The ability to respond to change is an ongoing concern in information systems engineering. Designing flexible and adaptable information technology (IT) solutions is challenging due to difficulties in identifying and p...
详细信息
ISBN:
(数字)9783319192437
ISBN:
(纸本)9783319192437;9783319192420
The ability to respond to change is an ongoing concern in information systems engineering. Designing flexible and adaptable information technology (IT) solutions is challenging due to difficulties in identifying and predicting adaptation needs influenced by environmental changes and enterprise competitive positioning. In this paper, we draw upon theories in strategic management, particularly conceptions of dynamic capabilities that deal with sustainable advantage, to identify and represent enterprise requirements. This research enables analysis of enterprise transformation by modeling coupling and alignment between IT and organizational capabilities using the i* framework. Potential inflexibilities and impact of changes are studied with analysis of dependency propagations. A hypothetical case using experiences from SOA and BPM implementations demonstrates use of the proposed modeling constructs.
This paper explores novel forms of technological and digital societal innovation putting the full potential of the Future of Internet into Web-based innovation, web-Entrepreneurship and Internationalization (IEI) of b...
详细信息
ISBN:
(数字)9783319192437
ISBN:
(纸本)9783319192437;9783319192420
This paper explores novel forms of technological and digital societal innovation putting the full potential of the Future of Internet into Web-based innovation, web-Entrepreneurship and Internationalization (IEI) of businesses. It introduces an approach to extend and complement existing incubation environments, which are no longer sufficient to deal with the dynamicity of the Web-Entrepreneur. Based on personal and professional relations, and new business models empowered by social media and the Web 2.0, together with a set of interoperable ICT services supporting virtual or agile enterprises, the authors propose a federation of open-source platforms for the to-be born and existing enterprise life-cycle management, instantiating the Unified Digital Enterprise concept. The novel approach ensures full reuse of existing solutions, developing targeted research to support web-entrepreneurship with cooperation between people, businesses, and assets, namely focusing on innovative methods and architectures for competitive intelligence;crowd-based market sensing;idea incubation and simulation;knowledge intensive team building;as well as interoperability to enable internal federation and external platform integration.
In this paper, we focus on demand side management in consumer collectives with community owned renewable energy generation and storage facilities for effective integration of renewable energy with the existing fossil ...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
In this paper, we focus on demand side management in consumer collectives with community owned renewable energy generation and storage facilities for effective integration of renewable energy with the existing fossil fuel-based power supply system. The collective buys energy as a group through a central coordinator who also decides about the storage and usage of renewable energy produced by the collective. Our objective is to design coordination algorithms to minimize the cost of electricity consumption of the consumer collective while allowing the consumers to make their own consumption decisions based on their private consumption constraints and preferences. Minimizing the cost is not only of interest to the consumers but is also socially desirable because it reduces the consumption at times of peak demand. We develop an iterative coordination algorithm in which the coordinator makes the storage decision and shapes the demands of the consumers by designing a virtual price signal for the agents. We prove that our algorithm converges, and it achieves the optimal solution under realistic conditions. We also present simulation results based on real world consumption data to quantify the performance of our algorithm.
During the long-term period of a nuclear disaster, people living in contaminated territories need to gain knowledge in order to take protective actions. While existing representations of this knowledge are designed fo...
详细信息
ISBN:
(纸本)9783319243993;9783319243986
During the long-term period of a nuclear disaster, people living in contaminated territories need to gain knowledge in order to take protective actions. While existing representations of this knowledge are designed for experts, we propose a thesaurus of radiation safety built for the lay people. We present a methodology to extract such a thesaurus from a set of documents addressed to non-experts. Extension of the corpus and implementation of more automated processes are still required to improve the resulting thesaurus.
Data warehouses (DW) and OLAP systems are technologies allowing the on-line analysis of huge volume of data according to decision-makers' needs. Designing DW involves taking into account functional requirements an...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
Data warehouses (DW) and OLAP systems are technologies allowing the on-line analysis of huge volume of data according to decision-makers' needs. Designing DW involves taking into account functional requirements and data sources (mixed design methodology) [1]. But, for complex applications, existing automatic design methodologies seem inefficient. In some cases, decision-makers need querying, as a dimension, data which have been defined as facts by actual automatic mixed approachs. Therefore, in this paper, we offer a new mixed refinement methodology relevant to constellation multidimensional schema. The proposed methodolgy allows to decision-makers to enrich a dimension with factual data. In order to validate our theoretical proposals, we have implemented an enrichment tool and we have tested it on a real case study from bird biodiversity.
For decision making in a community, a set of alternatives needs to be identified. The set of alternatives should be consistent with recognition in a community (Social context). In this study, we define "social co...
详细信息
ISBN:
(数字)9783319215365
ISBN:
(纸本)9783319215365;9783319215358
For decision making in a community, a set of alternatives needs to be identified. The set of alternatives should be consistent with recognition in a community (Social context). In this study, we define "social context" as typical wording in community. Such wording appears in newspaper articles. We focus on the issue of bicycle riding in Japan and clarify the change of social context by using newspaper article. We show that wording in newspaper articles on bicycle riding in Japan has been changed during the past 11 years.
The Requirements Engineering (RE) community recognizes the importance of trust proposing several approaches to model and analyze trust requirements. However, such approaches mainly focus on trust as social relations w...
详细信息
ISBN:
(纸本)9783319258973;9783319258966
The Requirements Engineering (RE) community recognizes the importance of trust proposing several approaches to model and analyze trust requirements. However, such approaches mainly focus on trust as social relations without relating them to the requirements of the system's components. We propose a belief-based trust approach based on an extended version of Secure Tropos, where social relations are modeled and analyzed along with beliefs concerning capabilities and motivations of system's components. An example concerning US stock market crash (the Flash Crash) is used to illustrate our approach.
Due to the propagation of devices with imaging capabilities, the amount of pictures taken in public spaces has risen. Due to this, unintentionally photographed bystanders are often represented in pictures without bein...
详细信息
ISBN:
(纸本)9783319267623;9783319267616
Due to the propagation of devices with imaging capabilities, the amount of pictures taken in public spaces has risen. Due to this, unintentionally photographed bystanders are often represented in pictures without being aware of it. Social networks and search engines make these images easier accessible due to the available meta-data and the tagging and linking functionality provided by these services. Facial recognition amplifies the privacy implications for the individuals in these pictures. Overall there exist three main classes of wearable picture-related Privacy Enhancing Technologies (PETs). As they need different prerequisites to operate and become effective they have unique time frames in the future where they can be effective even if introduced today. The group of face pattern destroying picture PETs work directly against current face detection algorithms and is the choice for immediate usage. These PETs destroy face patterns and inhibit the detection and automated processing and meta-data enrichment of individuals. This unconditionally visual destructive behavior can be a major obstacle in transition to other PETs. In this paper, we describe how to master a smooth transition between these classes including the restoration of the visual damage some of these methods entail. Furthermore, we propose the Smart Privacy Visor, a PET which combines the previously published Privacy Visor and the Picture Privacy Policy Framework. The overall goal of this transition is to create a PET that avoids identifiable and linkable properties which contradicts the goals of picture PETs in the first place and offer a visually appealing photographic result at the same time.
As the interest in DevOps continues to grow, there is an increasing need for software organizations to understand how to adopt it successfully. This study has as objective to clarify the concept and provide insight in...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
As the interest in DevOps continues to grow, there is an increasing need for software organizations to understand how to adopt it successfully. This study has as objective to clarify the concept and provide insight into existing challenges of adopting DevOps. First, the existing literature is reviewed. A definition of DevOps is then formed based on the literature by breaking down the concept into its defining characteristics. We interview 13 subjects in a software company adopting DevOps and, finally, we present 11 impediments for the company's DevOps adoption that were identified based on the interviews.
Portable devices have been experimented for data acquisition in different domains, e.g., logistics and census data acquisition. Nevertheless, their large-scale adoption depends on the development of effective applicat...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
Portable devices have been experimented for data acquisition in different domains, e.g., logistics and census data acquisition. Nevertheless, their large-scale adoption depends on the development of effective applications with a careful interaction design. In this work, we revisit existing strategies for mobile application design and evaluation and use the Semiotic Ladder from Organizational Semiotics as an artifact to organize a set of guidelines. We propose a set of semiotic-informed guidelines with questions for evaluation of mobile application interfaces. We also propose a methodology for the evaluation of mobile application interfaces based on the proposed guidelines set. We demonstrate the use of the proposed methodology in the evaluation of four mobile application interfaces designed for phenological data acquisition in the field.
暂无评论