Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_2
D. Menascé
{"title":"Self-managed Computer Systems: Foundations and Examples","authors":"D. Menascé","doi":"10.1007/978-3-030-40783-4_2","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_2","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"90 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007696901490157
Dong Nie, M. Roantree
Application areas such as healthcare and insurance see many patients or clients with their lifetime record spread across the databases of different providers. Record linkage is the task where algorithms are used to identify the same individual contained in different datasets. In cases where unique identifiers are found, linking those records is a trivial task. However, there are very high numbers of individuals who cannot be matched as common identifiers do not exist across datasets and their identifying information is not exact or often, quite different (e.g. a change of address). In this research, we provide a new approach to record linkage which also includes the ability to detect relationships between customers (e.g. family). A validation is presented which highlights the best parameter and configuration settings for the types of relationship links that are required.
{"title":"Detecting Multi-Relationship Links in Sparse Datasets","authors":"Dong Nie, M. Roantree","doi":"10.5220/0007696901490157","DOIUrl":"https://doi.org/10.5220/0007696901490157","url":null,"abstract":"Application areas such as healthcare and insurance see many patients or clients with their lifetime record spread across the databases of different providers. Record linkage is the task where algorithms are used to identify the same individual contained in different datasets. In cases where unique identifiers are found, linking those records is a trivial task. However, there are very high numbers of individuals who cannot be matched as common identifiers do not exist across datasets and their identifying information is not exact or often, quite different (e.g. a change of address). In this research, we provide a new approach to record linkage which also includes the ability to detect relationships between customers (e.g. family). A validation is presented which highlights the best parameter and configuration settings for the types of relationship links that are required.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121137993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007700605880595
Evando Souza Borges, M. Fantinato, Ünal Aksu, H. Reijers, L. Thom
Business monitoring approaches usually address indicators associated with processes only at the service level; i.e., related to the services implementing the processes. Monitoring at the service level raises technical measures geared to Information Technology (IT) managers. Monitoring of Key Performance Indicators (KPIs) is usually carried out at a higher level, but transversely to the organization’s processes, i.e., uncoupled from the processes. We present a component designed to aid in strategic alignment between business and IT by monitoring Non-Functional Requirements (NFR) of processes based on Quality of Service attributes. This component aims to allow business managers to monitor process executions by focusing on the indicators that truly respond to the execution of such processes. We evaluated the component via a proof of concept.
{"title":"Monitoring of Non-functional Requirements of Business Processes based on Quality of Service Attributes of Web Services","authors":"Evando Souza Borges, M. Fantinato, Ünal Aksu, H. Reijers, L. Thom","doi":"10.5220/0007700605880595","DOIUrl":"https://doi.org/10.5220/0007700605880595","url":null,"abstract":"Business monitoring approaches usually address indicators associated with processes only at the service level; i.e., related to the services implementing the processes. Monitoring at the service level raises technical measures geared to Information Technology (IT) managers. Monitoring of Key Performance Indicators (KPIs) is usually carried out at a higher level, but transversely to the organization’s processes, i.e., uncoupled from the processes. We present a component designed to aid in strategic alignment between business and IT by monitoring Non-Functional Requirements (NFR) of processes based on Quality of Service attributes. This component aims to allow business managers to monitor process executions by focusing on the indicators that truly respond to the execution of such processes. We evaluated the component via a proof of concept.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"70 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123248370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007753503280336
Luis Tello-Oquendo, Freddy Tapia, Walter Fuertes, R. Andrade, Nicolay Samaniego Erazo, Jenny G. Torres, A. Cadena
The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidents and generate adverse impacts on organizations. Nowadays, organizations have been strengthened in aspects of information security and information through the implementation of various technological solutions. Nevertheless, defined processes for the proper handling and coordinated management of security incidents should be established. In this paper, we propose an incident management framework that is adaptable to educational organizations and allows them to improve their management processes in the face of computer incidents. We introduce a coordination network with three levels of decision-making that defines interfaces and communication channels with supporting policies and procedures for coordination across processes and process actors. It enables different organizations to maintain focus on different objectives, to work jointly on common objectives, and to share information that supports them all in case of security incidents. Our model enables the examination of incident management processes that cross organizational boundaries, both internally and externally. This can help CSIRTs improve their ability to collaborate with other business units and other organizations when responding to incidents.
{"title":"A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy","authors":"Luis Tello-Oquendo, Freddy Tapia, Walter Fuertes, R. Andrade, Nicolay Samaniego Erazo, Jenny G. Torres, A. Cadena","doi":"10.5220/0007753503280336","DOIUrl":"https://doi.org/10.5220/0007753503280336","url":null,"abstract":"The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidents and generate adverse impacts on organizations. Nowadays, organizations have been strengthened in aspects of information security and information through the implementation of various technological solutions. Nevertheless, defined processes for the proper handling and coordinated management of security incidents should be established. In this paper, we propose an incident management framework that is adaptable to educational organizations and allows them to improve their management processes in the face of computer incidents. We introduce a coordination network with three levels of decision-making that defines interfaces and communication channels with supporting policies and procedures for coordination across processes and process actors. It enables different organizations to maintain focus on different objectives, to work jointly on common objectives, and to share information that supports them all in case of security incidents. Our model enables the examination of incident management processes that cross organizational boundaries, both internally and externally. This can help CSIRTs improve their ability to collaborate with other business units and other organizations when responding to incidents.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125292881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007354000250035
J. Pires, André Vasconcelos, J. Borbinha
For an organization to achieve benefits from records management, it needs to include several practices such as the implementation of a records management system in alignment with the organization's reality and business processes. The focus of this work is on framing records management in business process management by identifying the role that records management plays in business. This research is applied in the replacement of a records management system workflow module. This research proposes the replacement of the workflow module by a flexible and open source solution, composed by an enterprise service bus and two workflow engines, accessed through a single API. The solution proves to be a flexible and scalable solution to the workflow module and that can even be used by more systems than records management systems. The implementation of records management in organizations is analysed, including the alignment between business processes, records management and workflows. This research shows that records management acts as an essential component to business that supports business processes and all the phases of their management, allowing for improvement regarding the storage, management and monitoring of records while also optimizing the execution of business activities.
{"title":"Business Process Support in the Context of Records Management","authors":"J. Pires, André Vasconcelos, J. Borbinha","doi":"10.5220/0007354000250035","DOIUrl":"https://doi.org/10.5220/0007354000250035","url":null,"abstract":"For an organization to achieve benefits from records management, it needs to include several practices such as the implementation of a records management system in alignment with the organization's reality and business processes. The focus of this work is on framing records management in business process management by identifying the role that records management plays in business. This research is applied in the replacement of a records management system workflow module. This research proposes the replacement of the workflow module by a flexible and open source solution, composed by an enterprise service bus and two workflow engines, accessed through a single API. The solution proves to be a flexible and scalable solution to the workflow module and that can even be used by more systems than records management systems. The implementation of records management in organizations is analysed, including the alignment between business processes, records management and workflows. This research shows that records management acts as an essential component to business that supports business processes and all the phases of their management, allowing for improvement regarding the storage, management and monitoring of records while also optimizing the execution of business activities.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007759306440651
A. Perry, Terhi Nurmikko-Fuller, B. Nunes
This paper reports on an evaluation of five commonly used, lexicon-based sentiment analysis tools (MeaningCloud, ParallelDots, Repustate, RSentiment for R, SentiStrength), tested for accuracy against a collection of Trump’s tweets spanning from election day November 2016 to one year post inauguration (January 2018). Repustate was found to be the most accurate at 67.53%. Our preliminary analysis suggests that this percentage reflects Trump’s frequent inclusion of both positive and negative sentiments in a single tweet. Additionally to providing an evaluative comparison of sentiment analysis tools, a summary of shared features of a number of existing datasets containing Twitter content along with a comprehensive discussion is also provided.
本文报告了对五种常用的基于词典的情感分析工具(meancloud, ParallelDots, Repustate, RSentiment for R, SentiStrength)的评估,并对特朗普从2016年11月选举日到就职后一年(2018年1月)的推文进行了准确性测试。repstate的准确率最高,为67.53%。我们的初步分析表明,这一比例反映了特朗普经常在一条推文中同时包含积极和消极情绪。除了提供情感分析工具的评估比较外,还提供了包含Twitter内容的许多现有数据集的共享特征摘要以及全面的讨论。
{"title":"\"It's Modern Day Presidential! An Evaluation of the Effectiveness of Sentiment Analysis Tools on President Donald Trump's Tweets\"","authors":"A. Perry, Terhi Nurmikko-Fuller, B. Nunes","doi":"10.5220/0007759306440651","DOIUrl":"https://doi.org/10.5220/0007759306440651","url":null,"abstract":"This paper reports on an evaluation of five commonly used, lexicon-based sentiment analysis tools (MeaningCloud, ParallelDots, Repustate, RSentiment for R, SentiStrength), tested for accuracy against a collection of Trump’s tweets spanning from election day November 2016 to one year post inauguration (January 2018). Repustate was found to be the most accurate at 67.53%. Our preliminary analysis suggests that this percentage reflects Trump’s frequent inclusion of both positive and negative sentiments in a single tweet. Additionally to providing an evaluative comparison of sentiment analysis tools, a summary of shared features of a number of existing datasets containing Twitter content along with a comprehensive discussion is also provided.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130361472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007727002610268
W. B. Pereira, R. Souza, Un Hee Schiefelbein, J. C. D. Lima, B. Silva, C. C. Rocha
The general objective of this systematic review was to evaluate the evolution of studies on social interactions up to 2018, in addition to proposing a diagnostic tool on social interactions, sensors used, among others. The methodology of the research was the bibliographic research of an exploratory nature, using the data collection, it was possible to see that there is a significant growth of articles on this subject. The analysis identified different countries that conducted research on this subject and the most cited articles with their authors. Different jobs were found, such as care for the elderly, interactions in vehicular networks, social interactions in public environments, among others.
{"title":"Systematic Review of Bibliography on Social Interactions using the Meta-analytical Approach","authors":"W. B. Pereira, R. Souza, Un Hee Schiefelbein, J. C. D. Lima, B. Silva, C. C. Rocha","doi":"10.5220/0007727002610268","DOIUrl":"https://doi.org/10.5220/0007727002610268","url":null,"abstract":"The general objective of this systematic review was to evaluate the evolution of studies on social interactions up to 2018, in addition to proposing a diagnostic tool on social interactions, sensors used, among others. The methodology of the research was the bibliographic research of an exploratory nature, using the data collection, it was possible to see that there is a significant growth of articles on this subject. The analysis identified different countries that conducted research on this subject and the most cited articles with their authors. Different jobs were found, such as care for the elderly, interactions in vehicular networks, social interactions in public environments, among others.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123641364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007754806370643
G. Sammour, A. Al-Zoubi, Jeanne Schreurs
This research paper investigates the readiness of students to opt for MOOC courses in universities offering a joint master degree international programme. A study is conducted on two joint academic study programs offered by the University of Hasselt in Belgium and Princess Sumaya University for Technology in Jordan. The study examines the readiness of students to take MOOC courses and their acceptance by universities’ management staff and professors. The study reveals promising results as the results suggest that such virtual study programs are readily accepted in both universities by professors and students. On the other hand, management staff and some professors expressed concerns on the approval of the equivalence of a MOOC onto courses.
{"title":"Deployment of MOOCs in Virtual Joint Academic Degree Programs","authors":"G. Sammour, A. Al-Zoubi, Jeanne Schreurs","doi":"10.5220/0007754806370643","DOIUrl":"https://doi.org/10.5220/0007754806370643","url":null,"abstract":"This research paper investigates the readiness of students to opt for MOOC courses in universities offering a joint master degree international programme. A study is conducted on two joint academic study programs offered by the University of Hasselt in Belgium and Princess Sumaya University for Technology in Jordan. The study examines the readiness of students to take MOOC courses and their acceptance by universities’ management staff and professors. The study reveals promising results as the results suggest that such virtual study programs are readily accepted in both universities by professors and students. On the other hand, management staff and some professors expressed concerns on the approval of the equivalence of a MOOC onto courses.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007676201410148
A. A. Brahim, Rabah Tighilt Ferhat, G. Zurfluh
In recent years, the need to use NoSQL systems to store and exploit big data has been steadily increasing. Most of these systems are characterized by the property "schema less" which means absence of the data model when creating a database. This property brings an undeniable flexibility by allowing the evolution of the model during the exploitation of the base. However, query expression requires a precise knowledge of the data model. In this article, we propose a process to automatically extract the physical model from a document-oriented NoSQL database. To do this, we use the Model Driven Architecture (MDA) that provides a formal framework for automatic model transformation. From a NoSQL database, we propose formal transformation rules with QVT to generate the physical model. An experimentation of the extraction process was performed on the case of a medical application.
{"title":"MDA Process to Extract the Data Model from Document-oriented NoSQL Database","authors":"A. A. Brahim, Rabah Tighilt Ferhat, G. Zurfluh","doi":"10.5220/0007676201410148","DOIUrl":"https://doi.org/10.5220/0007676201410148","url":null,"abstract":"In recent years, the need to use NoSQL systems to store and exploit big data has been steadily increasing. Most of these systems are characterized by the property \"schema less\" which means absence of the data model when creating a database. This property brings an undeniable flexibility by allowing the evolution of the model during the exploitation of the base. However, query expression requires a precise knowledge of the data model. In this article, we propose a process to automatically extract the physical model from a document-oriented NoSQL database. To do this, we use the Model Driven Architecture (MDA) that provides a formal framework for automatic model transformation. From a NoSQL database, we propose formal transformation rules with QVT to generate the physical model. An experimentation of the extraction process was performed on the case of a medical application.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}