Pub Date : 2019-04-29DOI: 10.7250/csimq.2019-18.02
I. Rychkova, Gil Regev, A. Wegmann
We use homeostasis, the maintenance of steady states in an organism, to explain some of the decisions made by participants in a business process. We use Vickers’ Appreciative System to model the homeostatic states with Harel’s statecharts. We take the example of a doctoral student recruitment process formally defined between a faculty member, a graduate student candidate and a doctoral school. We analyze some gaps in the process caused by a misfit between norms of the process participants. We present a rationale for the anticipation and resolution of these misfits. We extend the traditional operational model with an appreciative model. This model represents the appreciative systems of process participants. Understanding these appreciative systems is necessary to make explicit the misfit between the model and the observed reality. The operational model represents the “technical” perspective on the business process, the one that can be automated. The appreciative model represents the “social” perspective, the one that explains the participants’ behavior as a result of their individual and collective norms. By combining these two perspectives, we can appreciate the richness of the development of socio-technical systems.
{"title":"Extending Business Process Models with Appreciation","authors":"I. Rychkova, Gil Regev, A. Wegmann","doi":"10.7250/csimq.2019-18.02","DOIUrl":"https://doi.org/10.7250/csimq.2019-18.02","url":null,"abstract":"We use homeostasis, the maintenance of steady states in an organism, to explain some of the decisions made by participants in a business process. We use Vickers’ Appreciative System to model the homeostatic states with Harel’s statecharts. We take the example of a doctoral student recruitment process formally defined between a faculty member, a graduate student candidate and a doctoral school. We analyze some gaps in the process caused by a misfit between norms of the process participants. We present a rationale for the anticipation and resolution of these misfits. We extend the traditional operational model with an appreciative model. This model represents the appreciative systems of process participants. Understanding these appreciative systems is necessary to make explicit the misfit between the model and the observed reality. The operational model represents the “technical” perspective on the business process, the one that can be automated. The appreciative model represents the “social” perspective, the one that explains the participants’ behavior as a result of their individual and collective norms. By combining these two perspectives, we can appreciate the richness of the development of socio-technical systems.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124800922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-29DOI: 10.7250/CSIMQ.2019-18.01
Steven L. Alter
This article responds to a need for a socio-technical systems (STS) perspective that fits in a world that has changed greatly over the decades since the socio-technical movement began. This article identifies conditions and paradoxes that limit traditional STS approaches in current business practice. A newer work system perspective (WSP) combines aspects of work system theory (WST), WST extensions, and the work system method (WSM). This WSP frames socio-technical thinking in a straightforward way that helps in describing and discussing socio-technical systems. It also provides many ideas that can help in negotiating and designing improvements. After summarizing WSP and some of its possible applications to work systems, this article uses the various topics in its title to indicate how WSP-based socio-technical thinking might be more suitable for today’s world.
{"title":"Applying Socio-technical Thinking in the Competitive, Agile, Lean, Data-Driven World of Knowledge Work and Smart, Service-Oriented, Customer-Centric Value Creation Ecosystems","authors":"Steven L. Alter","doi":"10.7250/CSIMQ.2019-18.01","DOIUrl":"https://doi.org/10.7250/CSIMQ.2019-18.01","url":null,"abstract":"This article responds to a need for a socio-technical systems (STS) perspective that fits in a world that has changed greatly over the decades since the socio-technical movement began. This article identifies conditions and paradoxes that limit traditional STS approaches in current business practice. A newer work system perspective (WSP) combines aspects of work system theory (WST), WST extensions, and the work system method (WSM). This WSP frames socio-technical thinking in a straightforward way that helps in describing and discussing socio-technical systems. It also provides many ideas that can help in negotiating and designing improvements. After summarizing WSP and some of its possible applications to work systems, this article uses the various topics in its title to indicate how WSP-based socio-technical thinking might be more suitable for today’s world.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"111 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115761555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-29DOI: 10.7250/csimq.2019-18.00
P. Bednar, I. Bider
This thematic issue of the Complex Systems Informatics and Modeling Quarterly journal is dedicated to using a socio-technical perspective in the Information Systems (IS) field. It contains a selection of extended papers presented at STPIS'18 – 4th International Workshop on Socio-Technical Perspective in IS Development held on June 12, 2018 in Tallinn, Estonia. The articles presented in this thematic issue contain at least 30% new material compared to the initial papers. After the extension, all articles went through two rounds of reviews to ensure the quality of the papers published in this issue. STPIS papers cover both theoretical and practical aspects of using a socio-technical perspective in IS, which is reflected in the current issue that contains both theoretically and practically oriented papers.
{"title":"Selected Topics on Socio-technical Perspective in Information Systems: Editorial Introduction to Issue 18 of CSIMQ","authors":"P. Bednar, I. Bider","doi":"10.7250/csimq.2019-18.00","DOIUrl":"https://doi.org/10.7250/csimq.2019-18.00","url":null,"abstract":"This thematic issue of the Complex Systems Informatics and Modeling Quarterly journal is dedicated to using a socio-technical perspective in the Information Systems (IS) field. It contains a selection of extended papers presented at STPIS'18 – 4th International Workshop on Socio-Technical Perspective in IS Development held on June 12, 2018 in Tallinn, Estonia. The articles presented in this thematic issue contain at least 30% new material compared to the initial papers. After the extension, all articles went through two rounds of reviews to ensure the quality of the papers published in this issue. STPIS papers cover both theoretical and practical aspects of using a socio-technical perspective in IS, which is reflected in the current issue that contains both theoretically and practically oriented papers.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128060781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-29DOI: 10.7250/csimq.2019-18.03
T. McEvoy, S. Kowalski
Cyber security risks are socio-technical in nature. They result not just from technical vulnerabilities but also, more fundamentally, from the degradation of working practices over time – which move an organization across the boundary of secure practice to a place where attacks will not only succeed, but also have a significantly greater impact on the organization. Yet current risk analysis and management methodologies are not designed to detect these kinds of systemic risks. We present an approach, devised in the field, to deriving these risks – using a qualitative research methodology, akin to grounded theory, but based on preset coding descriptors. This allows organizational and individual behavior identified during interviews, observations or document research to be thematically analyzed, collated and mapped to potential risks, linked to poor working practices. The resulting risk factors can be linked together forming “risk narratives”, showing how the degradation of working practices in one part of the organization can contribute to undermining its ability to respond to cyber security threats in another part of the organization.
{"title":"Deriving Cyber Security Risks from Human and Organizational Factors - A Socio-technical Approach","authors":"T. McEvoy, S. Kowalski","doi":"10.7250/csimq.2019-18.03","DOIUrl":"https://doi.org/10.7250/csimq.2019-18.03","url":null,"abstract":"Cyber security risks are socio-technical in nature. They result not just from technical vulnerabilities but also, more fundamentally, from the degradation of working practices over time – which move an organization across the boundary of secure practice to a place where attacks will not only succeed, but also have a significantly greater impact on the organization. Yet current risk analysis and management methodologies are not designed to detect these kinds of systemic risks. We present an approach, devised in the field, to deriving these risks – using a qualitative research methodology, akin to grounded theory, but based on preset coding descriptors. This allows organizational and individual behavior identified during interviews, observations or document research to be thematically analyzed, collated and mapped to potential risks, linked to poor working practices. The resulting risk factors can be linked together forming “risk narratives”, showing how the degradation of working practices in one part of the organization can contribute to undermining its ability to respond to cyber security threats in another part of the organization.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134563915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-27DOI: 10.7250/csimq.2018-17.05
Negin Banaeianjahromi
Governmental organizations adopt Enterprise Architecture (EA) not only to enhance their performance and efficiency but also to move toward e-government implementation. The article at hand investigates the EA development obstacles in governmental organizations. An interpretivist paradigm using the Grounded Theory Methodology was selected to carry out this study. The data were collected through semi-structured interviews with 9 governmental organizations in Iran. In total, 17 obstacles were identified. This study revealed the precedence in addressing EA development obstacles and top management commitment category was identified as a category that has the highest impact on the EA projects. It was realized that the commitment that top management levels of the organizations show toward EA development projects, motivates employees to effectively engage with the projects. In addition, a committed top manager assigns adequate resources to the EA project in order to prepare the infrastructure of the company. In this study, government and politics category appeared to be a category of external obstacles that affects most of the other categories directly or indirectly. This study contributes to industry and academia by investigating the EA development obstacles.
{"title":"The Role of Top Management Commitment in Enterprise Architecture Development in Governmental Organizations","authors":"Negin Banaeianjahromi","doi":"10.7250/csimq.2018-17.05","DOIUrl":"https://doi.org/10.7250/csimq.2018-17.05","url":null,"abstract":"Governmental organizations adopt Enterprise Architecture (EA) not only to enhance their performance and efficiency but also to move toward e-government implementation. The article at hand investigates the EA development obstacles in governmental organizations. An interpretivist paradigm using the Grounded Theory Methodology was selected to carry out this study. The data were collected through semi-structured interviews with 9 governmental organizations in Iran. In total, 17 obstacles were identified. This study revealed the precedence in addressing EA development obstacles and top management commitment category was identified as a category that has the highest impact on the EA projects. It was realized that the commitment that top management levels of the organizations show toward EA development projects, motivates employees to effectively engage with the projects. In addition, a committed top manager assigns adequate resources to the EA project in order to prepare the infrastructure of the company. In this study, government and politics category appeared to be a category of external obstacles that affects most of the other categories directly or indirectly. This study contributes to industry and academia by investigating the EA development obstacles.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-27DOI: 10.7250/csimq.2018-17.04
Luisa Rincón, R. Mazo, C. Salinesi
Product lines have emerged in the software industry as an attractive approach to perform planned reuse of code. Nevertheless, a product line solution is not appropriate in all cases and also requires some conditions to be implemented successfully. The literature offers several contributions regarding the adoption of product lines. However, only a few of them are able to support decision-makers in making informed decisions in favor of or against following this approach. We proposed APPLIES, a framework for evaluating the organization’s motivation and preparation for adopting product lines. This article presents the second version of the APPLIES framework as well as the second iteration of the evaluation of this approach. This evaluation consisted of (i) a workshop with a practitioner who had experience in adopting the product line production approach and; (ii) a review of the content by five product line experts. The results obtained from the evaluation resulted in modifications to the framework content, mainly to simplify the statements and eliminate redundant elements. Also, we detected new functionalities and modifications that we expect to be resolved in the following evaluation iterations. Further evaluations and improvements are needed to mature the framework. Moreover, we expect to incorporate APPLIES into a process that covers the aspects that a company must consider before deciding to adopt this production paradigm.
{"title":"Evaluating Company's Readiness for Adopting Product Line Engineering: a Second Evaluation Round","authors":"Luisa Rincón, R. Mazo, C. Salinesi","doi":"10.7250/csimq.2018-17.04","DOIUrl":"https://doi.org/10.7250/csimq.2018-17.04","url":null,"abstract":"Product lines have emerged in the software industry as an attractive approach to perform planned reuse of code. Nevertheless, a product line solution is not appropriate in all cases and also requires some conditions to be implemented successfully. The literature offers several contributions regarding the adoption of product lines. However, only a few of them are able to support decision-makers in making informed decisions in favor of or against following this approach. We proposed APPLIES, a framework for evaluating the organization’s motivation and preparation for adopting product lines. This article presents the second version of the APPLIES framework as well as the second iteration of the evaluation of this approach. This evaluation consisted of (i) a workshop with a practitioner who had experience in adopting the product line production approach and; (ii) a review of the content by five product line experts. The results obtained from the evaluation resulted in modifications to the framework content, mainly to simplify the statements and eliminate redundant elements. Also, we detected new functionalities and modifications that we expect to be resolved in the following evaluation iterations. Further evaluations and improvements are needed to mature the framework. Moreover, we expect to incorporate APPLIES into a process that covers the aspects that a company must consider before deciding to adopt this production paradigm.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-27DOI: 10.7250/csimq.2018-17.02
M. Rakoczy, A. Bouzeghoub, Alda Lopes Gançarski, K. Wegrzyn-Wolska
In every scientific discipline, researchers face two common dilemmas: where to find bleeding-edge papers and where to publish their own articles. We propose to answer these questions by looking at the influence between communities, e.g. conferences or journals. The influential conferences are those which papers are heavily cited by other conferences, i.e. they are visible, significant and inspiring. For the task of finding such influential places-to-publish, we introduce a Running Influence model that aims to discover pairwise influence between communities and evaluate the overall influence of each considered community. We have taken into consideration time aspects such as intensity of papers citations over time and difference of conferences starting years. The community influence analysis is tested on real-world data of Computer Science conferences.
{"title":"Time-Dependent Influence Measurement in Citation Networks","authors":"M. Rakoczy, A. Bouzeghoub, Alda Lopes Gançarski, K. Wegrzyn-Wolska","doi":"10.7250/csimq.2018-17.02","DOIUrl":"https://doi.org/10.7250/csimq.2018-17.02","url":null,"abstract":"In every scientific discipline, researchers face two common dilemmas: where to find bleeding-edge papers and where to publish their own articles. We propose to answer these questions by looking at the influence between communities, e.g. conferences or journals. The influential conferences are those which papers are heavily cited by other conferences, i.e. they are visible, significant and inspiring. For the task of finding such influential places-to-publish, we introduce a Running Influence model that aims to discover pairwise influence between communities and evaluate the overall influence of each considered community. We have taken into consideration time aspects such as intensity of papers citations over time and difference of conferences starting years. The community influence analysis is tested on real-world data of Computer Science conferences.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125537316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-27DOI: 10.7250/csimq.2018-17.00
B. L. Grand, R. Deneckère
This thematic issue of the Complex Systems Informatics and Modeling Quarterly journal is dedicated to Information Science. It is a selection of the extended best papers presented at the 12th edition of the International IEEE Conference on Research Challenges in Information Science (RCIS’2018). The articles presented in this thematic issue contain at least 30% new material compared to the initial papers. The RCIS conference covers a wide spectrum of topics in the information science field: information search and discovery, requirement engineering, product lines, smart cities and Internet of Things, business processes, recommendation and prediction, security, social computing and Social Network Analysis, Human-Computer Interaction and systems engineering. After an additional reviewing process, the articles which have been finally selected present contributions of different types to the field of information science: models, architectures, frameworks, and surveys.
{"title":"Selected Topics on Research Challenges in Information Science: Editorial Introduction to Issue 17 of CSIMQ","authors":"B. L. Grand, R. Deneckère","doi":"10.7250/csimq.2018-17.00","DOIUrl":"https://doi.org/10.7250/csimq.2018-17.00","url":null,"abstract":"This thematic issue of the Complex Systems Informatics and Modeling Quarterly journal is dedicated to Information Science. It is a selection of the extended best papers presented at the 12th edition of the International IEEE Conference on Research Challenges in Information Science (RCIS’2018). The articles presented in this thematic issue contain at least 30% new material compared to the initial papers. The RCIS conference covers a wide spectrum of topics in the information science field: information search and discovery, requirement engineering, product lines, smart cities and Internet of Things, business processes, recommendation and prediction, security, social computing and Social Network Analysis, Human-Computer Interaction and systems engineering. After an additional reviewing process, the articles which have been finally selected present contributions of different types to the field of information science: models, architectures, frameworks, and surveys.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131238600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-27DOI: 10.7250/csimq.2018-17.03
George Drosatos, Fotis Nalbadis, E. Arden-Close, Victoria Baines, Elvira Bolat, L. Vuillier, Theodoros Kostoulas, M. Budka, S. Wasowska, M. Bonello, Jamie Brown, Tessa Corner, J. McAlaney, Keith Phalp, Raian Ali
Online gambling, unlike other offline addiction forms, provides unprecedented opportunities for monitoring users’ behaviour in real-time, along with the ability to adapt persuasive interactions and messages that would match the gamblers usage and personal context. Online gambling industry usually offers Application Programming Interfaces (APIs) that are mainly intended to allow third-party applications to interact with their services and enhance user’s experience. In this article, we claim that such API’s can also be utilised to retrieve gamblers’ online data, such as browsing and betting history and other available offers, and use it to build more proactive and intelligent responsible gambling systems. We report on our experience in this field and make the argument that the available data for persuasive marketing and usability should, under certain usage conditions, also be made available for responsible online gambling services. We discuss the psychological foundations of our proposed approach and the risks and challenges typically identified when building such a software-assisted intervention, persuasion and emotion regulation technology. We also explain the potential impact of corporate social responsibility and data protection prospects. Furthermore, we explore the required principles that should be followed by the gambling industry for enabling responsible online gambling. We finally propose a conceptual architecture to show our vision and explain how it can be implemented. In the broader context, the article is intended to provide insights on building behavioural awareness and regulation information systems related to problematic digital media usage.
{"title":"Enabling Responsible Online Gambling by Real-time Persuasive Technologies","authors":"George Drosatos, Fotis Nalbadis, E. Arden-Close, Victoria Baines, Elvira Bolat, L. Vuillier, Theodoros Kostoulas, M. Budka, S. Wasowska, M. Bonello, Jamie Brown, Tessa Corner, J. McAlaney, Keith Phalp, Raian Ali","doi":"10.7250/csimq.2018-17.03","DOIUrl":"https://doi.org/10.7250/csimq.2018-17.03","url":null,"abstract":"Online gambling, unlike other offline addiction forms, provides unprecedented opportunities for monitoring users’ behaviour in real-time, along with the ability to adapt persuasive interactions and messages that would match the gamblers usage and personal context. Online gambling industry usually offers Application Programming Interfaces (APIs) that are mainly intended to allow third-party applications to interact with their services and enhance user’s experience. In this article, we claim that such API’s can also be utilised to retrieve gamblers’ online data, such as browsing and betting history and other available offers, and use it to build more proactive and intelligent responsible gambling systems. We report on our experience in this field and make the argument that the available data for persuasive marketing and usability should, under certain usage conditions, also be made available for responsible online gambling services. We discuss the psychological foundations of our proposed approach and the risks and challenges typically identified when building such a software-assisted intervention, persuasion and emotion regulation technology. We also explain the potential impact of corporate social responsibility and data protection prospects. Furthermore, we explore the required principles that should be followed by the gambling industry for enabling responsible online gambling. We finally propose a conceptual architecture to show our vision and explain how it can be implemented. In the broader context, the article is intended to provide insights on building behavioural awareness and regulation information systems related to problematic digital media usage.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129305439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-27DOI: 10.7250/csimq.2018-17.01
Ana León Palacio, O. P. López
During the last two decades, data generated by Next Generation Sequencing Technologies have revolutionized our understanding of human biology and improved the study on how changes (variations) in the DNA are involved in the risk of suffering a certain disease. A huge amount of genomic data is publicly available and frequently used by the research community in order to extract meaningful and reliable gene-disease relationships. However, the management of this exponential growth of data has become a challenge for biologists. Under such a Big Data problem perspective, they are forced to delve into a lake of complex data spread in over thousand heterogeneous repositories, represented in multiple formats and with different levels of quality; but when data are used to solve a concrete problem only a small part of that “data lake” is really significant; this is what we call the “smart” data perspective. By using conceptual models and the principles of data quality management, adapted to the genomic domain, we propose a systematic approach called SILE method to move from a Big Data to a Smart Data perspective. The aim of this approach is to populate an Information System with genomic data which are accessible, informative and actionable enough to extract valuable knowledge.
{"title":"Smart Data for Genomic Information Systems: the SILE Method","authors":"Ana León Palacio, O. P. López","doi":"10.7250/csimq.2018-17.01","DOIUrl":"https://doi.org/10.7250/csimq.2018-17.01","url":null,"abstract":"During the last two decades, data generated by Next Generation Sequencing Technologies have revolutionized our understanding of human biology and improved the study on how changes (variations) in the DNA are involved in the risk of suffering a certain disease. A huge amount of genomic data is publicly available and frequently used by the research community in order to extract meaningful and reliable gene-disease relationships. However, the management of this exponential growth of data has become a challenge for biologists. Under such a Big Data problem perspective, they are forced to delve into a lake of complex data spread in over thousand heterogeneous repositories, represented in multiple formats and with different levels of quality; but when data are used to solve a concrete problem only a small part of that “data lake” is really significant; this is what we call the “smart” data perspective. By using conceptual models and the principles of data quality management, adapted to the genomic domain, we propose a systematic approach called SILE method to move from a Big Data to a Smart Data perspective. The aim of this approach is to populate an Information System with genomic data which are accessible, informative and actionable enough to extract valuable knowledge.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"25 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123159994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}