A SEMIOTIC APPROACH TO ORGANISATIONAL MODELLING USING NORM ANALYSIS

Size: px
Start display at page:

Download "A SEMIOTIC APPROACH TO ORGANISATIONAL MODELLING USING NORM ANALYSIS"

Transcription

1 A SEMIOTIC APPROACH TO ORGANISATIONAL MODELLING USING NORM ANALYSIS Authors : Simon Tan, Kecheng Liu, Zhiwu Xie Affiliation: University of Reading Department of Computer Science PO Box 225, Whiteknights Reading, RG6 6AY, United Kingdom URL : {b.k.s.tan, k.liu, z.xie}@reading.ac.uk : Telephone: Fax : Keywords : Norm Analysis, Agents, Process Modelling, Information Systems, Affordance. Appropriate stream: Developing the IS Discipline. Appropriate topic : Social and Cultural Issues of Information Systems. 1

2 Abstract This paper explores a theoretical perspective to information systems engineering, correlating requirements modelling techniques with Norm Analysis, to elicit organisational semantics and to formalise complex business rules. At present noticeable disparity exists between systems models, and the actual, real organisation information systems. The modern multifaceted organisational disposition is complicated further with exceptions in business rules, and volatility in the behaviour of normative agents. Traditional systems approaches do not fully address these complications, and disparity in systems models; Norm Analysis, however, offers a viable alternative, which until now has not been extensively explored. These inherent systems design issues may be alleviated with the introduction of norms, to address the complexity of organisational information systems. We propose utilising Norm Analysis, a branch of Organisational Semiotics, for the elicitation of IS requirements to encapsulate rigorous business behaviour, and formalise intricate business rules. We believe this approach will contribute to the overall usability and coherence of organisational models. The second part of this paper considers the adequacy of representing norms in deontic logic, rules operands and temporal based systems, with an illustration of a constabulary crime-reporting case study. Keywords: Norm Analysis, Agents, Process Modelling, Information Systems, Affordance 1. Introduction Current organisational information systems have grown significantly in both size and complexity. Modern systems designs are often technically aesthetic, but functionally awkward and do not address the real needs of users. Empirical studies have since established a direct link between the poor understanding of information systems organisation and software failure. Unified Modelling Language, the de facto object oriented modelling language has gain widespread recognition as the leading systemmodelling standard. UML however, is not equipped to model the complexity of organisational systems behaviour. As such, we propose an extension to addresses this issue, incorporating normative elements. Norm Analysis (NA), which originated from Semiotics, may provide a viable alternative to deal with this aspect. Systems modellers are aware that gaps, in the form of semantic gap, exist between organisation and software (Liu 2000) with many undefined parameters. System analysts are constantly required to resolve these arduous tasks of tidying up loose ambiguous parameters. This quandary will inevitably fall on the system analysts discreet judgment, hence knowingly or unknowingly, or even worst in some situation overwrite crucial business decisions. There is an impending need to unify existing requirement engineering with Norm Analysis. Traditional system requirements and organisational semantics (Liu et al. 1999) have until now, evolved independently. This poses a serious problem on consistency issues in systems design. Norm Analysis will attempt to address and unify requirements engineering with semantics to ensure that systems model designs are not developed in isolation from the social aspect of organisational norm. Information systems from the viewpoint of semioticians are regarded as a holistic entity, as opposed to UML dependency based concept of compartmentalising IT business 2

3 process, with independent sets of loosely coupled software processes. Norm Analysis, we believe has the rigorous ability to model these complex organisational systems requirements. We propose incorporating a suite of semiotics tools: semantic analysis, Norm Analysis, and normative agents (Liu & Salter 2002). These components will undertake three crucial tasks of addressing the above systems issues. Firstly, it identifies the ontological dependency (Wand 1999) between systems processes, having established the ontology chart; it will then ascertain the semantic relations. Hence, formalising these relationships to model the behaviour of organisational systems design. It is not the intent of this paper to propose additional methodology to the existing field of information system practice; many renowned methodologies over time have demonstrated to be reliable and thorough. Over the last 30 years, there have been numerous attempts and endeavours to model organisational semantics (Peckham & Mryanski 1988, Wand et al. 1999), which were founded on entity-relationships. There is an impending need to re-focus and tap the rich organisational semantic layers. In recent years, we have seen rapid growth in enterprise systems organisation, huge technological advances and radical evolution in business IT organisation. These changes have exerted great demands on systems requirements engineering tools. Traditional systems, as such are overwhelmed, and ill-equipped to address the social behavioural aspect of organisational roles (Joaquim et al. 1999). In order to illustrate the functions of Norm Analysis, within an IS organisation model. We have instantiated Norm Analysis with several leading system requirement techniques: Role activity diagram (RAD) (Ould, 1995), Activity diagram and Scenario diagram (Booch et al. 1999). This paper is structured as follows: Section 1 identifies the limitation of traditional systems requirement approach, and proposes an extension to elicit complex organisational information. In section 2, we briefly describe norm concepts with respect to deontic operators, rule-based and temporal-based, and its significance to systems modelling. Norm Analysis in section 3, explains the concepts of Norm. NA structure and rules constructs, with emphasis on the four stages of NA framework: Responsibility analysis, Information identification, Pre/Post triggers analysis and Norm specification. Section 4, compares and contrast between rules and norms within an IS domain. Section 5 illustrates a case study of a crime reporting system, and demonstrates how norms and semantics are elicited by applying NA. Drawing the conclusion and discuss future work on Section What is Norm? Norms in essence are a set of rules and regulations, an underlying protocol governing the human communications network. These are etiquette of behaviour observed among people of different communities, cultures, groups and even sub-cultures unique within an organisation. These norms are embedded within a social context transcending the boundaries of explicit, implicit, formal and informal states, collaborating to attain certain goals. Norms revolves around agents, which influences the agents to execute a series of concerted actions to achieve a particular goal. In this respect, it can specify to a limited 3

4 extent how an agent should or should not behave, under a prescribe sets of triggers. Norms are highly regarded in many instances; it in reality controls the social and organisational domains, which exerts a major influence on affordance. Affordance and Norms are not mutually exclusive, yet inextricably intertwined within the social context of organisational behaviour. The term affordance was first coined from the perceptual psychologist (Gibson 1977), referring it to the actionable properties between the world and an actor. To Gibson, affordances are relationships of entities and observable pattern of behaviour occurring within a domain. Patterns exits, as such it could be captured, and taken to anticipate users and systems behaviour. It should be stressed that affordance exists naturally: it may or may not be apparent, visible, known, or even desirable, but it plays a significant role, and its effects will greatly influence behavioural norms and the order of patterns. Affordances are time dependent, thus it abides by the rule and concept of start and finish of an event. As such, defiance of affordance and norm are not to be taken without due consideration within a domain. This deviation from acceptable norms has its consequences; punishments and penalty may be imposed on agents compromising these protocols. Advocating Norm Analysis as a systems method offers a normative perspective to systems modelling and design, utilising rich semantics to depict the ontological dependency, and to facilitate the elicitation of system requirements. Norm Analysis also facilitates the deduction of organisation signs and norms (Stamper et al. 2000). Norm Analysis is well equipped to accommodate different systems methods, techniques and approaches. Norm s application in information systems is not just a recent fad; it has seen wide spread adoption in various industries more notably in the field of Artificial Intelligences and legal systems. Norms are used in organisational systems modelling e.g. by Sergot (2001) and Ivan (2000), with varying degrees of systems complexities. This paper will present a feasible normative approach, which introduces roles that complements existing system requirements techniques. Secondly, norm with its pliable behaviour and rules, when applied appropriately would widen the spectrum of information requirements. Lastly, and more importantly this system approach will attempt to resolve the handling of business exceptions, utilising intelligent agents for the prognosis of systems behaviour, facilitating a proactive systems design responses as oppose to reactive model design. These characteristics will be manifested in the modelling and systems development phases, making it more communicative and reflective of a real business systems model. It is evident, that conforming to syntax, methodology and abiding good programming practices alone will not produce a system that users require, without thoroughly understanding the semantic abstract layer of an organisation. Norm Analysis will attempt to steer the developer towards a normorientated approach to systems model design. 3. Norm Analysis Norms evolve in accordance to circumstances and change, akin to a living-breathing organism adapting to its environment, a habitat operating within a complex boundary of interdependent entities whose relations and properties are largely determined by their 4

5 functions in the organisation. It is a source of commitments and contracts that agents establish mutually; however, agents being autonomous may choose to violate (Liu et al, 1999). It is a composite of multiple actors performing different activities, capacity and objectives with a concerted goal. Agents in this context refer to both software and human entities, autonomous in characteristic (Chong & Liu 2000) facilitating the communication, and possible violation of norms. Human agents however take precedence over software agents, and as such are responsible for the delegation of duties. Agents either human or software interact actively within and across business domains. The understandings of norms are crucial to enables modellers to appreciate systems processes, and agent s behaviour to reinforce the overall systems design. Thus, represents an organisation true complexity, and diverse mix of autonomous processes and behaviour. Norm Analysis Norms can be broadly categorised as cognitive, evaluative, perceptual and behaviour (Stamper 1992). These are further elaborated in (Liu 2002). Behavioural norms are highly applicable to organisation Norm Analysis; comprising of 4 stages namely, 1) Responsibility analysis, 2) Information identification, 3) Trigger analysis and 4) Norm specification. Norm Analysis (Liu et al. 2001) formulates an approach to elicited complex organisation arguments. It identifies and determines the pre-condition and post-condition of agents behaviour to ascertain responsible agents. A norm has the following construct (Stamper et al. 2000): whenever <condition> if <state> then <agent> is <deontic operator> to do<action> This construct enables norm elements to capture, which are required for execution in lowlevel programming language, e.g. LEGOL (Liu 2000 & Stamper 1980). Deontic logic has different representations of a fundamental nucleus. It has a canonical criteria expressed antecedent. Users have to be cautious of this proliferation of expression based on normative context of each scenario. 4. Rules Versus Norms A rule determines a principle or instruction stating the way in which things should be done. Sets of rules e.g. IF, ELSE, THEN constructs. However, business rules are more tightly specified in this respect. They represent procedures, constraints and policies on the way an organisation should conduct its business (Liu & Ong 1999). Software agents serve to automate and enforce rules and isolate those instances in which the independent judgement of a human is required. These rules are embedded directly in the program 5

6 code. It is the procedural logic of how system workflow intertwined with business logic. Thus, when business rules changes it requires the arduous tasks of rewriting the program logic code. A norm in contrast represents a hypothetical construct using agents to associate actions to conditions. (Liu 200) Norms include deontic operator, rule-based and temporal- based operands. The antecedents of each norm will have a prescribe set of successive instructions on the next norm, structured on the pre/post notion of norm triggers. Agents are empowered to exercise and assert responsibility and authority over organisational norm. However, exceptions exist and rules differ. Refer to an example below: A police superintendent in-charge of an inspector, and the inspector over the junior officers. At a glance, it may appear similar to a typical hierarchy structure model; however, it is quite different with the inclusion of components as deontic operator, timebase and rules-base operands. E.g. Agents role: The superintendent has to abide by legislative and policies (rules) set by the governmental bodies and police force (agents). The Superintended should not instruct his subordinate to reopen a case without valid reason, contravening the police policies (violation of norm); if there are no supporting evidences pertaining to the case. (Rules overwrite > Agents roles) The superintendent can specify the rights of his subordinates by using deontic operators, such as obliged, prohibited and permitted. The subordinates are the responsible agents for the actions prescribed by the superintendent. The subordinates under the command of the superintendent may choose to follow or violate the norm. However, the latter may induce a punishment unless there is an acceptable ground. Temporal Elements of Norm Conditions of properties can and will change over time. These temporal-based norms would greatly influence the Norm Analysis constructs, in determining how to resolve the procedural algorithm. Absolute (calendar date) Relative (e.g. bill due-date) Event triggers (trigger via a process) Absolute and relative-time triggers a state of changes on norms with the passage of time. However, associated agents may overwrite triggered event, causing a change of states and event. E.g. A suspect is apprehended for a crime committed in another county and the investigation reveal that this case is linked. This will automatically re-opened (pending active) via the trigger from an external source. 6

7 The Method of Norm Analysis Norm Analysis formulates a systematic approach to elicited norms, responsible agents and defines pre/post conditions of event triggers. The analysis is carried out in 4 stages to provide each process with a tabular normative unit of information. The NA table is designed to capture a series of norm instance. This modular design enables a clear and well-defined norm structure, representative of each characteristics pertaining to a specific norm. stages tasks Responsibilities Analysis Information Identification Triggers Analysis outcome Identify responsible agents for the Start/finish of an instance Select type of key information required by an instance Activities/actions effecting the Start/finish of an instance Preconditions The conditions for acting and invoking norm postconditions The resultant after the successful execution of norm 4 Norm Specification Norms specified in the standard construct. Table 1: Norm Analysis: Stages, Norms and Deliverables (Adapted from Liu 2000 and Liu & Salter 2002) Responsibility Analysis (Stage 1) Responsibility analysis identifies state association of entities and agents that are responsible for the start and finish of an instance. E.g. Affordance > Investigation. The period of an incident starts immediately from the instant a case code is issued but not prior to it classified as a Crime. The investigation period will only commence, once the police officer is assigned to the case, and terminated when the case have been resolved. These are examples of well-defined processes/actions with explicit period and agents. It is more evocative to link processes, which are time-bounded and responsibly linked, as compared to establishing links based exclusively on process that trigger a subsequent or concurrent process. Information Identification (Stage 2) An instance needs key source information for the preceding action. Without these vital bits of information, it is technically difficult however, not impossible for agents to derive prudent decisions. The investigating officer would need to know information as, details of the victims, location/time of crime committed and description of incident to proceed with the investigation. Else, the entire investigation process would not exist. These affordance and agents define in the NA tables, are elicited during the semantic analysis phase after the ontological chart are drafted. 7

8 Trigger Analysis (Stage 3) Triggers act as a mechanism to activate associated processes based on the pre-post conditions of existing social norm define in Stage 1; it could either take the form of Temporal, Substantive or Semiological to influence the trigger procedure. A relative temporal norm could take the form of a binding legislature. Specifying that a case should not be open for a period longer than 1 year without any development or new evidence. It must therefore be categorised under pending, as a case cannot remain open indefinitely. Substantive norm occurs e.g. when the witness recalls any key clues pertaining to the crime, where the status has been flagged as Pending, this action will automatically reopening the case. Semiological trigger happens for e.g. when a suspect is caught for another crime and is traced to implicate or influence the outcome of the existing case. Norm Specification (Stage 4) Norm specification is the final stage, where the earlier 3 stages of information are collated, decimated, formalised and structured to facilitate prudent behaviour decisions based on conditional norm presented. The complexity here is to deal with formalise norm when conditions are often violated. Refer to section 3. Conditions of higher order precedence will overwrite that of a lower. E.g. personal safety commands a higher precedence to reporting a crime. Norms would have to be formalised in this respect, it would then be incorporated in the above example to handle business exceptions and the violation of Norms. 5. Case Study: Police Crime-Reporting This case study was based on a project of designing a crime management system for the police forces. An excerpt of this project, "crime-reporting" was highlighted to reflect the actual research conducted by our research team, which is still ongoing. This case study is provided, although for the sake of brevity the detailed workings and complexity of the model have not been fully reproduced here. The outputs from the model are sensitive to changes in key assumptions. We have not sought to be prescriptive about these assumptions, which will vary according to circumstances. However, this guide does identify the key sensitivities and the basis on which the assumptions underlying them might be made. The Crime Reporting Unit is the contact point between members of the public and the police departments. It is charged with the responsibility of collecting, maintaining, analysing, and reporting crime data for the nation wide crime-management. In the Crime Reporting case study, Role Activity Diagram (Ould, 1995) was used to capture the overview of the system outline with the multiple façade role characteristic of the Police Department (Fig. 1). Roles have been widely used for modelling the authority, responsibility, functions, and interactions, associated with agents within an organisations. RAD forms a regional road map of the systems design. However, these are ideal for an initial mapping, but insufficient to establish detail relationships between agents and the targets they manage. This structure is constructed on an abstract models of coordination, however social elements context that are crucial for organisational analysis are lacking, as behaviour or norms are not present in these dependency-based models. 8

9 CRIME REPORTING Crime Assessor Victim / Reporter Start taking enquiry Request Identification Note reporter details Submit identification Request incident details Describe incident Appraise Incident Validity y n Valid Crime? Crime Statement Verify no duplication Fill crime details Refer to Relevant Dept Write Statement Police Assign Case no. Assign to Investigating Officer Allocate Case Investigation y Case solved? n Figure 1: RAD Crime reporting process Role Activity diagram emphasise on roles, functions, activities and their interactions within events and logic that determines what activities are carried out and at what point in time. This derives a higher-level conceptual model to determine at best a sketchy superficial model of the system. It is not particularly concern in identifying and of patterning Norm behaviour at this stage. Agents in the form of token, resides on a particular state will represent the possible outcome of the next role instances. The functionality of token resemble a baton relay race, the next process can only occur once it receive the passed on token, satisfying the pre-conditions then only will it trigger the consecutive action and so forth. Thus, at every stage of modelling, the modeller has to make explicit decision, not allowing much margin to accommodate exception behaviour. 9

10 Public Domain Crime Reporter Crime Recorder Other Departments Crime Committed Contact Police Crime Reporter appraise incident 1 Department (referral) [Norm 3] Reject [Norm 2] Accept [Norm 1] Forward Take written statement 2 1) Assign to Crime Recorder 2) Record Crime 3A Accept & record Crime 3B Figure 2: Activity Diagram Crime reporting process detail. [Apprise - Forward Incident] Victim/ Witness Crime Reporter Police Force Info Statutory/Other Department Report Incident Describe Incident Furnish incident Does not constitute as a crime Apprise incident Waiting Verifying Verifying Checking policies Relevant Dept Department Contact Referral to dept Figure 3: Scenario Diagram Appraise Incident 10

11 [Verify New Crime] Victim/ Witness Crime Reporter Police Force Info Report Incident Request particulars Furnish particulars Describe Incident Furnish incident Verify incident new (no duplication) Waiting Verifying Checking Take statement Confirm new incident Figure 4: Scenario Diagram Verify Incident Extracting Norms (Activity diagram and Scenario diagram) Roles are further expanded to capture high-level normative elements. Activity diagram (Fig. 2) in itself is only sufficed to model at a superficial-level to identify the existence of high-level norms. Scenario diagram shows the existence of objects, their relationships in the logical view of the system, and how they execute a particular scenario or use-case. Let's look at a scenario (Fig. 3, 4) and how we can document it with the Activity diagram (Fig.2) crime reporting process. Norm An1alysis offers an extension to this perspective to capture norms, which is present but hidden. Process (Activities) Norms Appraise Incident [Norm 1] Forward: (Sub-Norm 1.1, 1.2, 1.3..) (will lead to 3 possible outcomes [Norm 2] Accept : (Sub-Norm 2.1, 2.2, 2.3..) Refer to fig.2) [Norm 3] Reject : (Sub-Norm 3.1, 3.2, 3.3..) [Norm 1 ] : Forward Process [Norm 1.1] Sub-Norm - 1.1: IF the (incident does not constitute to a crime); a case of domestic violence. THEN Crime Reporter Is Obliged To forward it to the family welfare departments. [Norm 1.2] Sub-Norm - 1.2: IF the (incident does not constitute to a crime); a case of customer/consumer disagreement. THEN Crime Reporter Is Obliged 11

12 Sub-Norm3:.. Sub-Norm4:.. To forward it to the consumer association organisation. [Norm 2 ] : Accept Process [Norm 2.1] Sub-Norm - 2.1: IF the (incident constitute to a crime); robbery committed. THEN Crime Reporter Is Permitted To take the statement and issue incident report serial number beginning with ROBxxxxx [Norm 2.2] Sub-Norm - 2.2: IF the (incident constitute to a crime); hit and run accident. THEN Crime Reporter Is Permitted To take the statement and issue incident report serial number beginning with HNRxxxxx Sub-Norm3:.. Sub-Norm4:.. Norm Analysis will attempt to formalise these unregulated normative behaviour (Liu et al. 2001) and agents. Many observable and obscure norms will be defined at this stage and the predicative behaviour analysed. Reusability of norm is achievable only when the modelled organisation is equivalent to the real system environment. NA information table clearly helps to state and structure responsible agents, key data, pre-post triggers and detailed behaviour norms. Appraise Incident: Process 1 Responsibility Info. Identification Trigger (Conditions Pre/Post) Officer in contact with public Victim/witness info details, incident (date/time), etc.. Public contact Report incident Incident enquire Detailed Norm WHEN the public made an incident report to the police IF the incident is valid and within the scope of police THEN the officer in contact OBLIGED to accept and filed an incident report ELSE selection process Table 2: Norm Analysis (Incident Process) 12

13 Determine Incident: Selection (Reject) N3 Responsibility Info. Identification Trigger (Conditions Pre/Post) Detailed Norm Crime Reporter Missing person > 24hrs, family dispute, policies, etc.. Incident Appraisal Incident appraisal Incident rejected WHEN incident report is gathered IF the incident is invalid and outside the scope of police THEN the officer in contact OBLIGED to reject the incident Table 3: Norm Analysis (Determine Incident - Reject) Crime Statement : Selection (Accepts) N2 Responsibility Info. Identification Trigger (Conditions Pre/Post) Detailed Norm Crime Reporter Type of crime, category, urgency Determine Incident Valid Crime Statement report WHEN a crime is confirmed IF it is urgent that it will be assign immediately THEN the officer in contact is to investigate Legend: selection process process # N# <norm> Table 4: Norm Analysis (Crime Statement - Accepts) Norm Analysis, present an unambiguous detailed description of the interrelated entities and its possible behaviour, which is structured on information collated from the high level RAD and Activity diagram. The results attained are abstract, yet comprehensive in its procedural logic, which considers entities behaviour, norms and agents. This allows the flexibility to model the very essences of complex organisation systems. Equipped with this information the modeller will have an invaluable glimpse of a significant insight in the communication network of the organisation. 6. Conclusion and Further work. At this juncture, it is evident that systems information engineering is not sufficiently equipped to model organisational behaviour, and may require a revisit and extension to the fundamental field of requirement engineering. The above case study illustrated the significances of ontological dependencies, affordances and normative agents on an organisational business domain. These techniques are at its infancy, but it has nevertheless gained widespread attention in many fields agreeing for a need to address the organisation semantic layers. However, having said that, it has the ability to capture 13

14 rigorous system behaviour and model the complexity of modern business organisation. The next phase of systems study is to define, regulate and model norms, as well as to develop the interoperability of agents. This approach would structure on behavioural norms for systems optimisation and reuse. It is with the aim of bring requirement engineering a step closer to realising the above objective with the advent of tools as, semantic analysis and Norm Analysis; more effort however, needs to be done in the following areas: 1) Formulising norms for applications in software simulation. 2) Validation of norms; and 3) Elicitation of high-level abstract organisational norms for system reuses. We are aware of the current norms systems limitations, attributed to the complex and unstructured autonomous behaviour of entities. Equipped with the semiotics tools, modellers at present will still have to rely largely on individual experiences and thorough understanding of the specific organisational domain. We aim to improve future work and formulise the current requirement system technique, unifying system requirement design with Norm Analysis, with further enhancement. Acknowledgement This research is partly supported by EPSRC SEDITA project GR/S04840/ Reference: Carlos, Ivan (2000) Logical Models of Argument. ACM Computing Survey Vol 32, No. 4. pp Chong, S. & Liu, K. (2000) A Semiotic Approach for Modelling and Designing Agent- Based Information Systems Based on Roles and Norms. Proceedings of AOIS-2000 at CAiSE*00. icue Publishing, Berlin, pp Liu, K. (2000), Semiotics in Information Systems Engineering, Cambridge University Press, Cambridge (UK). Liu, K, Alderson, Qureshi, Z (1999). Requirement Recovery from Legacy Systems by Analysing and Modelling Behaviour. International Conference on Software Maintenance Oxford, England (UK), pp Liu, K. Andy Salter (2002) Using Semantic Analysis And Norm Analysis To Model Organisations. Proceedings of ICEIS 4th International Conference On Enterprise Information Systems Ciudad Real - Spain pp Liu, K, Ong Tina, (1999) A Modelling Approach For Handling Business Rules And Exceptions. The Computer Journal, Vol 42, No

15 Liu, Kecheng, Lily Sun, Alan Dix & Mohan Narasipuram (2001). Norm Based Agency for Designing Collaborative Information Systems, Information Systems Journal, 11, Filipe, Joaquim, Kecheng Liu & Bernadette Sharp (2000) Organisation Simulation Based on Normative Knowledge and Role Modelling, AAAI Spring Symposium workshop "Bringing Knowledge to Business Processes", Technical Report SS-00-03, Stanford, March 2000, pp Joaquim, F., Liu, K. & Sharp, B. (1999), A Semiotic Approach to Organisational Role Modelling for Intelligent Agents, Kluwer Academic Publishers, The Netherlands. Pp Martin Fowler, Ken Scott (1999), UML Distilled Second Edition A Brief Guide to the Standard Object Modelling Language, Addison-Wesley, Reading, Massachusetts. Ould Martyn A.Wiley (1995). Business Processes, Modelling and Analysis for Reengineering and Improvement. John Wiley & Sons, Chichester. Peckham, J. & Mryanski, F. (1988), Semantic Data Models, ACM Computing Surveys 20(3). Vol. 20, Issue 3. pp Sergot Marek (2001), A computational theory of normative position. ACM transaction on computational logic. Vol. 2, Issue 4. pp Stamper, R., Liu, K., Hafkamp, M. & Ades, Y. (2000). Understanding the Roles of Signs and Norms in Organizations A Semiotic Approach to Information Design. Journal of Behaviour and Information Technology. Vol.19, No.1, pp Wand, Y., Storey, V.C. & Weber, R. (1999), An ontological analysis of the relationship construct in conceptual modelling, ACM Transactions on database systems. Vol. 24, Issue 4. pp

COMPARISON BETWEEN THE BUSINESS MODELLING METHODS PROVIDED BY MEASUR AND RUP

COMPARISON BETWEEN THE BUSINESS MODELLING METHODS PROVIDED BY MEASUR AND RUP COMPARISON BETWEEN THE BUSINESS MODELLING METHODS PROVIDED BY MEASUR AND RUP Hui Du, Tingting Li and Dan Ding Beijing Philosophy and Social Science Research Center for Beijing Transportation Development

More information

Social Organization Analysis: A Tutorial

Social Organization Analysis: A Tutorial Social Organization Analysis: A Tutorial Gavan Lintern Cognitive Systems Design glintern@cognitivesystemsdesign.net Copyright 2013 by Gavan Lintern Abstract Far less attention has been paid to social organization

More information

Comparative Analysis of Ontology Charting with other Modelling Techniques

Comparative Analysis of Ontology Charting with other Modelling Techniques Comparative Analysis of Ontology Charting with other Modelling Techniques José Cordeiro and Joaquim Filipe Escola Superior de Tecnologia de Setúbal, Rua do Vale de Chaves, Estefanilha, 2910-761 Setúbal,

More information

Requirements Engineering

Requirements Engineering Requirements Engineering Professor Ray Welland Department of Computing Science University of Glasgow E-mail: ray@dcs.gla.ac.uk The Importance of Requirements Identifying (some) requirements is the starting

More information

Level 5 NVQ Diploma in Management and Leadership Complete

Level 5 NVQ Diploma in Management and Leadership Complete Learner Achievement Portfolio Level 5 NVQ Diploma in Management and Leadership Complete Qualification Accreditation Number: 601/3550/5 Version AIQ004461 Active IQ wishes to emphasise that whilst every

More information

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Software Engineering Third Year CSE( Sem:I) 2 marks Questions and Answers

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Software Engineering Third Year CSE( Sem:I) 2 marks Questions and Answers DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Software Engineering Third Year CSE( Sem:I) 2 marks Questions and Answers UNIT 1 1. What are software myths Answer: Management myths: We already have a book

More information

B/AWP2/YT Reading University, UK

B/AWP2/YT Reading University, UK EU-China Information Society Project Research on e-government User Requirements B/AWP2/YT-0803 By Prof. Liu Kecheng Reading University, UK October 2008 Table of Contents Executive summary... 1 1. Background

More information

Methodological approaches based on business rules

Methodological approaches based on business rules Revista Informatica Economică nr.3(47)/2008 23 Methodological approaches based on business rules Anca Ioana ANDREESCU, Adina UŢĂ Academy of Economic Studies, Bucharest, România Business rules and business

More information

No. Detail Page. M&L 45 Contribute to the development of a strategic plan 3. M&L 46 Establish business risk management processes 5

No. Detail Page. M&L 45 Contribute to the development of a strategic plan 3. M&L 46 Establish business risk management processes 5 Management and Leadership Level 5 Units Contents No. Detail Page M&L 45 Contribute to the development of a strategic plan 3 M&L 46 Establish business risk management processes 5 M&L 47 Promote equality

More information

Managing IS Development Projects Using a Generalised Set of Scorecard Perspectives

Managing IS Development Projects Using a Generalised Set of Scorecard Perspectives Managing IS Development Projects Using a Generalised Set of Scorecard Perspectives Abstract Phil Brook Information Systems Academic Group Faculty of Management University of Western Sydney Sydney, Australia

More information

Intelligent Workflow Management: Architecture and Technologies

Intelligent Workflow Management: Architecture and Technologies Proceedings of The Third International Conference on Electronic Commerce(ICeCE2003), Hangzhou Oct. 2003, pp.995-999 Intelligent Workflow Management: Architecture and Technologies Chen Huang a, Yushun Fan

More information

Development Process and Analysis. LTOOD/OOAD - Verified Software Systems 1

Development Process and Analysis. LTOOD/OOAD - Verified Software Systems 1 Development Process and Analysis LTOOD/OOAD - Verified Software Systems 1 Software Crisis Declared in the late 60 s Expressed by delays and failures of major software projects (unreached goals, unpredictable

More information

A methodology for requirements analysis at CIM level

A methodology for requirements analysis at CIM level A methodology for requirements analysis at CIM level Iman Poernomo 1, George Tsaramirsis 2, Venera Zuna 3 1 King s College London, UK, iman.poernomo@kcl.ac.uk 2 Accenture, UK DC, UK, georgios.tsaramirsis@accenture.com

More information

A RFBSE model for capturing engineers useful knowledge and experience during the design process

A RFBSE model for capturing engineers useful knowledge and experience during the design process A RFBSE model for capturing engineers useful knowledge and experience during the design process Hao Qin a, Hongwei Wang a*, Aylmer Johnson b a. School of Engineering, University of Portsmouth, Anglesea

More information

1. Introduction. URDAD for System Design. Table of Contents. Dr. Fritz Solms. Abstract. Use-Case Responsibility Driven Analysis and Design

1. Introduction. URDAD for System Design. Table of Contents. Dr. Fritz Solms. Abstract. Use-Case Responsibility Driven Analysis and Design Solms Training, Consulting and Development Physical: 113 Barry Hertzog Ave, Emmarentia, Johannesburg, South Africa Postal: PostNet Suite no 237, Private Bax X9, Melville 2109, South Africa Phone: +27 (11)

More information

Assessing Pragmatic Interoperability of Information Systems from a Semiotic Perspective

Assessing Pragmatic Interoperability of Information Systems from a Semiotic Perspective Assessing Pragmatic Interoperability of Information Systems from a Semiotic Perspective Shixiong Liu 1, Weizi Li 1, and Kecheng Liu 1,2 1 Informatics Research Centre, University of Reading, UK 2 School

More information

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques Book Outline Software Testing and Analysis: Process, Principles, and Techniques Mauro PezzèandMichalYoung Working Outline as of March 2000 Software test and analysis are essential techniques for producing

More information

TIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION

TIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION Job Classification Manual Page 1 of 49 TIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION 1. This grade level standard illustrates the application of the ICSC Master Standard (Tier

More information

Functional Hazard Assessment in Product-Lines A Model-Based Approach

Functional Hazard Assessment in Product-Lines A Model-Based Approach Functional Hazard Assessment in Product-Lines A Model-Based Approach Ibrahim Habli, Tim Kelly, Richard Paige Department of Computer Science, University of York, York, United Kingdom {Ibrahim.Habli, Tim.Kelly,

More information

Organising Requirements

Organising Requirements Requirements Organisation, Analysis and Evolution Software Requirements and Design CITS 4401 Lecture 20 CITS4401 Software Requirements and Design 2 Viewpoints Organising Requirements Interactor viewpoints:

More information

Chapter 3 Prescriptive Process Models

Chapter 3 Prescriptive Process Models Chapter 3 Prescriptive Process Models - Generic process framework (revisited) - Traditional process models - Specialized process models - The unified process Generic Process Framework Communication Involves

More information

Software Safety Assurance What Is Sufficient?

Software Safety Assurance What Is Sufficient? Software Safety Assurance What Is Sufficient? R.D. Hawkins, T.P. Kelly Department of Computer Science, The University of York, York, YO10 5DD UK Keywords: Software, Assurance, Arguments, Patterns. Abstract

More information

ENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER

ENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER ENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER Document No. Title P05PE Australian Engineering Stage 1 Competency Standards

More information

A MEASUR and RUP Combined Business Modeling Method

A MEASUR and RUP Combined Business Modeling Method 1086 JOURNAL OF COMPUTERS, VOL. 6, NO. 6, JUNE 2011 A MEASUR and RUP Combined Business Modeling Method Hui Du Beijing Philosophy and Social Science Research Center for Beijing Transportation Development,

More information

A Dialogue Act Modelling Approach to Web-Based System Modelling

A Dialogue Act Modelling Approach to Web-Based System Modelling A Dialogue Act Modelling Approach to Web-Based System Modelling Ying Liang School of Computing, University of the West of Scotland, Paisley PA1 2BE, U.K. Email: Ying. Liang@uws.ac.uk Abstract Modelling

More information

Proposed Framework of Interpretation and Considerations concerning ICANN s Human Rights Bylaw

Proposed Framework of Interpretation and Considerations concerning ICANN s Human Rights Bylaw Proposed Framework of Interpretation and Considerations concerning ICANN s Human Rights Bylaw April 4, 2017 Prelude: With ICANN s most recent bylaw change a Human Rights Core Value 1 was added to ICANN

More information

CHAPTER 2. Conceptual Framework for Financial Reporting 9, 10, 11, 30 6, Basic assumptions. 12, 13, 14 5, 7, 10 6, 7

CHAPTER 2. Conceptual Framework for Financial Reporting 9, 10, 11, 30 6, Basic assumptions. 12, 13, 14 5, 7, 10 6, 7 CHAPTER 2 Conceptual Framework for Financial Reporting ASSIGNMENT CLASSIFICATION TABLE (BY TOPIC) Topics Questions Brief Exercises Exercises Concepts for Analysis 1. Conceptual framework general. 2. Objectives

More information

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation

Lecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation Chapter 2 Software Processes Lecture 1 Software process descriptions When we describe and discuss processes, we usually talk about the activities in these processes such as specifying a data model, designing

More information

Analysing client requirements

Analysing client requirements Analysing client requirements Before you can start to analyse the information you have gathered you should think about what you are trying to achieve . The client has presented you with a business problem.

More information

INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)

INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) ATTRIBUTE STANDARDS 1000 Purpose, Authority and Responsibility The purpose, authority, and responsibility of the internal

More information

Workflow Model Representation Concepts

Workflow Model Representation Concepts Workflow Model Representation Concepts József Tick Institute for Software Engineering, John von Neumann Faculty, Budapest Tech tick@bmf.hu Abstract: Workflow management and the possibilities of workflow

More information

HOPS RESPONSE TO THE FINANCIAL MEMORANDUM 1

HOPS RESPONSE TO THE FINANCIAL MEMORANDUM 1 THE PLANNING (SCOTLAND) BILL - FINANCIAL MEMORANDUM RESPONSE TO THE FINANCE AND CONSTITUTION COMMITTEE (FACC) Introduction- Heads of Planning Scotland (HOPS), which is the representative organisation for

More information

University Process Innovation Framework for Process Analysis

University Process Innovation Framework for Process Analysis University Process Innovation Framework for Process Analysis University Process Innovation Updated September 2016 Executive Summary Processes are the means by which work gets done and how value is delivered.

More information

Modeling the responsibility relationship in the REA Business Ontology using Petri Nets

Modeling the responsibility relationship in the REA Business Ontology using Petri Nets Modeling the responsibility relationship in the REA Business Ontology using Petri Nets Hans Weigand 1, Paul Johannesson 2, Birger Andersson 2 1 University of Tilburg, P.O.Box 90153, 5000 LE Tilburg, The

More information

Knowledge in Planning Scheduling and Control. Abstract

Knowledge in Planning Scheduling and Control. Abstract Knowledge in Planning Scheduling and Control. Track: Operations Planning, Scheduling and Control. Jane Guinery, Dr Sarah Crawford, Dr Bart MacCarthy Management and Human Factors Group, University of Nottingham

More information

Methodology for the Design and Evaluation of Ontologies. Michael Gruninger and Mark S. Fox. University oftoronto. f gruninger, msf

Methodology for the Design and Evaluation of Ontologies. Michael Gruninger and Mark S. Fox. University oftoronto. f gruninger, msf Methodology for the Design and Evaluation of Ontologies Michael Gruninger and Mark S. Fox Department of Industrial Engineering University oftoronto Toronto, Canada M5S 1A4 f gruninger, msf g@ie.utoronto.ca

More information

Business Process Improvements Using SSM and UML Activity Diagram

Business Process Improvements Using SSM and UML Activity Diagram Business Process Improvements Using SSM and UML Activity Diagram Abdelrahman Elsharif Karrar 1, Amar Ibrahim Mohammed Abdalla 2, Mudawi Mukhtar Elmusharaf 3 1 (College of Computer Science and Engineering/

More information

GLASGOW CALEDONIAN UNIVERSITY. Programme Specification Pro-forma (PSP) 1. GENERAL INFORMATION

GLASGOW CALEDONIAN UNIVERSITY. Programme Specification Pro-forma (PSP) 1. GENERAL INFORMATION GLASGOW CALEDONIAN UNIVERSITY Programme Specification Pro-forma (PSP) 1. GENERAL INFORMATION 1. Programme Title: BA/BA (Hons) Accountancy BA/BA (Hons) Accountancy (GCU Pathways) Chartered Institute of

More information

Why Machine Learning for Enterprise IT Operations

Why Machine Learning for Enterprise IT Operations Why Machine Learning for Enterprise IT Operations Judith Hurwitz President and CEO Daniel Kirsch Principal Analyst and Vice President Sponsored by CA Introduction The world of computing is changing before

More information

RESOLVING APPLICATION DEVELOPMENT ISSUES USING SOA Y. KIRAN KUMAR 1, G.SUJATHA 2, G. JAGADEESH KUMAR 3

RESOLVING APPLICATION DEVELOPMENT ISSUES USING SOA Y. KIRAN KUMAR 1, G.SUJATHA 2, G. JAGADEESH KUMAR 3 RESOLVING APPLICATION DEVELOPMENT ISSUES USING SOA Y. KIRAN KUMAR 1, G.SUJATHA 2, G. JAGADEESH KUMAR 3 1 Asst Professor, Dept of MCA, SVEC, A. Rangampet. ykkumar83@gmail.com, sujatha229@gmail.com,com 148

More information

STRATEGIC PROGRAMME IMPACT FRAMEWORK

STRATEGIC PROGRAMME IMPACT FRAMEWORK IPEC Guidelines STRATEGIC PROGRAMME IMPACT FRAMEWORK First Version May 2002 Prepared by the Design, Evaluation & Documentation (DED) Section of IPEC Strategic Programme Impact Framework SPIF GUIDELINES

More information

Legislating for Brexit the UK Government s EU Withdrawal Bill

Legislating for Brexit the UK Government s EU Withdrawal Bill Brexit Law your business, the EU and the way ahead Legislating for Brexit the UK Government s EU Withdrawal Bill July 2017 Introduction The Great Repeal Bill, the UK Government s draft legislation to implement

More information

Prescription of qualifications. ARB Criteria at Parts 1, 2 and 3

Prescription of qualifications. ARB Criteria at Parts 1, 2 and 3 Prescription of qualifications ARB Criteria at Parts 1, 2 and 3 Approved: January 2010 Effective From: 2011/2012 Introduction Under the Architects Act 1997, the Architects Registration Board (ARB) has

More information

Knowledge-Level Integration for JaCaMo

Knowledge-Level Integration for JaCaMo Knowledge-Level Integration for JaCaMo Artur Freitas, Daniela Schmidt, Alison Panisson Rafael H. Bordini, Felipe Meneguzzi and Renata Vieira Pontifical Catholic University of Rio Grande do Sul - PUCRS

More information

Digital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016

Digital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016 Digital Industries Apprenticeship: Occupational Brief Software Development Technician September 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 3 Software Development Technician Apprenticeship

More information

Objectives. The software process. Topics covered. Waterfall model. Generic software process models. Software Processes

Objectives. The software process. Topics covered. Waterfall model. Generic software process models. Software Processes Objectives Software Processes To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software

More information

Digital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016

Digital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016 Digital Industries Apprenticeship: Occupational Brief Software Development Technician September 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 3 Software Development Technician Apprenticeship

More information

The Enterprise Systems Engineering Center Requirements Management Guide - Analysis

The Enterprise Systems Engineering Center Requirements Management Guide - Analysis The Enterprise Systems Engineering Center Requirements Management Guide - The Enterprise Requirements Management Guide - Introduction Innumerable studies have concluded that requirements problems are the

More information

ACFID Code of Conduct PMEL Guidance Note. Prepared for ACFID by Learning4Development

ACFID Code of Conduct PMEL Guidance Note. Prepared for ACFID by Learning4Development ACFID Code of Conduct PMEL Guidance Note Prepared for ACFID by Learning4Development September 2017 1 CONTENTS: 1. Introduction 2. What is PMEL? 3. Approaches to PMEL 3.1 At a strategic or policy level

More information

7. Model based software architecture

7. Model based software architecture UNIT - III Model based software architectures: A Management perspective and technical perspective. Work Flows of the process: Software process workflows, Iteration workflows. Check Points of The process

More information

Requirements Organisation, Analysis. Software Requirements & Project Management CITS3220

Requirements Organisation, Analysis. Software Requirements & Project Management CITS3220 Requirements Organisation, Analysis and Negotiation Software Requirements & Project Management CITS3220 Organising Requirements Viewpoints Interactor viewpoints: people or other systems that interact

More information

International Journal of Computing and Business Research (IJCBR) ISSN (Online) :

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 Volume 3 Issue 2 May 2012 LATEST PROGRAMMING LANGUAGE TOOLS FOR BUSINESS PROCESS MODELLING Dr. Ram Shukla, Faculty

More information

Type-based Validation and Management of Business Service Interoperability

Type-based Validation and Management of Business Service Interoperability Type-based Validation and Management of Business Service Interoperability Toni Ruokolainen Dept. of Computer Science P.O. Box 68 (Gustaf Hällströmin katu 2b) FI-00014 UNIVERSITY OF HELSINKI, FINLAND Toni.Ruokolainen@cs.Helsinki.FI

More information

Service Oriented Architecture. Reference MIDDLEWARE & ENTERPRISE INTEGRATION TECHNOLOGIES By

Service Oriented Architecture. Reference MIDDLEWARE & ENTERPRISE INTEGRATION TECHNOLOGIES By Service Oriented Architecture Reference MIDDLEWARE & ENTERPRISE INTEGRATION TECHNOLOGIES By G. SUDHA SADASIVAM, RADHA SHANKARMANI 1 COMPILED BY BJ What is Service-Oriented Architecture? Service-Oriented

More information

A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 Skillport

A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 Skillport A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 by The International Institute of Business Analysis (IIBA) International Institute of Business Analysis. (c) 2009. Copying

More information

BPMN Guide Quick Start. by Bizagi BPM

BPMN Guide Quick Start. by Bizagi BPM BPMN Guide Quick Start by Bizagi BPM Recruitment and Selection 1 Table of Contents Scope... 2 BPMN 2.0 Business Process Modeling Notation... 2 Why Is It Important To Model With BPMN?... 2 Introduction

More information

HAZARD ANALYSIS AND CRITICAL CONTROL POINTS FOR WATER SUPPLIES. Kevin Hellier. Melbourne Water Corporation

HAZARD ANALYSIS AND CRITICAL CONTROL POINTS FOR WATER SUPPLIES. Kevin Hellier. Melbourne Water Corporation HAZARD ANALYSIS AND CRITICAL CONTROL POINTS FOR WATER SUPPLIES Paper Presented by : Kevin Hellier Authors: Kevin Hellier, Water Quality Engineer Melbourne Water Corporation 63 rd Annual Water Industry

More information

Analysis of Agile and Multi-Agent Based Process Scheduling Model

Analysis of Agile and Multi-Agent Based Process Scheduling Model International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 4, Issue 8 (August 2015), PP.23-31 Analysis of Agile and Multi-Agent Based Process Scheduling

More information

Evaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland

Evaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland Evaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland Guide 20.05.2014 Inhalt 1! General provisions... 1! 1.1! Goal and object of an evaluation... 1! 1.2! EUR-ACE

More information

International Standards for the Professional Practice of Internal Auditing (Standards)

International Standards for the Professional Practice of Internal Auditing (Standards) Attribute Standards 1000 Purpose, Authority, and Responsibility The purpose, authority, and responsibility of the internal audit activity must be formally defined in an internal audit charter, consistent

More information

AN OBJECT ORIENTED APPROACH TO BUSINESS MODELING IN INFORMATION SYSTEMS DEVELOPMENT *

AN OBJECT ORIENTED APPROACH TO BUSINESS MODELING IN INFORMATION SYSTEMS DEVELOPMENT * AN OBJECT ORIENTED APPROACH TO BUSINESS MODELING IN INFORMATION SYSTEMS DEVELOPMENT Jonás Arturo Montilva C. Universidad de Los Andes Facultad de Ingeniería Escuela de Ingeniería de Sistemas Departamento

More information

Ontologies and the Dynamics of Organisational Environments: An Example of a Group Memory System for the Management of Group Competencies

Ontologies and the Dynamics of Organisational Environments: An Example of a Group Memory System for the Management of Group Competencies Proceedings of I-KNOW 03 Graz, Austria, July 2-4, 2003 Ontologies and the Dynamics of Organisational Environments: An Example of a Group Memory System for the Management of Group Competencies José Braga

More information

C2 Decision Making and Cognitive Analysis. Modelling Operational Level Planning Processes with Coloured Petri Nets

C2 Decision Making and Cognitive Analysis. Modelling Operational Level Planning Processes with Coloured Petri Nets Submission to the 7 th International Command and Control Research and Technology Symposium Topic C2 Decision Making and Cognitive Analysis Title Modelling Operational Level Planning Processes with Coloured

More information

11 September Dear Conveners.,

11 September Dear Conveners., Cabinet Secretary for Government Business and Constitutional Relations Michael Russell MSP T: 0300 244 4000 E: scottish.ministers@gov.scot Bruce Crawford MSP, Convener, Finance and Constitution Committee

More information

WNR Approach: An Extension to Requirements Engineering Lifecycle

WNR Approach: An Extension to Requirements Engineering Lifecycle WNR Approach: An Extension to Requirements Engineering Lifecycle Ahmad Abdollahzadeh Barforoush, Abbas Rasoolzadegan, Reza Gorgan Mohammadi Information Technology and Computer Engineering Faculty Amirkabir

More information

Improving Requirements Specifications in Model-Driven Development Processes

Improving Requirements Specifications in Model-Driven Development Processes Improving Requirements Specifications in Model-Driven Development Processes Jordi Cabot and Eric Yu Department of Computer Science, University of Toronto {jcabot,eric}@cs.toronto.edu Abstract: Understanding

More information

ISO INTERNATIONAL STANDARD. Risk management Principles and guidelines. Management du risque Principes et lignes directrices

ISO INTERNATIONAL STANDARD. Risk management Principles and guidelines. Management du risque Principes et lignes directrices INTERNATIONAL STANDARD ISO 31000 First edition 2009-11-15 Risk management Principles and guidelines Management du risque Principes et lignes directrices http://mahdi.hashemitabar.com Reference number ISO

More information

An Ethical Reading of the UK Modern Slavery Act and its Implications for Firms

An Ethical Reading of the UK Modern Slavery Act and its Implications for Firms Saïd Business School Research Papers February 2016 An Ethical Reading of the UK Modern Slavery Act and its Implications for Firms Laurence Cranmer Saïd Business School, University of Oxford Saïd Business

More information

Advisory Circular. Date: DRAFT Initiated by: AIR-110

Advisory Circular. Date: DRAFT Initiated by: AIR-110 U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: DETERMINING THE CLASSIFICATION OF A CHANGE TO TYPE DESIGN. Date: DRAFT Initiated by: AIR-110 AC No: 21.93-1

More information

Mapping Service-Orientation to TOGAF 9 Part IV: Applying Service-Orientation to TOGAF s Service Contracts

Mapping Service-Orientation to TOGAF 9 Part IV: Applying Service-Orientation to TOGAF s Service Contracts Mapping Service-Orientation to TOGAF 9 Part IV: Applying Service-Orientation to TOGAF s Service Contracts by Filippos Santas, Credit Suisse Private Banking in Switzerland In this series of articles we

More information

Digital Collaboration in Sweden. Presentation at meeting between ISA and Sweden Brussels, October 22, 2014

Digital Collaboration in Sweden. Presentation at meeting between ISA and Sweden Brussels, October 22, 2014 Digital Collaboration in Sweden Presentation at meeting between ISA and Sweden Brussels, October 22, 2014 1 Proposed Agenda Introduction The Swedish situation after the parliament election Swedish situation

More information

NAU MT2050i Week 4 Quiz

NAU MT2050i Week 4 Quiz Class: Date: NAU MT2050i Week 4 Quiz Short Answer 1. A(n) is a choice made from available alternatives. 2. is the process of identifying problems and opportunities and then resolving them. 3. decisions

More information

Virtual Prototyping for Engineering Design

Virtual Prototyping for Engineering Design Virtual Prototyping for Engineering Design Walid Tizani University of Nottingham England walid.tizani@ nottingham.ac.uk Robert A Smith University of Nottingham England robert.smith@ nottingham.ac.uk Darshan

More information

Success Factors in ERP Systems Implementations. Result of Research on the Polish ERP Market

Success Factors in ERP Systems Implementations. Result of Research on the Polish ERP Market Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004. Result of Research on the Polish ERP Market Piotr

More information

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Software Processes Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Objectives To introduce software process models To describe three generic process models and when they may be

More information

12. A Sustainable Murray Darling Basin: The legal challenges

12. A Sustainable Murray Darling Basin: The legal challenges 12. A Sustainable Murray Darling Basin: The legal challenges Douglas Fisher Introduction The range of legal instruments informing how the Murray Darling Basin (MDB) is managed is extensive. Some provide

More information

Socio-technical Organisation

Socio-technical Organisation Socio-technical Organisation Virginia Dignum 1 (Agent) Socio-technical Organizations Develop theory and tools for engineering complex multi-actor systems, integrating artificial and human partners, based

More information

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004 INTERNATIONAL FEDERATION OF ACCOUNTANTS 545 Fifth Avenue, 14th Floor Tel: +1 (212) 286-9344 New York, New York 10017 Fax: +1 (212) 856-9420 Internet: http://www.ifac.org Agenda Item 8-C First Issued July

More information

Manual for writing a Strategic Programme Plan (SPP)

Manual for writing a Strategic Programme Plan (SPP) Manual for writing a Strategic Programme Plan (SPP) Introduction Partner organisations that seek financial support for their multi-annual programmes from Red een Kind (ReK) or Woord en Daad (WD) are requested

More information

Human Resource Management

Human Resource Management Synopsis Human Resource Management 1. The Origins and Nature of Human Resource Management understand what is meant by human resource management (HRM); describe the main factors which led to the emergence

More information

tit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation

tit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation tit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation Date: 6 April 2011 Priority: Low Security level: In Confidence Report

More information

Version 1.0. The Contract Management Standard Final Edition. Version 1.0

Version 1.0. The Contract Management Standard Final Edition. Version 1.0 The Management Standard Final Edition 1 Purpose of the Management Standard The purpose of the Management Standard is to describe the nature of contract management in terms of the contract management processes

More information

Introduction to Software Engineering

Introduction to Software Engineering Introduction to Software Engineering 2. Requirements Collection Mircea F. Lungu Based on a lecture by Oscar Nierstrasz. Roadmap > The Requirements Engineering Process > Functional and non-functional requirements

More information

The software process

The software process Software Processes The software process A structured set of activities required to develop a software system Specification; Design; Validation; Evolution. A software process model is an abstract representation

More information

Future Trends in State Courts 2011

Future Trends in State Courts 2011 Future Trends in State Courts 2011 NCSC ISBN: 0-89656-279-4 Future Trends in State Courts 2011 Special Focus on Access to Justice Principles of Judicial Administration: The Lens of Change Daniel J. Hall

More information

A Simulation Platform for Multiagent Systems in Logistics

A Simulation Platform for Multiagent Systems in Logistics A Simulation Platform for Multiagent Systems in Logistics Heinz Ulrich, Swiss Federal Institute of Technology, Zürich Summary: The challenges in today s global economy are flexibility and fast reactions

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Part I INTRODUCING SOA Service Oriented Architecture- Presented by Hassan.Tanabi@Gmail.com 2 Fundamental SOA 1. The term "service-oriented" has existed for some time, it has

More information

CLASS/YEAR: II MCA SUB.CODE&NAME: MC7303, SOFTWARE ENGINEERING. 1. Define Software Engineering. Software Engineering: 2. What is a process Framework? Process Framework: UNIT-I 2MARKS QUESTIONS AND ANSWERS

More information

Unstructured Nature of Important Decisions. Understanding the Business Value of Systems and Managing Change. Diversity of Managerial Roles

Unstructured Nature of Important Decisions. Understanding the Business Value of Systems and Managing Change. Diversity of Managerial Roles Unstructured Nature of Important Decisions Understanding the Business Value of Systems and Managing Change Many important decisions, especially in the areas of strategic planning and knowledge are not

More information

ISO/IEC JTC 1 N 10998

ISO/IEC JTC 1 N 10998 ISO/IEC JTC 1 N 10998 ISO/IEC JTC 1 Information technology Secretariat: ANSI (USA) Document type: Title: Status: Text for PDTR ballot or comment Text of 2nd PDTR 38502, Governance of IT - Framework and

More information

Requirement Engineering. L3 The requirement study. Change is constant. Communication problem? People are hard to understand!

Requirement Engineering. L3 The requirement study. Change is constant. Communication problem? People are hard to understand! Requirement Engineering L3 The requirement study Fang Chen Requirement are ubiquitous part of our lives Understand the requirement through communication Requirement Creation Communication problem? People

More information

Extended Enterprise Architecture ViewPoints Support Guide

Extended Enterprise Architecture ViewPoints Support Guide Extended Enterprise Architecture ViewPoints Support Guide Editorial Writer: J. Schekkerman Version 1.8 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 10 CHAPTER 2 LITERATURE SURVEY This chapter provides the related work that has been done about the software performance requirements which includes the sub sections like requirements engineering, functional

More information

COPYRIGHTED MATERIAL PROCESS IMPROVEMENT DEVELOPMENTS IN PROCESS MANAGEMENT

COPYRIGHTED MATERIAL PROCESS IMPROVEMENT DEVELOPMENTS IN PROCESS MANAGEMENT PROCESS IMPROVEMENT DEVELOPMENTS IN PROCESS MANAGEMENT CHAPTER 1 Businesses, whether commercial or not - for - profit organizations, inevitably have a wish to remain in operation; to have sustainable and

More information

Version 1.0. The Contract Management Standard Final Edition. Version 1.0

Version 1.0. The Contract Management Standard Final Edition. Version 1.0 The Management Standard Final Edition 1 Purpose of the Management Standard The purpose of the Management Standard is to describe the nature of contract management in terms of the contract management processes

More information

Guidance on project management

Guidance on project management BSI Standards Publication NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW raising standards worldwide Guidance on project management BRITISH STANDARD National foreword This British

More information

The Systems and Software Product Line Engineering Lifecycle Framework

The Systems and Software Product Line Engineering Lifecycle Framework Revised January 27, 2013 Contact Information: info@biglever.com www.biglever.com 512-426-2227 The Systems and Software Product Line Engineering Lifecycle Framework Report ##200805071r4 Mainstream forces

More information

CAPTURING INFORMATION SYSTEM S REQUIREMENT USING BUSINESS PROCESS SIMULATION

CAPTURING INFORMATION SYSTEM S REQUIREMENT USING BUSINESS PROCESS SIMULATION CAPTURING INFORMATION SYSTEM S REQUIREMENT USING BUSINESS PROCESS SIMULATION Alan Serrano Department of Information Systems and Computing Brunel University Uxbridge Middlesex UB8 3PH, London, UK KEYWORDS

More information

International Standards for the Professional Practice of Internal Auditing (Standards)

International Standards for the Professional Practice of Internal Auditing (Standards) INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Attribute Standards 1000 Purpose, Authority, and Responsibility The purpose, authority, and responsibility of the

More information

White Paper. Transforming Contact Centres using Simulation-based Scenario Modelling

White Paper. Transforming Contact Centres using Simulation-based Scenario Modelling White Paper Transforming Contact Centres using Simulation-based Scenario Modelling Meet Your KPI s, Deliver Consistently High Service and Reduce Customer Churn to Increase Your Bottom Line Results PM@SIMUL8.com

More information