This document proposes a methodological approach for specifying services and analyzing service compliance considering the responsibility dimension of stakeholders. The approach includes a product model and process model. The product model has three layers: an informational layer describing service context and concepts, an organizational layer describing business rules and roles, and a responsibility dimension layer linking the two. The process model outlines steps for service architects to identify context, define concepts and rules, specify services, and analyze compliance. The approach is illustrated with an example of managing access rights for sensitive healthcare data exchange between organizations.
Towards a Framework of Influence Factors for Value Co-Creation in Service Sys...Peter Hottum
Presented at the International Conference on Exploring Service Science 1.5 in Porto (Portugal), Feb 5th 2015.
According to modern service science theory, value is jointly generated by several partners forming a service system. In this work, we focus on a simple two-party system consisting of a service provider and its customer. The value created by this service system hinges on the contribution of both parties.
That is, it also depends on the collaboration of the customer, which is a key characteristic of services in traditional definitions. Providers, however, lack knowledge on how to identify and measure the influence factors for value cocreation, such as customer contribution. Being aware of customer contribution, providers could design and manage value propositions purposefully. In this work, we provide a first version of a framework of influence factors for value co-creation in service systems, which may serve providers as a guideline for identifying different types of customer contribution.
This paper demonstrates that Leadership - and Human Resource Management literature is moving towards a Service Science perspective in which value creation unfolds out of action situations embedded in polycentric systems interconnected by value propositions (Boxall & Purcell, 2016; Hartmann, Wieland, & Vargo, 2018; Ostrom, 1990). To contribute to this grounding, the authors draw on the perspectives of IAD-framework, Service Science and Service-Dominant Logic to provide further theoretical foundation for leadership (Kiser & Ostrom, 1982; J. Spohrer, Maglio, Bailey, & Gruhl, 2007; Stephen L. Vargo & Lusch, 2004). The purpose of this conceptual paper is to derive implications for the foundation, design and output of leadership by theory synthesis.
The document describes a conceptual model for services in the PLASTIC project. It builds on previous work modeling mobile distributed computing platforms. The conceptual model represents components, services, and their relationships using a UML-like notation. It extends an existing SeCSE conceptual model by introducing new concepts like context, location, adaptation, and relationships between services and software components. The goal is to develop a common vocabulary that all project partners can use to facilitate communication and modeling tasks.
This document provides an overview of service-oriented architecture (SOA) and metrics to measure coupling in SOA. It first defines key concepts in SOA like loosely coupled services, service orientation, and service-oriented computing. It then discusses the three planes of SOA - service foundations, service composition, and service management and monitoring. Finally, it proposes using metrics to measure coupling between services to predict maintainability during the design phase of SOA systems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes a research paper on competitive strategies for enterprises operating in networked environments, with a focus on cloud computing, service-oriented architectures, and web services. The paper proposes an architecture to integrate these technologies to help universities better coordinate distributed operations across multiple campuses. Specifically, it develops a model for integrating cloud computing with enterprise networks using web services and a service-oriented approach. This is intended to enable strategic business processes and planning within university organizations with geographically dispersed units.
Service-oriented computing is meant to support loose relationships between organizations; Serviceoriented
architectures often have the goal to integrate various distributed services of one or more
organizations in a flexible way to be able to quickly react on business changes.
Distributed services provided a new way of distributed computing that achieve the interoperability between
heterogonous application through platform and language independent interfaces. The creation of value
added services by composition of existing ones is gaining a significant momentum. Distributed service
composition is meant to support loose relationships between implemented services in order to provide new
functions. A composite service is the one resulting from the integration, coordination and synchronization
of different service components. In this paper, we generated A Services Composition Model (SCM) that
provides a general solution for the services composition problem by realizing the requirements of a new
service using the requirements of the already existing service. We explained in details all the steps of the
composition process; services registration, services discovery, services selection, services invoking, and
services integration. Although the SCM is not bounded to one particular algorithm to compose services, we
generated an application as an example to test our Service Composition Model.
We also generated the Services Composition Language (SCL) as a simple text-based language which
allows the user to express the requirements of his request, the inserted request will then be analyzed using
our Parsing Algorithm to determine the name of the requested services, after that our Service Composition
Algorithm will execute all the steps of the composition process and return the result of the composition to
the user.
Towards a Framework of Influence Factors for Value Co-Creation in Service Sys...Peter Hottum
Presented at the International Conference on Exploring Service Science 1.5 in Porto (Portugal), Feb 5th 2015.
According to modern service science theory, value is jointly generated by several partners forming a service system. In this work, we focus on a simple two-party system consisting of a service provider and its customer. The value created by this service system hinges on the contribution of both parties.
That is, it also depends on the collaboration of the customer, which is a key characteristic of services in traditional definitions. Providers, however, lack knowledge on how to identify and measure the influence factors for value cocreation, such as customer contribution. Being aware of customer contribution, providers could design and manage value propositions purposefully. In this work, we provide a first version of a framework of influence factors for value co-creation in service systems, which may serve providers as a guideline for identifying different types of customer contribution.
This paper demonstrates that Leadership - and Human Resource Management literature is moving towards a Service Science perspective in which value creation unfolds out of action situations embedded in polycentric systems interconnected by value propositions (Boxall & Purcell, 2016; Hartmann, Wieland, & Vargo, 2018; Ostrom, 1990). To contribute to this grounding, the authors draw on the perspectives of IAD-framework, Service Science and Service-Dominant Logic to provide further theoretical foundation for leadership (Kiser & Ostrom, 1982; J. Spohrer, Maglio, Bailey, & Gruhl, 2007; Stephen L. Vargo & Lusch, 2004). The purpose of this conceptual paper is to derive implications for the foundation, design and output of leadership by theory synthesis.
The document describes a conceptual model for services in the PLASTIC project. It builds on previous work modeling mobile distributed computing platforms. The conceptual model represents components, services, and their relationships using a UML-like notation. It extends an existing SeCSE conceptual model by introducing new concepts like context, location, adaptation, and relationships between services and software components. The goal is to develop a common vocabulary that all project partners can use to facilitate communication and modeling tasks.
This document provides an overview of service-oriented architecture (SOA) and metrics to measure coupling in SOA. It first defines key concepts in SOA like loosely coupled services, service orientation, and service-oriented computing. It then discusses the three planes of SOA - service foundations, service composition, and service management and monitoring. Finally, it proposes using metrics to measure coupling between services to predict maintainability during the design phase of SOA systems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes a research paper on competitive strategies for enterprises operating in networked environments, with a focus on cloud computing, service-oriented architectures, and web services. The paper proposes an architecture to integrate these technologies to help universities better coordinate distributed operations across multiple campuses. Specifically, it develops a model for integrating cloud computing with enterprise networks using web services and a service-oriented approach. This is intended to enable strategic business processes and planning within university organizations with geographically dispersed units.
Service-oriented computing is meant to support loose relationships between organizations; Serviceoriented
architectures often have the goal to integrate various distributed services of one or more
organizations in a flexible way to be able to quickly react on business changes.
Distributed services provided a new way of distributed computing that achieve the interoperability between
heterogonous application through platform and language independent interfaces. The creation of value
added services by composition of existing ones is gaining a significant momentum. Distributed service
composition is meant to support loose relationships between implemented services in order to provide new
functions. A composite service is the one resulting from the integration, coordination and synchronization
of different service components. In this paper, we generated A Services Composition Model (SCM) that
provides a general solution for the services composition problem by realizing the requirements of a new
service using the requirements of the already existing service. We explained in details all the steps of the
composition process; services registration, services discovery, services selection, services invoking, and
services integration. Although the SCM is not bounded to one particular algorithm to compose services, we
generated an application as an example to test our Service Composition Model.
We also generated the Services Composition Language (SCL) as a simple text-based language which
allows the user to express the requirements of his request, the inserted request will then be analyzed using
our Parsing Algorithm to determine the name of the requested services, after that our Service Composition
Algorithm will execute all the steps of the composition process and return the result of the composition to
the user.
This PhD thesis presents methods for improving e-business design through business model analysis. The thesis addresses three research questions: how to design business models considering goal models, business collaborations, and e-services. It develops artifacts including a method for designing goal-aligned business models using means templates and transformation rules, a method for business model design based on analyzing business transaction types and resource identification, and a method for e-service design based on transforming business models. The contributions are methods for business model and e-service design that integrate intentions, objectives and stages of business interactions.
Ontology based dynamic business process customizationieijjournal
The document discusses ontology-based customization of dynamic business processes. It proposes using a human semantic web approach to customize processes for consumers. The framework detects customization needs by identifying discrepancies between primary and secondary business processes. It then enacts customizations automatically using rules and notifications. The approach uses ontologies, semantic web technologies like RDF, and categorization tools to map processes and overcome semantic mismatches between heterogeneous descriptions.
Analysis and implementation of the impact of change: application to heterogen...IJECEIAES
This document summarizes an article that proposes models and measures to evaluate complexity in enterprise architecture, specifically heterogeneity of components and relationships. It presents three concepts to analyze heterogeneity: 1) single components, 2) relationships between two components, and 3) relationship paths between multiple components. Metrics are defined to measure heterogeneity for each concept. An algorithm hierarchy is implemented using the strategy design pattern to allow algorithms to evolve over time. The observer design pattern is used to automatically update metrics when the enterprise architecture model changes. This allows progressive monitoring of changes to the proposed evaluation system.
Maintaining Consistent Customer Experience in Service System NetworksStephen Kwan
This document discusses maintaining consistent customer experience in service system networks. It proposes a model to align value propositions between service providers and their partners to deliver the promised level and quality of service to customers. The success of service system networks depends on this alignment, otherwise customers may receive dissatisfying service. The document presents scenarios where value propositions can become misaligned, such as in outsourcing and when using channel partners. It proposes decomposing value propositions into components to better understand relationships between initiating and receiving stakeholders across different value dimensions. An outcome-based contracting model is also discussed as a way for service providers to combat commoditization.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document provides an overview of a workshop on service design for new faculty and PhD students. The workshop introduces participants to key concepts in service design, including what constitutes a service system, factors to consider when designing services, and various design methods. The workshop also discusses teaching service design and potential areas for future research. The target audience is new faculty, PhD students, and faculty teaching service science and design courses.
Tsring-hua University Workshop File 2 of 2 12/07/12Stephen Kwan
This document presents a lecture by Dr. Stephen K. Kwan on service systems, value propositions, and service innovation. It defines key concepts in service science like service systems and value co-creation. It describes a framework for understanding service systems and stages in customer empowerment. Finally, it discusses how this framework can be used to complement innovation methods and provides examples of applying these concepts to teaching and student projects.
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...IJwest
The increasing interest in developing efficient and effective optimization techniques has conducted researchers to turn their attention towards biology. It has been noticed that biology offers many clues for designing novel optimization techniques, these approaches exhibit self-organizing capabilities and permit the reachability of promising solutions without the existence of a central coordinator. In this paper we handle the problem of dynamic web service composition, by using the clonal selection algorithm. In order to assess the optimality rate of a given composition, we use the QOS attributes of the services involved in the workflow as well as, the semantic similarity between these components. The experimental evaluation shows that the proposed approach has a better performance in comparison with other approaches such as the genetic algorithm.
This 3 sentence summary provides the key details about the document:
The document discusses a study that evaluated e-service quality in banking from customers' perspectives. The study examined how dimensions of e-service quality like reliability, responsiveness, ease of use, personalization, security, and website design influence customers' perceptions of e-banking quality. The author developed measures for these quality dimensions based on prior research and analyzed the data collected from customer surveys to understand the impact of each dimension on perceived e-service quality.
5 ijitcs v7-n1-7-an empirical study on testing of soa based servicesAbhishek Srivastava
Service-Oriented Architecture (SOA) removed the gap between software and business. Today, there is a business transformation among enterprises and they adopt a service based information technology (IT) model. So, testing is necessary for SOA based applications. This paper investigates different type of approaches and techniques that address the testing problems of SOA based services. Here we also investigate the differences between SOA and web services and traditional testing and SOA testing. Various testing levels are also discussed in detail. This paper also expresses various testing perspectives, challenges of SOA testing and review the many testing approaches and identify the problems that improve the testability of SOA based services.
1) The document discusses Patricia Diaz's research interests, which focus on developing a framework called CHRRIS to conceptualize innovative digital services through recombining digital artifacts in a digital sandbox.
2) Her dissertation research developed the CHRRIS framework and Diaz-CIDOMA analytical tool. Her current research aims to validate and extend CHRRIS, and investigate using it as the central mechanism in a service innovation system.
3) Long term, she is interested in how digital technology can help solve complex societal problems like healthcare, hunger, and oppression.
Transitioning Enterprise Architectures to Service Oriented ArchitecturesNathaniel Palmer
This document discusses transitioning from an enterprise architecture to a service-oriented architecture (SOA). It defines what an SOA is and why organizations adopt them. It then describes how to identify the key components of an SOA by analyzing business processes, including identifying roles, objects, boundaries, potential services, and interfaces. The method provides a roadmap for transitioning an enterprise architecture to an SOA by developing business and IT services and defining platform-independent interfaces.
An Exploration of Service Ecosystems in Microfinance: A Service Dominant Logi...Md. Abul Kalam Siddike
This document outlines a case study exploring the service ecosystem in microfinance through BRAC, a large NGO in Bangladesh, using a service-dominant logic view. The study utilized qualitative interviews and observations to understand the institutions, resource integration, and evolving business models in BRAC's microfinance services. Key findings included identifying the micro, meso, and macro structures of the service ecosystem, including how on-demand information sharing, monitoring, financial education, transactions, social enterprises, and community culture function as institutions. The service system model demonstrated in BRAC's case may inform other social enterprises seeking to adopt similar approaches modified for local contexts.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Adaptive SOA with Interactive Monitoring Techniques and HPSIOSR Journals
This document proposes techniques for an adaptive service-oriented architecture (SOA) that facilitates collaboration between software services and human experts. It involves integrating human-provided services (HPS) using web services standards like SOAP, WSDL, and UDDI. An adaptive infrastructure is proposed that monitors interactions, analyzes service behavior, and adapts services based on metrics. This allows for flexible and adaptive interactions between software components and human experts in a mixed service-oriented system. Discovery of services considers both functional and non-functional properties to identify suitable human experts represented by avatars.
The document proposes a framework called Semantic Conflicts Reconciliation (SCR) to detect and resolve data-level semantic conflicts when integrating heterogeneous data sources. SCR uses an ontology-based approach where data semantics are explicitly described during knowledge representation. At query time, an Interpretation Mediation Service can then automatically detect and resolve conflicts. Traditional approaches like global data standardization or pairwise data conversions between all sources are infeasible due to the large number of sources and conversions required. SCR aims to provide a more scalable solution through its ontology-based representation of semantics.
Web Service Discovery Mechanisms Based on IR ModelsIRJET Journal
This document discusses various approaches for web service discovery that employ information retrieval (IR) methods. It describes five main approaches:
1. Using singular value decomposition (SVD) to find similar services by representing them as vectors and calculating cosine similarity.
2. Applying the vector space model of IR to represent services and queries as vectors and calculate cosine similarity to discover analogous services.
3. Combining the vector space model with a structure matching algorithm to refine service discovery results.
4. Measuring semantic similarity of services instead of structural similarity by representing data types as trees and calculating edit distances.
5. Enhancing service requests and descriptions with ontologies, representing them as vectors using latent semantic
Cluster based approach for Service Discovery using Pattern RecognitionYogesh Santhan
Abstract— Web services that are appropriate to a user specific request are usually not considered in discovering the exact service since they are present without explicit related semantic descriptions. In our approach, we deal with the issue of service discovery provided non-explicit service description semantics that match a particular service request. We propose a system that involves semantic-based service categorization which is performed at the UDDI with a key for achieving the service categorization at functional level based on an ontology skeleton. Also, clustering is used for literally systemizing the web services based on functionality which is achieved by using analytic algorithm. An efficient matching for the relevant services is achieved by the enhancing the service request semantically and involves expanding the additional functionality (obtained from ontology) that are related for the requested service. The pattern recognition algorithm is used to select appropriate service from the cluster formation of related (grouped) web services.
WHAT ARE CAPABILITIES?
- Capability: A capability is an abstraction that represents the ability to perform a particular skillset. In organizations this would be organizational capabilities, directional capabilities, service capabilities, information capabilities and technology capabilities.
- Directional Capability: The extent of Strategy, Objectives, plans Command and Management direction (guidance, instructions, publications, doctrine, procedures, & preparedness documents) required to support decision-making, administration, and operations.
- Organizational Capability: The extent to which organizational units e.g. Organization areas, Organization groups, Organization function with an appropriate balance of competency, structure and command and control to accomplish their tasks.
- Resource Capability: The extent to which all nonexpendable items needed to outfit or equip an individual or organization to perform its mission are in place.
- Location Capability: The extent and utility of buildings, structures, property, plant, training areas and facilities (Real Property).
- Process Capability: The extent to which the enterprise has the ability to execute on Organization processes, steps, and events.
- Service Capability: The service construct and the service delivered.
- Information Capability: The extent of or quality of Information aspects, including timely access to authoritative information to support decisions.
- Technology Capability: The extent of or quality of Information aspects, including timely access to authoritative information to support decisions.
This document proposes extending the HL7 standard with a responsibility perspective to better manage access rights to patient health records. It presents the ReMMo responsibility metamodel, which defines actors' responsibilities and associated access rights. The paper aims to align ReMMo with the HL7-based eSanté healthcare platform model in Luxembourg to semantically enhance access controls based on users' real responsibilities rather than just roles. It will first map concepts between the two models, then evaluate the alignment through a prototype applying inference rules.
This document discusses integrating responsibility aspects into service engineering for e-government. It proposes a multi-layered approach including an ontological layer defining legal concepts, an organizational layer describing roles and stakeholders, an informational layer representing data structures and integrity constraints, and a technical layer representing IT components. A responsibility meta-model is also introduced to align responsibilities across these layers and facilitate interoperability between services that share data. The approach aims to ensure service compliance and manage risks associated with e-government services.
1) The document proposes a dynamic approach for assigning functions and responsibilities to agents in a multi-agent system for critical infrastructure management.
2) The approach uses an agent's reputation, which is based on past performance, to determine which agents receive which responsibilities as crisis situations change over time.
3) Assigning responsibilities dynamically based on reputation allows the system to continue operating effectively if an agent becomes isolated or has reduced capabilities during a crisis.
This PhD thesis presents methods for improving e-business design through business model analysis. The thesis addresses three research questions: how to design business models considering goal models, business collaborations, and e-services. It develops artifacts including a method for designing goal-aligned business models using means templates and transformation rules, a method for business model design based on analyzing business transaction types and resource identification, and a method for e-service design based on transforming business models. The contributions are methods for business model and e-service design that integrate intentions, objectives and stages of business interactions.
Ontology based dynamic business process customizationieijjournal
The document discusses ontology-based customization of dynamic business processes. It proposes using a human semantic web approach to customize processes for consumers. The framework detects customization needs by identifying discrepancies between primary and secondary business processes. It then enacts customizations automatically using rules and notifications. The approach uses ontologies, semantic web technologies like RDF, and categorization tools to map processes and overcome semantic mismatches between heterogeneous descriptions.
Analysis and implementation of the impact of change: application to heterogen...IJECEIAES
This document summarizes an article that proposes models and measures to evaluate complexity in enterprise architecture, specifically heterogeneity of components and relationships. It presents three concepts to analyze heterogeneity: 1) single components, 2) relationships between two components, and 3) relationship paths between multiple components. Metrics are defined to measure heterogeneity for each concept. An algorithm hierarchy is implemented using the strategy design pattern to allow algorithms to evolve over time. The observer design pattern is used to automatically update metrics when the enterprise architecture model changes. This allows progressive monitoring of changes to the proposed evaluation system.
Maintaining Consistent Customer Experience in Service System NetworksStephen Kwan
This document discusses maintaining consistent customer experience in service system networks. It proposes a model to align value propositions between service providers and their partners to deliver the promised level and quality of service to customers. The success of service system networks depends on this alignment, otherwise customers may receive dissatisfying service. The document presents scenarios where value propositions can become misaligned, such as in outsourcing and when using channel partners. It proposes decomposing value propositions into components to better understand relationships between initiating and receiving stakeholders across different value dimensions. An outcome-based contracting model is also discussed as a way for service providers to combat commoditization.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document provides an overview of a workshop on service design for new faculty and PhD students. The workshop introduces participants to key concepts in service design, including what constitutes a service system, factors to consider when designing services, and various design methods. The workshop also discusses teaching service design and potential areas for future research. The target audience is new faculty, PhD students, and faculty teaching service science and design courses.
Tsring-hua University Workshop File 2 of 2 12/07/12Stephen Kwan
This document presents a lecture by Dr. Stephen K. Kwan on service systems, value propositions, and service innovation. It defines key concepts in service science like service systems and value co-creation. It describes a framework for understanding service systems and stages in customer empowerment. Finally, it discusses how this framework can be used to complement innovation methods and provides examples of applying these concepts to teaching and student projects.
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...IJwest
The increasing interest in developing efficient and effective optimization techniques has conducted researchers to turn their attention towards biology. It has been noticed that biology offers many clues for designing novel optimization techniques, these approaches exhibit self-organizing capabilities and permit the reachability of promising solutions without the existence of a central coordinator. In this paper we handle the problem of dynamic web service composition, by using the clonal selection algorithm. In order to assess the optimality rate of a given composition, we use the QOS attributes of the services involved in the workflow as well as, the semantic similarity between these components. The experimental evaluation shows that the proposed approach has a better performance in comparison with other approaches such as the genetic algorithm.
This 3 sentence summary provides the key details about the document:
The document discusses a study that evaluated e-service quality in banking from customers' perspectives. The study examined how dimensions of e-service quality like reliability, responsiveness, ease of use, personalization, security, and website design influence customers' perceptions of e-banking quality. The author developed measures for these quality dimensions based on prior research and analyzed the data collected from customer surveys to understand the impact of each dimension on perceived e-service quality.
5 ijitcs v7-n1-7-an empirical study on testing of soa based servicesAbhishek Srivastava
Service-Oriented Architecture (SOA) removed the gap between software and business. Today, there is a business transformation among enterprises and they adopt a service based information technology (IT) model. So, testing is necessary for SOA based applications. This paper investigates different type of approaches and techniques that address the testing problems of SOA based services. Here we also investigate the differences between SOA and web services and traditional testing and SOA testing. Various testing levels are also discussed in detail. This paper also expresses various testing perspectives, challenges of SOA testing and review the many testing approaches and identify the problems that improve the testability of SOA based services.
1) The document discusses Patricia Diaz's research interests, which focus on developing a framework called CHRRIS to conceptualize innovative digital services through recombining digital artifacts in a digital sandbox.
2) Her dissertation research developed the CHRRIS framework and Diaz-CIDOMA analytical tool. Her current research aims to validate and extend CHRRIS, and investigate using it as the central mechanism in a service innovation system.
3) Long term, she is interested in how digital technology can help solve complex societal problems like healthcare, hunger, and oppression.
Transitioning Enterprise Architectures to Service Oriented ArchitecturesNathaniel Palmer
This document discusses transitioning from an enterprise architecture to a service-oriented architecture (SOA). It defines what an SOA is and why organizations adopt them. It then describes how to identify the key components of an SOA by analyzing business processes, including identifying roles, objects, boundaries, potential services, and interfaces. The method provides a roadmap for transitioning an enterprise architecture to an SOA by developing business and IT services and defining platform-independent interfaces.
An Exploration of Service Ecosystems in Microfinance: A Service Dominant Logi...Md. Abul Kalam Siddike
This document outlines a case study exploring the service ecosystem in microfinance through BRAC, a large NGO in Bangladesh, using a service-dominant logic view. The study utilized qualitative interviews and observations to understand the institutions, resource integration, and evolving business models in BRAC's microfinance services. Key findings included identifying the micro, meso, and macro structures of the service ecosystem, including how on-demand information sharing, monitoring, financial education, transactions, social enterprises, and community culture function as institutions. The service system model demonstrated in BRAC's case may inform other social enterprises seeking to adopt similar approaches modified for local contexts.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Adaptive SOA with Interactive Monitoring Techniques and HPSIOSR Journals
This document proposes techniques for an adaptive service-oriented architecture (SOA) that facilitates collaboration between software services and human experts. It involves integrating human-provided services (HPS) using web services standards like SOAP, WSDL, and UDDI. An adaptive infrastructure is proposed that monitors interactions, analyzes service behavior, and adapts services based on metrics. This allows for flexible and adaptive interactions between software components and human experts in a mixed service-oriented system. Discovery of services considers both functional and non-functional properties to identify suitable human experts represented by avatars.
The document proposes a framework called Semantic Conflicts Reconciliation (SCR) to detect and resolve data-level semantic conflicts when integrating heterogeneous data sources. SCR uses an ontology-based approach where data semantics are explicitly described during knowledge representation. At query time, an Interpretation Mediation Service can then automatically detect and resolve conflicts. Traditional approaches like global data standardization or pairwise data conversions between all sources are infeasible due to the large number of sources and conversions required. SCR aims to provide a more scalable solution through its ontology-based representation of semantics.
Web Service Discovery Mechanisms Based on IR ModelsIRJET Journal
This document discusses various approaches for web service discovery that employ information retrieval (IR) methods. It describes five main approaches:
1. Using singular value decomposition (SVD) to find similar services by representing them as vectors and calculating cosine similarity.
2. Applying the vector space model of IR to represent services and queries as vectors and calculate cosine similarity to discover analogous services.
3. Combining the vector space model with a structure matching algorithm to refine service discovery results.
4. Measuring semantic similarity of services instead of structural similarity by representing data types as trees and calculating edit distances.
5. Enhancing service requests and descriptions with ontologies, representing them as vectors using latent semantic
Cluster based approach for Service Discovery using Pattern RecognitionYogesh Santhan
Abstract— Web services that are appropriate to a user specific request are usually not considered in discovering the exact service since they are present without explicit related semantic descriptions. In our approach, we deal with the issue of service discovery provided non-explicit service description semantics that match a particular service request. We propose a system that involves semantic-based service categorization which is performed at the UDDI with a key for achieving the service categorization at functional level based on an ontology skeleton. Also, clustering is used for literally systemizing the web services based on functionality which is achieved by using analytic algorithm. An efficient matching for the relevant services is achieved by the enhancing the service request semantically and involves expanding the additional functionality (obtained from ontology) that are related for the requested service. The pattern recognition algorithm is used to select appropriate service from the cluster formation of related (grouped) web services.
WHAT ARE CAPABILITIES?
- Capability: A capability is an abstraction that represents the ability to perform a particular skillset. In organizations this would be organizational capabilities, directional capabilities, service capabilities, information capabilities and technology capabilities.
- Directional Capability: The extent of Strategy, Objectives, plans Command and Management direction (guidance, instructions, publications, doctrine, procedures, & preparedness documents) required to support decision-making, administration, and operations.
- Organizational Capability: The extent to which organizational units e.g. Organization areas, Organization groups, Organization function with an appropriate balance of competency, structure and command and control to accomplish their tasks.
- Resource Capability: The extent to which all nonexpendable items needed to outfit or equip an individual or organization to perform its mission are in place.
- Location Capability: The extent and utility of buildings, structures, property, plant, training areas and facilities (Real Property).
- Process Capability: The extent to which the enterprise has the ability to execute on Organization processes, steps, and events.
- Service Capability: The service construct and the service delivered.
- Information Capability: The extent of or quality of Information aspects, including timely access to authoritative information to support decisions.
- Technology Capability: The extent of or quality of Information aspects, including timely access to authoritative information to support decisions.
This document proposes extending the HL7 standard with a responsibility perspective to better manage access rights to patient health records. It presents the ReMMo responsibility metamodel, which defines actors' responsibilities and associated access rights. The paper aims to align ReMMo with the HL7-based eSanté healthcare platform model in Luxembourg to semantically enhance access controls based on users' real responsibilities rather than just roles. It will first map concepts between the two models, then evaluate the alignment through a prototype applying inference rules.
This document discusses integrating responsibility aspects into service engineering for e-government. It proposes a multi-layered approach including an ontological layer defining legal concepts, an organizational layer describing roles and stakeholders, an informational layer representing data structures and integrity constraints, and a technical layer representing IT components. A responsibility meta-model is also introduced to align responsibilities across these layers and facilitate interoperability between services that share data. The approach aims to ensure service compliance and manage risks associated with e-government services.
1) The document proposes a dynamic approach for assigning functions and responsibilities to agents in a multi-agent system for critical infrastructure management.
2) The approach uses an agent's reputation, which is based on past performance, to determine which agents receive which responsibilities as crisis situations change over time.
3) Assigning responsibilities dynamically based on reputation allows the system to continue operating effectively if an agent becomes isolated or has reduced capabilities during a crisis.
This document presents a study that aims to develop and validate a responsibility model to improve IT governance. It analyzes concepts of responsibility from literature and frameworks like COBIT. The researchers developed a responsibility model with key concepts like obligation, accountability, right, and commitment. They then compare this model to COBIT's representation of responsibility to identify areas for potential enhancement, like adding concepts that COBIT lacks. The document illustrates how the responsibility model could be used to refine COBIT's process for identifying system owners and their responsibilities.
This document proposes an innovative approach called SIM (Secure Identity Management) that aims to make access management policies closer aligned with business objectives. It does this in two ways:
1) By focusing the policy engineering process on business goals and responsibilities defined in processes, using concepts from the ISO/IEC 15504 standard. This links capabilities and accountabilities to process outcomes and work products.
2) By defining a multi-agent system architecture to automate the deployment of policies across heterogeneous IT components and devices. The agents provide autonomy and ability to adapt rapidly according to context.
The approach was prototyped using open source components and aims to improve how access rights are defined according to business needs and deployed across an organization
This document proposes an innovative systemic approach to risk management across interconnected sectors. It suggests using enterprise architecture models to manage cross-sector risks in Luxembourg's complex ICT ecosystem. The approach would provide regulators an overview of all players and systems, as well as models of different sectors to analyze collected data and risks at a national level, fostering accurate and reactive risk mitigation across economic domains.
Este documento describe varios mitos comunes sobre la sociedad de la información. Entre estos mitos se incluyen la idea de que las TIC proporcionan acceso ilimitado a la información, que reemplazarán a los profesores, y que resolverán automáticamente los problemas educativos. El documento argumenta que estas creencias no son realistas porque el valor de las TIC depende de cómo se utilizan, no todos tienen acceso a Internet, y compartir información no necesariamente conduce a un conocimiento compartido.
El documento describe un sistema de gestión de riesgos, medicina preventiva y salud ocupacional que da soporte a las leyes relevantes en Perú. El sistema permite realizar evaluaciones de riesgos, programas médicos, registros de salud de los empleados y generar historias clínicas ocupacionales electrónicas. El objetivo es implementar actividades para prevenir y controlar los efectos en la salud de los trabajadores derivados de la exposición a riesgos laborales.
Las Trece Colonias originales eran posesiones británicas en América del Norte entre los siglos XVII y XVIII, que eventualmente se unificaron y declararon su independencia de Gran Bretaña en 1776 para formar los Estados Unidos. Gran Bretaña había establecido colonias en América del Norte desde 1607 y para el siglo XVIII controlaba un vasto territorio en Norteamérica después de derrotar a los franceses en la Guerra de los Siete Años, aunque las colonias gozaban de gran autonomía interna. Sin embargo, las
Este documento presenta lecturas y oraciones de varias religiones e ideologías que se enfocan en el agua como un símbolo de vida, renovación, curación y unión. Las lecturas cristianas, musulmanas, judías, hindúes, budistas y sij hablan sobre el agua que da vida y limpia. Citas de figuras como Gandhi, Mandela, el Dalai Lama y Mother Teresa enfatizan la importancia de la unidad y la responsabilidad compartida hacia la humanidad y el planeta.
This document discusses a work system perspective and how it can illuminate topics related to service, service systems, IT services, and service science. It explains that a work system perspective provides frameworks and concepts that can be used to describe, evaluate, analyze, design, and improve services and service systems. The document notes there are three fundamentally different portrayals of service - as acts performed by providers, as outcomes perceived by customers, and as software entities meant to be invisible. It argues that a work system perspective can help disentangle discussions in service science that combine aspects of different disciplines.
An artifact centric view-based approach to modeling inter-organizational busi...Dr. Sira Yongchareon
This document proposes an artifact-centric view-based framework for modeling inter-organizational business processes. The framework consists of an artifact-centric collaboration model and a conformance mechanism between public and private views. The artifact-centric collaboration model uses artifacts, roles, services, and business rules to model inter-organizational processes. Public and private views are defined, where the public view represents agreed lifecycles of shared artifacts and the private view represents an organization's local processes and shared artifacts. Lifecycle modifications in private views, such as refinement of shared artifacts and extension with local artifacts, are allowed as long as they conform to the public view based on lifecycle coverage. View conformance is checked using state transition systems
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSijitcs
The document describes a service-oriented design approach for e-governance systems. It discusses key challenges in developing e-governance systems and proposes addressing these challenges through a service-oriented paradigm. The approach defines concepts like service types (readily available, composable, collaborative), service windows, service composition, and service collaboration. Service types depend on the complexity of processing required - readily available services require minimal processing, composable services may invoke other related services, and collaborative services require coordination across service windows. The approach aims to provide reusable, interoperable services and facilitate integration of existing applications in e-governance systems.
This document discusses an integrated, operational perspective on services and service systems. It provides a simple definition of service as "an act or group of acts performed to produce or facilitate outcomes for the benefit of others." This definition supports various portrayals of service relevant to different contexts. The perspective covers all types of services and service systems from simple to complex. It identifies five basic premises including that services can be portrayed in different valid ways from a single definition, services can be viewed as a combination of product and service characteristics, and service systems are a type of work system. Taking an operational perspective using work system theory can help analyze, design, implement and evaluate services and service systems.
This document proposes a method for identifying candidate services from business process models in a service-oriented architecture (SOA) approach. The method involves two main phases: 1) identifying and classifying candidate services based on heuristics applied to business process activities, and 2) consolidating candidate services based on existing business requirements. The heuristics examine both the structural and semantic elements of process models. The overall goal is to provide systematic guidance to service designers in mapping business processes to appropriate software services. The method was applied successfully in a case study with a large Brazilian oil company.
This document provides an overview of service-oriented architecture (SOA) and metrics to measure coupling in SOA. It first defines key concepts in SOA like loosely coupled services, service orientation, and service-oriented computing. It then discusses the three planes of SOA - service foundations, service composition, and service management and monitoring. Finally, it proposes using metrics to measure coupling between services to predict maintainability during the design phase of SOA systems.
An Information Retrieval Based Approach for Measuring Service Conceptual Cohe...Pooyan Jamshidi
This document summarizes a research paper that proposes a new metric called SCD to measure the conceptual cohesion of services. SCD uses latent semantic indexing to consider both the functionality and sequential relationships between operations based on their shared business entities and processes. It forms graphs between entity sets to calculate the conceptual relationship between each operation pair. SCD was evaluated on a sales department case study and shown to satisfy measurement theory properties and provide a more accurate cohesion value than existing metrics. Future work is planned to further validate SCD through case studies and evaluate its impact on service properties.
The document discusses principles of organic planning and service-oriented architecture (SOA). It argues that systems should be designed as a continuous fabric or web of interoperating services. Each new service or project should contribute positively to the overall system and be designed at multiple scales - upwards towards larger services, sideways with related services, and downwards by decomposing into smaller services. This organic approach allows order and coherence to emerge from distributed activity without a central authority, through SOA governance.
This document discusses service systems engineering (SSE). It defines SSE as a trans-disciplinary field that studies enterprise-customer interactions from socio-economic and technological perspectives to enable value co-creation. The document outlines several topics within SSE knowledge areas, including the fundamentals and properties of services, the scope and value of SSE, and SSE stages. It emphasizes that SSE requires collaboration between different stakeholders and resources to prioritize customer satisfaction in service design and delivery.
The document presents research on how social capital between users and IT service delivery units impacts user satisfaction with IT services. The research tests hypotheses about the relationships between structural, cognitive, and relational social capital and user satisfaction. Data was collected through questionnaires from four financial services firms and analyzed using partial least squares structural equation modeling. The results supported the hypotheses, finding that cognitive and relational social capital positively influence user satisfaction directly and strengthen the relationship between service quality and user satisfaction. The study contributes to literature on user satisfaction and social capital theory.
Service Science Research and Service Standards DevelopmentStephen Kwan
The document discusses the relationship between service science research and service standardization. It finds that while most existing ISO service standards focus on back-of-house service activities, there is a small increase in standards related to front-of-house activities. Upon analyzing definitions of "service" in standards, the document finds little commonality between how service is defined in standards and concepts in service science. It recommends further research to foster mutual benefits between service science and standards development.
This document proposes a framework for autonomically managing the dependability of service-oriented architectures at runtime. It involves:
1) Monitoring services to evaluate their dependability based on feedback from consumers using a voting system and reputation calculations.
2) Aggregating evaluations to determine the dependability of the whole system and compare it to a dependability objective.
3) Dynamically reconfiguring the system by adding/removing services or changing connections if the objective is not met, in order to optimize dependability.
The framework uses several techniques like exponential moving averages to determine current dependability levels and drive reconfiguration decisions. It is evaluated using a smart home automation case study.
How can we enable human-centered service innovation? A service design perspective (Story 1)
Cecilia Lee
https://www.linkedin.com/in/cecilialeegeneva/
Utpal Mangla
https://www.linkedin.com/in/utpal-mangla-b748541/
This document discusses managing the alignment between business processes and supporting software systems. It proposes an approach with three phases: 1) modeling the business process and software systems, 2) evaluating the alignment degree using metrics, and 3) analyzing the results to identify needed evolution activities if misalignment is detected. The approach was applied to a case study where the results provided useful suggestions for evolving the software system and improving alignment. Maintaining alignment is important as misalignment can negatively impact business process performance. The proposed approach facilitates understanding models of processes, systems, and their relationships to help software and business analysts collaborate.
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...ITIIIndustries
This paper describes the results of a theoretical mapping of the cybernetic principles of the Viable System Model (VSM) to an Enterprise Service Bus (ESB) model, with the aim to identify the management principles for the integration of services at all levels in the enterprise. This enrichment directly contributes to the viability of service-oriented systems and the justification of Business/IT alignment within enterprise. The model was identified to be suitable for further adaption in the industrial setting planned within Australian governmental departments.
Service customization through dramaturgyIan McCarthy
The customization of a service often depends on the “performance” delivered by front-stage service employees. Drawing on theories of dramaturgy and service marketing, we present a typology of four distinct and viable configurations for achieving different types of service customization. We explain how variations in the time pressure to customize a service, and the degree of customization required, combine to determine the characteristics of each configuration. With service organizations increasingly operating on a global basis, we discuss the fit between the preferences of different multicultural segments, the operational characteristics of a configuration, and the level of customization offered.
The document discusses the importance of information governance (IG) in healthcare based on studies conducted by Cohasset Associates and AHIMA. It defines IG as an organization-wide framework for managing information throughout its lifecycle while supporting organizational strategy, operations, and regulatory requirements. The definition covers policy creation, information accountability and management, processes and controls, and the importance of investment. IG implementation means more rules and redundancy, but compliance, quality improvement, IT, and other departments should continue their existing functions and also complete IG tasks as needed.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Knowledge transfer mechanisms in service business acquisitionsMiia Kosonen
This document discusses knowledge transfer mechanisms in service business acquisitions. It begins with an introduction that knowledge transfer is important for using resources efficiently and transferring best practices. The document then reviews literature on knowledge transfer mechanisms and the specifics of knowledge transfer in services and acquisitions.
The document presents a qualitative study of knowledge transfer mechanisms in one business-to-business service firm that had acquired four other firms. Six knowledge transfer mechanisms were identified: 1) an acquisition management team, 2) unit managers, 3) formal training, 4) "rooming-in", 5) e-communication, and 6) a codified database. These were further classified into management-, learning-, and technology-related mechanisms.
The
1. The document discusses the development of an e-service application to facilitate online guidance for research proposals between lecturers and practitioners in Indonesia.
2. The application aims to increase opportunities for lecturers to receive funding for their research proposals and community service projects from the government.
3. It describes how the e-service application would allow lecturers to directly communicate with experts, upload draft proposals, and discuss proposals online to improve them.
Similar to Service specification and service compliance how to consider the responsibility dimension (20)
Multi-Agent System (MAS) monitoring solutions are designed for a plethora of usage topics. Existing approach mostly used cloned back-end architectures while front-end monitoring interface tends to constitute the real specificity of the solution. These interfaces are recurrently structured around three dimensions: access to informed knowledge, agent’s behavioural rules, and restitution of real-time states of specific system sector. In this paper, we propose prototyping a sector-agnostic MAS platform (Smart-X) which gathers in an integrated and independent platform all the functionalities required to monitor and to govern a wide range of sector specific environments. For illustration and validation purposes, the use of Smart-X is introduced and explained with a smart-mobility case study.
This document provides an agenda and overview for a joint workshop on security modeling hosted by the ArchiMate Forum and Security Forum. The workshop aims to identify opportunities to improve the conceptual and visual modeling of enterprise information security using TOGAF and ArchiMate. The agenda includes introductions, a research spotlight on strengthening role-based access control with responsibility modeling, an open discussion on complementing TOGAF and ArchiMate with enhanced security modeling, and identifying next steps. The workshop purpose is to enable better security architecture decisions and drive usage of TOGAF and ArchiMate for security architecture.
Aligning the business operations with the appropriate IT infrastructure is a challenging and critical activity. Without efficient business/IT alignment, the companies face the risk not to be able to deliver their business services satisfactorily and that their image is seriously altered and jeopardized. Among the many challenges of business/IT alignment is the access rights management which should be conducted considering the rising governance needs, such as taking into account the business actors' responsibility. Unfortunately, in this domain, we have observed that no solution, model and method, fully considers and integrates the new needs yet. Therefore, the paper proposes firstly to define an expressive Responsibility metamodel, named ReMMo, which allows representing the existing responsibilities at the business layer and, thereby, allows engineering the access rights required to perform these responsibilities, at the application layer. Secondly, the Responsibility metamodel has been integrated with ArchiMate® to enhance its usability and benefits from the enterprise architecture formalism. Finally, a method has been proposed to define the access rights more accurately, considering the alignment of ReMMo and RBAC. The research was realized following a design science and action design based research method and the results have been evaluated through an extended case study at the Hospital Center in Luxembourg.
This document proposes a responsibility modeling language (ReMoLa) to align access rights with business process requirements. ReMoLa is a responsibility-centered meta-model that integrates concepts from the business and technical layers, with the concept of employee responsibility bridging the two. It incorporates four types of obligations from the COBIT framework to refine employee responsibilities and better assign access rights. ReMoLa maps responsibilities to roles in the RBAC model to leverage its advantages for access right management while ensuring responsibilities align with business tasks and employee commitment.
The document describes the NOEMI assessment methodology, which was developed as part of a research project to help very small enterprises (VSEs) improve their IT practices. The methodology aims to assess VSEs' IT capabilities in order to facilitate collaborative IT management across organizations. It was designed to be aligned with common IT standards like ISO/IEC 15504 and ITIL, but adapted specifically for VSEs. The methodology has been tested through several case studies with VSEs in Luxembourg, with promising results.
This document provides a preliminary literature review of policy engineering methods related to the concept of responsibility. It summarizes key access control models and discusses how they address concepts like capability, accountability, and commitment. The document also reviews engineering methods and how they incorporate responsibility considerations. The overall goal is to orient further research towards a new policy model and engineering method that more fully addresses stakeholder responsibility.
This document proposes an extension of the ArchiMate enterprise architecture framework to model multi-agent systems for critical infrastructure governance. The authors develop a responsibility-driven policy concept and metamodel layers to represent agent behavior and organizational policies across technical, application, and organizational layers. The approach is illustrated through a case study of a financial transaction processing system.
This document summarizes an experimental prototype of the OpenSST protocol for secured electronic transactions. OpenSST was developed to achieve high security, simplicity in software engineering, and compatibility with existing standards. The prototype uses OpenSST for the authorization portion of electronic payments in an e-business clearing solution. It describes the OpenSST message format and types, and discusses how OpenSST is implemented in the prototype's three-element architecture of an OpenSST proxy, reverse proxy, and server.
This document proposes an automatic reaction strategy for critical infrastructure SCADA systems. It defines a three-layer metamodel for modeling SCADA components and two types of policies (cognitive and permissive) that govern component behavior. It then presents a two-phase method for identifying these policies from the SCADA architecture and formalizing them to support an automatic reaction strategy. This strategy is modeled as an integral part of the SCADA architecture using the defined metamodel and policy identification method. It includes organizational and application layers with main actors, strategies, and components that realize the reaction policies based on expected automation levels.
This document discusses the NOEMI model, a collaborative management model for ICT processes in SMEs. The model was developed by the Centre Henri Tudor and tested with a cluster of 8 partner SMEs. Key aspects of the model include defining ICT activities across 5 domains, assessing each SME's capabilities, and having an operational team manage activities for the cluster under a coordination committee. The experiment showed improved cost control, management, and partner satisfaction compared to alternatives like outsourcing or hiring individual IT staff. The research is now ready for market transfer as the successful model is adopted long-term by participating SMEs.
The document proposes an agent-based architecture for multi-level security incident reaction in distributed telecommunication networks. The architecture has three levels: a low level interface with the infrastructure, an intermediate level using multi-agent systems to correlate alerts and deploy reactions across domains, and a high level for global supervision and policy management. The architecture was designed based on requirements like scalability, availability, autonomy, and robust reaction and alert management across distributed systems. It was successfully tested for implementing data access control policies.
This document proposes a multi-agent architecture for incident reaction in information system security. The architecture has three layers - low level interacts directly with the infrastructure, intermediate level correlates alerts and deploys reaction actions using multi-agent systems, and high level provides supervision and manages business policies. The architecture was tested for data access control and aims to quickly and efficiently react to attacks while ensuring policy compliance. The document discusses requirements like scalability, autonomy, and global supervision. It also describes the key components of alert management, reaction decision making, and policy definition/deployment to implement the architecture using a multi-agent approach.
This document proposes a methodology for aligning business and IT policies using a responsibility model. The methodology is a five-step approach consisting of collecting information, defining capabilities, accountabilities and commitments, linking responsibilities to processes, validating the model, and defining policies. It is illustrated with a case study from an IT company where they define an access control policy using this methodology and responsibility model. The responsibility model defines three components - capabilities, accountabilities, and commitments - to clarify roles and responsibilities for policy definition.
This document proposes a metamodel for modeling reputation-based multi-agent systems using an adaptation of the ArchiMate enterprise architecture modeling framework. It describes a case study applying this metamodel to model an electrical distribution critical infrastructure system. Key elements of the metamodel include:
- Representing agents and their behaviors through policies that integrate both behavior and trust components
- Modeling trust relationships between agents using a reputation-based trust model
- Illustrating the metamodel layers and components on a system that detects weather alerts and broadcasts messages to the public through various channels like SMS or social media
The document discusses information security concerns of industry managers. A survey found that information security is the top concern of managers, even more than risks from the economy or natural disasters. While industries invest heavily in information security, most managers still trust their current security systems despite few having organizations well-adapted to new information risks. The complexity of assessing security risks is growing due to new IT capabilities, critical infrastructure developments, cloud services, and increasing cybercrime. Industries and academics must collaborate further on information security research to address these challenges.
Immersive Learning That Works: Research Grounding and Paths ForwardLeonel Morgado
We will metaverse into the essence of immersive learning, into its three dimensions and conceptual models. This approach encompasses elements from teaching methodologies to social involvement, through organizational concerns and technologies. Challenging the perception of learning as knowledge transfer, we introduce a 'Uses, Practices & Strategies' model operationalized by the 'Immersive Learning Brain' and ‘Immersion Cube’ frameworks. This approach offers a comprehensive guide through the intricacies of immersive educational experiences and spotlighting research frontiers, along the immersion dimensions of system, narrative, and agency. Our discourse extends to stakeholders beyond the academic sphere, addressing the interests of technologists, instructional designers, and policymakers. We span various contexts, from formal education to organizational transformation to the new horizon of an AI-pervasive society. This keynote aims to unite the iLRN community in a collaborative journey towards a future where immersive learning research and practice coalesce, paving the way for innovative educational research and practice landscapes.
Or: Beyond linear.
Abstract: Equivariant neural networks are neural networks that incorporate symmetries. The nonlinear activation functions in these networks result in interesting nonlinear equivariant maps between simple representations, and motivate the key player of this talk: piecewise linear representation theory.
Disclaimer: No one is perfect, so please mind that there might be mistakes and typos.
dtubbenhauer@gmail.com
Corrected slides: dtubbenhauer.com/talks.html
Authoring a personal GPT for your research and practice: How we created the Q...Leonel Morgado
Thematic analysis in qualitative research is a time-consuming and systematic task, typically done using teams. Team members must ground their activities on common understandings of the major concepts underlying the thematic analysis, and define criteria for its development. However, conceptual misunderstandings, equivocations, and lack of adherence to criteria are challenges to the quality and speed of this process. Given the distributed and uncertain nature of this process, we wondered if the tasks in thematic analysis could be supported by readily available artificial intelligence chatbots. Our early efforts point to potential benefits: not just saving time in the coding process but better adherence to criteria and grounding, by increasing triangulation between humans and artificial intelligence. This tutorial will provide a description and demonstration of the process we followed, as two academic researchers, to develop a custom ChatGPT to assist with qualitative coding in the thematic data analysis process of immersive learning accounts in a survey of the academic literature: QUAL-E Immersive Learning Thematic Analysis Helper. In the hands-on time, participants will try out QUAL-E and develop their ideas for their own qualitative coding ChatGPT. Participants that have the paid ChatGPT Plus subscription can create a draft of their assistants. The organizers will provide course materials and slide deck that participants will be able to utilize to continue development of their custom GPT. The paid subscription to ChatGPT Plus is not required to participate in this workshop, just for trying out personal GPTs during it.
PPT on Direct Seeded Rice presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Leonel Morgado
Current descriptions of immersive learning cases are often difficult or impossible to compare. This is due to a myriad of different options on what details to include, which aspects are relevant, and on the descriptive approaches employed. Also, these aspects often combine very specific details with more general guidelines or indicate intents and rationales without clarifying their implementation. In this paper we provide a method to describe immersive learning cases that is structured to enable comparisons, yet flexible enough to allow researchers and practitioners to decide which aspects to include. This method leverages a taxonomy that classifies educational aspects at three levels (uses, practices, and strategies) and then utilizes two frameworks, the Immersive Learning Brain and the Immersion Cube, to enable a structured description and interpretation of immersive learning cases. The method is then demonstrated on a published immersive learning case on training for wind turbine maintenance using virtual reality. Applying the method results in a structured artifact, the Immersive Learning Case Sheet, that tags the case with its proximal uses, practices, and strategies, and refines the free text case description to ensure that matching details are included. This contribution is thus a case description method in support of future comparative research of immersive learning cases. We then discuss how the resulting description and interpretation can be leveraged to change immersion learning cases, by enriching them (considering low-effort changes or additions) or innovating (exploring more challenging avenues of transformation). The method holds significant promise to support better-grounded research in immersive learning.
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...Sérgio Sacani
Context. With a mass exceeding several 104 M⊙ and a rich and dense population of massive stars, supermassive young star clusters
represent the most massive star-forming environment that is dominated by the feedback from massive stars and gravitational interactions
among stars.
Aims. In this paper we present the Extended Westerlund 1 and 2 Open Clusters Survey (EWOCS) project, which aims to investigate
the influence of the starburst environment on the formation of stars and planets, and on the evolution of both low and high mass stars.
The primary targets of this project are Westerlund 1 and 2, the closest supermassive star clusters to the Sun.
Methods. The project is based primarily on recent observations conducted with the Chandra and JWST observatories. Specifically,
the Chandra survey of Westerlund 1 consists of 36 new ACIS-I observations, nearly co-pointed, for a total exposure time of 1 Msec.
Additionally, we included 8 archival Chandra/ACIS-S observations. This paper presents the resulting catalog of X-ray sources within
and around Westerlund 1. Sources were detected by combining various existing methods, and photon extraction and source validation
were carried out using the ACIS-Extract software.
Results. The EWOCS X-ray catalog comprises 5963 validated sources out of the 9420 initially provided to ACIS-Extract, reaching a
photon flux threshold of approximately 2 × 10−8 photons cm−2
s
−1
. The X-ray sources exhibit a highly concentrated spatial distribution,
with 1075 sources located within the central 1 arcmin. We have successfully detected X-ray emissions from 126 out of the 166 known
massive stars of the cluster, and we have collected over 71 000 photons from the magnetar CXO J164710.20-455217.
ESR spectroscopy in liquid food and beverages.pptxPRIYANKA PATEL
With increasing population, people need to rely on packaged food stuffs. Packaging of food materials requires the preservation of food. There are various methods for the treatment of food to preserve them and irradiation treatment of food is one of them. It is the most common and the most harmless method for the food preservation as it does not alter the necessary micronutrients of food materials. Although irradiated food doesn’t cause any harm to the human health but still the quality assessment of food is required to provide consumers with necessary information about the food. ESR spectroscopy is the most sophisticated way to investigate the quality of the food and the free radicals induced during the processing of the food. ESR spin trapping technique is useful for the detection of highly unstable radicals in the food. The antioxidant capability of liquid food and beverages in mainly performed by spin trapping technique.
Service specification and service compliance how to consider the responsibility dimension
1. Journal of Service Science Research (2011) 3:105-120
DOI 10.1007/s12927-009-0006-y
Abdelaziz Khadraoui ( )
Institute of Services Science, Centre Universitaire d'Informatique, University of Geneva, Switzerland
e-mail: abdelaziz.khadraoui@unige.ch
Christophe Feltus
Public Research Center Henri Tudor, Luxembourg-Kirchberg, Luxembourg
e-mail: christophe.feltus@tudor.lu
Service specification and service compliance : How to Consider
the Responsibility Dimension?
Abdelaziz Khadraoui, Christophe Feltus
ABSTRACT
Service engineering is a huge research topic that addresses the specification, the compliance
and the sharing of business and IT services across companies, institutions or governmental
organizations. Despite many advantages of working with the services, the guarantee of
service compliance and management of the service overlaps by the stakeholders remains
challenging. The objective of this document is to present a methodological approach in order
to specify the links between the organizational layer and the informational layer of services.
Therefore our research has focused on clarifying the responsibility dimension of the
stakeholders involved in those services. The proposed approach is illustrated with an example
in the context of sensitive data exchange between stakeholders from the healthcare domain.
KEYWORDS
Service, Engineering, Compliance, Business/IT Alignment, Responsibility, Information
system, Organizational context.
3. A concise and informative title 107
Journal of Service Science Research (2011) 3:105-120
the different elements composing each part of the compliance. Section four illustrates through
a practical example the proposed approach and the last section concludes the document and
provides future perspectives.
2. RESEARCH APPROACH
The main objective of the document is to define a methodology allowing specifying
services and service compliance considering the responsibility dimension of the stakeholders.
Enhancing the service compliance aims at facilitating the exchange and the use of services
between actors, organizations or others boundaries. The service compliance contributes to
help the stakeholders1
(Service Architects or Method Engineers) to define the services that
support the activities of the company. As a result, one may rightly consider that the objective
of the research contributes to serve humans and may, hence, naturally, be included in the
scope of design science. In (Hevner et al. 2004). The authors explain that the design science
paradigm seeks to extend the boundaries of human and organization capability by creating
new and innovative artifacts. In this document we define two innovative artifacts: the product
model and the process model. Those artifacts have been elaborated by using a model design
approach, that means that we have systematically reviewed all of the concepts that composed
the service by a deep analysis of the literature and that we have associated those concepts in a
model of service that we call the product model.
In order to prevent a discrepancy between the research objectives and the research
outcomes, the validation of the product and the process model has been realized in order to
substantiate their applicability and their usability. Therefore, Palvia et al (2003) have
proposed a set of twelve research and validation methodologies. The case study is one of
them that we have retained along our work. The case study methodology is defined as the
study of a single phenomenon (eg.: an application, a technology, a decision) in an
organization over a logical time frame. We have extended and overridden that definition to
1
The main categories of stakeholders are: business practitioners from the different departments/entities, ISs architects,
programmers, DBAs.
5. A concise and informative title 109
Journal of Service Science Research (2011) 3:105-120
class, a transaction or an attribute, and so on. The informational layer permits to describe the
information needed for the service.
A service is defined as a result of a process of acquiring knowledge in the context of the
information system engineering (see Fig. 2). It can correspond to an action or series of
actions to characterize the relationships between the stakeholders (Khadraoui et al. 2011). It
can have one or more goals. A goal may be assigned to one or more services (Entity “Goal –
Service”). A service can be specified upon one or multiple existing IS and an IS can support
one or more services (Entity “Service – IS”).
The Organisational Context describes the business rules, the legal constraints and the
capability of the organization to enforce laws and policies (Khadraoui et al. 2011). The entity
“Service – OC” expresses a many-to-many relationship between the Entity “Service” and the
Entity “Organizational Context”. A service can be defined on one or several organizational
context(s). An Organisational Context can be concerned by one or more services.
A hyperconcept is constructed on a subset of concepts extracted from organizational
contexts, forming a unity with a precise semantic. It is represented by a conceptual graph
where nodes are concepts, and edges are links between concepts (Khadraoui et al. 2006),
(Khadraoui. 2007). A Hyperconcept is expressed in the context of one or more ISs. An IS can
be concerned by one or more Hyperconcepts. We express this semantic relationship by the
introduction of the entity “HCP - IS”. The entity “HCPC- OC” expresses the direct link
between the hyperconcepts and the organizational context.
7. A concise and informative title 111
Journal of Service Science Research (2011) 3:105-120
A business activity is defined as a unit of work that produces, transforms and consumes
information.
A business process is defined in (Davenport 1993) as “a structured, measured set of
activities designed to produce a specified output for a particular customer or market. It
implies a strong emphasis on how work is done within an organization”. It can be part of a
larger, encompassing process and can include other business processes.
Figure 3. Organizational layer (by using existential binary model)
3.1.3 Responsibility dimension
The review of the governance standards and norms (ISO38500 2008) (Sarbanes-Oxley
2002) (Basel 2004) (Cobit 4.1) argues for having the responsibilities of the actors involved in
business process suitably defined along the enterprises' structures. The definition and the
modeling of the entity “responsibility” as for a long time remained lacunars and incomplete
in the field of information technology. In order to enhance the compliance of the services and
the service overlap management using the responsibility dimension, that dimension has been
included in our meta-model (product model). Therefore, we have defined the responsibility as
a charge assigned to an employee to signify his accountabilities concerning a business task,
and the right and capacity required to perform those accountabilities (Feltus et al. 2011). We
9. A concise and informative title 113
Journal of Service Science Research (2011) 3:105-120
• The capability (Vernadat 1995) represents the qualities, the skills or the resources
intrinsic to the actor and required in order to perform an accountability that concerns a
business activity
• The assignment is the action of linking an agent to a responsibility. Delegation
process is the transfer of an agent’s responsibility assignment to another agent (Feltus
et al. 2010b),
Figure 5. Responsibility dimension (by using existential binary model)
3.2 Process model
According of the context of the project, service architects which are leading the service
engineering and the compliance analysis needs to identify the appropriate strategy to carry
out the intention of the service. Therefore, we propose a methodological process (see Fig. 6)
that mainly intends to support the tasks of these service architects.
This process model is composed of several tasks: organizational context identification and
analysis, business rule definition, business activity definition, role identification,
hyperconcept elaboration, business process elaboration, informational kernel elaboration,
11. A concise and informative title 115
Journal of Service Science Research (2011) 3:105-120
All these steps permit to analyze the compliance of services at different levels.
Figure 6. The methodological process
The proposed methodological process aims at constructing all the background of a service:
the ontological background of a service (hyperconcepts construction), the organizational
background and the informational background of the service. The responsibility dimension is
constructed by focusing on informational aspects of a service and on the basis of the roles
identified within the organization.
13. A concise and informative title 117
Journal of Service Science Research (2011) 3:105-120
access to different types of actors. The medical staff of the hospital institution is allowed to
access all the information. This is justified because, on one hand, they need access to the
complete history of the medical data related to the patient in order to provide care and
perform medical acts, and, on the other hand, they also need access to information required
for the invoicing department, including the National healthcare ID, the insurance company,
etc. The insurance company only needs access to the public Patients’ record in order to pay
back the patient for medical acts. The National agency for statistics only needs access to the
private Patient’s record in order to analyze the evolution of the pathology at the regional
layer. They may not access the Public Patients’ record so they will not be able to retrieve the
links between the patients (personally identified) and their private data.
In the example, we focus our attention on the responsibility of the doctors. In a hospital,
the doctors are responsible for treating the patients. They, therefore, need the capability to
realize medical acts and to have a medical education. They need the right to access the entire
patient’s record layer and are accountable towards the patients, the medical director of the
hospital, the law and themselves (that last accountability is justified by the feeling of guilt if
the patient is deceased after the treatment).
Figure 7. Example in the healthcare sector
15. A concise and informative title 119
Journal of Service Science Research (2011) 3:105-120
4.2.2 Business Process Elaboration
Next, we have to specify the business processes which realizes and which operates the
services. That specification is performed at the organizational layer which is concerned by the
service and which influences the service specification. In our example, in order to have the
service Give access to the patient’s record operated, we have to specify the business
processes that support the service as well as the business activities that complete the business
processes. The product model (presented in Section 3.2) permits to represent two types of
business process. The business processes that realize the service and the business process that
use the service.
4.2.2.1 The business process that realises the service
In order to give access to the patient’s record, the most significant process that we depict is
the process that validates the compliance between the business rules and the requests issued
by the different actors and the different roles. That process is composed of four business
activities (see Fig. 8). The first one is the activity to receive the request, the second activity is
the activity to check the compliance, the third activity is the activity to decide whether or not
the access is given to the medical record and the last activity is really the provisioning of the
access right. Each of those activities is associated to one or more business role(s) that has for
objective to realize the activity. In that case of the analysis of that process, we acknowledge
the role is mostly played by software agents that use algorithms in order to retrieve the access
right query, to analyze the compliancy according to different attributes such as the business
rules, to make the decision and to provide the rights.
17. A concise and informative title 121
Journal of Service Science Research (2011) 3:105-120
previously advocated, the concept of responsibility is composed of the accountabilities to
perform obligation on a business activity and it specifies, at the same time, the required
rights. Concerning the task to Ask access to the patient’s record, two responsibilities exist.
The first responsibility is the responsibility of doing the request to the service provider. This
responsibility is assigned to the doctor’s assistant that requires therefore the ability to use the
patient’s record management system and the right to read the patient’s record. It is composed
of an accountability to do the request and is under the responsibility of the doctor that
performs the query. The second responsibility is to decide what information from the
patient’s record is necessary in order to treat the patient and to ask the assistant to retrieve
that information. This responsibility requires a medical education and the right to make
request to the assistant. The accountability of the doctor is due to four stakeholders as
explained previously.
4.3 Compliance Analysis
In order to illustrate the analysis of the compliance, we introduce two scenarios in our
healthcare example:
The first scenario: an employee that makes a query concerning the private data related to a
patient that he/she personally knows. In this case, the role of the stakeholder at the
organizational layer is Statistics analyst and his/her responsibility is to make statistics about
the birth rate of children with protein deficiency. This business activity is part of the annual
health statistic report publication process. At the service execution level, the Check
compliancy business analysis the responsibility of the requester and he retrieves that
according to the business rules, the responsibility to make statistics about nativity does not
required those types of access to the private data of the “patient that he knows”, he concludes
that the information that is requested needs to be kept confidential for that stakeholder.
The second scenario concerns a doctor’s assistant that requests access to pulmonary
analysis of a patient treated by the doctor that he assists. In this case, the business activity is
to check compliancy that composes the service acknowledges that the responsibility to treat a
patient really requires the access to that patient’s record and that the business rules, in this
case consider that for that responsibility, it is no longer confidential.
19. A concise and informative title 123
Journal of Service Science Research (2011) 3:105-120
Ferrario R & Guarino N (2008) Towards an Ontological Foundation for Services Science. In:
FIS, 152-169.
Feltus C, Petit M & Dubois E (2011) ReMoLa: Responsibility Model Language to Align
Access Rights with Business Process Requirements. Fifth International Conference on
Research Challenges in Information Science RCIS 2011, Gosier, Guadeloupe.
Feltus C, Dubois E & Petit M (2010a) Conceptualizing a Responsibility based Approach for
Elaborating and Verifying RBAC Policies Conforming with CobiT Framework
Requirements, Third International Workshop on Requirements Engineering and Law
(RELAW10), Sydney, Australia.
Feltus C, Petit M & Dubois E (2010b), Enhancement of Business IT Alignment by Including
Responsibility Components in RBAC, 5th Busital workshop, Hammamet, Tunisia.
Feltus C, Khadraoui A, Yurchyshyna A, Léonard, M & Dubois E (2012), Responsibility
aspects in service engineering for e-Government, Interoperability for Enterprise Systems
and Applications conference (I-ESA'12) Workshop Service Science and the Next Wave
in Enterprise Interoperability, Valencia, Spain.
Fox JA (2007) The uncertain relationship between transparency and accountability, Center
for Global, International and Regional Studies. Reprint Series. Paper CGIRS-Reprint-
2007-2.
Khadraoui A, Opprecht W, Léonard M & Aïdonidis C (2001) Service Specification Upon
Multiple Existing Information Systems. Fifth International Conference on Research
Challenges in Information Science RCIS 2011: 1-11, Gosier, Guadeloupe.
Khadraoui A, Opprecht W, Aïdonidis C& Léonard M (2008) Laws-Based Ontology for e-
Government Services Construction Case Study: The Specification of Services in
Relationship with the Venture Creation in Switzerland. PoEM 2008 Conference: 197-
209.
Khadraoui A, Turki S, Aïdonidis C & Léonard M (2006) Framework for e-Government
Information Systems Engineering: Describing the Organizational Layers. IEEE-ICCTA
2006.
Khadraoui A (2007) Method components for institutional information system engineering,
ISBN: 978-2-88903-000-2, Editions SES - University of Geneva.
21. A concise and informative title 125
Journal of Service Science Research (2011) 3:105-120
AUTHOR BIOGRAPHIES
Dr Abdelaziz Khadraoui is a senior researcher at the University of
Geneva. He is undertaking teaching and research activities since 2003, at
the Institute of Services Science. Dr Khadraoui’s research relates to the
engineering of IT-based services with a specific focus on the engineering
of e-government services and information systems. He frequently
collaborates on IT projects with the Geneva administration. He is
member of several international conference committees. He is author or
co-author of several contributions and publications in the field of e-
government services and institutional information systems engineering.
Christophe Feltus is graduated as an Electromechanics Engineer from
the Institut Supérieur Industriel des Art et Métiers Pierrard (Belgium).
He worked for several years in private companies as: Production Head at
Pfizer SA in Jette, Project Coordinator at Nizet Entreprise in Louvain-la-
Neuve, and Assessor for the Civil Belgium Aviation Administration in
Brussels, Belgium. He joined the Centre de Recherche Public Henri
Tudor in the Grand-Duchy of Luxembourg in 1999 to work in the field
of Service Science and Innovation. There he has taken part in a projects
related to IT security, IT governance and business IT/alignment and has
developed the responsibility modeling theory.