Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_15
A. Dutra, M. Silveira
{"title":"HCI and SE: Integration Experiences Between Theory and Practice from a SE Program","authors":"A. Dutra, M. Silveira","doi":"10.1007/978-3-030-40783-4_15","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_15","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120829840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007769904830487
Hua Guo, Kecheng Liu
In the context of the development of AI algorithms in natural language processing, tremendous progress has been made in knowledge abstraction and semantic reasoning. However, for answering the questions with complex logic, AI system is still in an early stage. Hierarchical ontology graph is proposed to establish analysis threads for the complex question in order to facilitate AI system to further support in business decision making. The study of selecting the appropriate corpora is intended to improve the data asset management of enterprises.
{"title":"Hierarchical Ontology Graph for Solving Semantic Issues in Decision Support Systems","authors":"Hua Guo, Kecheng Liu","doi":"10.5220/0007769904830487","DOIUrl":"https://doi.org/10.5220/0007769904830487","url":null,"abstract":"In the context of the development of AI algorithms in natural language processing, tremendous progress has been made in knowledge abstraction and semantic reasoning. However, for answering the questions with complex logic, AI system is still in an early stage. Hierarchical ontology graph is proposed to establish analysis threads for the complex question in order to facilitate AI system to further support in business decision making. The study of selecting the appropriate corpora is intended to improve the data asset management of enterprises.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"58 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007677101690176
D. Huth, Laura Stojko, F. Matthes
Data portability is one of the new provisions that have been introduced with the General Data Protection Regulation (GDPR) in May 2018. Given certain limitations, the data subject can request a digital copy of her own personal data. Practical guidelines describe how to handle such data portability requests, but do not support in identifying which data has to be handed out. We apply a rigorous method to extract the necessary information properties to fulfill data portability requests. We then use these properties to define an abstract service for data portability. This service is evaluated in seven expert interviews.
{"title":"A Service Definition for Data Portability","authors":"D. Huth, Laura Stojko, F. Matthes","doi":"10.5220/0007677101690176","DOIUrl":"https://doi.org/10.5220/0007677101690176","url":null,"abstract":"Data portability is one of the new provisions that have been introduced with the General Data Protection Regulation (GDPR) in May 2018. Given certain limitations, the data subject can request a digital copy of her own personal data. Practical guidelines describe how to handle such data portability requests, but do not support in identifying which data has to be handed out. We apply a rigorous method to extract the necessary information properties to fulfill data portability requests. We then use these properties to define an abstract service for data portability. This service is evaluated in seven expert interviews.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007680005720579
Emmanuel Nowakowski, Matthias Farwick, Thomas Trojer, Martin Häusler, Johannes Kessler, R. Breu
Industry 4.0 changes the manufacturing industry significantly. In order to stay competitive, companies need to develop new business capabilities and business models that are enabled by Industry 4.0 concepts. However, companies are currently struggling with expensive and risky IT transformation projects that are needed to implement such concepts. We observed a lack of research on the planning and modeling part of IT transformations towards Industry 4.0. Therefore, we conducted a series of expert interviews on the topic of enterprise architecture in the context of modeling and planning Industry 4.0 transformations. As a result, we were able to develop a metamodel that can be used as target model for planning endeavors and a planning process that helps as guideline for such planning projects.
{"title":"An Enterprise Architecture Planning Process for Industry 4.0 Transformations","authors":"Emmanuel Nowakowski, Matthias Farwick, Thomas Trojer, Martin Häusler, Johannes Kessler, R. Breu","doi":"10.5220/0007680005720579","DOIUrl":"https://doi.org/10.5220/0007680005720579","url":null,"abstract":"Industry 4.0 changes the manufacturing industry significantly. In order to stay competitive, companies need to develop new business capabilities and business models that are enabled by Industry 4.0 concepts. However, companies are currently struggling with expensive and risky IT transformation projects that are needed to implement such concepts. We observed a lack of research on the planning and modeling part of IT transformations towards Industry 4.0. Therefore, we conducted a series of expert interviews on the topic of enterprise architecture in the context of modeling and planning Industry 4.0 transformations. As a result, we were able to develop a metamodel that can be used as target model for planning endeavors and a planning process that helps as guideline for such planning projects.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, enterprises face big problems in a global market, especially small and medium-sized enterprises (PYMES), they are required to innovate the way they offer their products/services, without affecting their limited financial resources. In consequence they need to find new business opportunities, also cloud services trend could complement the business models promoted by PYMES, providing them competitive advantages. Here we propose the development of a business model based on data mobility and ease of access. This model contributes to reduce PYMES mortality causes, and at the same time to increase their growth projection rates.
{"title":"Business Model as a Cloud Services-based Movility Strategy That Allows to Diminish the Number of PYMES Closures in Ecuador","authors":"Cristina Pesántez, Freddy Tapia, Jorge Edison Lascano","doi":"10.5220/0007727305960603","DOIUrl":"https://doi.org/10.5220/0007727305960603","url":null,"abstract":"Nowadays, enterprises face big problems in a global market, especially small and medium-sized enterprises (PYMES), they are required to innovate the way they offer their products/services, without affecting their limited financial resources. In consequence they need to find new business opportunities, also cloud services trend could complement the business models promoted by PYMES, providing them competitive advantages. Here we propose the development of a business model based on data mobility and ease of access. This model contributes to reduce PYMES mortality causes, and at the same time to increase their growth projection rates.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124745176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007724104070414
Ishak Riali, Messaouda Fareh, Hafida Bouarfa
Today, there is a critical need to develop new solutions that enable classical ontologies to deal with uncertain knowledge, which is inherently attached to the most of the real world’s problems. For that need, several solutions have been proposed; one of them is based on fuzzy logic. Fuzzy ontologies were proposed as candidate solutions based on fuzzy logic. Indeed, they propose a formal representation and reason in presence of vague and imprecise knowledge in classical ontologies. Despite their indubitable success, they cannot handle the probabilistic knowledge, which is presented in most of the real world’s applications. To address this problem, this paper proposes a new solution based on fuzzy Bayesian networks, which aims at enhancing the expressivity of the fuzzy ontologies to handle probabilistic knowledge and benefits from the highlights of the fuzzy Bayesian networks to provide a fuzzy probabilistic reasoning based on vague knowledge stored in fuzzy ontologies.
{"title":"A Semantic Approach for Handling Probabilistic Knowledge of Fuzzy Ontologies","authors":"Ishak Riali, Messaouda Fareh, Hafida Bouarfa","doi":"10.5220/0007724104070414","DOIUrl":"https://doi.org/10.5220/0007724104070414","url":null,"abstract":"Today, there is a critical need to develop new solutions that enable classical ontologies to deal with uncertain knowledge, which is inherently attached to the most of the real world’s problems. For that need, several solutions have been proposed; one of them is based on fuzzy logic. Fuzzy ontologies were proposed as candidate solutions based on fuzzy logic. Indeed, they propose a formal representation and reason in presence of vague and imprecise knowledge in classical ontologies. Despite their indubitable success, they cannot handle the probabilistic knowledge, which is presented in most of the real world’s applications. To address this problem, this paper proposes a new solution based on fuzzy Bayesian networks, which aims at enhancing the expressivity of the fuzzy ontologies to handle probabilistic knowledge and benefits from the highlights of the fuzzy Bayesian networks to provide a fuzzy probabilistic reasoning based on vague knowledge stored in fuzzy ontologies.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007724304440451
Joana Muchagata, P. Vieira-Marques, A. Ferreira
Through mobile applications, patients and health professionals are able to access and monitor health data. But even with user-adaptive systems, which can adjust interface content according to individual’s needs and context (e.g., physical location), data privacy can be at risk, as these techniques do not aim to protect them or even identify the presence of vulnerabilities. The main goal of this paper is to test with end-users the adaptive visualization techniques, together with the context where they are used, to understand how these may influence users’ security perception, and decide which techniques can be applied to improve security and privacy of visualized data. An online survey was applied to test two different use-cases and contexts, where traditional access and access using visualization techniques are compared in terms of security characteristics. Preliminary results with 27 participants show that when accessing personal data from a patients’ perspective, the context has higher influence in the perception of confidentiality (authorized access) and integrity (authorized modification) of visualized data while for a health professional’s perspective, independently of the context, the visualization techniques are the ones that seem to primarily influence participants’ choices for those security characteristics. For availability (data available to authorized users whenever necessary), both visualization techniques and context have little, or no influence, in the participants’ choice.
{"title":"mHealth Applications: Can User-adaptive Visualization and Context Affect the Perception of Security and Privacy?","authors":"Joana Muchagata, P. Vieira-Marques, A. Ferreira","doi":"10.5220/0007724304440451","DOIUrl":"https://doi.org/10.5220/0007724304440451","url":null,"abstract":"Through mobile applications, patients and health professionals are able to access and monitor health data. But even with user-adaptive systems, which can adjust interface content according to individual’s needs and context (e.g., physical location), data privacy can be at risk, as these techniques do not aim to protect them or even identify the presence of vulnerabilities. The main goal of this paper is to test with end-users the adaptive visualization techniques, together with the context where they are used, to understand how these may influence users’ security perception, and decide which techniques can be applied to improve security and privacy of visualized data. An online survey was applied to test two different use-cases and contexts, where traditional access and access using visualization techniques are compared in terms of security characteristics. Preliminary results with 27 participants show that when accessing personal data from a patients’ perspective, the context has higher influence in the perception of confidentiality (authorized access) and integrity (authorized modification) of visualized data while for a health professional’s perspective, independently of the context, the visualization techniques are the ones that seem to primarily influence participants’ choices for those security characteristics. For availability (data available to authorized users whenever necessary), both visualization techniques and context have little, or no influence, in the participants’ choice.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123753629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007727905250534
Adalberto T. Azevedo, Fernando Benedito, L. Coutinho, Francisco Silva, Marcos Roriz Junior, M. Endler
There are many situations in which there is a need to monitor the location and behavior of people and/or vehicles in order to detect possible irregularities and control where they are located and how they move, such as in companies, public transportation and public security. In this paper, we present MobCons-AT (Mobility Constraints Authoring Tool), an authoring tool that allows the specification of mobility restrictions rules that must be followed by mobile nodes. Rules are specified through a Domain-Specific Modeling Language (DSML) called MobCons-SL (Mobility Constraints Specification Language). Once specified in MobCons-SL, these rules are automatically transformed into software artifacts that performs the detection of the mobility restrictions violations performed by mobile nodes. This approach allows faster delivery time and lower the cost for the development of software systems aiming the detection of mobility restrictions. This paper also describes the use of MobCons-AT in two case studies, showing its applicability for diverse mobility scenarios.
{"title":"A Mobility Restriction Authoring Tool Approach based on a Domain Specific Modeling Language and Model Transformation","authors":"Adalberto T. Azevedo, Fernando Benedito, L. Coutinho, Francisco Silva, Marcos Roriz Junior, M. Endler","doi":"10.5220/0007727905250534","DOIUrl":"https://doi.org/10.5220/0007727905250534","url":null,"abstract":"There are many situations in which there is a need to monitor the location and behavior of people and/or vehicles in order to detect possible irregularities and control where they are located and how they move, such as in companies, public transportation and public security. In this paper, we present MobCons-AT (Mobility Constraints Authoring Tool), an authoring tool that allows the specification of mobility restrictions rules that must be followed by mobile nodes. Rules are specified through a Domain-Specific Modeling Language (DSML) called MobCons-SL (Mobility Constraints Specification Language). Once specified in MobCons-SL, these rules are automatically transformed into software artifacts that performs the detection of the mobility restrictions violations performed by mobile nodes. This approach allows faster delivery time and lower the cost for the development of software systems aiming the detection of mobility restrictions. This paper also describes the use of MobCons-AT in two case studies, showing its applicability for diverse mobility scenarios.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128051078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007725304150422
Christian Weber, Pascal Hirmer, P. Reimann, H. Schwarz
The management of machine learning models is an extremely challenging task. Hundreds of prototypical models are being built and just a few are mature enough to be deployed into operational enterprise information systems. The lifecycle of a model includes an experimental phase in which a model is planned, built and tested. After that, the model enters the operational phase that includes deploying, using, and retiring it. The experimental phase is well known through established process models like CRISP-DM or KDD. However, these models do not detail on the interaction between the experimental and the operational phase of machine learning models. In this paper, we provide a new process model to show the interaction points of the experimental and operational phase of a machine learning model. For each step of our process, we discuss according functions which are relevant to managing machine learning models.
{"title":"A New Process Model for the Comprehensive Management of Machine Learning Models","authors":"Christian Weber, Pascal Hirmer, P. Reimann, H. Schwarz","doi":"10.5220/0007725304150422","DOIUrl":"https://doi.org/10.5220/0007725304150422","url":null,"abstract":"The management of machine learning models is an extremely challenging task. Hundreds of prototypical models are being built and just a few are mature enough to be deployed into operational enterprise information systems. The lifecycle of a model includes an experimental phase in which a model is planned, built and tested. After that, the model enters the operational phase that includes deploying, using, and retiring it. The experimental phase is well known through established process models like CRISP-DM or KDD. However, these models do not detail on the interaction between the experimental and the operational phase of machine learning models. In this paper, we provide a new process model to show the interaction points of the experimental and operational phase of a machine learning model. For each step of our process, we discuss according functions which are relevant to managing machine learning models.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130853255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007838602740281
Anastasija Nikiforova, J. Bičevskis
This research is an extension of a data object-driven approach to data quality evaluation allowing to analyse data object quality in scope of multiple data objects. Previously presented approach was used to analyse one particular data object, mainly focusing on syntactic analysis. It means that the primary data object quality can be analysed against secondary data objects of unlimited number. This opportunity allows making more comprehensive, in-depth contextual data object analysis. The given analysis was applied to open data sets, making comparison between previously obtained results and results of application of the extended approach, underlying importance and benefits of the given extension.
{"title":"An Extended Data Object-driven Approach to Data Quality Evaluation: Contextual Data Quality Analysis","authors":"Anastasija Nikiforova, J. Bičevskis","doi":"10.5220/0007838602740281","DOIUrl":"https://doi.org/10.5220/0007838602740281","url":null,"abstract":"This research is an extension of a data object-driven approach to data quality evaluation allowing to analyse data object quality in scope of multiple data objects. Previously presented approach was used to analyse one particular data object, mainly focusing on syntactic analysis. It means that the primary data object quality can be analysed against secondary data objects of unlimited number. This opportunity allows making more comprehensive, in-depth contextual data object analysis. The given analysis was applied to open data sets, making comparison between previously obtained results and results of application of the extended approach, underlying importance and benefits of the given extension.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133293275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}