The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents rough set model under different granular computing, and compares the model under combined granular with that under single granular, also with rough set model under logical computing of granule. Results show that combination granule and logical computing of granule construct a chain, which will lay a foundation for knowledge acquisition based on information granule and induction...
This paper grafts rough set theory, logical computing with granular computing, and retrieving rough set model under logical computing of granular. This paper formally defines logical computer of granular and also presents its properties. In addition, this paper discusses the relationship between the values of granular with logical computing of granular. All of these will lay a foundation for knowledge...
The Framework Programmes (FPs) for Research and Technological Development (R&TD) are funding programmes created by the European Union/European Commission to support and foster research in the European Research Area (ERA). International R&TD projects play an increasing part in many organizations' R&TD investments. Technology developers of all organizations (industrial companies, small and...
Enterprises face the challenge of rapidly adapting to dynamic business environments. Evolving markets, policies, regulations, technologies, and business models are some of the many vectors of change along which enterprise systems must constantly align. The capability of rapidly adapting systems and processes to an ever-changing environment to leverage existing resources has become a crucial factor...
This paper theoretically and empirically examines a state to emerge objectively a “structure” characteristic in Interorganizational Information Systems(IOS), and then builds a measure model to structure cost model of IOS, and does a survey on communication of QQ Group(an IM tool) to test and calculate these QQ participants' structure cost.
This paper uses work system theory (WST) and two of its extensions to provide an integrated perspective on engineering enterprises for emergent change. This paper starts by explaining six basic assumptions and distinctions related to emergent change. It introduces four frameworks or models related to WST including the work system framework, work system life cycle model, a theory of workarounds, and...
Health and social care systems are currently facing complex challenges that continually require more sophisticated answers. The integration of health, social and informal care and the care personalization are important issues in the organization of existing health and social systems. For that information architectures are required to accommodate a wide range of information objects. The paper presents...
Considering the global competitiveness the organizations ability to effectively use information technologies and bet on innovation and creativity are today commonly recognized as important. In this context, research on creativity in information systems has assumed special importance. This paper illustrates the use of Action-Research Method " in research in Information Systems and Creativity,...
This paper describes an approach and accompanying process for the development and use of architecture principles. In doing so, it builds on earlier work in which we defined the concept of architecture principle itself. The approach presented in this paper is based on a combination of experiences gathered from practice, as well as a synthesis of past work and other sources from both academia and industry,...
The net generation of students have characteristics which make them well-suited for participating in open source projects including being comfortable with information technologies, using IT as a form of communication, desiring to work in groups, a desire to do social good, and being fascinated by new technologies. The nature of open source projects where communities of developers from around the world...
Management of testing provides high level control on testing and monitoring of testing provides both high level and detailed insight in the testing activities. The combination of management and monitoring gives a strong grip on test processes and test projects. This is required to manage risk, to increase efficiency and to provide transparency into development and test processes for various stakeholders...
Business process models are an important tool in understanding and improving the efficiency of a business and in the design of information systems. Recent work has evaluated business process modelling languages against upper-level ontologies on the assumption that these ontologies are adequate representations of the general process domain. In this paper, we present a method to test this assumption...
Modern business process modeling languages such as BPMN or EPC provide users with more constructs to represent real world situations than their predecessors such as IDEF or Petri Nets. But this apparent increase in expressiveness is accompanied by an increase in language complexity. In practice many organizations choose to only use a subset of the available modeling constructs. Using a well established...
Like RM-ODP [1], enterprise architecture (or EA for short) has its own perspectives as a basic construct for its architecture definition to represent areas of concern. In this paper, difference between RM-ODP and one concrete example EA, and applicability of Use of UML for ODP system specifications [2] (or UML4ODP in short) standard to the example EA, are discussed. Several additional diagrams that...
Process modeling and rule modeling languages are both used to document organizational policies and procedures. However, little work has been done to understand their synergies and overlap. Understanding the relationship between the two modeling types would allow organizations to maximize synergies and reduce their modeling effort. In this paper we use the well-established Bunge-Wand-Weber (BWW) representation...
In this paper we propose a way to facilitate the issue of discovering the eGovernment services that address a citizen's need. This approach is implemented in an application, which we call a semantic portal. The semantic portal is part of our SemanticGov project architecture. The portal's components and its architecture are presented and explained. The portal's conceptual modeling is based on the generic...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.