Information Systems Development (eBook)
LIV, 974 Seiten
Springer US (Verlag)
978-0-387-84810-5 (ISBN)
This volume constitutes the published proceedings of the 17th International Conference on Information Systems Development. They present the latest and greatest concepts, approaches, and techniques of systems development - a notoriously transitional field.
Preface 5
Contents 7
Conference Organisation 37
Programme Chair 37
Organising Chair 37
International Advisory Committee 37
Local Organising Committee 37
Track Chairs 37
Information Systems Engineering & Management
Business Systems Analysis & Design
Intelligent Information Systems 38
Agile and High-Speed Systems Development Methods 38
Enterprise Systems Development & Adoption
Public Information Systems Development 38
Information Systems Development Education 38
Information Systems Development in Developing Nations 38
Legal and Administrative Aspects of Information Systems Development 38
Information Systems Research Methodologies 38
Service-Oriented Analysis and Design of Information Systems 39
IT Service Management 39
Philosophical and Theoretical Issues in Information Systems Development 39
Model-driven Engineering in ISD 39
Human Computer Interaction (HCI) in Information Systems Development 39
International Programme Committee 39
Contributors 44
Designing Class Methods from Dataflow Diagrams 54
1. Introduction 54
2. Overview of the Design Phase of FOOM 55
3. Transactions and Their Descriptions 56
3.1 What is a Transaction? 56
3.2 Top-Level Descriptions of Transactions 58
4. Detailed Design of Transactions and Class Methods 59
4.1 Steps in the Design of Transaction and Class Methods 59
4.2 From Top-Level to Detailed Transaction Descriptions 59
4.3 From Detailed Descriptions of Transaction to Class Methods 60
4.4 Message Charts 62
5. Summary 62
References 63
On The Human, Organizational, and Technical Aspects of Software Development and Analysis 64
1. Introduction 64
2. Non-Technical Aspects of Software Development 65
2.1 Social Aspects 65
2.2 Organizational Aspects 65
2.3 Psychological Aspects 66
2.4 Cultural Aspects 66
3. Social Disciplines of Computer Science 66
4. Socio-Technical Software Analysis 68
4.1 Concept, Context, and Aims of Socio-Technical Software Analysis 68
4.2 Socio-Technical Software Analysis vs. Traditional Domain Analysis 68
5. Discussion and Conclusions 69
References 70
Toward Modeling Language-Independent Integration of Dynamic Schemata 73
1. Introduction 73
2. Related Work 74
3. Guidelines for Language Independent Schema Integration 75
3.1 Phase 1 - Preparation of Source Schemata 75
3.2 Phase 2 - Recognition of Conflicts and Commonalities Between Source Schemata 76
3.3 Phases 3 and 4: Conflict Resolution and Schema Merging 76
4. Applying the Guidelines - A Motivating Example 77
4.1 The Applied Modeling Languages 77
4.2 Integrating Language-Independent Source Schemata 78
5. Summary and Conclusion 81
References 81
Improving Knowledge Management in the Health Service: Re-Engineering Approach Towards Successful Implementation 82
1. Introduction 82
2. Business Process Re-Engineering (BPR) 83
3. Knowledge Management (KM) 84
4. The Case Study 84
5. BPR Processes and Activities 86
5.1 Set Business Goals and Objectives for Implementing KM 87
5.2 Review Programme, Activities and Identify Communication Strategies 87
5.3 Estimate and Justify Cost for KM 87
5.4 Examine the Technical Challenges 87
5.5 ReDesign the Health-Care Project Management Process 88
5.5.1 Re-Engineer Towards IT Infrastructure 88
5.5.2 Consideration of KMS 88
5.6 Evaluate Change Management Issues 88
5.7 Implement the System 89
6. Limitations 89
7. Summary and Recommendations 89
8. Conclusion 89
Acknowledgement 90
References 90
Accounting, Charging and Billing for Dynamic Service Composition Chains 92
1. Introduction 92
2. ACB in Service Composition Chains 93
2.1 ACB in Static Service Composition Chains 94
2.1.1 Static Business Relationships 94
2.1.2 Static Service Composition Chains 94
2.1.3 ACB in Static Service Composition Chains 95
2.2 ACB in Dynamic Service Composition Chains 96
2.2.1 Dynamic Business Relationships 96
2.2.2 Dynamic Service Composition Chains 96
2.2.3 Impact on ACB in Dynamic Service Composition Chains 96
3. Dynamic Service Composition ACB Framework 97
3.1 Dynamic Service Composition Architecture 97
3.2 Framework Function Descriptions 98
3.2.1 Negotiation Layer 99
3.2.2 ACB Management Layer 99
4. Conclusion 99
References 99
Web Service Execution and Monitoring in Integrated Applications in Support of Business Communities 100
1. Introduction 100
2. Basic Business Scenario 101
3. Conceptual Architecture 102
3.1 Integration Tools 103
3.2 Component Execution 104
3.3 System Monitoring 105
4. Implementation Aspects 106
5. Summary and Conclusions 107
References 107
Scrutinizing UML Activity Diagrams 109
1. Introduction 109
2. The Flow Model 110
3. Some FM Features 110
4. Comparison of Some FM Features with UML 111
5. Conceptual Class Diagrams 113
6. Example of FM Capabilities: Exceptions in UML 2.0 115
7. Conclusion 117
References 117
Integration of Weakly Heterogeneous Semistructured Data 118
1. Introduction 118
2. Oceanographic Data Example 119
2.1 Querying Weakly Heterogeneous Data 120
3. Related Research 121
4. Proposed Approach 122
4.1 Query System Architecture 122
4.2 Mapping Schema 123
5. Conclusions and Future Work 126
Acknowledgments 126
References 126
Investigating the Applicability of Structural Analysis Techniques in Distributed Systems 128
1. Introduction 128
2. Structural Analysis Techniques 129
2.1 Support from Structural Analysis Techniques 130
3. Application to Distributed Systems 131
3.1 Proposed Technique 131
3.2 Application of Proposed Technique 133
4. Conclusion 137
References 137
Web-Based Systems Development: Analysis and Comparison of Practices in Croatia and Ireland 139
1. Introduction 139
2. The Software Industry in Croatia and Ireland 140
3. Research Method 140
4. Findings and Discussion 142
4.1 Small Development Teams and Collective Knowledge 142
4.2 Project Management and Requirements Management 142
4.3 Development Processes and Procedures 144
4.4 Attitudes Towards Documented Plans 145
5. Conclusions 146
References 147
The Solution Space Organization: Linking Information Systems Architecture and Reuse 149
1. Introduction 149
2. The Software Reuse Paradigm: A Literature Review 150
3. The Software Global Model 151
4. The Solution Space Structure 153
4.1 A Layered Description of the Solution Space 153
4.2 The Reuse Approach 155
5. Conclusion and Future Research Directions 156
References 156
Designing Cognition-Adaptive Human-Computer Interface for Mission-Critical Systems 158
1. Introduction 158
2. Literature Review 159
3. Design of Cognition-Adaptive Multimodal Interface (CAMI) 161
3.1 Motivation and Objectives 161
3.2 CAMI Design and Analysis 162
4. Multimodal Interface Development and Cognitive Task Analysis 164
5. Cognitive Load Analysis and Measurement 165
6. Conclusions and Future Work 165
References 166
Conceptual Web Users’ Actions Prediction for Ontology-Based Browsing Recommendations 167
1. Introduction 167
2. Related Works 168
3. Mining of Users’ Interest Concepts for Predictions 169
3.1 Web Ontology 169
3.2 Extraction of Users’ Interest Concepts into Prediction Model 170
4. Predictions on Sequential and Conceptual Models 171
4.1 Conceptual Distance Between Pages Accessed 172
4.2 Empirical Study of the Prediction Models 172
5. Conclusions 174
References 174
Web Portal Design: Employment of a Range of Assessment Methods 176
1. Introduction 176
2. Background to the Research 177
3. Study 1: Usability Testing 177
3.1 Research Design and Methodology 178
3.2 Results and Discussion of Findings 179
4. Study 2: Guideline-Based Inspection 180
4.1 Assessment Procedure 181
4.2 Results and Analysis 181
5. Conclusion and Future Steps 183
Acknowledgements 184
References 184
A Proposed Extension of the CODAM Model for Human Attention 185
1. Introduction 185
2. Control Theory Approach for Computational Modeling of Attention 186
3. Brief Description of the CODAM Model 186
4. Some Important Issues and Questions on Specific Characteristics of Attention 187
5. Proposed Modifications on the Attention Model 188
6. Discussion 190
References 190
Aligning Service Requirements with Business Strategy: A Proposed Stakeholder Value Model for SOA 192
1. Introduction 192
2. Service-Oriented Requirements Engineering - A Review 193
3. Applying a Value-Based Approach to Service Requirements 194
3.1 An Empirical Understanding of the Business Drivers for SOA 194
3.2 The Value Proposition of SOA 195
3.2.1 Strategic Value Proposition 195
3.2.2 Tactical Value Proposition 196
3.2.3 Operational Value Proposition 196
3.3 Proposing a Stakeholder Value Model for SOA 197
4. Contributions and Future Research 198
References 199
A New Method for Conceptual Modelling of Information Systems 200
1. Introduction 200
2. Intersubjective and Objective View in System Analysis 201
3. Integration of Static and Dynamic Aspects 203
4. Service-Oriented Modelling of Information Systems 205
5. Concluding Remarks 207
References 208
Using ESB and BPEL for Evolving Healthcare Systems Towards Pervasive, Grid-Enabled SOA 210
1. Introduction 210
2. A System Evolution Process 211
3. Motivating Scenario 213
4. System Architecture 214
5. Security Framework 216
5.1 Access Control Mechanism 216
5.2 Context Information Management 217
6. Concluding Remarks 217
References 218
MISS: A Metamodel of Information System Service 219
1. Introduction 219
2. Information System Service 220
2.1 Static Space 221
2.2 Dynamic Space 222
2.3 Rule Space 223
3. Examples of ISS 223
4. Modularity and Autonomy of ISS 225
5. Positioning and Future Work 226
6. Conclusion 227
References 227
An Examination on Service Science: A View from e-Service 229
1. Introduction 229
2. A Structure for Service Science 231
2.1 Representative Concepts 232
2.2 Four Subtopics from the Four Parts 233
2.3 Interdependencies Among the Four Parts 233
3. Context of Service Science 234
3.1 Service Interoperability 234
3.2 Service Management and Quality Control 235
4. Conclusion 235
References 237
Mapping SOA Artefacts onto an Enterprise Reference Architecture Framework 238
1. Introduction 238
2. The Reference Framework 239
3. Mapping Typical SOA Artefacts on the Reference Framework 240
3.1 SOA Ontologies 240
3.2 SOA Metamodels 240
3.3 SOA Reference Models and Reference Architectures 241
3.4 SOA Modelling/Documentation Framework 241
3.5 SOA Life Cycle and Service Life Cycle 242
3.6 SOA Vision 243
3.7 SOA Governance 244
3.8 The SOA Team 244
3.9 SOA Methodologies 244
3.10 SOA Quality of Service and Quality Control 244
3.11 Enterprise Service Bus and Policies 245
4. Conclusions and Further Work 245
References 245
Comparing Architectural Styles for Service-Oriented Architectures - a REST vs. SOAP Case Study 247
1. Motivation and Outline 247
2. Case Study 248
3. SOAP-Style architecture 250
4. REST-Style Architecture 251
5. Evaluation and Outlook 254
Acknowledgments 255
References 255
A Method for Transforming Existing Web Service Descriptions into an Enhanced Semantic Web Service Framework 256
1. Introduction 256
2. Enhanced CbSSDF (CbSSDF+) 257
3. Transformation Method 259
3.1 Step One: Ontology-Based Service Classification 259
3.2 Step Two: CUPs generation 260
3.3 Step Three: S-CGs Generation 260
3.4 An Illustrative Example 261
4. Evaluation 262
5. Conclusion 264
References 265
An Extensible ADL for Service-Oriented Architectures 266
1. Introduction 266
2. Meta Types 267
3. Interface Types 268
4. Connector Types 269
5. Component Types 270
6. Pattern Templates 273
7. Features 273
8. System 274
9. Discussion 275
References 275
Specification and Verification of an Agent-Based Auction Service 277
1. Introduction 277
2. Agent Negotiation Model 278
3. FSP Model of Agent Negotiation 280
3.1 Overview of the Modelling Approach 280
3.2 Auction Host 281
3.3 Auction Service Host 282
3.4 Buyer and Seller Roles 283
3.5 System with Buyers, Sellers and an Auction Service 283
4. Modelling System Properties 284
5. Conclusions and Future Work 285
References 285
A Practical Environment to Apply Model-Driven Web Engineering 287
1. Introduction 287
2. The Methodology 288
2.1 MÕtrica v3 288
2.2 NDT - Navigational Development Techniques 289
2.3 A Practical Combination Between MÕtrica v3 and NDT 290
3. Tool Support 291
3.1 NDT-Profile 291
3.2 CADI 292
4. The Practical Experience: The Diraya Project 293
5. Conclusions and Future Works 294
References 295
An Approach to Generating Program Code in Quickly Evolving Environments 297
1. Introduction 297
2. Related Works 298
3. Properties and Limitations of Standard Approach to Generating Program Code from Abstract Program Models 299
4. Analysis of Information Required to Configure Program Code Generator 300
5. Properties of Program Code Exploited by Program Code Generators 300
6. An Approach to Generating Program Code in Quickly Evolving Environments 301
7. A Method Proposal for the Structural Part of the Program Model 302
8. Conclusions and Future Work 303
References 304
Devising a New Model-Driven Framework for Developing GUI for Enterprise Applications 306
1. Introduction 306
2. Presentation Technologies 307
3. Diverse Presentation Technology Dilemma 310
4. Customizable Enterprise Data Administrator (CEDAR) 310
4.1 CEDAR Development Technology 311
4.2 CEDAR Presentation Designer 311
4.3 CEDAR Data Storage 311
4.4 CEDAR Application Architecture 312
4.5 CEDAR Designer Essentials 312
4.6 Technology-Specific Generation 315
5. Conclusion and Future Work 315
References 315
Model-Driven Development of Decision Support Systems: Tackling the Variability Problem 317
1. Introduction 317
2. Variability 318
3. Variability Management in BOM 319
3.1 The First Variability in BOM 321
3.2 The Second Variability in BOM 321
4. Model Transformations in BOM 322
5. Conclusions and Future Work 323
References 323
Foundations on Generation of Relationships Between Classes Based on Initial Business Knowledge 325
1. Introduction 325
2. Aggregation 327
3. Dependency 329
4. Generalization 331
5. Conclusions 332
Acknowledgements 333
References 333
Expert Systems Development Through Software Product Lines Techniques 334
1. Introduction 334
2. Foundations 335
3. The Architecture of the Expert Systems 335
3.1 The Variability in the Architecture of the Expert Systems 336
3.1.1 Variability in the Expert Systems Structure 336
3.1.2 Variability in the Expert Systems Behavior 337
4. Variability Management in BOM 339
5. Expert Systems Development in BOM 340
6. Conclusions and Future Work 341
Acknowledgments 341
References 341
Framework for Using Patterns in Model-Driven Development 343
1. Introduction 343
2. Model-Driven Development Paradigm and Software Patterns Overview 343
2.1 Model-Driven Development Paradigm 343
2.2 Software Patterns 344
2.2.1 Definition and Characteristics of Patterns 344
2.2.2 Pattern Classification and Standardization 345
3. Conditions for Using Patterns in MDD 345
4. Framework Development 346
4.1 Pattern Identification 347
4.2 Pattern Development 348
4.3 Pattern Use 349
4.4 Pattern Management 350
5. Conclusions 350
References 351
Ontology of Domain Analysis Concepts in Software System Design Domain 352
1. Introduction 352
2. Domain Ontology Engineering: Concepts, Aims, and Definitios 353
3. Domain Concepts in Known DA Approaches 354
4. Domain Taxonomy and Ontology 356
5. Taxonomy of Domain Analysis Concepts 358
6. Conclusions and Further Work 359
References 359
An Anonymity Revocation Technology for Anonymous Communication 361
1. Introduction 361
2. Current Work in the Area of Anonymity Revocation Technologies 362
3. Principles of an Anonymity Revocation Technology 362
4. Requirements of an Anonymity Revocation Technology 363
5. Analysis of an Anonymity Revocation Technology 365
6. Analysis of the Existing ARTs Based on the Requirements 366
7. Discussion 367
8. Conclusion and Future Work 368
References 368
The Fight Against Piracy in Peer-to-Peer Networks: the Sword of Damocles Hanging over ISP’s Head? 370
1. Introduction 370
2. The Role of ISPs as Neutral Intermediaries Endangered? 371
2.1 Developments in European Member States 371
2.2 Developments on European Level 372
3. The Danger of Private Censorship 372
4. The Protection of the Secrecy of Communications 373
4.1 Looking for an Appropriate Legal Ground: An Analysis of Article 15(1) of the E-Privacy Directive 374
4.2 The Existence of a Pressing Social Need 374
4.3 The Principle of Proportionality 375
5. Conclusion 376
References 377
Information Technology Projects - Leaving the ‘Magic’ to the ‘Wizards’ 379
1. In Search of the Magic Wand 379
2. A Cloak of Invisibility 381
3. Conclusions 384
References 385
Analysis of Academic Results for Informatics Course Improvement Using Association Rule Mining 387
1. Introduction 387
2. Principles of Association Rule Mining and Rule Metrics 388
3. Framework for Educational Data Mining Using Association Rules 389
4. Case Study: Mining Association Rules in ‘‘Object-Oriented Programming’’ Course 390
5. Conclusion and Future Work 392
References 392
The Automatic Integration of Folksonomies with Taxonomies Using Non-axiomatic Logic 394
1. Introduction 394
2. The Problem of Integration 395
3. An Approach to Tagging with Non-axiomatic Logic 396
4. Experiment 398
5. Evaluation 399
6. Conclusions 400
References 401
Using Rules in an ‘Intelligent’ Information Retrieval Environment 402
1. Introduction 402
2. A Rule System for ‘Intelligent’ Information Retrieval 404
2.1 Some Information about NKRL 404
2.2 General Principles about ‘Reasoning’ in NKRL 406
2.3 Some Additional Details 407
2.4 Integrating the Two Inference Modes of NKRL 408
3. Conclusion 409
References 410
Genetic Programming Modeling and Complexity Analysis of the Magnetoencephalogram of Epileptic Patients 411
1. Introduction 411
2. Genetic Programming 413
3. Results 414
4. Conclusions 418
References 418
A Three-Layer Approach to Testing of Multi-agent Systems 420
1. Introduction 420
1.1 Three-Layer Approach 421
2. First Layer - Unit Testing 421
2.1 Stochastic Approach 422
2.2 Agent’s Perception 423
3. Second Layer - Testing of Agent Interactions 423
4. Third Layer - Testing of the Whole System 425
4.1 System Bottlenecks 425
4.2 System Stability during Mass Crashes of Agents 425
5. Conclusions and Future Work 426
Acknowledgments 427
References 427
Risk Analysis Based Business Rule Enforcement for Intelligent Decision Support 429
1. Introduction 429
2. Related Works 430
3. A Method for Decision Automation Using Risk Analysis Based Business Rule Enforcement 432
4. Experimental Validation of the Method Using XForms 434
5. Conclusions 435
Acknowledgements 436
References 437
Sound Processing Features for Speaker-Dependent and Phrase-Independent Emotion Recognition in Berlin Database 438
1. Introduction 438
2. Basic Emotions 439
3. Sound/Speech Features 440
3.1 Sound Feature Selection 441
3.2 Calculation of Sound Features 442
4. Classification 443
4.1 Utterance-Dependent Emotion Recognition 443
4.2 Utterance-Independent Emotion Recognition 444
5. Conclusion and Future Work 444
References 445
An Approach for Implementation of Project Management Information Systems 447
1. Introduction 447
2. State of Art 448
2.1 Project Management Methodologies 448
2.2 Project Management Information System 449
2.3 Implementation of COTS Systems 449
3. Approach 449
4. Project Management Methodology Specification 450
5. Sample Application 453
6. Conclusion 455
Acknowledgments 455
References 455
From Standard Application Packages to Enterprise Systems - A Matter of Opportunities 456
1. Historical Review 456
2. Standard Application Packages 457
3. Enterprise Systems 457
4. Opportunities 458
4.1 Function Quality vs. Integration Quality 458
4.2 Customer-Driven Work vs. Vendor-Driven Work 459
4.3 Component View vs. Portfolio View 459
4.4 Expandability vs. Adaptability 460
4.5 Promoting System Concept vs. Controlling System Concept 460
5. The Connection 461
References 462
The Total Picture - A Framework for Control of IT Investments 464
1. Introduction 464
2. Research Method and Project Setting 465
3. Proposed Framework 466
3.1 The Project Level in the Framework 466
3.1.1 Different Types of Benefits 467
3.1.2 Principles of the Framework 467
3.2 The Total Picture Level in the Framework 468
3.2.1 The Total Picture - from a Cash Flow Perspective 468
4. Discussion: Applying a Lifetime Perspective and a Total Picture to Control IT Investments 469
5. Conclusions and Future Research 470
References 471
Design Patterns Application in the ERP Systems Improvements 473
1. Introduction 473
2. Review of Business Functionalities Analysis 474
3. Analysis of Ease of Maintenance and Design Patterns Usage 474
3.1 Analysis of Combined Results 475
3.1.1 Design Patterns Familiarity 476
4. Analysis of Existing Patterns in Dynamics AX 476
4.1 Strategy 476
4.1.1 Intent 476
4.1.2 Application in Dynamics AX 476
4.2 Iterator 477
4.2.1 Intent 477
4.2.2 Application in Dynamics AX 477
4.3 Template Method 478
4.3.1 Intent 478
4.3.2 Application in Dynamics AX 478
5. Improvement Possibilities for Dynamics AX Using Design Patterns 478
5.1 Software Metrics 478
5.2 Example in Dynamics AX 479
6. Conclusions 481
References 481
Determinants of Open Source Software Adoption - An Application of TOE Framework 482
1. Introduction 482
2. Research on IT Adoption and Implementation 483
3. Conceptual Model of Open Source Adoption 484
4. Research Method, Survey Design, and the Sample Description 485
5. Estimation of the TOE Model 487
6. Summary 489
References 489
Hybridization of Architectural Styles for Integrated Enterprise Information Systems 491
1. Introduction 491
2. Component-Based Integrated Enterprise Information System 492
3. Service-Oriented Architecture: Characteristics and Open Questions 493
4. Hybrid Architecture for Integrated Enterprise Information Systems 495
4.1 Components and Services as Architecture Level Concepts 495
4.2 Main Architectural Decisions to Build IEIS 495
4.3 Using SysML for IEIS Architectural Modeling 497
5. Concluding Remarks 498
References 498
Proposing a Formalised Model for Mindful Information Systems Offshoring 500
1. Introduction 500
2. Background and Motivation 501
2.1 Offshoring: The Case of Ireland and Germany 501
2.2 Literature Context 501
3. Research Framing 502
3.1 Theoretical Considerations 502
3.2 Research Approach 502
4. Towards a Mindful Offshoring Model 503
4.1 Mindless Offshoring Equation 503
4.2 Mindful Offshoring Equation 503
5. Analysis and Suggestions 504
5.1 Possible Endogenous Variables 504
5.2 Offshoring Coefficient 504
5.3 Elasticity Analysis of the Equation Parameters 505
6. Discussion 506
6.1 Assignment of Values to the Parameters 506
6.2 Implications for Theory and Practice 506
6.3 Limitations and Suggestions for Future Work 506
7. Conclusions 507
References 507
Negotiating a Systems Development Method 509
1. Introduction 509
2. Research Design 510
2.1 Theoretical Underpinnings 510
2.2 Case Description and Data Collection 511
3. The Negotiating Process of Method Tailoring 512
3.1 Negotiation 1 - Basic Principles 512
3.2 Negotiation 2 - Storyboards 513
3.3 Negotiation 3 - Bug Report Template 513
3.4 Negotiation 4 - Standardization of Web Page Template Documentation 515
4. Reflections on Method Tailoring as Negotiation 515
5. Conclusion 516
References 516
A Hybrid Peer-to-Peer Solution for Context Distribution in Mobile and Ubiquitous Environments 518
1. Introduction 518
2. A Hybrid Peer-to-Peer Based Context Distribution System 519
2.1 A Hybrid Peer-to-Peer Infrastructure for Context Distribution 520
2.2 Context Network and Distribution Service 521
2.3 Scope of Context Distribution 522
3. Comparison with Related Work 523
4. Evaluation 524
5. Conclusions 526
References 526
Rules Transformation Using Formal Concept Approach 528
1. Introduction 528
2. Related Works 529
3. Understanding of Formal Concept Analysis 529
4. Process of Rule Transformation 530
5. Storage of Formal Concepts in Formal Context and Experiment Overview 533
6. Discussions 534
7. Conclusions 535
Acknowledgements 535
References 535
Agreements in Virtual Organizations 536
1. Virtualization 536
2. Virtual Organizations and Their Development 537
3. Virtual Organizations’ Management Problems 539
4. Virtual Organization’s Evaluation by Contracts and Agreements 540
5. Conclusions 542
References 542
Applying Utility Functions to Adaptation Planning for Home Automation Applications 545
1. Introduction 545
2. Motivating Scenario 546
3. System overview 547
3.1 Device and Service Discovery 547
3.2 Configuration Plans 548
3.3 User Preferences 549
3.4 Utility Functions 549
4. Evaluation 550
4.1 Case Study Example 550
5. Related Work 551
6. Conclusions 552
Acknowledgments 552
References 552
Current Trends in Testing XMLMSs 554
1. Introduction 554
2. Overview of Existing Approaches 555
2.1 XML Data Sets 555
2.2 XML Data Generators 555
2.3 Parsing and Validating XML Data 556
2.3.1 XML Conformance Test Suites 556
2.3.2 XML Parsers 556
2.4 Querying XML Data 557
2.4.1 Analysis of Benchmarking Projects 559
2.4.2 Benchmark Repository 559
2.5 Transforming, Updating and Other Operations with XML Data 559
3. Summary 560
4. Conclusion 561
Acknowledgments 561
References 561
Service-Oriented Software Development Value Chain and Process 563
1. Introduction 563
2. Service-Oriented Reusable Software Development Process 564
3. Value Chain Model of Service-Oriented Software Process 565
3.1 Meta-Model of Value Chain 565
3.2 Value Chain-Based Software Development Process 565
3.3 The Establishment of SDVC Based on Different Processes 566
4. Value Chain Analysis of Software Development Process 569
5. Related Work 571
6. Conclusion 571
Acknowledgments 572
References 572
A Content Markup Language for Data Services 573
1. Introduction 573
2. Octapy3 a Distributed and Cooperative Content Management System 574
3. OCML Specification 577
4. The Museo Virtuale Test Bed 580
5. Conclusions 581
References 581
Organizational Learning Literature Visited - Fresh Lenses to Study Practices in ISD Organizations? 582
1. Introduction 582
2. Organizational Learning Literature 583
2.1 Concepts and Terminology 583
2.2 Literature in IS Discipline 583
2.3 Literature in Other Disciplines 584
2.4 Classification of Organizational Learning Literature 584
3. Research Process and Revisited Empirical Data 584
4. Observations on Empirical Data 586
5. Discussion 587
6. Summary and Future Work 588
References 589
Contract Negotiations Supported Through Risk Analysis 591
1. Introduction 591
2. Risk Management 592
3. The Negotiation Process 594
4. IT Contract Negotiation 595
5. Case Study and Results 596
5.1 Negotiation Context 596
5.2 Using RisNeg in the Negotiation 596
5.3 Results 598
6. Conclusions 598
References 599
Instantiating Software Processes: An Industry Approach 600
1. Introduction 600
2. Related Work 601
3. The Siemens Software Processes 602
4. Standardized and Semi-automated Instantiation of Processes 604
4.1 Implementation of the Approach 605
4.2 Use Case ‘‘Inserting a Milestone’’ 606
4.3 Evaluation of the Approach 607
5. Conclusion 608
References 608
A Language for Modelling Trust in Information Systems 609
1. Introduction 609
2. Related Work 610
3. A Modelling Language for Trust 611
3.1 Modelling Language Concepts 611
3.2 Links/Associations 613
3.3 Modelling Language Graphical Notation 613
4. Case Study 616
5. Conclusions and Future Work 617
Acknowledgements 617
References 617
Modeling the Contribution of Enterprise Architecture Practice to the Achievement of Business Goals 619
1. Effectiveness of Enterprise Architecture 619
2. The Architecture Effectiveness Model 620
3. Three Applications of the AEM Concept 622
3.1 Case 1: A Municipality 622
3.2 Case 2: A University of Professional Education 623
3.3 Case 3: A Financial Institution 624
4. Discussion 625
5. Evaluation and Conclusions 626
Acknowledgment 627
References 627
Organizational Culture and ISD Practices: Comparative Literature Review 629
1. Introduction 629
2. Community of Practice and Organizational Culture 630
3. Overview of Three Communities of Practice 630
4. Comparative Analysis 631
4.1 Analytic Framework for Comparisons 631
4.2 Business Milieu 631
4.3 Team Efforts 632
4.4 Software Development Approaches 633
4.5 Products and Quality 633
5. Discussion 634
6. Conclusions 635
References 635
Metadata to Support Data Warehouse Evolution 637
1. Introduction 637
2. Related Work 637
3. Data Warehouse Evolution Framework 638
4. Data Warehouse Metadata 638
4.1 Logical Metadata 639
4.2 Physical Metadata 640
5. Evolution Support 640
5.1 Physical Changes 641
5.2 Logical Changes 642
6. Conclusions and Future Work 644
Acknowledgments 644
References 644
The Morning After: What Happens When Outsourcing Relationships End? 646
1. Introduction 646
2. Reported Findings on Sourcing Decisions 648
2.1 Related Research 648
3. Proposed Model 649
4. Model Applied to Case Study 651
5. Conclusion and Future Work 652
References 652
Method Engineering: A Formal Description 654
1. Introduction 654
2. Research Approach 655
3. Description of the Method Elements 655
3.1 Method Chains and Alliances 656
3.2 Method Fragments 656
3.3 Method Chunks 657
3.4 Method Components 657
4. Formal Description of the Concept of Method 657
4.1 Annotation 657
5. Application of the Formal Description 659
6. Summary and Outlook 662
References 663
A Methodological Framework for Enterprise Information System Requirements Derivation 664
1. Introduction 664
2. Related Works 665
3. The Proposed Methodological Framework 666
4. Conclusions 672
References 672
Measuring Communication Heterogeneity Between Multiple Web-Based Agents 673
1. Introduction 673
2. Related Works 674
3. Measuring Heterogeneity 674
4. Case Studies 676
4.1 Case One. Measuring Communication Heterogeneity with Three Agents 676
4.2 Case Two. Measuring Communication Heterogeneity with Eight Agents 677
5. Evaluation of Results 679
6. Conclusions 680
References 681
Requirements Modeling with Agent Programming 682
1. Introduction 682
2. Background 683
2.1 The i* Framework 683
2.2 CASO 683
3. Modeling Softgoals as Preferences in i* 684
4. A Methodology for Combined Use of the i* and CASO Frameworks 685
5. Case Study: Meeting Scheduling Process 686
5.1 Building i* Models for Meeting Scheduler 686
5.2 Developing the Initial CASO Model 686
5.3 Validating and Refining the CASO Model by Simulation 688
5.4 Refining i* and CASO Models Based on Validation Results 689
6. Conclusion 689
References 689
BPMN, Toolsets, and Methodology: A Case Study of Business Process Management in Higher Education 691
1. Introduction 691
2. Motivation for This Chapter 692
3. Background and Related Work 692
4. Approach Taken 694
5. Case Study 694
5.1 Experimentation with UML Activity Diagrams and BPEL 695
6. Results and Evaluation 696
7. Conclusion 698
Acknowledgements 699
References 699
Incorporating Spatial Data into Enterprise Applications 700
1. Introduction 700
2. Spatial Data Usage in Enterprise Applications 701
3. Spatial Data Support in Commercial Relational Database Management Systems 701
4. The Open Geospatial Consortium (OGC) 702
5. Spatial Data Visualization in Enterprise Applications 703
6. Spatial Extensions (SPEX) 704
6.1 SPEX Development Technology 704
6.2 SPEX Visual Components 704
6.3 SPEX Vague Spatial Data Support 706
7. Conclusion 708
References 709
The Development of Mobile Services - The Impact of Actor Groups in the Standardization Process 710
1. Introduction 710
2. A Framework for Showing Standardization Involvement 711
3. Our Framework and Research Methods 712
4. Findings - Presentation of the Data 714
4.1 Technological Strength - The Number of Essential IPR 714
4.2 The Depth Metric - Number of Chairs and Editors 714
4.3 The Openness Metric - Number of Proposals Supported 715
4.4 The Efficiency Metric - Two Cases 715
4.4.1 Mobile E-mail 715
4.4.2 Push to Talk Over Cellular (POC) 716
4.5 Summary of Our Metrics 716
5. General Observation and Discussion 717
6. Conclusion 718
References 718
Reducing Health Cost: Health Informatics and Knowledge Management as a Business and Communication Tool 719
1. Introduction 719
1.1 Research Approach 720
1.2 Knowledge Management in the Medical Health Informatics Service of Business 720
2. Health Informatics and Evidence-Based Medicine 720
3. The Role of Health Informatics in Knowledge Management Environment 721
4. Cutting Health Service Costs 722
5. Information Technology and Information System Use 723
5.1 Strategy 723
5.2 Using Technology 723
5.3 Knowledge Management Culture 723
5.4 Management 723
5.5 Processes 723
5.6 Ongoing Maintenance and Protection 723
6. Recommendation 724
7. Summary and Further Research 724
References 725
The Information Architecture of E-Commerce: An Experimental Study on User Performance and Preference 727
1. Introduction 727
2. Research Framework 728
2.1 Conceptual Model 728
2.2 Research Questions 729
3. Research Method 730
3.1 Subjects 730
3.2 Experimental Web sites 730
3.3 Experimental Design and Procedure 731
4. Research Framework 732
4.1 Experimental Result 732
4.2 Post-Study Result 733
5. Conclusions 734
References 734
Computer Literacy of Population 50+ - A Case from Slovenia 736
1. Introduction 736
2. The CLP Project and the PIG Project 736
2.1 The CLP Project 736
2.2 The PIG Project 738
3. Conclusions 739
References 739
A Taxonomy of E-Health Standards to Assist System Developers 740
1. Introduction 740
2. Background and Evolution of E-Health Standardization 741
2.1 Principal Standards and Stakeholders 741
2.2 E-Health Standardization Problems 742
2.3 Software Development Standards in E-Health 743
2.4 E-Health Standards’ Main Categories 743
3. The Taxonomy 744
3.1 Taxonomy Domains 744
4. E-Health Standards Classification 745
5. Conclusions 745
References 747
Mobile Location-Based Services for Trusted Information in Disaster Management 749
1. Introduction 749
2. System Architecture 750
3. System Security 752
4. Trust in the System 753
5. Implemented Prototype 753
6. Conclusions 754
Acknowledgments 755
References 755
Resolution of Complexity in ISD Projects 756
1. Introduction 756
2. Complexity in ISD Projects 757
3. A Theoretical Framework for ISD Complexity 757
4. Research Approach 758
5. Case Study - Rollout of an Enterprise Project Management Software in a Government Department 759
5.1 Department XYZ 759
5.2 The Third Party - Primavera Australia 760
5.3 The Project 760
6. Discussion 761
6.1 Addressing Complexity 762
7. Conclusion 763
References 763
Business Architecture Development at Public Administration - Insights from Government EA Method Engineering Project in Finland 765
1. Introduction 765
2. CASE: The GEA Method Engineering Project 766
3. Research Method 768
4. Results 768
4.1 E-Government Business Models 768
4.2 Customer-Driven Development 769
4.3 Business Process Modeling 770
5. Implications 771
6. Conclusion 772
Acknowledgments 773
References 773
A Standardization Framework for Electronic Government Service Portals 775
1. Introduction 775
2. The Driving Force 776
3. State of the Art 777
4. The Greek Standardization Framework 778
5. Application of the Standardization Framework 780
5.1 The Case of Civil Personnel Selection Portal 780
5.2 The Case of Fireservice Portal 781
6. Conclusions 782
References 783
Elaborating the WARE Method for eParticipation Requirements 785
1. Introduction 785
2. eParticipation 786
3. Wide Audience Requirement Engineering (WARE) 786
4. Implementing the WARE Method in an eParticipation Project 787
5. Developing Requirement Design Interface to Support ‘‘Ongoing Activities’’ 789
6. Discussion 791
6.1 Suggested Improvements to the WARE Method 791
7. Conclusion 792
References 792
Web Tools for Geospatial Data Management 793
1. Introduction 793
2. Objectives 794
3. Methodology 794
4. Technology Description 795
5. Developments and Results 796
5.1 Generation of Map Compositions 796
5.2 Example of composition 797
5.3 Integration with Other Web Tools 798
5.4 Examples of Other Tools Integrated into URM Portals 798
5.4.1 Metadata Extractor 798
5.4.2 Moodle 798
5.4.3 Video Lecture 799
6. Business Benefits 799
7. Conclusions 799
References 800
Exploring the Role of Method Rationale in the Context of Teaching Information Systems Development Methods 801
1. Introduction 801
2. Theoretical Framework 802
2.1 Method rationale 802
2.2 Method Components 803
2.2.1 The Internal View 803
2.2.2 The External View 803
3. Research Approach 804
4. Lectures 804
4.1 G1 Lectures 805
4.2 G2 Lectures 805
5. Modelling Seminars 805
5.1 G1 Modelling Seminar 806
5.2 G2 Modelling Seminar 806
6. Interviews 806
6.1 G1 Interviews 807
6.2 G2 Interviews 807
7. Concluding Discussion 807
References 808
Four Levels of Moral Conflict in ISD 810
1. Introduction 810
2. Information Systems Development 811
3. Four Levels of Moral Conflict in ISD 811
3.1 Intentional Level 812
3.2 Functional Level 812
3.3 Managerial Level 813
3.4 Societal Level 814
4. Theories Describing the Internal Structure of Moral Conflicts 815
4.1 A Philosophical Theory 815
4.2 Three Normative Theories of Business Ethics 815
4.3 An Exemplary Application of the Theories 816
5. Discussion 816
References 817
Specification of Learning Content Using Feature Diagrams 819
1. Introduction 819
2. Use of Graphical Modeling Languages in Educational Domain 820
3. Features, Feature Modeling, and Feature Diagram 821
4. Motivation of Using Feature Diagrams for LO Domain 822
5. Capabilities and Limitations of Feature Diagrams in Learning Object Domain 823
6. Case Study: A Learning Object for Teaching Shift Registers 824
7. Conclusions 826
References 826
Understanding Service-Oriented Architectures in the Classroom: From Web Services to Grid Services 828
1. Introduction 828
2. SOA Education 829
2.1 Importance of SOA Education 829
2.2 Requirements of SOA Education 829
2.3 Initiatives for SOA Education 830
2.4 Comments on the Current Content of SOA Education 830
3. Web Service Education 832
3.1 Importance of Web Services for SOA Education 832
3.2 Initiatives for Web Service Education 832
3.3 Comments on the Current Content of Web Service Education 833
4. Grid Services in the Context of SOA Education 833
5. Conclusions 835
Acknowledgments 835
References 835
Refactoring of Learning Objects for Mobile Learning 836
1. Introduction 836
2. Technological and Educational Issues in m-Learning 837
2.1 Technological Constraints of Mobiles 837
2.2 Educational Issues in Using Mobile Devices 838
3. Refactoring of Learning Objects 838
3.1 Concept of Refactoring in Software Engineering 838
3.2 Learning Content Refactoring Techniques 839
3.3 Framework of LO Refactoring 839
4. Case Study 841
4.1 Original Learning Object 841
4.2 Refactoring of a LO to a Mobile Device 841
5. Open Research Issues in LO Refactoring 842
6. Conclusion and Future Work 843
References 843
Early Orientation Toward Future Profession: A Case Study of Introduction into Information Systems Development for the First-Year Students 845
1. Introduction 845
2. Context 846
3. Previous Experience 847
4. Conception 848
5. Implementation of the Conception 850
6. Evaluation Results 852
7. Conclusions 854
References 854
Embedding Knowledge Management into Business Logic of E-learning Platform for Obtaining Adaptivity 855
1. Introduction 855
2. Methods and Materials 856
2.1 Tesys e-Learning Platform 856
2.2 Concept Maps 857
2.3 Data Filtering 857
2.4 Obtaining Recommendations 858
3. Analysis Process and Experiments 858
4. Conclusions and Future Works 860
References 860
Problem-Based Learning in a Programming Context- Planning and Executing a Pilot Survey on Database Access in a Programming Language 862
1. Introduction 862
2. The PBL Pilot Survey 863
2.1 History and Related Work 863
2.2 Planning the PBL Pilot Survey 864
2.3 Executing the PBL Pilot Survey 866
2.4 Follow-Up and Evaluation of the PBL Pilot Survey 866
3. Perspectives on the PBL Pilot Survey 867
3.1 The Tutor Perspective 867
3.2 The Student Perspective 868
3.3 Collected Data 868
4. Analyses and Discussion 868
5. Summary and Conclusion 869
References 869
‘‘Learning to Research’’ in a Virtual Learning Environment: A Case Study on the Effectiveness of a Socio-constructivist Learning Design 871
1. Introduction 871
1.1 The Research Question 872
2. The Socio-constructivist Learning Model 872
3. Design and Implementation of the VLE 873
4. Experiments: Methodology and Results 875
4.1 Methodology and Procedure 875
4.2 Analysis of Results 876
5. Discussion and Conclusions 876
Acknowledgements 877
References 877
IS Degrees - Sociotechnical or Technosocial? 879
1. Introduction 879
2. Some Key Existing Proposals 880
3. What Is Different in Our Approach 881
4. A ‘‘Technosocial’’ IS Curriculum 882
5. Conclusions and Further Work 883
Acknowledgements 883
References 884
Teaching Medium-Sized ERP Systems - A Problem-Based Learning Approach 885
1. Introduction 885
2. Procedure Model and Description of the Course 886
2.1 [Step 1] Selection of Evaluation Area and Framework 887
2.2 [Step 2] Market Overview 888
2.3 [Step 3a] Identification of Appropriate ERP Manufacturers 888
2.4 [Step 3b] Preparation of Scenario, Evaluation Objectives, and Literature 888
2.5 [Step 4] ERP Evaluations 889
2.6 [Step 5] ERP Presentations 889
3. System Evaluations and Presentations 890
3.1 General Comparison 890
3.2 Functional Comparison 890
3.3 Technical Comparison 891
4. Course Evaluation 893
4.1 Students’ Perspective 893
4.2 Manufacturers’ Perspective 894
4.3 Lecturer’s Perspective 894
References 894
Statistical Analysis for Supporting Inter-Institutional Knowledge Flows in the Context of Educational System 896
1. Introduction 896
2. Inter-Institutional Model for Education System in Latvia 897
3. Data Type for supporting Statistical Analysis 898
4. Data-Gathering Procedure 900
5. Statistical Methods Overview for Supporting Inter-Institutional Knowledge Flows 900
6. Statistical Data Application 902
6.1 Forecast Data About First-Year Students’ Knowledge Level and Scope in IT Field 902
6.2 The Forecast and Real Data to Support Knowledge Flows 904
7. Conclusions and Future Work 904
Acknowledgments 904
References 905
Using Agile Methods? - Expected Effects 906
1. Introduction 906
2. Research Approach 907
3. Findings 908
3.1 Expected Effects of Traditional Methods 908
3.2 Expected Effects of Agile Methods 909
3.3 Comparison of Effects 910
3.3.1 Added Effects 910
3.3.2 Lost Effects 911
3.3.3 Preserved Effects 911
4. Conclusions 911
References 912
Finding Categories and Keywords in Web Services 915
1. Introduction 915
2. Related Work 916
3. Existing Web Service Languages 917
4. Ordinary Documents Versus Web Service Specifications 917
4.1 Structure 917
4.2 Domain 918
4.3 Users 918
5. Categories and Keywords Derived from Web Services 918
5.1 Useful Tag Information Derived from OWL-S Documents 919
5.2 Information Derived from WSDL Specifications 921
6. Categories, Keywords, and Types of Users 921
7. Conclusion and Future Work 922
References 923
MEDNET: Telemedicine via Satellite Combining Improved Access to Health-Care Services with Enhanced Social Cohesion in Rural Peru 924
1. Introduction: Clinical and Technical Requirements 924
1.1 Medical Situation 925
1.2 Doctors Needs 925
1.3 Health-Care Infrastructure Needs 926
2. Architecture and Major Components of the System 926
2.1 TeleConsult 926
2.2 Medical Database/Health-Care Records 927
2.3 Satellite Communication/AmerHis 928
3. Community Engagement 929
4. Expected Impacts 929
5. Conclusions - Future Work 930
Acknowledgement 931
References 931
Why Can’t We Bet on ISD Outcomes: ISD ‘‘Form’’ as a Predictor of Success 932
1. Introduction 932
1.1 Football as an Allegory for ISD 933
1.2 Historical Context - ‘‘Form’’ or Antecedent Conditions 934
2. Case 1: Telecoms Corp 935
3. Case 2: US Insurance Corporation 936
4. Lessons and Practical Implications 936
References 938
Index 939
Erscheint lt. Verlag | 23.9.2009 |
---|---|
Zusatzinfo | LIV, 974 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Wirtschaft ► Betriebswirtschaft / Management ► Wirtschaftsinformatik | |
Schlagworte | Cognition • Communication • Development • Information • Papadopoulos • Provision • Service • Society • System • towards • Wojtkowski • Wrycza |
ISBN-10 | 0-387-84810-X / 038784810X |
ISBN-13 | 978-0-387-84810-5 / 9780387848105 |
Haben Sie eine Frage zum Produkt? |
Größe: 26,1 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich