Developing e-Government interoperability in the government context is a complex task. As interoperability in government context is associated and hindered by many challenges and barriers connected to government nature of complexity. Interoperability is generally defined as the ability for two (or more) systems to exchange information and to use the information that has been exchanged. In this paper, we focus on computing systems interoperability across government ministries to achieve interoperable e-Government IT based solutions. In order to achieve e-Government interoperability in an organised and efficient way, this paper establishes a guidance-based approach for enhancing the e-Government Interoperability. This contribution is motivated by the limitations of the traditional software engineering methodologies in terms of analysis, design and development frameworks to a point that they can hardly cope with the growing issues of e-Government services interoperability.
{"title":"A Guidance Based Approach for Enhancing the e-Government Interoperability","authors":"Y. Jamoussi, Z. Al-Khanjari, N. Kraiem","doi":"10.31341/JIOS.41.1.3","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.3","url":null,"abstract":"Developing e-Government interoperability in the government context is a complex task. As interoperability in government context is associated and hindered by many challenges and barriers connected to government nature of complexity. Interoperability is generally defined as the ability for two (or more) systems to exchange information and to use the information that has been exchanged. In this paper, we focus on computing systems interoperability across government ministries to achieve interoperable e-Government IT based solutions. In order to achieve e-Government interoperability in an organised and efficient way, this paper establishes a guidance-based approach for enhancing the e-Government Interoperability. This contribution is motivated by the limitations of the traditional software engineering methodologies in terms of analysis, design and development frameworks to a point that they can hardly cope with the growing issues of e-Government services interoperability.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"35-56"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43009902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Learning analytics deals with the data that occurs from students' interaction with ICT: collecting data, analyzing and reporting that can influence learning and teaching. Analysis of validity and reliability of assessment lags behind other applications of learning analytics. We present here mathematical modeling of learning analytics for assessment, especially for peer-assessment. In addition, we analyze and categorize students' recognition of advantages and disadvantages of peer-assessment. Finally implementations of reliability check of peer-assessment in Moodle Workshop module are explained.
{"title":"Learning Analytics for Peer-assessment: (Dis)advantages, Reliability and Implementation","authors":"B. Divjak, M. Maretić","doi":"10.31341/JIOS.41.1.2","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.2","url":null,"abstract":"Learning analytics deals with the data that occurs from students' interaction with ICT: collecting data, analyzing and reporting that can influence learning and teaching. Analysis of validity and reliability of assessment lags behind other applications of learning analytics. We present here mathematical modeling of learning analytics for assessment, especially for peer-assessment. In addition, we analyze and categorize students' recognition of advantages and disadvantages of peer-assessment. Finally implementations of reliability check of peer-assessment in Moodle Workshop module are explained.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"21-34"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47565677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara Kerraoui, Y. Kissoum, M. Redjimi, Moussa Saker
Testing is a software development activity, devoted to evaluating product quality and improving it by identifying defects and problems. Concerning multi agent systems, testing is a challenging task, which asks for new testing techniques dealing with their specific nature. The techniques need to be effective and adequate to evaluate agent’s autonomous behaviors and build confidence in them.The "Model Based Testing" (MBT) is a technique particularly interested among all existing solutions of tests. This latter is based on a system model, which produces abstract test cases. To run these last ones against systems under test,the abstract test cases have to be transformed to concrete ones. As part of this effort, we propose a model based testing approach for multi agent systems based on such a model called Reference net, where a tool, which aims to providing a uniform and automated approach is developed. The feasibility and the advantage of the proposed approach are shown through a short case study.
{"title":"MATT: Multi Agents Testing Tool Based Nets within Nets","authors":"Sara Kerraoui, Y. Kissoum, M. Redjimi, Moussa Saker","doi":"10.31341/JIOS.40.2.1","DOIUrl":"https://doi.org/10.31341/JIOS.40.2.1","url":null,"abstract":"Testing is a software development activity, devoted to evaluating product quality and improving it by identifying defects and problems. Concerning multi agent systems, testing is a challenging task, which asks for new testing techniques dealing with their specific nature. The techniques need to be effective and adequate to evaluate agent’s autonomous behaviors and build confidence in them.The \"Model Based Testing\" (MBT) is a technique particularly interested among all existing solutions of tests. This latter is based on a system model, which produces abstract test cases. To run these last ones against systems under test,the abstract test cases have to be transformed to concrete ones. As part of this effort, we propose a model based testing approach for multi agent systems based on such a model called Reference net, where a tool, which aims to providing a uniform and automated approach is developed. The feasibility and the advantage of the proposed approach are shown through a short case study.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"40 1","pages":"165-184"},"PeriodicalIF":0.6,"publicationDate":"2016-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.40.2.1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper deals with the ACP2Petri tool, providing a transformation of process algebraic specification to equivalent Petri net-based specification. Long-term practical experiences with the tool revealed some suggestions for its update and extension. Shortcomings and limitations found are described and proposed solutions provided within the paper. Implemented extensions, simplifying the usage of the tool and providing more options for analysis of particular transformation, are also presented. One of the most evident extensions of the tool is its graphical user interface, which allows for convenient management and detailed control over the process of transformation.
{"title":"Enhancing Formal Methods Integration with ACP2Petri","authors":"Slavomír Simonák, M. Šolc","doi":"10.31341/JIOS.40.2.4","DOIUrl":"https://doi.org/10.31341/JIOS.40.2.4","url":null,"abstract":"The paper deals with the ACP2Petri tool, providing a transformation of process algebraic specification to equivalent Petri net-based specification. Long-term practical experiences with the tool revealed some suggestions for its update and extension. Shortcomings and limitations found are described and proposed solutions provided within the paper. Implemented extensions, simplifying the usage of the tool and providing more options for analysis of particular transformation, are also presented. One of the most evident extensions of the tool is its graphical user interface, which allows for convenient management and detailed control over the process of transformation.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"40 1","pages":"221-235"},"PeriodicalIF":0.6,"publicationDate":"2016-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a Multi-Agents Model to simulate the phenomenon of the infection by the human immunodeficiency virus (HIV). Since the HIV was isolated in 1983 and found to be the cause of the Acquired Immune Deficiency Syndrome (AIDS) in 1984, lots of studies have been carried out to understand the complex dynamics between the HIV virus and the immune system. The simplest model was the 3D mathematical model. But the complexity of this phenomenon and the diversity of cells and actors which affect its evolution requires the use of new approaches such as multi-agents approach that we have applied in this paper. The results of our simulator on the 5D model are promising because they are consistent with biological knowledge’s. Therefore, the proposed approach is well appropriate to the study of population dynamics in general and could help to understand and predict the dynamics of HIV infection.
{"title":"Agent-Based Modelling applied to 5D model of the HIV infection","authors":"Toufik Laroum, Bornia Tiguiouart, M. Redjimi","doi":"10.31341/JIOS.40.2.2","DOIUrl":"https://doi.org/10.31341/JIOS.40.2.2","url":null,"abstract":"This paper proposes a Multi-Agents Model to simulate the phenomenon of the infection by the human immunodeficiency virus (HIV). Since the HIV was isolated in 1983 and found to be the cause of the Acquired Immune Deficiency Syndrome (AIDS) in 1984, lots of studies have been carried out to understand the complex dynamics between the HIV virus and the immune system. The simplest model was the 3D mathematical model. But the complexity of this phenomenon and the diversity of cells and actors which affect its evolution requires the use of new approaches such as multi-agents approach that we have applied in this paper. The results of our simulator on the 5D model are promising because they are consistent with biological knowledge’s. Therefore, the proposed approach is well appropriate to the study of population dynamics in general and could help to understand and predict the dynamics of HIV infection.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"40 1","pages":"185-201"},"PeriodicalIF":0.6,"publicationDate":"2016-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this paper is to find and compare existing solutions of complex event processing platforms (CEP). CEP platforms generally serve for processing and/or predicting of high frequency data. We intend to use CEP platform for processing of complex time series and integrate a solution for newly proposed method of decision making. The decision making process will be described by formal grammar. As there are lots of CEP solutions we will take the following characteristics under consideration - the processing in real time, possibility of processing of high volume data from multiple sources, platform independence, platform allowing integration with user solution and open license. At first we will talk about existing CEP tools and their specific way of use in praxis. Then we will mention the design of method for formalization of business rules used for decision making. Afterwards, we focus on two platforms which seem to be the best fit for integration of our solution and we will list the main pros and cons of each approach. Next part is devoted to benchmark platforms for CEP. Final part is devoted to experimental measurements of platform with integrated method for decision support.
{"title":"Performance Measurement of Complex Event Platforms","authors":"Eva Zámecníková, Jitka Kreslíková","doi":"10.31341/JIOS.40.2.5","DOIUrl":"https://doi.org/10.31341/JIOS.40.2.5","url":null,"abstract":"The aim of this paper is to find and compare existing solutions of complex event processing platforms (CEP). CEP platforms generally serve for processing and/or predicting of high frequency data. We intend to use CEP platform for processing of complex time series and integrate a solution for newly proposed method of decision making. The decision making process will be described by formal grammar. As there are lots of CEP solutions we will take the following characteristics under consideration - the processing in real time, possibility of processing of high volume data from multiple sources, platform independence, platform allowing integration with user solution and open license. At first we will talk about existing CEP tools and their specific way of use in praxis. Then we will mention the design of method for formalization of business rules used for decision making. Afterwards, we focus on two platforms which seem to be the best fit for integration of our solution and we will list the main pros and cons of each approach. Next part is devoted to benchmark platforms for CEP. Final part is devoted to experimental measurements of platform with integrated method for decision support.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"40 1","pages":"237-254"},"PeriodicalIF":0.6,"publicationDate":"2016-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Definition of programming languages consists of the formal definition of syntax and semantics. One of the most popular semantic methods used in various stages of software engineering is structural operational semantics. It describes program behavior in the form of state changes after execution of elementary steps of program. This feature makes structural operational semantics useful for implementation of programming languages and also for verification purposes. In our paper we present a new approach to structural operational semantics. We model behavior of programs in category of states, where objects are states, an abstraction of computer memory and morphisms model state changes, execution of a program in elementary steps. The advantage of using categorical model is its exact mathematical structure with many useful proved properties and its graphical illustration of program behavior as a path, i.e. a composition of morphisms. Our approach is able to accentuate dynamics of structural operational semantics. For simplicity, we assume that data are intuitively typed. Visualization and facility of our model is not only a new model of structural operational semantics of imperative programming languages but it can also serve for education purposes.
{"title":"Categorical model of structural operational semantics for imperative language","authors":"William Steingartner, Valerie Novitzká","doi":"10.31341/JIOS.40.2.3","DOIUrl":"https://doi.org/10.31341/JIOS.40.2.3","url":null,"abstract":"Definition of programming languages consists of the formal definition of syntax and semantics. One of the most popular semantic methods used in various stages of software engineering is structural operational semantics. It describes program behavior in the form of state changes after execution of elementary steps of program. This feature makes structural operational semantics useful for implementation of programming languages and also for verification purposes. In our paper we present a new approach to structural operational semantics. We model behavior of programs in category of states, where objects are states, an abstraction of computer memory and morphisms model state changes, execution of a program in elementary steps. The advantage of using categorical model is its exact mathematical structure with many useful proved properties and its graphical illustration of program behavior as a path, i.e. a composition of morphisms. Our approach is able to accentuate dynamics of structural operational semantics. For simplicity, we assume that data are intuitively typed. Visualization and facility of our model is not only a new model of structural operational semantics of imperative programming languages but it can also serve for education purposes.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"40 1","pages":"203-219"},"PeriodicalIF":0.6,"publicationDate":"2016-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Underground economy (UE) is one of the undesired facts in every country. The size of the underground economy is an important parameter in determining the effectiveness of fiscal and monetary policy, the rate of economic growth, and income distribution. From a scientific point of view analysis of the UE is faced with severe data problems because underground activities are not recorded and anyone engaged in it has an incentive to hide them. Therefore, economists have developed a variety of methods to estimate the size of the underground economy. The aim of this paper is to estimate and compare the size of the Croatian underground economy with the underground economy of European Union (EU) countries in the period of 2004 till 2012. The purpose of this paper is to address this issue in three ways. First, we review existing estimates of the size of the underground economy. Second, we apply a novel calculation method for estimation: fuzzy logic. Third, we calculated and compared underground economy index for 25 European Union countries and compared it, with special focus on Croatian underground economy index. Results indicated that Croatia has the thirteenth largest underground economy among measured members of the European Union. This study is the first of its kind with recent data to measure the size of underground economy in European Union countries by employing fuzzy logic approach.
{"title":"Estimation and Comparison of Underground Economy in Croatia and European Union Countries: Fuzzy Logic Approach","authors":"K. Maršić, D. Oreški","doi":"10.31341/JIOS.40.1.5","DOIUrl":"https://doi.org/10.31341/JIOS.40.1.5","url":null,"abstract":"Underground economy (UE) is one of the undesired facts in every country. The size of the underground economy is an important parameter in determining the effectiveness of fiscal and monetary policy, the rate of economic growth, and income distribution. From a scientific point of view analysis of the UE is faced with severe data problems because underground activities are not recorded and anyone engaged in it has an incentive to hide them. Therefore, economists have developed a variety of methods to estimate the size of the underground economy. The aim of this paper is to estimate and compare the size of the Croatian underground economy with the underground economy of European Union (EU) countries in the period of 2004 till 2012. The purpose of this paper is to address this issue in three ways. First, we review existing estimates of the size of the underground economy. Second, we apply a novel calculation method for estimation: fuzzy logic. Third, we calculated and compared underground economy index for 25 European Union countries and compared it, with special focus on Croatian underground economy index. Results indicated that Croatia has the thirteenth largest underground economy among measured members of the European Union. This study is the first of its kind with recent data to measure the size of underground economy in European Union countries by employing fuzzy logic approach.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"69 1","pages":"83-104"},"PeriodicalIF":0.6,"publicationDate":"2016-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the results of an evaluation of the Performance Journey Mapping (PJM) framework. PJM is a service performance assessment concept with accompanying tools tailored to the specific performance measurement needs of small and medium-sized service providers. The initial evaluation of PJM was performed from three different perspectives. The underlying evaluation framework applied methodological triangulation in order to (i) ensure valid and reliable results and to (ii) evaluate both the framework’s results and its process. Quantitative results were supplemented with insights gained through participant observation.
{"title":"Performance Journey Mapping: Insights from a Methodological Triangulation","authors":"Angelika Höber, D. Weitlaner, Elisabeth Pergler","doi":"10.31341/JIOS.40.1.3","DOIUrl":"https://doi.org/10.31341/JIOS.40.1.3","url":null,"abstract":"This paper presents the results of an evaluation of the Performance Journey Mapping (PJM) framework. PJM is a service performance assessment concept with accompanying tools tailored to the specific performance measurement needs of small and medium-sized service providers. The initial evaluation of PJM was performed from three different perspectives. The underlying evaluation framework applied methodological triangulation in order to (i) ensure valid and reliable results and to (ii) evaluate both the framework’s results and its process. Quantitative results were supplemented with insights gained through participant observation.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"45-65"},"PeriodicalIF":0.6,"publicationDate":"2016-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.40.1.3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the investigation and comparison of TLC model checking method (TLA Checker) properties. There are two different approaches to method usage which are considered. The first one consists of a transition system states attendance by breadth-first search (BFS), and the second one by depth-first search (DFS). The Kripke structure has been chosen as a transition system model. A case study has been conducted, where composite web service usage scenario has been considered. Obtained experimental results are aimed at increasing the effectiveness of TLA+ specifications automated verification.
{"title":"The Investigation of TLC Model Checker Properties","authors":"V. Shkarupylo, Igor Tomičić, K. M. Kasian","doi":"10.31341/JIOS.40.1.7","DOIUrl":"https://doi.org/10.31341/JIOS.40.1.7","url":null,"abstract":"This paper presents the investigation and comparison of TLC model checking method (TLA Checker) properties. There are two different approaches to method usage which are considered. The first one consists of a transition system states attendance by breadth-first search (BFS), and the second one by depth-first search (DFS). The Kripke structure has been chosen as a transition system model. A case study has been conducted, where composite web service usage scenario has been considered. Obtained experimental results are aimed at increasing the effectiveness of TLA+ specifications automated verification.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"40 1","pages":"145-152"},"PeriodicalIF":0.6,"publicationDate":"2016-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69297211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}