The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web Ontology Language (OWL) is a semantic markup language for describing information on the Web so that machines can process and interpret Web content. OWL expresses information ontologies and has the capability to map all the information on the World Wide Web into a semantic, machine-understandable atlas of information. This article addresses personal information modeling in OWL through enhancing...
Private/personal information is defined as any linguistic expression that has referent(s) of type natural person. Private information can be classified as: (1) atomic private information is an assertion that has a single human referent, and (2) compound private information is an assertion that has more than one human referent. If p is a piece of atomic private information of person v, then p is proprietary...
In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security-relevant information. This paper scrutinizes this proposed method for security requirements specification and develops a different basic methodology that can be used for the stated purpose...
Access control models traditionally have been used to indicate which subjects have access to which objects. This paper conceptualizes access control in terms of information flow. A fundamental concept in this flow is that objects are "things that flow", i.e., that are received, processed, created, released, and transferred. The resulting diagrammatic description specifies the stream of flow...
Application development security utilizes a list of threats that identify and organize application security classes of attack. The developed system is decomposed into relevant components and then each component is analyzed for threats. Data flow diagrams (DFDs) are typically used to graphically represent a system. In this paper we propose a flow-based model as an alternative methodology for identification...
Floridi's resource-product-target (RPT) model has been proposed as a unified approach for information ethics (IE). RPT can be used to explain and relate the main concepts of IE. It models morally relative acts on information. This paper introduces an enhancement of the RPT model that represents a more complete conceptualization of the "life of information," establishing a firmer foundation...
The input-process-output (IPO) model has been used in many interdisciplinary applications to convey systems fundamentals, as exemplified in abstract diagramming of attacks on information systems. The resulting IPO-based diagram can provide a framework for identifying points of potential security concern and to develop protection strategies. This paper introduces an alternative diagramming representation...
Personal Identifiable Information (PII) describes a relationship between information and a uniquely identifiable person. Sensitive PII refers to a category of PII that contains significant information about individuals. In general, sources of sensitivity of PII can be tracked by partitioning the basic unit of linguistic information into three parts: identity, verb, and the reminder of the linguistic...
Conceptual modeling provides a foundation for the development phases of software systems. UML has become one of the major conceptual modeling tools in Object-Oriented software engineering utilized in a wide range of applications and domains. However, concerns have arisen recently regarding UML tools used in this area. In this paper, we scrutinize the concept of State utilized extensively in UML statecharts...
Modeling of systems, e.g., communication systems, involves identification of their basic components and the interrelationship between them. This paper proposes a model of ethical systems based on the notion of flow. The flow of ethical rules, e.g., ought not lie, are conceptualized to trigger the flow/blockage of other flows, e.g., information flow. In this scheme different types of mechanisms can...
Agent-based systems have emerged as an important next-generation automation paradigm. One of the aims of agent-oriented research is to simplify agent design by introducing a conceptual abstraction layer for interacting agents. This paper provides a new multilevel conceptual foundation for modeling of agents, their relationships, and their interactions based on BDI concepts. The methodology utilizes...
This paper proposes a multilevel flow model of supply chains that reflects new requirements for interconnected flows of material, information, and money. The internal organization of each sphere is an assembly of five areas - collection, processing, creation, release, and communication - that form stages of internal streams of flow. To illustrate the applicability of the model, an application is discussed...
Building an information system involves a first phase of conceptual modeling of the ldquoreal world domain,rdquo then a second phase of design of the software system. For describing the software system, object-oriented methods and languages (e.g., UML) are typically used. For the system analysis process that produces the conceptual description, object-oriented techniques or their semantic extensions...
The field of information lifecycle management (ILM) aims for a cost-effective strategy for maintaining information assets in terms of balancing the cost of maintaining information vs. business value. However, despite impressive commercial systems, the field needs more research studies and focus. This paper contains a contribution toward developing a theoretical foundation for ILM. Information values...
In the field of human-computer interaction studies, the need exists to understand how computers can be made more effective in cooperating with people. Difficulties are caused by lack of a general model for the flow of information, actions, and psychological aspects between humans and computers. This paper proposes an information-based model of human-computer interaction that takes into consideration...
Information processing models have been used in marketing and advertising to analyze internal factors that may influence the flow of information in the consumer mind. These models mix information-based processes with non-informational processes. They also have incorporated non-informational analysis without exhausting the basic patterns of information flow. This paper introduces an information flow...
This paper investigates the problem of how to model the need for information, and the process of seeking information that satisfies that need. It utilizes a proposed information flow model that integrates information needs, information seeking, and information-based activities. The model includes the phases of need generation and propagation that are transformed into information seeking, which in...
One of the most important aspects of security organization is to establish a framework to identify security- significant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology. All are participants in handling information, which is the item that needs to be protected. Our approach is to identify information stream...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.