25 research outputs found

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Constitutive surveillance and social media

    Get PDF
    Starting from the premise that surveillance is the ‘dominant organising practice’ of our time (Lyon et al 2012: 1), this thesis establishes a framework of ‘constitutive surveillance’ in relation to social media, taking Facebook as its key example. Constitutive surveillance is made up of four forms: economic, political, lateral, and oppositional surveillance. These four surveillance forms – and the actors who undertake them – intersect, compound, and confront one another in the co-production of social media spaces. The framework of constitutive surveillance is structured around a Foucauldian understanding of power, and the thesis shows how each surveillance form articulates strategies of power for organising, administering, and subjectifying populations. After outlining the four surveillance forms, each chapter unpacks the relationship of one form to social media, building throughout the thesis an extensive critical framework of constitutive surveillance

    Who Governs the Internet? The Emerging Policies, Institutions, and Governance of Cyberspace

    Full text link
    There remains a widespread perception among both the public and elements of academia that the Internet is ungovernable . However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous architectures of control have nevertheless become pervasive. So who, then, governs the Internet? Our contentions are that the Internet is, in fact, being governed; that it is being governed by specific and identifiable networks of policy actors; and that an argument can be made as to how it is being governed. This project will develop a new conceptual framework for analysis that deconstructs the Internet into four policy layers with the aim of formulating a new political architecture that accurately maps out and depicts authority on the Internet by identifying who has demonstrable policymaking authority that constrains or enables behavior with intentional effects. We will then assess this four-layer model and its resulting map of political architecture by performing a detailed case study of U.S. national cybersecurity policy, post-9/11. Ultimately, we will seek to determine the consequences of these political arrangements and governance policies

    The Proceedings of the European Conference on Social Media ECSM 2014 University of Brighton

    Get PDF
    corecore