The aim of the article is to detect and review existing topic modelling methods of Latent Dirichlet Allocation and their modifications usable in Voice of Customer analysis. Voice of Customer is expressed mainly through textual comments which often focus on the evaluation of products or services the customer consumes. The most studied data source are customer reviews which contain next to the textual comments also ratings in form of scales. The aim of the topic models is to mine the topics and their aspects the customers are evaluating in their reviews and assign to them a particular sentiment or emotion. The author completed a systematic literature review of peer-reviewed published journal articles indexed in leading databases of Scopus and Web of Science and concerning the current use of Latent Dirichlet Allocation model variants in Voice of Customer textual analysis for performing the tasks of aspect detection, emotion detection, personality detection and sentiment assignation. In total, 38 modifications of the LDA model were identified with the reference to their first application in the research of text analytics. The review is intended for researchers in customer analytics the field of sentiment or emotion detection, and moreover as results from the review, for studies in personality recognition based on the textual data. The review offers a basic overview and comparison of LDA modifications which can be considered as a knowledge baseline for selection in a specific application. The scope of the literature examination is limited to the period of years 2003–2018 with the application relevant to the analysis of Voice of Customer subjective textual data only which is closely connected to the area of marketing or customer relationship management.
本文的目的是检测和回顾现有的潜在狄利克雷分配的主题建模方法及其修改可用于客户之声分析。顾客的声音主要是通过文本评论来表达的,这些评论往往集中在对顾客消费的产品或服务的评价上。研究最多的数据来源是客户评论,它包含在文本评论旁边也以尺度的形式评级。主题模型的目的是挖掘客户在评论中评估的主题及其方面,并为它们分配特定的情绪或情感。作者完成了一项系统的文献综述,检索了Scopus和Web of Science等领先数据库中同行评审的已发表期刊文章,并研究了目前在Customer Voice文本分析中使用Latent Dirichlet Allocation模型变体执行方面检测、情感检测、个性检测和情感分配任务的情况。总共有38个LDA模型的修改,参考了它们在文本分析研究中的首次应用。这篇综述的目的是为客户分析领域的研究人员提供情感或情感检测,并且作为综述的结果,用于基于文本数据的人格识别研究。该综述提供了LDA修改的基本概述和比较,可被视为在特定应用中选择的知识基线。文献检查的范围仅限于2003-2018年期间,仅与客户主观文本数据分析相关的应用程序与营销或客户关系管理领域密切相关。
{"title":"Review of Latent Dirichlet Allocation Methods Usable in Voice of Customer Analysis","authors":"Lucie Sperková","doi":"10.18267/j.aip.120","DOIUrl":"https://doi.org/10.18267/j.aip.120","url":null,"abstract":"The aim of the article is to detect and review existing topic modelling methods of Latent Dirichlet Allocation and their modifications usable in Voice of Customer analysis. Voice of Customer is expressed mainly through textual comments which often focus on the evaluation of products or services the customer consumes. The most studied data source are customer reviews which contain next to the textual comments also ratings in form of scales. The aim of the topic models is to mine the topics and their aspects the customers are evaluating in their reviews and assign to them a particular sentiment or emotion. The author completed a systematic literature review of peer-reviewed published journal articles indexed in leading databases of Scopus and Web of Science and concerning the current use of Latent Dirichlet Allocation model variants in Voice of Customer textual analysis for performing the tasks of aspect detection, emotion detection, personality detection and sentiment assignation. In total, 38 modifications of the LDA model were identified with the reference to their first application in the research of text analytics. The review is intended for researchers in customer analytics the field of sentiment or emotion detection, and moreover as results from the review, for studies in personality recognition based on the textual data. The review offers a basic overview and comparison of LDA modifications which can be considered as a knowledge baseline for selection in a specific application. The scope of the literature examination is limited to the period of years 2003–2018 with the application relevant to the analysis of Voice of Customer subjective textual data only which is closely connected to the area of marketing or customer relationship management.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":"7 1","pages":"152-165"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41722959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. A. Orunsolu, O. Afolabi, A. Sodiya, A. Akinwale
Security tips are now used as a method of priming online users from falling prey for fraudulent scams. These security tips usually come as email, SMS or online posts where they can be easily accessed by the users. In this work, phishing attacks are simulated with varying cues that are available in such fraudulent email messages, SMS and web pages were used to investigate the effectiveness of the security tips used by Nigerian banks to prime their customers of online threats. A total of 427 respondents, purposively selected from three tertiary institutions in Ogun State, participated in the study. Each respondent was asked to identify five messages with varying phishing cues to evaluate their understanding of the security tips messages. The results which were computed at 95% Confidence Interval, indicated that 58.91% failed on the first attribute, 58.59% failed on the second attribute while 58.73% failed on the third attribute. 74.24% of the participant could not correctly identify a fake email message (fourth attribute) while 76.71% could not correctly identify a phished bank verification number update message (fifth attribute). Using the Mann Whitney Test, the result further showed that overall, those who failed the test are significantly more than those who passed. Moreover, a regression model is proposed to evaluate the influence of the socio demographic factors used in the study. This result indicated that gender, academic qualification and user's computer knowledge significantly influences their ability to recognize phished messages.
{"title":"A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips","authors":"A. A. Orunsolu, O. Afolabi, A. Sodiya, A. Akinwale","doi":"10.18267/j.aip.119","DOIUrl":"https://doi.org/10.18267/j.aip.119","url":null,"abstract":"Security tips are now used as a method of priming online users from falling prey for fraudulent scams. These security tips usually come as email, SMS or online posts where they can be easily accessed by the users. In this work, phishing attacks are simulated with varying cues that are available in such fraudulent email messages, SMS and web pages were used to investigate the effectiveness of the security tips used by Nigerian banks to prime their customers of online threats. A total of 427 respondents, purposively selected from three tertiary institutions in Ogun State, participated in the study. Each respondent was asked to identify five messages with varying phishing cues to evaluate their understanding of the security tips messages. The results which were computed at 95% Confidence Interval, indicated that 58.91% failed on the first attribute, 58.59% failed on the second attribute while 58.73% failed on the third attribute. 74.24% of the participant could not correctly identify a fake email message (fourth attribute) while 76.71% could not correctly identify a phished bank verification number update message (fifth attribute). Using the Mann Whitney Test, the result further showed that overall, those who failed the test are significantly more than those who passed. Moreover, a regression model is proposed to evaluate the influence of the socio demographic factors used in the study. This result indicated that gender, academic qualification and user's computer knowledge significantly influences their ability to recognize phished messages.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":"7 1","pages":"138-151"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45333056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social media networks are tools that recruiters can utilize during a recruitment process. Most importantly, social media networks can be used in conjunction with applications capable of downloading information about their potential candidates. The aim of this article is to present a creation process of a model that could be helpful in recruiting area. A crucial part of this model is application software that downloads user’s data, particularly from Facebook profiles. This model should propose appropriate analytical methods for data processing. The output of this article is employee recruitment model that can be used as a guide to utilize the potential of social media networks by HR professionals. Test run of this model on our population sample showed prediction accuracy of 68 % to 84 %.
{"title":"Analyzing Social Media Data for Recruiting Purposes","authors":"L. Bohmova, David Chudán","doi":"10.18267/j.aip.111","DOIUrl":"https://doi.org/10.18267/j.aip.111","url":null,"abstract":"Social media networks are tools that recruiters can utilize during a recruitment process. Most importantly, social media networks can be used in conjunction with applications capable of downloading information about their potential candidates. The aim of this article is to present a creation process of a model that could be helpful in recruiting area. A crucial part of this model is application software that downloads user’s data, particularly from Facebook profiles. This model should propose appropriate analytical methods for data processing. The output of this article is employee recruitment model that can be used as a guide to utilize the potential of social media networks by HR professionals. Test run of this model on our population sample showed prediction accuracy of 68 % to 84 %.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44145665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of the article is to give a survey of research fields related to test and manage applications from the cloud, i.e. cloud-based testing, so that it can facilitate security requirements associated with the testing. This article has two main aims. The first one is the survey of published results attained by the synergy of these research fields – cloud-based testing, testing strategies and types of tests, and related architectures, which is followed by the classification of testing tools based on their testing strategies. The second part is focused on security testing of Fire and Rescue Service portals in the Czech Republic and identification of vulnerabilities in these portals. The results suggested that it is more appropriate to manage only one unified portal than a lot of portals on the regional level, also due to the economies of scale. Finally, the most suitable tool for cloud-based security testing was recommended based on these results and a typical cloud-based testing methodology was described.
{"title":"Classification and Evaluation of Cloud-Based Testing Tools: The Case Study of Web Applications' Security Testing","authors":"Martin Lnenicka, J. Čapek","doi":"10.18267/j.aip.113","DOIUrl":"https://doi.org/10.18267/j.aip.113","url":null,"abstract":"The purpose of the article is to give a survey of research fields related to test and manage applications from the cloud, i.e. cloud-based testing, so that it can facilitate security requirements associated with the testing. This article has two main aims. The first one is the survey of published results attained by the synergy of these research fields – cloud-based testing, testing strategies and types of tests, and related architectures, which is followed by the classification of testing tools based on their testing strategies. The second part is focused on security testing of Fire and Rescue Service portals in the Czech Republic and identification of vulnerabilities in these portals. The results suggested that it is more appropriate to manage only one unified portal than a lot of portals on the regional level, also due to the economies of scale. Finally, the most suitable tool for cloud-based security testing was recommended based on these results and a typical cloud-based testing methodology was described.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47151677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Obecna uměla inteligence usiluje o vytvořeni umělých systemů schopných řesit mnoho různých, a to i během vývoje nepředvidaných, uloh, což takove systemy cini svou inteligenci srovnatelne s lidmi. To vsak vyžaduje existenci vhodných metod vyhodnocujicich, zda a nakolik jsou uměle systemy inteligentni. Tento přehledový clanek hleda pravě takove evaluacni metody. Provadi proto rozsahlou resersi literatury pokrývajici jak filosoficke a kognitivni předpoklady inteligence, tak i formalni definice a prakticke testy vychazejici z algoritmicke teorie informace. Na zakladě porovnani představených metod clanek odhaluje dvě rozdilne skupiny přistupů založene na principialně odlisných předpokladech. Zatimco starsi přistupy, jako např. Turingův test, jsou založeny na předpokladu, že uspěch v komplexni cinnosti je postacujici pro přiznani inteligence, nove přistupy, jako např. test algoritmickeho IQ, kromě toho vyžaduji i důkladne ověřeni uspěsnosti v jednoduchých cinnostech. V důsledku tohoto zjistěni clanek dochazi k zavěru, že test algoritmickeho IQ založený na definici univerzalni inteligence je v soucasne době nejlepsim kandidatem na vhodný prakticky proveditelný test obecne inteligence umělých systemů. Ackoliv i tento test ma několik znamých limitů.
{"title":"Přehled přístupů k vyhodnocování inteligence umělých systémů","authors":"Ondrej Vadinský","doi":"10.18267/j.aip.115","DOIUrl":"https://doi.org/10.18267/j.aip.115","url":null,"abstract":"Obecna uměla inteligence usiluje o vytvořeni umělých systemů schopných řesit mnoho různých, a to i během vývoje nepředvidaných, uloh, což takove systemy cini svou inteligenci srovnatelne s lidmi. To vsak vyžaduje existenci vhodných metod vyhodnocujicich, zda a nakolik jsou uměle systemy inteligentni. Tento přehledový clanek hleda pravě takove evaluacni metody. Provadi proto rozsahlou resersi literatury pokrývajici jak filosoficke a kognitivni předpoklady inteligence, tak i formalni definice a prakticke testy vychazejici z algoritmicke teorie informace. Na zakladě porovnani představených metod clanek odhaluje dvě rozdilne skupiny přistupů založene na principialně odlisných předpokladech. Zatimco starsi přistupy, jako např. Turingův test, jsou založeny na předpokladu, že uspěch v komplexni cinnosti je postacujici pro přiznani inteligence, nove přistupy, jako např. test algoritmickeho IQ, kromě toho vyžaduji i důkladne ověřeni uspěsnosti v jednoduchých cinnostech. V důsledku tohoto zjistěni clanek dochazi k zavěru, že test algoritmickeho IQ založený na definici univerzalni inteligence je v soucasne době nejlepsim kandidatem na vhodný prakticky proveditelný test obecne inteligence umělých systemů. Ackoliv i tento test ma několik znamých limitů.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43679999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Od podzimu roku 2016 do jara 2017 se na Fakultě dopravni CVUT v Praze opět uskutecňovaly tradicni „Vlckovy seminaře“. Ty se na Fakultě dopravni CVUT konavaly nepravidelně už od roku 1999. Smyslem seminarnich debat i nyni bylo předevsim hledat nove neotřele impulsy k tzv. systemovemu přistupu k řeseni uloh, utřiďovat poznatky a nahledy na nastroje systemoveho inženýrstvi a systemove analýzy. To jinými slovy znamena hledat jak dalsi nove (inovovane) postupy a nastroje systemoveho přistupu, tak i cile a možne prostory jejich uplatněni. Metodologickým zakladem vedeni diskusi je vždy tzv. „konstruktivni teorie systemů“, prezentovana prof. Jaroslavem Vlckem, z jehož původniho popudu se zacaly tyto seminaře uskutecňovat.
{"title":"\"Vlček's Seminars\" About Systems Approaches - Topics 2016/2017: Technological Gluttony, GIS in Transportation and Current Approaches to Scientific Publishing","authors":"V. Vlčková","doi":"10.18267/j.aip.117","DOIUrl":"https://doi.org/10.18267/j.aip.117","url":null,"abstract":"Od podzimu roku 2016 do jara 2017 se na Fakultě dopravni CVUT v Praze opět uskutecňovaly tradicni „Vlckovy seminaře“. Ty se na Fakultě dopravni CVUT konavaly nepravidelně už od roku 1999. Smyslem seminarnich debat i nyni bylo předevsim hledat nove neotřele impulsy k tzv. systemovemu přistupu k řeseni uloh, utřiďovat poznatky a nahledy na nastroje systemoveho inženýrstvi a systemove analýzy. To jinými slovy znamena hledat jak dalsi nove (inovovane) postupy a nastroje systemoveho přistupu, tak i cile a možne prostory jejich uplatněni. Metodologickým zakladem vedeni diskusi je vždy tzv. „konstruktivni teorie systemů“, prezentovana prof. Jaroslavem Vlckem, z jehož původniho popudu se zacaly tyto seminaře uskutecňovat.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":"118 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67745103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Chudán, V. Svátek, Jaroslav Kuchař, Stanislav Vojíř
Metody dolovani z dat jsou aplikovany ve stale větsi miře, a to i v domenach, ktere tradicně nemaji tak silnou podporu analytických nastrojů a kde převlada rucni prace analytika. Použiti těchto metod v oblasti fiskalnich dat umožni jejich hlubsi analýzu a může přinest nova zjistěni. Nasazeni pokrocilých metod dolovani z dat je jednou z casti projektu OpenBudgets.eu, který se zaměřuje na transparentnost a odpovědnost v oblasti nakladani s veřejnými prostředky. Tento přehledový clanek shrnuje některe zkusenosti autorů z tohoto projektu ziskane při vývoji, implementaci a aplikaci vybraných metod dolovani z fiskalnich dat. Jedna se zejmena o metody detekce anomalii a dolovani asociacnich pravidel. Tyto metody jsou integrovany do centralni platformy projektu, ktera je k dispozici pokrocilým i běžným uživatelům v připadě zajmu o analýzu fiskalnich dat. Pilotni analýzy ukazaly, že problemem dataminingove analýzy v teto domeně je velký objem nachazených pravidel a různorodý původ jejich vzniku.
{"title":"Data Mining from Open Fiscal Data","authors":"David Chudán, V. Svátek, Jaroslav Kuchař, Stanislav Vojíř","doi":"10.18267/j.aip.114","DOIUrl":"https://doi.org/10.18267/j.aip.114","url":null,"abstract":"Metody dolovani z dat jsou aplikovany ve stale větsi miře, a to i v domenach, ktere tradicně nemaji tak silnou podporu analytických nastrojů a kde převlada rucni prace analytika. Použiti těchto metod v oblasti fiskalnich dat umožni jejich hlubsi analýzu a může přinest nova zjistěni. Nasazeni pokrocilých metod dolovani z dat je jednou z casti projektu OpenBudgets.eu, který se zaměřuje na transparentnost a odpovědnost v oblasti nakladani s veřejnými prostředky. Tento přehledový clanek shrnuje některe zkusenosti autorů z tohoto projektu ziskane při vývoji, implementaci a aplikaci vybraných metod dolovani z fiskalnich dat. Jedna se zejmena o metody detekce anomalii a dolovani asociacnich pravidel. Tyto metody jsou integrovany do centralni platformy projektu, ktera je k dispozici pokrocilým i běžným uživatelům v připadě zajmu o analýzu fiskalnich dat. Pilotni analýzy ukazaly, že problemem dataminingove analýzy v teto domeně je velký objem nachazených pravidel a různorodý původ jejich vzniku.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67744358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The primary aim of this paper is to establish a formal connection between a particular many–valued paraconsistent logic and the logic of a KDD method, namely the GUHA data mining method by introducing a new quantifier called Paraconsistent Separation quantifier. This quantifier is implemented to LISp–Miner Software. The secondary aim is to demonstrate a possible usefulness of this quantifier in social and other applied sciences by examples taking from family planning context.
{"title":"Paraconsistent Many-Valued Logic in GUHA Framework","authors":"E. Turunen","doi":"10.18267/j.aip.116","DOIUrl":"https://doi.org/10.18267/j.aip.116","url":null,"abstract":"The primary aim of this paper is to establish a formal connection between a particular many–valued paraconsistent logic and the logic of a KDD method, namely the GUHA data mining method by introducing a new quantifier called Paraconsistent Separation quantifier. This quantifier is implemented to LISp–Miner Software. The secondary aim is to demonstrate a possible usefulness of this quantifier in social and other applied sciences by examples taking from family planning context.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43615365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article summarizes the development of Acta Informatica Pragensia journal which focuses on social and business aspects of informatics. The journal has built an important position in the past six years among informatics oriented journals in the Czech Republic and in the Slovak Republic. To even strengthen this position, structural changes were made and the mission of the journal was reformulated, emphasizing the importance of informatics related issues connected with the Central and Eastern European region. The need for such a journal in this region is discussed in detail, with reference to the different methodological approaches used in informatics that are historically associated with the former Western and Eastern Bloc. The article also introduces current members of the editorial board, the abstracting and indexing services in which the journal is registered, and includes an acknowledgement to reviewers.
{"title":"Development of Acta Informatica Pragensia Journal and Acknowledgement to Reviewers","authors":"S. Mildeová, Zdenek Smutný, Michal Dolezel","doi":"10.18267/j.aip.118","DOIUrl":"https://doi.org/10.18267/j.aip.118","url":null,"abstract":"The article summarizes the development of Acta Informatica Pragensia journal which focuses on social and business aspects of informatics. The journal has built an important position in the past six years among informatics oriented journals in the Czech Republic and in the Slovak Republic. To even strengthen this position, structural changes were made and the mission of the journal was reformulated, emphasizing the importance of informatics related issues connected with the Central and Eastern European region. The need for such a journal in this region is discussed in detail, with reference to the different methodological approaches used in informatics that are historically associated with the former Western and Eastern Bloc. The article also introduces current members of the editorial board, the abstracting and indexing services in which the journal is registered, and includes an acknowledgement to reviewers.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42611267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses the definition of business rules using business vocabulary and semantics. At the beginning business rules, business vocabulary and semantics of business rules are specified. There is also outlined the current state of research on this topic. Then the definition and formalization of business rules using semantics and business vocabulary is described. Based on these proposed procedures was created a tool that implements and simulate these processes. The main advantage of this tool is “Business Rules Layer”, which implements business rules into the system but is separated from this system. Source code of the rules and the system are not mixed together. Finally, the results are evaluated and future development is suggested.
{"title":"Definition of Business Rules Using Business Vocabulary and Semantics","authors":"Roman Hypský, Jitka Kreslíková","doi":"10.18267/j.aip.103","DOIUrl":"https://doi.org/10.18267/j.aip.103","url":null,"abstract":"This paper discusses the definition of business rules using business vocabulary and semantics. At the beginning business rules, business vocabulary and semantics of business rules are specified. There is also outlined the current state of research on this topic. Then the definition and formalization of business rules using semantics and business vocabulary is described. Based on these proposed procedures was created a tool that implements and simulate these processes. The main advantage of this tool is “Business Rules Layer”, which implements business rules into the system but is separated from this system. Source code of the rules and the system are not mixed together. Finally, the results are evaluated and future development is suggested.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":"6 1","pages":"100-113"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44102199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}