133,364 research outputs found

    A software reference architecture for semantic-aware big data systems

    Get PDF
    Context: Big Data systems are a class of software systems that ingest, store, process and serve massive amounts of heterogeneous data, from multiple sources. Despite their undisputed impact in current society, their engineering is still in its infancy and companies find it difficult to adopt them due to their inherent complexity. Existing attempts to provide architectural guidelines for their engineering fail to take into account important Big Data characteristics, such as the management, evolution and quality of the data. Objective: In this paper, we follow software engineering principles to refine the ¿-architecture, a reference model for Big Data systems, and use it as seed to create Bolster, a software reference architecture (SRA) for semantic-aware Big Data systems. Method: By including a new layer into the ¿-architecture, the Semantic Layer, Bolster is capable of handling the most representative Big Data characteristics (i.e., Volume, Velocity, Variety, Variability and Veracity). Results: We present the successful implementation of Bolster in three industrial projects, involving five organizations. The validation results show high level of agreement among practitioners from all organizations with respect to standard quality factors. Conclusion: As an SRA, Bolster allows organizations to design concrete architectures tailored to their specific needs. A distinguishing feature is that it provides semantic-awareness in Big Data Systems. These are Big Data system implementations that have components to simplify data definition and exploitation. In particular, they leverage metadata (i.e., data describing data) to enable (partial) automation of data exploitation and to aid the user in their decision making processes. This simplification supports the differentiation of responsibilities into cohesive roles enhancing data governance.Peer ReviewedPostprint (author's final draft

    Analysing the IoT Ecosystem: the Barriers to Commercial Traction

    Get PDF
    The Internet of Things (IoT) has come to mean all things to all people. Combined with the huge amount of interest and investment into this emerging opportunity, there is a real possibility that the arising confusion will hamper adoption by the mass market. This paper proposes a phased model of the IoT ecosystem development, starting with infrastructure establishment, and culminating in exploitation through the creation of new companies and business models. It does not attempt to quantify the emerging opportunities, relying instead on the many publications dedicated to detailed market analysis. The focus is to place the opportunities in context, demonstrate the importance of sensor system technology underpinning the emerging IoT revolution, and suggests areas where Europe can establish a leadership position. Throughout the paper, examples of the likely protagonists have been used by way of illustration

    How can SMEs benefit from big data? Challenges and a path forward

    Get PDF
    Big data is big news, and large companies in all sectors are making significant advances in their customer relations, product selection and development and consequent profitability through using this valuable commodity. Small and medium enterprises (SMEs) have proved themselves to be slow adopters of the new technology of big data analytics and are in danger of being left behind. In Europe, SMEs are a vital part of the economy, and the challenges they encounter need to be addressed as a matter of urgency. This paper identifies barriers to SME uptake of big data analytics and recognises their complex challenge to all stakeholders, including national and international policy makers, IT, business management and data science communities. The paper proposes a big data maturity model for SMEs as a first step towards an SME roadmap to data analytics. It considers the ‘state-of-the-art’ of IT with respect to usability and usefulness for SMEs and discusses how SMEs can overcome the barriers preventing them from adopting existing solutions. The paper then considers management perspectives and the role of maturity models in enhancing and structuring the adoption of data analytics in an organisation. The history of total quality management is reviewed to inform the core aspects of implanting a new paradigm. The paper concludes with recommendations to help SMEs develop their big data capability and enable them to continue as the engines of European industrial and business success. Copyright © 2016 John Wiley & Sons, Ltd.Peer ReviewedPostprint (author's final draft

    The IoT Tree of Life

    Get PDF
    The Internet of Things (IoT) has come to mean all things to all people. Combined with the huge amount of interest and investment into this emerging opportunity, there is a real possibility that the arising confusion will hamper adoption by the mass market. The SILC team have used their extensive Sensor Systems market and technical knowledge in an attempt to clarify the situation for individuals interested in understanding IoT, and the underpinning role of Sensor Systems. This paper proposes a phased model of the IoT ecosystem, starting with infrastructure establishment, and culminating in exploitation through the creation of new companies and business models. It does not attempt to quantify the emerging opportunities, relying instead on the many publications dedicated to detailed market analysis. The focus is to place the opportunities in context, demonstrate the importance of sensor system technology underpinning the emerging IoT revolution, and suggests areas where the UK could establish leadership positions. Throughout the paper, examples of the likely protagonists have been used by way of illustration

    The Elimination of the Sexual Exploitation of Children: Two Policy Briefings

    Get PDF
    The Oak Foundation child-abuse programme has funded and supported a range of civil society actors over the course of the last ten years, with the aim of reducing the incidence of the sexual exploitation of children, focusing primarily on work in East Africa, Eastern and Central Europe, Brazil and India. The Foundation is committed to expanding this work, focusing 50 percent of resources over the next five years, within two priority areas: * The elimination of the sexual exploitation of children; * The positive engagement of men and boys in the fight against the sexual abuse of children. Under the first of these priorities Oak Foundation requested Knowing Children to produce two documents to guide a strategic-planning meeting of the child-abuse team in mid-October 2011: * Reducing societal tolerance of sexual exploitation of children; * Preventing children's entry into all forms of sexual exploitation

    Natural resources conservation management and strategies in agriculture

    Get PDF
    This paper suggests a holistic framework for assessment and improvement of management strategies for conservation of natural resources in agriculture. First, it incorporates an interdisciplinary approach (combining Economics, Organization, Law, Sociology, Ecology, Technology, Behavioral and Political Sciences) and presents a modern framework for assessing environmental management and strategies in agriculture including: specification of specific “managerial needs” and spectrum of feasible governance modes (institutional environment; private, collective, market, and public modes) of natural resources conservation at different level of decision-making (individual, farm, eco-system, local, regional, national, transnational, and global); specification of critical socio-economic, natural, technological, behavioral etc. factors of managerial choice, and feasible spectrum of (private, collective, public, international) managerial strategies; assessment of efficiency of diverse management strategies in terms of their potential to protect diverse eco-rights and investments, assure socially desirable level of environmental protection and improvement, minimize overall (implementing, third-party, transaction etc.) costs, coordinate and stimulate eco-activities, meet preferences and reconcile conflicts of individuals etc. Second, it presents evolution and assesses the efficiency of diverse management forms and strategies for conservation of natural resources in Bulgarian agriculture during post-communist transformation and EU integration (institutional, market, private, and public), and evaluates the impacts of EU CAP on environmental sustainability of farms of different juridical type, size, specialization and location. Finally, it suggests recommendations for improvement of public policies, strategies and modes of intervention, and private and collective strategies and actions for effective environmental protection

    Service Design Against Organised Crime

    Get PDF
    This paper proposes benefits of using service design against organised crime. As a vehicle to this discussion, the focus is an anti-child-trafficking project at Northumbria University in the UK, involving its multidisciplinary Northumbria Crime Prevention Network. The last 10 years have shown increasing evidence of people trafficking, internationally (DoS, 2010), generally for the purposes of illegal labour and/or sex. A significant fraction of those who are trafficked are children. The majority of these children are in their mid-teens, but some are as young as five years old. The C4 persona-based critical design process, (Hilton, 2008), is proposed to strategically enable a service design approach to counter organised crime, by first developing the required criminal personas in order to use their competitive perspectives in critical review of the preventative initiatives. Opportunities from such a service design approach, to child trafficking for example would include new means of: interruption or redirection of child trafficking services so that these children end up in legitimate care; also the proposition of considering new opportunities and improvements in child trafficking service routes and processes as a means of second guessing how and where Recruiters, Transporters, and Exploiters, (Van Dijck, 2005), might next be found operating, and then through border and security agencies successfully countered
    corecore