Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_11
C. Viegas, André Vasconcelos, J. Borbinha, Zaida Chora
{"title":"A Canonical Data Model for Records Management in the Portuguese Public Administration","authors":"C. Viegas, André Vasconcelos, J. Borbinha, Zaida Chora","doi":"10.1007/978-3-030-40783-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_11","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007723602080215
Oliver Schmidts, B. Kraft, Ines Siebigteroth, Albert Zündorf
For small to medium sized enterprises matching schemas is still a time consuming manual task. Even expensive commercial solutions perform poorly, if the context is not suitable for the product. In this paper, we provide an approach based on concept name learning from known transformations to discover correspondences between two schemas. We solve schema matching as a classification task. Additionally, we provide a named entity recognition approach to analyze, how the classification task relates to named entity recognition. Benchmarking against other machine learning models shows that when choosing a good learning model, schema matching based on concept name similarity can outperform other approaches and complex algorithms in terms of precision and F1-measure. Hence, our approach is able to build the foundation for improved automation of complex data integration applications for small to medium sized enterprises.
{"title":"Schema Matching with Frequent Changes on Semi-Structured Input Files: A Machine Learning Approach on Biological Product Data","authors":"Oliver Schmidts, B. Kraft, Ines Siebigteroth, Albert Zündorf","doi":"10.5220/0007723602080215","DOIUrl":"https://doi.org/10.5220/0007723602080215","url":null,"abstract":"For small to medium sized enterprises matching schemas is still a time consuming manual task. Even expensive commercial solutions perform poorly, if the context is not suitable for the product. In this paper, we provide an approach based on concept name learning from known transformations to discover correspondences between two schemas. We solve schema matching as a classification task. Additionally, we provide a named entity recognition approach to analyze, how the classification task relates to named entity recognition. Benchmarking against other machine learning models shows that when choosing a good learning model, schema matching based on concept name similarity can outperform other approaches and complex algorithms in terms of precision and F1-measure. Hence, our approach is able to build the foundation for improved automation of complex data integration applications for small to medium sized enterprises.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007614001620168
Srinivas Madhisetty, Mary-Anne Williams, John Massy-Greene, Luke Franco, Mark El Khoury
Photos and videos once published may stay available for people to view it unless they are deleted by the publisher of the photograph. If the content is downloaded and uploaded by others then they lose all the privacy settings once afforded by the publisher of the photograph or video via social media settings. This means that they could be modified or in some cases misused by others. Photos also contain tacit information, which cannot be completely interpreted at the time of their publication. Sensitive information may be revealed to others as the information is coded as tacit information. Tacit information allows different interpretations and creates difficulty in understanding loss of privacy. Free flow and availability of tacit information embedded in a photograph could have serious privacy problems. Our solution discussed in this paper illuminates the difficulty of managing privacy due the tacit information embedded in a photo. It also provides an offline solution for the photograph such that it cannot be modified or altered and gets automatically deleted over a period of time. By extending the Exif data of a photograph by incorporating an in-built feature of automatic deletion, and the access to an image by scrambling the image via adding a hash value. Only a customized application can unscramble the image therefore making it available. This intends to provide a novel offline solution to manage the availability of the image post publication.
{"title":"How to Manage Privacy in Photos after Publication","authors":"Srinivas Madhisetty, Mary-Anne Williams, John Massy-Greene, Luke Franco, Mark El Khoury","doi":"10.5220/0007614001620168","DOIUrl":"https://doi.org/10.5220/0007614001620168","url":null,"abstract":"Photos and videos once published may stay available for people to view it unless they are deleted by the publisher of the photograph. If the content is downloaded and uploaded by others then they lose all the privacy settings once afforded by the publisher of the photograph or video via social media settings. This means that they could be modified or in some cases misused by others. Photos also contain tacit information, which cannot be completely interpreted at the time of their publication. Sensitive information may be revealed to others as the information is coded as tacit information. Tacit information allows different interpretations and creates difficulty in understanding loss of privacy. Free flow and availability of tacit information embedded in a photograph could have serious privacy problems. Our solution discussed in this paper illuminates the difficulty of managing privacy due the tacit information embedded in a photo. It also provides an offline solution for the photograph such that it cannot be modified or altered and gets automatically deleted over a period of time. By extending the Exif data of a photograph by incorporating an in-built feature of automatic deletion, and the access to an image by scrambling the image via adding a hash value. Only a customized application can unscramble the image therefore making it available. This intends to provide a novel offline solution to manage the availability of the image post publication.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_13
Ignacio Huitzil, F. Bobillo, E. Mena, Carlos Bobed, J. Bermúdez
{"title":"Evaluating Some Heuristics to Find Hyponyms Between Ontologies","authors":"Ignacio Huitzil, F. Bobillo, E. Mena, Carlos Bobed, J. Bermúdez","doi":"10.1007/978-3-030-40783-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_13","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124654721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007719603980409
Lars Schütz, Korinna Bade
We introduce a novel intelligent user interface for assessing contributions submitted in participatory planning and decision processes. It assists public administrations in decision making by recommending ranked contributions that are similar to a reference contribution based on their textual content. This allows the user to group contributions in order to treat them consistently which is crucial in this domain. Presently, the assessment process is done manually with no sophisticated computer-aided support. The assessment user interface provides a two-column layout with a basic list of contributions in the left column and a list of similar contributions in the right column. We present results of a user study that we conducted with 21 public administration workers to evaluate the proposed interface. We found that the assessment user interface is well suited to the assessment task and the related decision-making process. But there are also unclear elements in the ranking visualization as well as some distrust in the ranked contributions or intelligent methods among the participants.
{"title":"Assessment User Interface: Supporting the Decision-making Process in Participatory Processes","authors":"Lars Schütz, Korinna Bade","doi":"10.5220/0007719603980409","DOIUrl":"https://doi.org/10.5220/0007719603980409","url":null,"abstract":"We introduce a novel intelligent user interface for assessing contributions submitted in participatory planning and decision processes. It assists public administrations in decision making by recommending ranked contributions that are similar to a reference contribution based on their textual content. This allows the user to group contributions in order to treat them consistently which is crucial in this domain. Presently, the assessment process is done manually with no sophisticated computer-aided support. The assessment user interface provides a two-column layout with a basic list of contributions in the left column and a list of similar contributions in the right column. We present results of a user study that we conducted with 21 public administration workers to evaluate the proposed interface. We found that the assessment user interface is well suited to the assessment task and the related decision-making process. But there are also unclear elements in the ranking visualization as well as some distrust in the ranked contributions or intelligent methods among the participants.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1994 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007766602380248
Saleh Alamro, H. Dogan, Raian Ali, Keith Phalp
Recruitment Best Practices (RBPs) are useful when building complex Enterprise Recruitment Architectures (ERAs). However, they have some limitations that reduce their reusability. A key limitation is the lack of capturing and documenting recruitment problems and their solutions from an enterprise perspective. To address this gap, a template for Enterprise Recruitment Best Practice (ERBP) documentation is defined. This template provides a model-driven environment and incorporates all elements that must be considered for a better documentation, sharing and reuse of ERBPs. For this purpose, we develop a precise metamodel and five UML diagrams to describe the template of the ERBPs. This template will facilitate the identification and selection of ERBPs and provide enterprise recruitment stakeholders with the guidelines of how to share and reuse them. The template is produced using design science method and a detailed analysis of three case studies. The evaluation results demonstrated that the template can contribute to a better documentation of ERBPs.
{"title":"Template-Driven Documentation for Enterprise Recruitment Best Practices","authors":"Saleh Alamro, H. Dogan, Raian Ali, Keith Phalp","doi":"10.5220/0007766602380248","DOIUrl":"https://doi.org/10.5220/0007766602380248","url":null,"abstract":"Recruitment Best Practices (RBPs) are useful when building complex Enterprise Recruitment Architectures \u0000(ERAs). However, they have some limitations that reduce their reusability. A key limitation is the lack of \u0000capturing and documenting recruitment problems and their solutions from an enterprise perspective. To \u0000address this gap, a template for Enterprise Recruitment Best Practice (ERBP) documentation is defined. This \u0000template provides a model-driven environment and incorporates all elements that must be considered for a \u0000better documentation, sharing and reuse of ERBPs. For this purpose, we develop a precise metamodel and \u0000five UML diagrams to describe the template of the ERBPs. This template will facilitate the identification and \u0000selection of ERBPs and provide enterprise recruitment stakeholders with the guidelines of how to share and \u0000reuse them. The template is produced using design science method and a detailed analysis of three case \u0000studies. The evaluation results demonstrated that the template can contribute to a better documentation of \u0000ERBPs.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007708301670175
Guanyao Du, Chun Long, Jianjun Yu, Wei Wan, Jing Zhao, Jinxia Wei
In this paper, we provide a real-time calculation and visualization framework for network security situation monitoring based on big data technology, and it mainly realizes the real-time massive multi-dimensional network attack dynamic display with Data-Driven Documents (D3). Firstly, we propose an integration and storage management mechanism of massive heterogeneous multi-source data for the network security data fusion. Then, we provide a general real time data computation and visualization framework for massive network security data. Based on the framework, we use the real security data of the network security cloud service platform of Chinese Academy of Sciences (CAS) to realize the visualization monitoring of network security dynamic attacks nationwide and worldwide, respectively. Experiment results are given to analyze the performance of our proposed framework on the efficiency of the data integration and computation stages.
{"title":"A Real-time Big Data Framework for Network Security Situation Monitoring","authors":"Guanyao Du, Chun Long, Jianjun Yu, Wei Wan, Jing Zhao, Jinxia Wei","doi":"10.5220/0007708301670175","DOIUrl":"https://doi.org/10.5220/0007708301670175","url":null,"abstract":"In this paper, we provide a real-time calculation and visualization framework for network security situation monitoring based on big data technology, and it mainly realizes the real-time massive multi-dimensional network attack dynamic display with Data-Driven Documents (D3). Firstly, we propose an integration and storage management mechanism of massive heterogeneous multi-source data for the network security data fusion. Then, we provide a general real time data computation and visualization framework for massive network security data. Based on the framework, we use the real security data of the network security cloud service platform of Chinese Academy of Sciences (CAS) to realize the visualization monitoring of network security dynamic attacks nationwide and worldwide, respectively. Experiment results are given to analyze the performance of our proposed framework on the efficiency of the data integration and computation stages.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"75 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007727702690276
Cristiano Sousa Melo, Matheus Cruz, Antônio Diogo Forte Martins, Tales Matos, J. M. S. M. Filho, Javam C. Machado
During the development and maintenance of a system of software, changes can occur due to new features, bug fix, code refactoring or technological advancements. In this context, software change prediction can be very useful in guiding the maintenance team to identify change-prone classes in early phases of software development to improve their quality and make them more flexible for future changes. A myriad of related works use machine learning techniques to lead with this problem based on different kinds of metrics. However, inadequate description of data source or modeling process makes research results reported in many works hard to interpret or reproduce. In this paper, we firstly propose a practical guideline to support change-proneness prediction for optimal use of predictive models. Then, we apply the proposed guideline over a case study using a large imbalanced data set extracted from a wide commercial software. Moreover, we analyze some papers which deal with change-proneness prediction and discuss them about missing points.
{"title":"A Practical Guide to Support Change-proneness Prediction","authors":"Cristiano Sousa Melo, Matheus Cruz, Antônio Diogo Forte Martins, Tales Matos, J. M. S. M. Filho, Javam C. Machado","doi":"10.5220/0007727702690276","DOIUrl":"https://doi.org/10.5220/0007727702690276","url":null,"abstract":"During the development and maintenance of a system of software, changes can occur due to new features, bug fix, code refactoring or technological advancements. In this context, software change prediction can be very useful in guiding the maintenance team to identify change-prone classes in early phases of software development to improve their quality and make them more flexible for future changes. A myriad of related works use machine learning techniques to lead with this problem based on different kinds of metrics. However, inadequate description of data source or modeling process makes research results reported in many works hard to interpret or reproduce. In this paper, we firstly propose a practical guideline to support change-proneness prediction for optimal use of predictive models. Then, we apply the proposed guideline over a case study using a large imbalanced data set extracted from a wide commercial software. Moreover, we analyze some papers which deal with change-proneness prediction and discuss them about missing points.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007677505710578
B. Silva, J. C. D. Lima, Celio Trois, W. B. Pereira, C. C. Rocha
The popularization of mobile devices and increasing the number of sensors and embedded resources boosted a large amount of research in the area of context-aware. Among the most relevant contextual information is the location. In outdoor environments, the GPS technology is already widespread and used. However, the people tend to spend most of their time indoors, such as universities, hospitals, malls, and supermarkets, where the GPS location is compromised. Several approaches using mainly radio frequency technologies have been proposed to solve the problem of indoor location. So far, no widely accepted solution solves the problem of location indoors. In this way, this work to use an opportunistic approach, making use of the Wi-Fi infrastructure available in the environment, to provide the location of mobile stations. Based on this objective, the WALDO architecture was developed that unites the characteristics of different approaches of the works that have been produced in recent years, taking into account the techniques that present better results at each stage, in conjunction with a zone-based approach and ranking, on phase online of the fingerprint technique, which makes ignoring RSS readings that present noises.
{"title":"No More Hiding! WALDO: Easily Locating with a Wi-Fi Opportunistic Approach","authors":"B. Silva, J. C. D. Lima, Celio Trois, W. B. Pereira, C. C. Rocha","doi":"10.5220/0007677505710578","DOIUrl":"https://doi.org/10.5220/0007677505710578","url":null,"abstract":"The popularization of mobile devices and increasing the number of sensors and embedded resources boosted a large amount of research in the area of context-aware. Among the most relevant contextual information is the location. In outdoor environments, the GPS technology is already widespread and used. However, the people tend to spend most of their time indoors, such as universities, hospitals, malls, and supermarkets, where the GPS location is compromised. Several approaches using mainly radio frequency technologies have been proposed to solve the problem of indoor location. So far, no widely accepted solution solves the problem of location indoors. In this way, this work to use an opportunistic approach, making use of the Wi-Fi infrastructure available in the environment, to provide the location of mobile stations. Based on this objective, the WALDO architecture was developed that unites the characteristics of different approaches of the works that have been produced in recent years, taking into account the techniques that present better results at each stage, in conjunction with a zone-based approach and ranking, on phase online of the fingerprint technique, which makes ignoring RSS readings that present noises.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_10
Marcos de Freitas, M. Fantinato, Violeta Sun, L. Thom, V. Garaj
{"title":"Function Point Tree-Based Function Point Analysis: Improving Reproducibility Whilst Maintaining Accuracy in Function Point Counting","authors":"Marcos de Freitas, M. Fantinato, Violeta Sun, L. Thom, V. Garaj","doi":"10.1007/978-3-030-40783-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_10","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}