1,610 research outputs found

    Capability driven development: an approach to designing digital enterprises

    Get PDF
    The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-014-0362-0[EN] The need for organizations to operate in changing environments is addressed by proposing an approach that integrates organizational development with information system (IS) development taking into account changes in the application context of the solution. This is referred to as Capability Driven Development (CDD). A meta-model representing business and IS designs consisting of goals, key performance indicators, capabilities, context and capability delivery patterns, is being proposed. The use of the meta-model is validated in three industrial case studies as part of an ongoing collaboration project, whereas one case is presented in the paper. Issues related to the use of the CDD approach, namely, CDD methodology and tool support are also discussed.This work has been partially supported by the EU-FP7 funded project no: 611351 CaaS - Capability as a Service in Digital Enterprises.Berzisa, S.; Bravos, G.; Cardona Gonzalez, T.; Czubayko, U.; España, S.; Grabis, J.; Henkel, M.... (2015). Capability driven development: an approach to designing digital enterprises. Business and Information Systems Engineering. 57(1):15-25. https://doi.org/10.1007/s12599-014-0362-0S1525571ArchiMate (2013) An enterprise modeling language from the Open Group. http://www.opengroup.org/archimate/ . Accessed 3 Dec 2014Asadi M, Ramsin R (2008) MDA-based methodologies: an analytical survey. In: Proceedings Model driven architecture – foundations and applications (ECMDA-FA 2008), LNCS 5095, pp 419–431Barney JB (1991) Firm resources and sustained competitive advantage. J Manag 17(1):99–120Bērziša S, Bravos G, Gonzalez Cardona T, Czubayko U, España S, Grabis J, Henke lM, Jokste L, Kampars J, Koc H, Kuhr J, Llorca C, Loucopoulos P, Juanes Pascua lR, Sandkuh lK, Simic H, Stirna J, Zdravkovic J (2014) Deliverable 1.4: Requirements specification for CDD, CaaS – capability as a service for digital enterprises. FP7 project no 611351, Riga Technical University, Latvia. Submitted for reviewBubenko JA Jr, Persson A, Stirna J (2001) User guide of the knowledge management approach using enterprise knowledge patterns. Deliverable D3, IST programme project hypermedia and pattern based knowledge management for smart organisations. project no. IST-2000-28401, Royal Institute of Technology, SwedenBriand LC, Yue T, Labiche Y (2011) A systematic review of transformation approaches between user requirements and analysis models. Requir Eng 16:75–99De Kinderen S, Gordijn J, Akkermans H (2009) Reasoning about customer needs in multi-supplier ICT service bundles using decision models. In: Proceedings 11th international conference on enterprise information systems (ICEIS 2009), pp 131–136Deloitte (2009) Cloud computing: forecasting change. Deloitte Consulting, New York. http://public.deloitte.no/dokumenter/2_Cloud_Computing%5B1%5D.pdf . Accessed 3 Dec 2014Dey A (2001) Understanding and using context. Pers Ubiquitous Comput 5(1):4–7Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object-oriented software architecture. Addison-Wesley, BostonGomes D, Gonçalves JM, Santos R, Aguiar R (2010) XMPP based context management architecture. In: Proceedings GLOBECOM workshop, IEEE, pp 1372–1377González A, España S, Ruiz M, Pastor Ó (2011) Systematic derivation of class diagrams from communication-oriented business process models. In: 12th working conference on business process modeling, development, and support (BPMDS’11). Springer LNBIP 81, pp 246–260Henkel M, Stirna J (2010) Pondering on the key functionality of model driven development tools: the case of mendix. In: Forbrig P, Günther H (eds) Proceedings business informatics research (BIR 2010), Springer LNBIP 64, pp 146–160Hervas R, Bravo J, Fontecha J (2010) A context model based on ontological languages – a proposal for information visualisation. J Univers Comput Sci 16(12):1539–1555Jarke M, Loucopoulos P, Lyytinen K, Mylopoulos J, Robinson W (2011) The brave new world of design requirements. Information Syst 36(7):992–1008Kaplan RS, Norton DP (2004) Strategy maps: converting intangible assets into tangible outcomes. Harvard Business School Press, BostonKleppe A, Warmer J, Bast W (2013) MDA explained. Addison-Wesley, BostonLoniewski G, Insfran E, Abrahao L (2010) A systematic review of the use of requirements engineering techniques in model-driven development. In: Proceedings model driven engineering languages and systems (MODELS 2010), Part II, LNCS 6395, pp 213–227Mohagheghi P, Dehlen V (2008) Where is the proof? - a review of experiences from applying MDE in industry. In: Proceedings model driven architecture – foundations and applications (ECMDA-FA 2008). LNCS 5095. Springer, Heidelberg, pp 432–443Nilsson AG, Tolis C, Nellborn C (eds) (1999) Perspectives on business modelling: understanding and changing organisations. Springer, HeidelbergOASIS (2011) Reference architecture foundation for service oriented architecture version 1.0, committee specification draft 03/public review draft 02 06 July 2011. http://docs.oasis-open.org/soa-rm/soa-ra/v1.0/soa-ra.pdf . Accessed 3 Dec 2014OMG (2011a) UML superstructure. http://www.omg.org/spec/UML/2.4.1/ . Accessed 3 Dec 2014OMG (2011b) Business process model and notation. http://www.omg.org/spec/BPMN/2.0/ . Accessed 3 Dec 2014Osterwalder A, Pigneur Y (2003) Modeling value propositions in e-business. Proc 5th international conference on electronic commerce (ICEC 2003). ACM Conference Proceedings Series 50Papazoglou MP, Yang J (2002) Design methodology for web services and business processes. In: Proceedings 3rd international workshop on technologies for e-services (TES 03). LNCS 2444. Springer, Heidelberg, pp 54–64Pastor O, Giachetti G (2010) Linking goal-oriented requirements and model-driven development. In: Intentional perspectives on information systems engineering. Springer, Heidelberg, pp 257–276Porter ME (1985) Competitive advantage: creating and sustaining superior performance. Free Press, New YorkRuiz M, Costal D, España S, Franch X, Pastor Ó (2014) Integrating the goal and business process perspectives in information system analysis. In: 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014). LNCS 8484. Springer, Heidelberg, pp 332–346Sheng Q, Yu J, Dustar S (eds) (2010) Enabling context-aware web services: methods, architectures, and technologies. Chapman & Hall/CRC, Boca RatonSmanchat S, Ling S, Indrawan M (2008) A survey on context-aware workflow adaptations. In: Proceedings 6th international conference on advances in mobile computing and multimedia (MoMM 2008), New York, pp 414–417Stirna J, Grabis J, Henkel M, Zdravkovic J (2012) Capability driven development – an approach to support evolving organizations. In: The practice of enterprise modeling (PoEM 2012). LNBIP 134. Springer, Heidelberg, pp 117–131Vale S, Hammoudi S (2009) COMODE: a framework for the development of context-aware applications in the context of MDE. In: Proceedings 4th international conference on internet and web applications and services (ICIW 2009). IEEE, Venice, pp 261–266Wesenberg H (2011) Enterprise modeling in an agile world. In: Johannesson P, Krogstie J, Opdahl AL (eds) The practice of enterprise modeling (PoEM 2011). LNBIP 92. Springer, Heidelberg, pp 126–130Zdravkovic J, Stirna J, Henkel M, Grabis J (2013) Modeling business capabilities and context dependent delivery by cloud services. In: Proceedings advanced information systems engineering (CAiSE 2013). LNCS 7908. Springer, Heidelberg, pp 369–38

    Recombinant Service System Engineering

    Get PDF
    Although many methods have been proposed for engineering services and customer solutions, most of these approaches give little consideration to recombinant service innovation. In an age of smart products and smart data, we can, however, expect that many of future service innovations need to be based on adding, transferring, dissociating, and associating existing value propositions. The purpose of this paper is to outline what properties constitute recombinant service innovation and to identify if current service engineering approaches fulfill these properties. Based on a conceptual in-depth analysis of 24 service engineering methods, we identify that most methods focus on designing value propositions instead of service systems, view service independent of physical goods, are linear or iterative, and incompletely address the mechanisms of recombinant innovation. We discuss how these deficiencies can be remedied and propose a first conceptual model of a revised service system engineering approach

    Working Notes from the 1992 AAAI Workshop on Automating Software Design. Theme: Domain Specific Software Design

    Get PDF
    The goal of this workshop is to identify different architectural approaches to building domain-specific software design systems and to explore issues unique to domain-specific (vs. general-purpose) software design. Some general issues that cut across the particular software design domain include: (1) knowledge representation, acquisition, and maintenance; (2) specialized software design techniques; and (3) user interaction and user interface

    Combining SOA and BPM Technologies for Cross-System Process Automation

    Get PDF
    This paper summarizes the results of an industry case study that introduced a cross-system business process automation solution based on a combination of SOA and BPM standard technologies (i.e., BPMN, BPEL, WSDL). Besides discussing major weaknesses of the existing, custom-built, solution and comparing them against experiences with the developed prototype, the paper presents a course of action for transforming the current solution into the proposed solution. This includes a general approach, consisting of four distinct steps, as well as specific action items that are to be performed for every step. The discussion also covers language and tool support and challenges arising from the transformation

    BoSDL: An Approach to Describe the Business Logic of Software Services in Domain-Specific Terms

    Get PDF
    Modular SaaS platforms that can flexibly be configured with software services, microservices, and the advent of the API economy provide new opportunities to realize even highly customized solutions in the cloud. The success of such endeavors depends on the ability of consumers to discriminate between offered services and choose those best fulfilling the requirements, though. To facilitate the assessment of services against functional requirements, this article proposes the Business-Oriented Service Description Language (BoSDL). It consists of: (1) a meta-model with rules to describe the business logic, that is, the functionality of a software service from a business-oriented perspective; (2) a textual presentation format based on English natural language; (3) a graphical notation based on the UML. Findings from a controlled experiment indicate that, compared to the state of the art, the information provided with the BoSDL enhances the ability of consumers to judge if software services satisfy existing functional requirements

    Privacy conflict analysis in web interaction models

    Get PDF
    User privacy has become an important topic with strong implications for the manner by which software systems are designed and used. However, it is not a straightforward consideration on how the instrumentation of data processing activities contribute to the privacy risk of data subjects when interacting with data processors online. In this work, we present a series of methods to assist Data Protection Officers (DPOs) in the modelling and review of data processing activity between data processors online. We articulate an awareness formalism to model the knowledge gain of data processors and the privacy expectations of a data subject. Privacy conflict is defined in this work as an event where the expectations of the data subject do not align with the data processors knowledge gain resulting from data processing activity. We introduce a Selenium workflow for the elicitation of data processing activity of web services online in the creation of an information flow network model. We further articulate a series of privacy anti-patterns to be matched as attributes on this model to identify data processing activity between two data processors facilitating conflict between data subjects and processors. Each anti-pattern illustrates a distinct manner by which conflict can arise on the information flow model. We define privacy risk as the ratio of third party data processors that facilitate an anti-pattern to the total number of third party data processors connected to a first party data processor. Risk in turn quantifies the privacy harm a data subject may incur when interacting with data processors online. Pursuant to the reduction of privacy risk, we present a multi objective approach to model the inherit tensions of balancing the utility of a data subject against the cost incurred by a data processor in the removal of anti-patterns. We present our approach to first elicit the Pareto efficient set of anti-patterns, before operating on a utility function of programmable biases to output a single recommendation. We evaluate our approach against trivial selection strategies to reduce privacy risk and illustrate the key benefit of a granular approach to analysis. We conclude this work with an outlook on how the work can be expanded along with critical reflections

    Designing Trustworthy Autonomous Systems

    Get PDF
    The design of autonomous systems is challenging and ensuring their trustworthiness can have different meanings, such as i) ensuring consistency and completeness of the requirements by a correct elicitation and formalization process; ii) ensuring that requirements are correctly mapped to system implementations so that any system behaviors never violate its requirements; iii) maximizing the reuse of available components and subsystems in order to cope with the design complexity; and iv) ensuring correct coordination of the system with its environment.Several techniques have been proposed over the years to cope with specific problems. However, a holistic design framework that, leveraging on existing tools and methodologies, practically helps the analysis and design of autonomous systems is still missing. This thesis explores the problem of building trustworthy autonomous systems from different angles. We have analyzed how current approaches of formal verification can provide assurances: 1) to the requirement corpora itself by formalizing requirements with assume/guarantee contracts to detect incompleteness and conflicts; 2) to the reward function used to then train the system so that the requirements do not get misinterpreted; 3) to the execution of the system by run-time monitoring and enforcing certain invariants; 4) to the coordination of the system with other external entities in a system of system scenario and 5) to system behaviors by automatically synthesize a policy which is correct
    corecore