Even though agile development has been known for many years, it is mainly used in information systems and is not common yet in embedded systems. Despite the mandatory regulations, the companies would like to increase ...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
Even though agile development has been known for many years, it is mainly used in information systems and is not common yet in embedded systems. Despite the mandatory regulations, the companies would like to increase the flexibility by the benefits of agile development. Thus, the idea is creating an Agile Capability Analysis with a subsequent Process Simulation, resulting in appropriate process extensions adhere to mandatory requirements. Because often agile methods require context-specific adaptations, we believe that the up-front investigation which agile practices to integrate into processes entails many benefits, especially in regulated domains.
This paper presents a novel task-oriented approach to crowdsource the drafting of a constitution. By considering micro-tasking as a particular form of crowdsourcing, it defines a workflow-based approach based on Onto2...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
This paper presents a novel task-oriented approach to crowdsource the drafting of a constitution. By considering micro-tasking as a particular form of crowdsourcing, it defines a workflow-based approach based on Onto2Flow, an ontology that models the basic concepts and roles to represent workflow-definitions. The approach is then applied to a prototype platform for constitution-making where human workers are requested to contribute to a set of tasks. The paper concludes by discussing previous approaches to participatory constitution-making and identifying areas for future work.
Mobile social networks are characterized by the sharing of user context information, such as the location of one's mobile device. The location information on a social network enables its operator to offer resource...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
Mobile social networks are characterized by the sharing of user context information, such as the location of one's mobile device. The location information on a social network enables its operator to offer resources for socialization, such as suggestions of new friends, products, and services, in relation to the user's geographical area. While some users view such suggestions as a personal gain, others view them as an invasion of privacy. Since this location information is shared by the users on social networks, it can be accessed by the users' friends and service providers, but also by malicious users. Unauthorized access can pose several risks regarding privacy and security. On the other hand, sharing a user's location with a particular friend or group of friends while concealing this information from the service provider would guarantee the security and privacy of the user's information. This paper presents a mobile social networking model with privacy guarantees concerning the sharing of its members' locations. The model allows users to personalize their privacy by setting rules that determine to whom, when, and where their location information can be made available. The model provides three levels of privacy, personalized by the user, using techniques of anonymity and dissemination or setting the location to ensure the concealment of information before it is made available on the social network. A proof of concept for the proposed model, called RSMPrivacy, was developed for the Android platform. The performance tests showed that the delays generated by the use of RSMPrivacy were proportional to, and justifiable for, the privacy levels desired and chosen by the users. RSMPrivacy was evaluated by 50 users on the aspects of usability and evidence of the efficiency of the techniques in the proposed model.
Replacement of the Project Manager (RPM) is a known phenomenon in information systems (IS) projects, but scholarly articles on the issue are scarce. To help fill this gap, this study provides an explanation of why RPM...
详细信息
ISBN:
(纸本)9783319217833;9783319217826
Replacement of the Project Manager (RPM) is a known phenomenon in information systems (IS) projects, but scholarly articles on the issue are scarce. To help fill this gap, this study provides an explanation of why RPM occurs in IS projects, how it unfolds over time, and how it affects a project. Based on the analysis of qualitative data, a process model is suggested. The model uses the concept of social mechanisms to explain causal relationships. The activation of deterioration mechanisms initiates the demand or need for RPM, and as a response project healing mechanisms are activated. If RPM is decided upon, handover mechanisms are activated, and after handover, the project experiences post-handover mechanisms. The model is a combination of teleological (goal directed) and dialectical (rival forces) motors, as both the joint and individual goals of the participants motivate RPM. However, the attainment of individual goals in some cases conflicts with others' goals during the RPM process.
An efficient process for gathering data from the field is crucial in managing crisis scenarios. In this paper we present a concept system for crisis management with focus on how observations from the field are reporte...
详细信息
ISBN:
(纸本)9783319243993;9783319243986
An efficient process for gathering data from the field is crucial in managing crisis scenarios. In this paper we present a concept system for crisis management with focus on how observations from the field are reported using hand held devices and integrated into a common operational picture. The application used for reporting situation from the field adapts to the current situation in real time by adding and hiding input field based on what the user is reporting. Moreover, the user interface will also adapt to external information request. This is realized by utilizing risk event models for real time risk assessment and identification of areas where information is lacking which can generate new requests for information.
Semantic integration remains a challenge, but it is particularly problematic in areas such as e-commerce, where ontologies are either nonexistent or have lightweight axiomatizations. In this paper we present a case st...
详细信息
ISBN:
(数字)9783319215457
ISBN:
(纸本)9783319215457;9783319215440
Semantic integration remains a challenge, but it is particularly problematic in areas such as e-commerce, where ontologies are either nonexistent or have lightweight axiomatizations. In this paper we present a case study that examines how two weak ontologies can be mapped together in the e-commerce setting. We also examine the role that upper-level interlingua ontologies can play in the development of ontology mappings.
This paper tells the story of my Agile Journey over the last 15 years. It is neither exceptionally rosy nor excessively pessimistic. It is an attempt to give an honest experience report.
ISBN:
(纸本)9783319186122;9783319186115
This paper tells the story of my Agile Journey over the last 15 years. It is neither exceptionally rosy nor excessively pessimistic. It is an attempt to give an honest experience report.
Human-centric business processes in the enterprise are knowledge-intensive, and rely on human judgment for decision making. This reliance impacts the integrity, uniformity, efficiency and consistency of the process en...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
Human-centric business processes in the enterprise are knowledge-intensive, and rely on human judgment for decision making. This reliance impacts the integrity, uniformity, efficiency and consistency of the process enactment over time. We describe our experience and challenges in driving the adoption of business process management tools in the sales process at a large IT services provider. We argue that in knowledge-driven and human-centric activities such as IT services sales, current technologies do not meet the needs. They do not support data capture and analytics around process and using it to reason about and take action on the process. Process definition and enactment, both, needs to be dynamic, flexible and adaptive based on the understanding of the state of affairs. We present a vision and a framework for a cognitive BPM system where the knowledge management, user interaction and analytics are employed to dynamically assess and proactively adapt the process based on the results of data analytics and continuous learning from the actions taken.
The story is about how we decided to activate potential of the teams in a product portfolio with 21 products and more than 400 people in 5 countries and started to build a learning organization where product teams sha...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
The story is about how we decided to activate potential of the teams in a product portfolio with 21 products and more than 400 people in 5 countries and started to build a learning organization where product teams share experience and knowledge with each other and improve. And this all driven by their own motivation. How? By organizing a community a bit different way, using peer hands-on support in between community sessions and by gamifying personal growth. This paper describes how we designed the community, piloted it for 3 months and summarizes the results. Teams are now much more connected cross team/product borders and they actively help each other to improve.
Service Based Systems (SBSs), like other software systems, evolve due to changes in both user requirements and execution contexts. Continuous evolution could easily deteriorate the design and reduce the Quality of Ser...
详细信息
ISBN:
(纸本)9783319179575;9783319179568
Service Based Systems (SBSs), like other software systems, evolve due to changes in both user requirements and execution contexts. Continuous evolution could easily deteriorate the design and reduce the Quality of Service (QoS) of SBSs and may result in poor design solutions, commonly known as SOA (Service Oriented Architecture) antipatterns. SOA antipatterns lead to a reduced maintainability and re-usability of SBSs. It is therefore critical to be able to detect and remove them to ensure the architectural quality of the software during its lifetime. In this paper, we present a novel approach named SOMAD-R (Service Oriented Mining for Antipattern Detection-Refactoring) which allows the refactoring of SOA antipatterns by building on a previously published tool named SOMAD (Service Oriented Mining for Antipattern Detection). SOMAD-R combines planning solving techniques and SOMAD detection algorithms to enable antipatterns driven refactoring of SBSs. As a first step towards refactoring antipatterns for SBSs, we successfully applied SOMAD-R to HomeAutomation, a SCA (Service Component Architecture) application and we removed three antipatterns (out of five) while improving application performance by 32%.
暂无评论