The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to understand business model in the context of open innovation, and to develop a conceptual framework for business model innovation in the process towards an open business model. The literature study presented in this paper shows that a business model in the context of open innovation is not a strategy of a company, but a cognitive tool and a mediating construct between technology...
A complex system is an embodiment of stochastically interacting subsystems through dynamics of vast information exchange (as seen in biological systems). In this context, a digital ecosystem can be regarded as being deeply intertwined with profiles of an IT-centric complex system. Hence, the complexity of evolution of modern telecommunication (telco) business (in terms of service expansion, revenue...
Cooperation mechanisms for agents monitoring service-based workflows are a means to address the increasing complexity of modern enterprise architectures. These mechanisms are inspired by existing biological mechanisms and extend an existing decentralized monitoring architecture in order to handle deviations from service level agreements autonomously. As the core cooperation mechanisms have been subject...
Successful negotiators prepare by determining their position along five dimensions: legitimacy, options, goals, independence, and commitment. We model business relationships in terms of these dimensions and two primitive concepts: intimacy (degree of closeness) and balance (degree of fairness). The intimacy is a pair of matrices that evaluate both an agent's contribution to the relationship and its...
Power system control centers are moving toward distributed and decentralized operations. The use of information technology (IT) to achieve these goals produces vulnerabilities and security threats. To safeguard against the threat of cyber-attacks, service providers also need to maintain the accuracy, assurance and integrity of their interdependent data networks. This paper presents the results of...
In the real world a service in a business is usually composed of many component services. These component services join together to form a composite of components. The trustworthiness of component services determines the trustworthiness of this composite. This trustworthiness of composite service has a large impact on the successful delivery of a service. In this paper we study that how we can determine...
The success of social software depends on contributions made by two key entities; the infrastructure provider(s) and the content providers (users). Currently, social software providers do not possess a powerful and generic approach to measure the contributions of their users. The ability of measuring user contributions will allow social software providers to accurately identify, acknowledge and reward...
Collaborative tools are among the most resource intensive applications today. Broadband technologies such as fiber-optic communication provide a way to bring these tools to a collaborative platform regardless of geography. In this paper, we focus on the feasibility of the network architecture that supports the collaboration. We solve the routing and wavelength assignment (RWA) problem in this specific...
One of the most pressing challenges facing humankind is climate change, but it is a wicked problem. While the complexity of this problem can be overwhelming there are means through which the problem can be understood and advances made towards a solution. This paper applies a holistic theoretical sense-making framework and an ecosystem approach to research and practice on ICT issues in the climate...
The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric usernames and password. Choosing a strong password and protecting the chosen password has always been a popular topic among security researchers. Traditionally strong password schemes could provide with certain degree of security but strong password leads complexity and difficult to...
Travel and tourism are potential areas for applying Web service technologies, especially with service integration of multiple travel information sources and tasks. It is required to support users dynamically and flexibly planning their trip plans which can be realized by various services. In this paper, we present a semantic method that automatically transforms high level trip plan templates into...
Semantic Web service (or briefly ldquoSWSrdquo) matching is a potential solution for automatic service discovery in various applications such as dynamic and automatic Web service composition. A number of approaches for SWS matching have been proposed. Most of them solely relied on concept subsumption relationship to improve the precision of Web service matching result from lexical-based methods. However...
The collaborative networks paradigm, supported by advanced community building and collaboration ICT platforms, can provide a new approach to active ageing. This paper introduces first results of a road mapping initiative towards the elaboration of a new vision for extending professional active life. To support this vision, a strategic research plan for the development of a new digital ecosystem, covering...
Assistive technology devices for the blind are portable electronic devices that are either hand-held or worn by the visually impaired user, to warn of obstacles ahead. Many assistive technology devices use ultrasonic pulse-echo techniques to gauge subject to object distance. Some use infrared light transceivers or laser technology to locate and warn of obstacles. These devices exhibit a number of...
The increasing rate of technological development is changing how we interact socially, commercially, and politically, making this an exciting yet challenging time in which to live. As the pace of development is destabilising the status quo, it is increasingly important for individuals and organisations alike to adapt. Research, development, and commercialisation are important tools in facilitating...
IT Systems in companies nowadays are confronted with constantly changing market conditions, new competitive threats and an increasing number of legal regulations. The service-oriented architecture (SOA) paradigm provides a promising way to address these challenges at the level of the company's IT infrastructure. These challenges and the management of the introduced complexity and heterogeneity are...
Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns of privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon, and Microsoft. Community Cloud Computing makes use of the principles of Digital Ecosystems to provide a paradigm for Clouds...
We argue that the complexity of the WS-* service stack is a barrier to the exploitation of service composition in digital ecosystems (and indeed, quite generally). As an alternative, we focus on the emerging interest in REpresentational State Transfer (REST) as an architectural style, and the Semantics of Business Vocabulary and Business Rules (SBVR) for the expression of business requirements. We...
Ontology mapping is a crucial task for achieving large scale semantic inter-operation of heterogeneous information sources. Conventional mapping solutions mainly focus on the mapping of a pair of ontologies. While such approaches are effective in creating one-to-one ontology mappings, they are less efficient when dealing with the many-to-many ontology mapping scenarios. To cope with the complexity...
Digital ecosystems are not "created", they form and evolve wherever their users guide them. Moreover, usage patterns within digital ecosystems are not bound to one particular technology. A computational neurologist, for instance, may move back and forth between laboratory experiments, grid infrastructure for simulation and analysis, collaborative environments and publication platforms. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.