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modeling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. This paper focuses on business process patterns and proposes an initial framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework synthesizes the idea from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Managing innovation uncertainties : a user-oriented knowledge typology
New product development processes are subject to uncertainties. These uncertainties can and should be managed to prevent innovations from failing. Uncertainties or knowledge deficits are addressed by deploying the right approaches, or learning activities to stimulate relevant inflows of knowledge. A typology of user-oriented knowledge types is key to overcome the reluctance of organizations towards multi-actor involvement and user-oriented learning activities. Here, we present a user-oriented knowledge typology departing from the end-user, embedded in a two-states framework (current state opposing future state). We discuss three iterations of the framework, including an expert review and real-world application as part of a workshop with intermediary organizations. When implemented, the framework enabled participants to identify and select learning activities enriching their innovation project. We want to underline our vision to transcend the gut-feeling and experience-driven allocation of learning activities, but instead strive towards optimal activity-selection based on the knowledge deficit at hand
Organization of Multi-Agent Systems: An Overview
In complex, open, and heterogeneous environments, agents must be able to
reorganize towards the most appropriate organizations to adapt unpredictable
environment changes within Multi-Agent Systems (MAS). Types of reorganization
can be seen from two different levels. The individual agents level
(micro-level) in which an agent changes its behaviors and interactions with
other agents to adapt its local environment. And the organizational level
(macro-level) in which the whole system changes it structure by adding or
removing agents. This chapter is dedicated to overview different aspects of
what is called MAS Organization including its motivations, paradigms, models,
and techniques adopted for statically or dynamically organizing agents in MAS.Comment: 12 page
The channels of technology acquisition in commercial firms, and the NASA dissemination program
Technology acquisition in commercial firms, and NASA dissemination progra
Migrating agile methods to standardized development practice
Situated process and quality frame-works offer a way to resolve the tensions that arise when introducing agile methods into standardized software development engineering. For these to be successful, however, organizations must grasp the opportunity to reintegrate software development management, theory, and practice
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not properly addressed by organizations. We contribute to reverse this situation by introducing a framework composed of a method for identification and assessment of insider threat risks and of two supporting deliverables for awareness of insider threat. The deliverables are: (i) attack strategies structured in four decomposition trees, and (ii) a matrix which correlates defense strategies, attack strategies and control principles. The method output consists of goal-based requirements for the defense against insiders
- ā¦