A SEMIOTIC APPROACH TO ORGANISATIONAL MODELLING USING NORM ANALYSIS
|
|
- Roy Lloyd
- 6 years ago
- Views:
Transcription
1 A SEMIOTIC APPROACH TO ORGANISATIONAL MODELLING USING NORM ANALYSIS Authors : Simon Tan, Kecheng Liu, Zhiwu Xie Affiliation: University of Reading Department of Computer Science PO Box 225, Whiteknights Reading, RG6 6AY, United Kingdom URL : {b.k.s.tan, k.liu, z.xie}@reading.ac.uk : Telephone: Fax : Keywords : Norm Analysis, Agents, Process Modelling, Information Systems, Affordance. Appropriate stream: Developing the IS Discipline. Appropriate topic : Social and Cultural Issues of Information Systems. 1
2 Abstract This paper explores a theoretical perspective to information systems engineering, correlating requirements modelling techniques with Norm Analysis, to elicit organisational semantics and to formalise complex business rules. At present noticeable disparity exists between systems models, and the actual, real organisation information systems. The modern multifaceted organisational disposition is complicated further with exceptions in business rules, and volatility in the behaviour of normative agents. Traditional systems approaches do not fully address these complications, and disparity in systems models; Norm Analysis, however, offers a viable alternative, which until now has not been extensively explored. These inherent systems design issues may be alleviated with the introduction of norms, to address the complexity of organisational information systems. We propose utilising Norm Analysis, a branch of Organisational Semiotics, for the elicitation of IS requirements to encapsulate rigorous business behaviour, and formalise intricate business rules. We believe this approach will contribute to the overall usability and coherence of organisational models. The second part of this paper considers the adequacy of representing norms in deontic logic, rules operands and temporal based systems, with an illustration of a constabulary crime-reporting case study. Keywords: Norm Analysis, Agents, Process Modelling, Information Systems, Affordance 1. Introduction Current organisational information systems have grown significantly in both size and complexity. Modern systems designs are often technically aesthetic, but functionally awkward and do not address the real needs of users. Empirical studies have since established a direct link between the poor understanding of information systems organisation and software failure. Unified Modelling Language, the de facto object oriented modelling language has gain widespread recognition as the leading systemmodelling standard. UML however, is not equipped to model the complexity of organisational systems behaviour. As such, we propose an extension to addresses this issue, incorporating normative elements. Norm Analysis (NA), which originated from Semiotics, may provide a viable alternative to deal with this aspect. Systems modellers are aware that gaps, in the form of semantic gap, exist between organisation and software (Liu 2000) with many undefined parameters. System analysts are constantly required to resolve these arduous tasks of tidying up loose ambiguous parameters. This quandary will inevitably fall on the system analysts discreet judgment, hence knowingly or unknowingly, or even worst in some situation overwrite crucial business decisions. There is an impending need to unify existing requirement engineering with Norm Analysis. Traditional system requirements and organisational semantics (Liu et al. 1999) have until now, evolved independently. This poses a serious problem on consistency issues in systems design. Norm Analysis will attempt to address and unify requirements engineering with semantics to ensure that systems model designs are not developed in isolation from the social aspect of organisational norm. Information systems from the viewpoint of semioticians are regarded as a holistic entity, as opposed to UML dependency based concept of compartmentalising IT business 2
3 process, with independent sets of loosely coupled software processes. Norm Analysis, we believe has the rigorous ability to model these complex organisational systems requirements. We propose incorporating a suite of semiotics tools: semantic analysis, Norm Analysis, and normative agents (Liu & Salter 2002). These components will undertake three crucial tasks of addressing the above systems issues. Firstly, it identifies the ontological dependency (Wand 1999) between systems processes, having established the ontology chart; it will then ascertain the semantic relations. Hence, formalising these relationships to model the behaviour of organisational systems design. It is not the intent of this paper to propose additional methodology to the existing field of information system practice; many renowned methodologies over time have demonstrated to be reliable and thorough. Over the last 30 years, there have been numerous attempts and endeavours to model organisational semantics (Peckham & Mryanski 1988, Wand et al. 1999), which were founded on entity-relationships. There is an impending need to re-focus and tap the rich organisational semantic layers. In recent years, we have seen rapid growth in enterprise systems organisation, huge technological advances and radical evolution in business IT organisation. These changes have exerted great demands on systems requirements engineering tools. Traditional systems, as such are overwhelmed, and ill-equipped to address the social behavioural aspect of organisational roles (Joaquim et al. 1999). In order to illustrate the functions of Norm Analysis, within an IS organisation model. We have instantiated Norm Analysis with several leading system requirement techniques: Role activity diagram (RAD) (Ould, 1995), Activity diagram and Scenario diagram (Booch et al. 1999). This paper is structured as follows: Section 1 identifies the limitation of traditional systems requirement approach, and proposes an extension to elicit complex organisational information. In section 2, we briefly describe norm concepts with respect to deontic operators, rule-based and temporal-based, and its significance to systems modelling. Norm Analysis in section 3, explains the concepts of Norm. NA structure and rules constructs, with emphasis on the four stages of NA framework: Responsibility analysis, Information identification, Pre/Post triggers analysis and Norm specification. Section 4, compares and contrast between rules and norms within an IS domain. Section 5 illustrates a case study of a crime reporting system, and demonstrates how norms and semantics are elicited by applying NA. Drawing the conclusion and discuss future work on Section What is Norm? Norms in essence are a set of rules and regulations, an underlying protocol governing the human communications network. These are etiquette of behaviour observed among people of different communities, cultures, groups and even sub-cultures unique within an organisation. These norms are embedded within a social context transcending the boundaries of explicit, implicit, formal and informal states, collaborating to attain certain goals. Norms revolves around agents, which influences the agents to execute a series of concerted actions to achieve a particular goal. In this respect, it can specify to a limited 3
4 extent how an agent should or should not behave, under a prescribe sets of triggers. Norms are highly regarded in many instances; it in reality controls the social and organisational domains, which exerts a major influence on affordance. Affordance and Norms are not mutually exclusive, yet inextricably intertwined within the social context of organisational behaviour. The term affordance was first coined from the perceptual psychologist (Gibson 1977), referring it to the actionable properties between the world and an actor. To Gibson, affordances are relationships of entities and observable pattern of behaviour occurring within a domain. Patterns exits, as such it could be captured, and taken to anticipate users and systems behaviour. It should be stressed that affordance exists naturally: it may or may not be apparent, visible, known, or even desirable, but it plays a significant role, and its effects will greatly influence behavioural norms and the order of patterns. Affordances are time dependent, thus it abides by the rule and concept of start and finish of an event. As such, defiance of affordance and norm are not to be taken without due consideration within a domain. This deviation from acceptable norms has its consequences; punishments and penalty may be imposed on agents compromising these protocols. Advocating Norm Analysis as a systems method offers a normative perspective to systems modelling and design, utilising rich semantics to depict the ontological dependency, and to facilitate the elicitation of system requirements. Norm Analysis also facilitates the deduction of organisation signs and norms (Stamper et al. 2000). Norm Analysis is well equipped to accommodate different systems methods, techniques and approaches. Norm s application in information systems is not just a recent fad; it has seen wide spread adoption in various industries more notably in the field of Artificial Intelligences and legal systems. Norms are used in organisational systems modelling e.g. by Sergot (2001) and Ivan (2000), with varying degrees of systems complexities. This paper will present a feasible normative approach, which introduces roles that complements existing system requirements techniques. Secondly, norm with its pliable behaviour and rules, when applied appropriately would widen the spectrum of information requirements. Lastly, and more importantly this system approach will attempt to resolve the handling of business exceptions, utilising intelligent agents for the prognosis of systems behaviour, facilitating a proactive systems design responses as oppose to reactive model design. These characteristics will be manifested in the modelling and systems development phases, making it more communicative and reflective of a real business systems model. It is evident, that conforming to syntax, methodology and abiding good programming practices alone will not produce a system that users require, without thoroughly understanding the semantic abstract layer of an organisation. Norm Analysis will attempt to steer the developer towards a normorientated approach to systems model design. 3. Norm Analysis Norms evolve in accordance to circumstances and change, akin to a living-breathing organism adapting to its environment, a habitat operating within a complex boundary of interdependent entities whose relations and properties are largely determined by their 4
5 functions in the organisation. It is a source of commitments and contracts that agents establish mutually; however, agents being autonomous may choose to violate (Liu et al, 1999). It is a composite of multiple actors performing different activities, capacity and objectives with a concerted goal. Agents in this context refer to both software and human entities, autonomous in characteristic (Chong & Liu 2000) facilitating the communication, and possible violation of norms. Human agents however take precedence over software agents, and as such are responsible for the delegation of duties. Agents either human or software interact actively within and across business domains. The understandings of norms are crucial to enables modellers to appreciate systems processes, and agent s behaviour to reinforce the overall systems design. Thus, represents an organisation true complexity, and diverse mix of autonomous processes and behaviour. Norm Analysis Norms can be broadly categorised as cognitive, evaluative, perceptual and behaviour (Stamper 1992). These are further elaborated in (Liu 2002). Behavioural norms are highly applicable to organisation Norm Analysis; comprising of 4 stages namely, 1) Responsibility analysis, 2) Information identification, 3) Trigger analysis and 4) Norm specification. Norm Analysis (Liu et al. 2001) formulates an approach to elicited complex organisation arguments. It identifies and determines the pre-condition and post-condition of agents behaviour to ascertain responsible agents. A norm has the following construct (Stamper et al. 2000): whenever <condition> if <state> then <agent> is <deontic operator> to do<action> This construct enables norm elements to capture, which are required for execution in lowlevel programming language, e.g. LEGOL (Liu 2000 & Stamper 1980). Deontic logic has different representations of a fundamental nucleus. It has a canonical criteria expressed antecedent. Users have to be cautious of this proliferation of expression based on normative context of each scenario. 4. Rules Versus Norms A rule determines a principle or instruction stating the way in which things should be done. Sets of rules e.g. IF, ELSE, THEN constructs. However, business rules are more tightly specified in this respect. They represent procedures, constraints and policies on the way an organisation should conduct its business (Liu & Ong 1999). Software agents serve to automate and enforce rules and isolate those instances in which the independent judgement of a human is required. These rules are embedded directly in the program 5
6 code. It is the procedural logic of how system workflow intertwined with business logic. Thus, when business rules changes it requires the arduous tasks of rewriting the program logic code. A norm in contrast represents a hypothetical construct using agents to associate actions to conditions. (Liu 200) Norms include deontic operator, rule-based and temporal- based operands. The antecedents of each norm will have a prescribe set of successive instructions on the next norm, structured on the pre/post notion of norm triggers. Agents are empowered to exercise and assert responsibility and authority over organisational norm. However, exceptions exist and rules differ. Refer to an example below: A police superintendent in-charge of an inspector, and the inspector over the junior officers. At a glance, it may appear similar to a typical hierarchy structure model; however, it is quite different with the inclusion of components as deontic operator, timebase and rules-base operands. E.g. Agents role: The superintendent has to abide by legislative and policies (rules) set by the governmental bodies and police force (agents). The Superintended should not instruct his subordinate to reopen a case without valid reason, contravening the police policies (violation of norm); if there are no supporting evidences pertaining to the case. (Rules overwrite > Agents roles) The superintendent can specify the rights of his subordinates by using deontic operators, such as obliged, prohibited and permitted. The subordinates are the responsible agents for the actions prescribed by the superintendent. The subordinates under the command of the superintendent may choose to follow or violate the norm. However, the latter may induce a punishment unless there is an acceptable ground. Temporal Elements of Norm Conditions of properties can and will change over time. These temporal-based norms would greatly influence the Norm Analysis constructs, in determining how to resolve the procedural algorithm. Absolute (calendar date) Relative (e.g. bill due-date) Event triggers (trigger via a process) Absolute and relative-time triggers a state of changes on norms with the passage of time. However, associated agents may overwrite triggered event, causing a change of states and event. E.g. A suspect is apprehended for a crime committed in another county and the investigation reveal that this case is linked. This will automatically re-opened (pending active) via the trigger from an external source. 6
7 The Method of Norm Analysis Norm Analysis formulates a systematic approach to elicited norms, responsible agents and defines pre/post conditions of event triggers. The analysis is carried out in 4 stages to provide each process with a tabular normative unit of information. The NA table is designed to capture a series of norm instance. This modular design enables a clear and well-defined norm structure, representative of each characteristics pertaining to a specific norm. stages tasks Responsibilities Analysis Information Identification Triggers Analysis outcome Identify responsible agents for the Start/finish of an instance Select type of key information required by an instance Activities/actions effecting the Start/finish of an instance Preconditions The conditions for acting and invoking norm postconditions The resultant after the successful execution of norm 4 Norm Specification Norms specified in the standard construct. Table 1: Norm Analysis: Stages, Norms and Deliverables (Adapted from Liu 2000 and Liu & Salter 2002) Responsibility Analysis (Stage 1) Responsibility analysis identifies state association of entities and agents that are responsible for the start and finish of an instance. E.g. Affordance > Investigation. The period of an incident starts immediately from the instant a case code is issued but not prior to it classified as a Crime. The investigation period will only commence, once the police officer is assigned to the case, and terminated when the case have been resolved. These are examples of well-defined processes/actions with explicit period and agents. It is more evocative to link processes, which are time-bounded and responsibly linked, as compared to establishing links based exclusively on process that trigger a subsequent or concurrent process. Information Identification (Stage 2) An instance needs key source information for the preceding action. Without these vital bits of information, it is technically difficult however, not impossible for agents to derive prudent decisions. The investigating officer would need to know information as, details of the victims, location/time of crime committed and description of incident to proceed with the investigation. Else, the entire investigation process would not exist. These affordance and agents define in the NA tables, are elicited during the semantic analysis phase after the ontological chart are drafted. 7
8 Trigger Analysis (Stage 3) Triggers act as a mechanism to activate associated processes based on the pre-post conditions of existing social norm define in Stage 1; it could either take the form of Temporal, Substantive or Semiological to influence the trigger procedure. A relative temporal norm could take the form of a binding legislature. Specifying that a case should not be open for a period longer than 1 year without any development or new evidence. It must therefore be categorised under pending, as a case cannot remain open indefinitely. Substantive norm occurs e.g. when the witness recalls any key clues pertaining to the crime, where the status has been flagged as Pending, this action will automatically reopening the case. Semiological trigger happens for e.g. when a suspect is caught for another crime and is traced to implicate or influence the outcome of the existing case. Norm Specification (Stage 4) Norm specification is the final stage, where the earlier 3 stages of information are collated, decimated, formalised and structured to facilitate prudent behaviour decisions based on conditional norm presented. The complexity here is to deal with formalise norm when conditions are often violated. Refer to section 3. Conditions of higher order precedence will overwrite that of a lower. E.g. personal safety commands a higher precedence to reporting a crime. Norms would have to be formalised in this respect, it would then be incorporated in the above example to handle business exceptions and the violation of Norms. 5. Case Study: Police Crime-Reporting This case study was based on a project of designing a crime management system for the police forces. An excerpt of this project, "crime-reporting" was highlighted to reflect the actual research conducted by our research team, which is still ongoing. This case study is provided, although for the sake of brevity the detailed workings and complexity of the model have not been fully reproduced here. The outputs from the model are sensitive to changes in key assumptions. We have not sought to be prescriptive about these assumptions, which will vary according to circumstances. However, this guide does identify the key sensitivities and the basis on which the assumptions underlying them might be made. The Crime Reporting Unit is the contact point between members of the public and the police departments. It is charged with the responsibility of collecting, maintaining, analysing, and reporting crime data for the nation wide crime-management. In the Crime Reporting case study, Role Activity Diagram (Ould, 1995) was used to capture the overview of the system outline with the multiple façade role characteristic of the Police Department (Fig. 1). Roles have been widely used for modelling the authority, responsibility, functions, and interactions, associated with agents within an organisations. RAD forms a regional road map of the systems design. However, these are ideal for an initial mapping, but insufficient to establish detail relationships between agents and the targets they manage. This structure is constructed on an abstract models of coordination, however social elements context that are crucial for organisational analysis are lacking, as behaviour or norms are not present in these dependency-based models. 8
9 CRIME REPORTING Crime Assessor Victim / Reporter Start taking enquiry Request Identification Note reporter details Submit identification Request incident details Describe incident Appraise Incident Validity y n Valid Crime? Crime Statement Verify no duplication Fill crime details Refer to Relevant Dept Write Statement Police Assign Case no. Assign to Investigating Officer Allocate Case Investigation y Case solved? n Figure 1: RAD Crime reporting process Role Activity diagram emphasise on roles, functions, activities and their interactions within events and logic that determines what activities are carried out and at what point in time. This derives a higher-level conceptual model to determine at best a sketchy superficial model of the system. It is not particularly concern in identifying and of patterning Norm behaviour at this stage. Agents in the form of token, resides on a particular state will represent the possible outcome of the next role instances. The functionality of token resemble a baton relay race, the next process can only occur once it receive the passed on token, satisfying the pre-conditions then only will it trigger the consecutive action and so forth. Thus, at every stage of modelling, the modeller has to make explicit decision, not allowing much margin to accommodate exception behaviour. 9
10 Public Domain Crime Reporter Crime Recorder Other Departments Crime Committed Contact Police Crime Reporter appraise incident 1 Department (referral) [Norm 3] Reject [Norm 2] Accept [Norm 1] Forward Take written statement 2 1) Assign to Crime Recorder 2) Record Crime 3A Accept & record Crime 3B Figure 2: Activity Diagram Crime reporting process detail. [Apprise - Forward Incident] Victim/ Witness Crime Reporter Police Force Info Statutory/Other Department Report Incident Describe Incident Furnish incident Does not constitute as a crime Apprise incident Waiting Verifying Verifying Checking policies Relevant Dept Department Contact Referral to dept Figure 3: Scenario Diagram Appraise Incident 10
11 [Verify New Crime] Victim/ Witness Crime Reporter Police Force Info Report Incident Request particulars Furnish particulars Describe Incident Furnish incident Verify incident new (no duplication) Waiting Verifying Checking Take statement Confirm new incident Figure 4: Scenario Diagram Verify Incident Extracting Norms (Activity diagram and Scenario diagram) Roles are further expanded to capture high-level normative elements. Activity diagram (Fig. 2) in itself is only sufficed to model at a superficial-level to identify the existence of high-level norms. Scenario diagram shows the existence of objects, their relationships in the logical view of the system, and how they execute a particular scenario or use-case. Let's look at a scenario (Fig. 3, 4) and how we can document it with the Activity diagram (Fig.2) crime reporting process. Norm An1alysis offers an extension to this perspective to capture norms, which is present but hidden. Process (Activities) Norms Appraise Incident [Norm 1] Forward: (Sub-Norm 1.1, 1.2, 1.3..) (will lead to 3 possible outcomes [Norm 2] Accept : (Sub-Norm 2.1, 2.2, 2.3..) Refer to fig.2) [Norm 3] Reject : (Sub-Norm 3.1, 3.2, 3.3..) [Norm 1 ] : Forward Process [Norm 1.1] Sub-Norm - 1.1: IF the (incident does not constitute to a crime); a case of domestic violence. THEN Crime Reporter Is Obliged To forward it to the family welfare departments. [Norm 1.2] Sub-Norm - 1.2: IF the (incident does not constitute to a crime); a case of customer/consumer disagreement. THEN Crime Reporter Is Obliged 11
12 Sub-Norm3:.. Sub-Norm4:.. To forward it to the consumer association organisation. [Norm 2 ] : Accept Process [Norm 2.1] Sub-Norm - 2.1: IF the (incident constitute to a crime); robbery committed. THEN Crime Reporter Is Permitted To take the statement and issue incident report serial number beginning with ROBxxxxx [Norm 2.2] Sub-Norm - 2.2: IF the (incident constitute to a crime); hit and run accident. THEN Crime Reporter Is Permitted To take the statement and issue incident report serial number beginning with HNRxxxxx Sub-Norm3:.. Sub-Norm4:.. Norm Analysis will attempt to formalise these unregulated normative behaviour (Liu et al. 2001) and agents. Many observable and obscure norms will be defined at this stage and the predicative behaviour analysed. Reusability of norm is achievable only when the modelled organisation is equivalent to the real system environment. NA information table clearly helps to state and structure responsible agents, key data, pre-post triggers and detailed behaviour norms. Appraise Incident: Process 1 Responsibility Info. Identification Trigger (Conditions Pre/Post) Officer in contact with public Victim/witness info details, incident (date/time), etc.. Public contact Report incident Incident enquire Detailed Norm WHEN the public made an incident report to the police IF the incident is valid and within the scope of police THEN the officer in contact OBLIGED to accept and filed an incident report ELSE selection process Table 2: Norm Analysis (Incident Process) 12
13 Determine Incident: Selection (Reject) N3 Responsibility Info. Identification Trigger (Conditions Pre/Post) Detailed Norm Crime Reporter Missing person > 24hrs, family dispute, policies, etc.. Incident Appraisal Incident appraisal Incident rejected WHEN incident report is gathered IF the incident is invalid and outside the scope of police THEN the officer in contact OBLIGED to reject the incident Table 3: Norm Analysis (Determine Incident - Reject) Crime Statement : Selection (Accepts) N2 Responsibility Info. Identification Trigger (Conditions Pre/Post) Detailed Norm Crime Reporter Type of crime, category, urgency Determine Incident Valid Crime Statement report WHEN a crime is confirmed IF it is urgent that it will be assign immediately THEN the officer in contact is to investigate Legend: selection process process # N# <norm> Table 4: Norm Analysis (Crime Statement - Accepts) Norm Analysis, present an unambiguous detailed description of the interrelated entities and its possible behaviour, which is structured on information collated from the high level RAD and Activity diagram. The results attained are abstract, yet comprehensive in its procedural logic, which considers entities behaviour, norms and agents. This allows the flexibility to model the very essences of complex organisation systems. Equipped with this information the modeller will have an invaluable glimpse of a significant insight in the communication network of the organisation. 6. Conclusion and Further work. At this juncture, it is evident that systems information engineering is not sufficiently equipped to model organisational behaviour, and may require a revisit and extension to the fundamental field of requirement engineering. The above case study illustrated the significances of ontological dependencies, affordances and normative agents on an organisational business domain. These techniques are at its infancy, but it has nevertheless gained widespread attention in many fields agreeing for a need to address the organisation semantic layers. However, having said that, it has the ability to capture 13
14 rigorous system behaviour and model the complexity of modern business organisation. The next phase of systems study is to define, regulate and model norms, as well as to develop the interoperability of agents. This approach would structure on behavioural norms for systems optimisation and reuse. It is with the aim of bring requirement engineering a step closer to realising the above objective with the advent of tools as, semantic analysis and Norm Analysis; more effort however, needs to be done in the following areas: 1) Formulising norms for applications in software simulation. 2) Validation of norms; and 3) Elicitation of high-level abstract organisational norms for system reuses. We are aware of the current norms systems limitations, attributed to the complex and unstructured autonomous behaviour of entities. Equipped with the semiotics tools, modellers at present will still have to rely largely on individual experiences and thorough understanding of the specific organisational domain. We aim to improve future work and formulise the current requirement system technique, unifying system requirement design with Norm Analysis, with further enhancement. Acknowledgement This research is partly supported by EPSRC SEDITA project GR/S04840/ Reference: Carlos, Ivan (2000) Logical Models of Argument. ACM Computing Survey Vol 32, No. 4. pp Chong, S. & Liu, K. (2000) A Semiotic Approach for Modelling and Designing Agent- Based Information Systems Based on Roles and Norms. Proceedings of AOIS-2000 at CAiSE*00. icue Publishing, Berlin, pp Liu, K. (2000), Semiotics in Information Systems Engineering, Cambridge University Press, Cambridge (UK). Liu, K, Alderson, Qureshi, Z (1999). Requirement Recovery from Legacy Systems by Analysing and Modelling Behaviour. International Conference on Software Maintenance Oxford, England (UK), pp Liu, K. Andy Salter (2002) Using Semantic Analysis And Norm Analysis To Model Organisations. Proceedings of ICEIS 4th International Conference On Enterprise Information Systems Ciudad Real - Spain pp Liu, K, Ong Tina, (1999) A Modelling Approach For Handling Business Rules And Exceptions. The Computer Journal, Vol 42, No
15 Liu, Kecheng, Lily Sun, Alan Dix & Mohan Narasipuram (2001). Norm Based Agency for Designing Collaborative Information Systems, Information Systems Journal, 11, Filipe, Joaquim, Kecheng Liu & Bernadette Sharp (2000) Organisation Simulation Based on Normative Knowledge and Role Modelling, AAAI Spring Symposium workshop "Bringing Knowledge to Business Processes", Technical Report SS-00-03, Stanford, March 2000, pp Joaquim, F., Liu, K. & Sharp, B. (1999), A Semiotic Approach to Organisational Role Modelling for Intelligent Agents, Kluwer Academic Publishers, The Netherlands. Pp Martin Fowler, Ken Scott (1999), UML Distilled Second Edition A Brief Guide to the Standard Object Modelling Language, Addison-Wesley, Reading, Massachusetts. Ould Martyn A.Wiley (1995). Business Processes, Modelling and Analysis for Reengineering and Improvement. John Wiley & Sons, Chichester. Peckham, J. & Mryanski, F. (1988), Semantic Data Models, ACM Computing Surveys 20(3). Vol. 20, Issue 3. pp Sergot Marek (2001), A computational theory of normative position. ACM transaction on computational logic. Vol. 2, Issue 4. pp Stamper, R., Liu, K., Hafkamp, M. & Ades, Y. (2000). Understanding the Roles of Signs and Norms in Organizations A Semiotic Approach to Information Design. Journal of Behaviour and Information Technology. Vol.19, No.1, pp Wand, Y., Storey, V.C. & Weber, R. (1999), An ontological analysis of the relationship construct in conceptual modelling, ACM Transactions on database systems. Vol. 24, Issue 4. pp
COMPARISON BETWEEN THE BUSINESS MODELLING METHODS PROVIDED BY MEASUR AND RUP
COMPARISON BETWEEN THE BUSINESS MODELLING METHODS PROVIDED BY MEASUR AND RUP Hui Du, Tingting Li and Dan Ding Beijing Philosophy and Social Science Research Center for Beijing Transportation Development
More informationSocial Organization Analysis: A Tutorial
Social Organization Analysis: A Tutorial Gavan Lintern Cognitive Systems Design glintern@cognitivesystemsdesign.net Copyright 2013 by Gavan Lintern Abstract Far less attention has been paid to social organization
More informationComparative Analysis of Ontology Charting with other Modelling Techniques
Comparative Analysis of Ontology Charting with other Modelling Techniques José Cordeiro and Joaquim Filipe Escola Superior de Tecnologia de Setúbal, Rua do Vale de Chaves, Estefanilha, 2910-761 Setúbal,
More informationRequirements Engineering
Requirements Engineering Professor Ray Welland Department of Computing Science University of Glasgow E-mail: ray@dcs.gla.ac.uk The Importance of Requirements Identifying (some) requirements is the starting
More informationLevel 5 NVQ Diploma in Management and Leadership Complete
Learner Achievement Portfolio Level 5 NVQ Diploma in Management and Leadership Complete Qualification Accreditation Number: 601/3550/5 Version AIQ004461 Active IQ wishes to emphasise that whilst every
More informationDEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Software Engineering Third Year CSE( Sem:I) 2 marks Questions and Answers
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Software Engineering Third Year CSE( Sem:I) 2 marks Questions and Answers UNIT 1 1. What are software myths Answer: Management myths: We already have a book
More informationB/AWP2/YT Reading University, UK
EU-China Information Society Project Research on e-government User Requirements B/AWP2/YT-0803 By Prof. Liu Kecheng Reading University, UK October 2008 Table of Contents Executive summary... 1 1. Background
More informationMethodological approaches based on business rules
Revista Informatica Economică nr.3(47)/2008 23 Methodological approaches based on business rules Anca Ioana ANDREESCU, Adina UŢĂ Academy of Economic Studies, Bucharest, România Business rules and business
More informationNo. Detail Page. M&L 45 Contribute to the development of a strategic plan 3. M&L 46 Establish business risk management processes 5
Management and Leadership Level 5 Units Contents No. Detail Page M&L 45 Contribute to the development of a strategic plan 3 M&L 46 Establish business risk management processes 5 M&L 47 Promote equality
More informationManaging IS Development Projects Using a Generalised Set of Scorecard Perspectives
Managing IS Development Projects Using a Generalised Set of Scorecard Perspectives Abstract Phil Brook Information Systems Academic Group Faculty of Management University of Western Sydney Sydney, Australia
More informationIntelligent Workflow Management: Architecture and Technologies
Proceedings of The Third International Conference on Electronic Commerce(ICeCE2003), Hangzhou Oct. 2003, pp.995-999 Intelligent Workflow Management: Architecture and Technologies Chen Huang a, Yushun Fan
More informationDevelopment Process and Analysis. LTOOD/OOAD - Verified Software Systems 1
Development Process and Analysis LTOOD/OOAD - Verified Software Systems 1 Software Crisis Declared in the late 60 s Expressed by delays and failures of major software projects (unreached goals, unpredictable
More informationA methodology for requirements analysis at CIM level
A methodology for requirements analysis at CIM level Iman Poernomo 1, George Tsaramirsis 2, Venera Zuna 3 1 King s College London, UK, iman.poernomo@kcl.ac.uk 2 Accenture, UK DC, UK, georgios.tsaramirsis@accenture.com
More informationA RFBSE model for capturing engineers useful knowledge and experience during the design process
A RFBSE model for capturing engineers useful knowledge and experience during the design process Hao Qin a, Hongwei Wang a*, Aylmer Johnson b a. School of Engineering, University of Portsmouth, Anglesea
More information1. Introduction. URDAD for System Design. Table of Contents. Dr. Fritz Solms. Abstract. Use-Case Responsibility Driven Analysis and Design
Solms Training, Consulting and Development Physical: 113 Barry Hertzog Ave, Emmarentia, Johannesburg, South Africa Postal: PostNet Suite no 237, Private Bax X9, Melville 2109, South Africa Phone: +27 (11)
More informationAssessing Pragmatic Interoperability of Information Systems from a Semiotic Perspective
Assessing Pragmatic Interoperability of Information Systems from a Semiotic Perspective Shixiong Liu 1, Weizi Li 1, and Kecheng Liu 1,2 1 Informatics Research Centre, University of Reading, UK 2 School
More informationBook Outline. Software Testing and Analysis: Process, Principles, and Techniques
Book Outline Software Testing and Analysis: Process, Principles, and Techniques Mauro PezzèandMichalYoung Working Outline as of March 2000 Software test and analysis are essential techniques for producing
More informationTIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION
Job Classification Manual Page 1 of 49 TIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION 1. This grade level standard illustrates the application of the ICSC Master Standard (Tier
More informationFunctional Hazard Assessment in Product-Lines A Model-Based Approach
Functional Hazard Assessment in Product-Lines A Model-Based Approach Ibrahim Habli, Tim Kelly, Richard Paige Department of Computer Science, University of York, York, United Kingdom {Ibrahim.Habli, Tim.Kelly,
More informationOrganising Requirements
Requirements Organisation, Analysis and Evolution Software Requirements and Design CITS 4401 Lecture 20 CITS4401 Software Requirements and Design 2 Viewpoints Organising Requirements Interactor viewpoints:
More informationChapter 3 Prescriptive Process Models
Chapter 3 Prescriptive Process Models - Generic process framework (revisited) - Traditional process models - Specialized process models - The unified process Generic Process Framework Communication Involves
More informationSoftware Safety Assurance What Is Sufficient?
Software Safety Assurance What Is Sufficient? R.D. Hawkins, T.P. Kelly Department of Computer Science, The University of York, York, YO10 5DD UK Keywords: Software, Assurance, Arguments, Patterns. Abstract
More informationENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER
ENGINEERS AUSTRALIA ACCREDITATION BOARD ACCREDITATION MANAGEMENT SYSTEM EDUCATION PROGRAMS AT THE LEVEL OF PROFESSIONAL ENGINEER Document No. Title P05PE Australian Engineering Stage 1 Competency Standards
More informationA MEASUR and RUP Combined Business Modeling Method
1086 JOURNAL OF COMPUTERS, VOL. 6, NO. 6, JUNE 2011 A MEASUR and RUP Combined Business Modeling Method Hui Du Beijing Philosophy and Social Science Research Center for Beijing Transportation Development,
More informationA Dialogue Act Modelling Approach to Web-Based System Modelling
A Dialogue Act Modelling Approach to Web-Based System Modelling Ying Liang School of Computing, University of the West of Scotland, Paisley PA1 2BE, U.K. Email: Ying. Liang@uws.ac.uk Abstract Modelling
More informationProposed Framework of Interpretation and Considerations concerning ICANN s Human Rights Bylaw
Proposed Framework of Interpretation and Considerations concerning ICANN s Human Rights Bylaw April 4, 2017 Prelude: With ICANN s most recent bylaw change a Human Rights Core Value 1 was added to ICANN
More informationCHAPTER 2. Conceptual Framework for Financial Reporting 9, 10, 11, 30 6, Basic assumptions. 12, 13, 14 5, 7, 10 6, 7
CHAPTER 2 Conceptual Framework for Financial Reporting ASSIGNMENT CLASSIFICATION TABLE (BY TOPIC) Topics Questions Brief Exercises Exercises Concepts for Analysis 1. Conceptual framework general. 2. Objectives
More informationLecture 1. In practice, most large systems are developed using a. A software process model is an abstract representation
Chapter 2 Software Processes Lecture 1 Software process descriptions When we describe and discuss processes, we usually talk about the activities in these processes such as specifying a data model, designing
More informationAnalysing client requirements
Analysing client requirements Before you can start to analyse the information you have gathered you should think about what you are trying to achieve . The client has presented you with a business problem.
More informationINTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) ATTRIBUTE STANDARDS 1000 Purpose, Authority and Responsibility The purpose, authority, and responsibility of the internal
More informationWorkflow Model Representation Concepts
Workflow Model Representation Concepts József Tick Institute for Software Engineering, John von Neumann Faculty, Budapest Tech tick@bmf.hu Abstract: Workflow management and the possibilities of workflow
More informationHOPS RESPONSE TO THE FINANCIAL MEMORANDUM 1
THE PLANNING (SCOTLAND) BILL - FINANCIAL MEMORANDUM RESPONSE TO THE FINANCE AND CONSTITUTION COMMITTEE (FACC) Introduction- Heads of Planning Scotland (HOPS), which is the representative organisation for
More informationUniversity Process Innovation Framework for Process Analysis
University Process Innovation Framework for Process Analysis University Process Innovation Updated September 2016 Executive Summary Processes are the means by which work gets done and how value is delivered.
More informationModeling the responsibility relationship in the REA Business Ontology using Petri Nets
Modeling the responsibility relationship in the REA Business Ontology using Petri Nets Hans Weigand 1, Paul Johannesson 2, Birger Andersson 2 1 University of Tilburg, P.O.Box 90153, 5000 LE Tilburg, The
More informationKnowledge in Planning Scheduling and Control. Abstract
Knowledge in Planning Scheduling and Control. Track: Operations Planning, Scheduling and Control. Jane Guinery, Dr Sarah Crawford, Dr Bart MacCarthy Management and Human Factors Group, University of Nottingham
More informationMethodology for the Design and Evaluation of Ontologies. Michael Gruninger and Mark S. Fox. University oftoronto. f gruninger, msf
Methodology for the Design and Evaluation of Ontologies Michael Gruninger and Mark S. Fox Department of Industrial Engineering University oftoronto Toronto, Canada M5S 1A4 f gruninger, msf g@ie.utoronto.ca
More informationBusiness Process Improvements Using SSM and UML Activity Diagram
Business Process Improvements Using SSM and UML Activity Diagram Abdelrahman Elsharif Karrar 1, Amar Ibrahim Mohammed Abdalla 2, Mudawi Mukhtar Elmusharaf 3 1 (College of Computer Science and Engineering/
More informationGLASGOW CALEDONIAN UNIVERSITY. Programme Specification Pro-forma (PSP) 1. GENERAL INFORMATION
GLASGOW CALEDONIAN UNIVERSITY Programme Specification Pro-forma (PSP) 1. GENERAL INFORMATION 1. Programme Title: BA/BA (Hons) Accountancy BA/BA (Hons) Accountancy (GCU Pathways) Chartered Institute of
More informationWhy Machine Learning for Enterprise IT Operations
Why Machine Learning for Enterprise IT Operations Judith Hurwitz President and CEO Daniel Kirsch Principal Analyst and Vice President Sponsored by CA Introduction The world of computing is changing before
More informationRESOLVING APPLICATION DEVELOPMENT ISSUES USING SOA Y. KIRAN KUMAR 1, G.SUJATHA 2, G. JAGADEESH KUMAR 3
RESOLVING APPLICATION DEVELOPMENT ISSUES USING SOA Y. KIRAN KUMAR 1, G.SUJATHA 2, G. JAGADEESH KUMAR 3 1 Asst Professor, Dept of MCA, SVEC, A. Rangampet. ykkumar83@gmail.com, sujatha229@gmail.com,com 148
More informationSTRATEGIC PROGRAMME IMPACT FRAMEWORK
IPEC Guidelines STRATEGIC PROGRAMME IMPACT FRAMEWORK First Version May 2002 Prepared by the Design, Evaluation & Documentation (DED) Section of IPEC Strategic Programme Impact Framework SPIF GUIDELINES
More informationLegislating for Brexit the UK Government s EU Withdrawal Bill
Brexit Law your business, the EU and the way ahead Legislating for Brexit the UK Government s EU Withdrawal Bill July 2017 Introduction The Great Repeal Bill, the UK Government s draft legislation to implement
More informationPrescription of qualifications. ARB Criteria at Parts 1, 2 and 3
Prescription of qualifications ARB Criteria at Parts 1, 2 and 3 Approved: January 2010 Effective From: 2011/2012 Introduction Under the Architects Act 1997, the Architects Registration Board (ARB) has
More informationKnowledge-Level Integration for JaCaMo
Knowledge-Level Integration for JaCaMo Artur Freitas, Daniela Schmidt, Alison Panisson Rafael H. Bordini, Felipe Meneguzzi and Renata Vieira Pontifical Catholic University of Rio Grande do Sul - PUCRS
More informationDigital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016
Digital Industries Apprenticeship: Occupational Brief Software Development Technician September 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 3 Software Development Technician Apprenticeship
More informationObjectives. The software process. Topics covered. Waterfall model. Generic software process models. Software Processes
Objectives Software Processes To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software
More informationDigital Industries Apprenticeship: Occupational Brief. Software Development Technician. September 2016
Digital Industries Apprenticeship: Occupational Brief Software Development Technician September 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 3 Software Development Technician Apprenticeship
More informationThe Enterprise Systems Engineering Center Requirements Management Guide - Analysis
The Enterprise Systems Engineering Center Requirements Management Guide - The Enterprise Requirements Management Guide - Introduction Innumerable studies have concluded that requirements problems are the
More informationACFID Code of Conduct PMEL Guidance Note. Prepared for ACFID by Learning4Development
ACFID Code of Conduct PMEL Guidance Note Prepared for ACFID by Learning4Development September 2017 1 CONTENTS: 1. Introduction 2. What is PMEL? 3. Approaches to PMEL 3.1 At a strategic or policy level
More information7. Model based software architecture
UNIT - III Model based software architectures: A Management perspective and technical perspective. Work Flows of the process: Software process workflows, Iteration workflows. Check Points of The process
More informationRequirements Organisation, Analysis. Software Requirements & Project Management CITS3220
Requirements Organisation, Analysis and Negotiation Software Requirements & Project Management CITS3220 Organising Requirements Viewpoints Interactor viewpoints: people or other systems that interact
More informationInternational Journal of Computing and Business Research (IJCBR) ISSN (Online) :
International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 Volume 3 Issue 2 May 2012 LATEST PROGRAMMING LANGUAGE TOOLS FOR BUSINESS PROCESS MODELLING Dr. Ram Shukla, Faculty
More informationType-based Validation and Management of Business Service Interoperability
Type-based Validation and Management of Business Service Interoperability Toni Ruokolainen Dept. of Computer Science P.O. Box 68 (Gustaf Hällströmin katu 2b) FI-00014 UNIVERSITY OF HELSINKI, FINLAND Toni.Ruokolainen@cs.Helsinki.FI
More informationService Oriented Architecture. Reference MIDDLEWARE & ENTERPRISE INTEGRATION TECHNOLOGIES By
Service Oriented Architecture Reference MIDDLEWARE & ENTERPRISE INTEGRATION TECHNOLOGIES By G. SUDHA SADASIVAM, RADHA SHANKARMANI 1 COMPILED BY BJ What is Service-Oriented Architecture? Service-Oriented
More informationA Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 Skillport
A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 by The International Institute of Business Analysis (IIBA) International Institute of Business Analysis. (c) 2009. Copying
More informationBPMN Guide Quick Start. by Bizagi BPM
BPMN Guide Quick Start by Bizagi BPM Recruitment and Selection 1 Table of Contents Scope... 2 BPMN 2.0 Business Process Modeling Notation... 2 Why Is It Important To Model With BPMN?... 2 Introduction
More informationHAZARD ANALYSIS AND CRITICAL CONTROL POINTS FOR WATER SUPPLIES. Kevin Hellier. Melbourne Water Corporation
HAZARD ANALYSIS AND CRITICAL CONTROL POINTS FOR WATER SUPPLIES Paper Presented by : Kevin Hellier Authors: Kevin Hellier, Water Quality Engineer Melbourne Water Corporation 63 rd Annual Water Industry
More informationAnalysis of Agile and Multi-Agent Based Process Scheduling Model
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 4, Issue 8 (August 2015), PP.23-31 Analysis of Agile and Multi-Agent Based Process Scheduling
More informationEvaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland
Evaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland Guide 20.05.2014 Inhalt 1! General provisions... 1! 1.1! Goal and object of an evaluation... 1! 1.2! EUR-ACE
More informationInternational Standards for the Professional Practice of Internal Auditing (Standards)
Attribute Standards 1000 Purpose, Authority, and Responsibility The purpose, authority, and responsibility of the internal audit activity must be formally defined in an internal audit charter, consistent
More informationAN OBJECT ORIENTED APPROACH TO BUSINESS MODELING IN INFORMATION SYSTEMS DEVELOPMENT *
AN OBJECT ORIENTED APPROACH TO BUSINESS MODELING IN INFORMATION SYSTEMS DEVELOPMENT Jonás Arturo Montilva C. Universidad de Los Andes Facultad de Ingeniería Escuela de Ingeniería de Sistemas Departamento
More informationOntologies and the Dynamics of Organisational Environments: An Example of a Group Memory System for the Management of Group Competencies
Proceedings of I-KNOW 03 Graz, Austria, July 2-4, 2003 Ontologies and the Dynamics of Organisational Environments: An Example of a Group Memory System for the Management of Group Competencies José Braga
More informationC2 Decision Making and Cognitive Analysis. Modelling Operational Level Planning Processes with Coloured Petri Nets
Submission to the 7 th International Command and Control Research and Technology Symposium Topic C2 Decision Making and Cognitive Analysis Title Modelling Operational Level Planning Processes with Coloured
More information11 September Dear Conveners.,
Cabinet Secretary for Government Business and Constitutional Relations Michael Russell MSP T: 0300 244 4000 E: scottish.ministers@gov.scot Bruce Crawford MSP, Convener, Finance and Constitution Committee
More informationWNR Approach: An Extension to Requirements Engineering Lifecycle
WNR Approach: An Extension to Requirements Engineering Lifecycle Ahmad Abdollahzadeh Barforoush, Abbas Rasoolzadegan, Reza Gorgan Mohammadi Information Technology and Computer Engineering Faculty Amirkabir
More informationImproving Requirements Specifications in Model-Driven Development Processes
Improving Requirements Specifications in Model-Driven Development Processes Jordi Cabot and Eric Yu Department of Computer Science, University of Toronto {jcabot,eric}@cs.toronto.edu Abstract: Understanding
More informationISO INTERNATIONAL STANDARD. Risk management Principles and guidelines. Management du risque Principes et lignes directrices
INTERNATIONAL STANDARD ISO 31000 First edition 2009-11-15 Risk management Principles and guidelines Management du risque Principes et lignes directrices http://mahdi.hashemitabar.com Reference number ISO
More informationAn Ethical Reading of the UK Modern Slavery Act and its Implications for Firms
Saïd Business School Research Papers February 2016 An Ethical Reading of the UK Modern Slavery Act and its Implications for Firms Laurence Cranmer Saïd Business School, University of Oxford Saïd Business
More informationAdvisory Circular. Date: DRAFT Initiated by: AIR-110
U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: DETERMINING THE CLASSIFICATION OF A CHANGE TO TYPE DESIGN. Date: DRAFT Initiated by: AIR-110 AC No: 21.93-1
More informationMapping Service-Orientation to TOGAF 9 Part IV: Applying Service-Orientation to TOGAF s Service Contracts
Mapping Service-Orientation to TOGAF 9 Part IV: Applying Service-Orientation to TOGAF s Service Contracts by Filippos Santas, Credit Suisse Private Banking in Switzerland In this series of articles we
More informationDigital Collaboration in Sweden. Presentation at meeting between ISA and Sweden Brussels, October 22, 2014
Digital Collaboration in Sweden Presentation at meeting between ISA and Sweden Brussels, October 22, 2014 1 Proposed Agenda Introduction The Swedish situation after the parliament election Swedish situation
More informationNAU MT2050i Week 4 Quiz
Class: Date: NAU MT2050i Week 4 Quiz Short Answer 1. A(n) is a choice made from available alternatives. 2. is the process of identifying problems and opportunities and then resolving them. 3. decisions
More informationVirtual Prototyping for Engineering Design
Virtual Prototyping for Engineering Design Walid Tizani University of Nottingham England walid.tizani@ nottingham.ac.uk Robert A Smith University of Nottingham England robert.smith@ nottingham.ac.uk Darshan
More informationSuccess Factors in ERP Systems Implementations. Result of Research on the Polish ERP Market
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004. Result of Research on the Polish ERP Market Piotr
More informationSoftware Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1
Software Processes Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Objectives To introduce software process models To describe three generic process models and when they may be
More information12. A Sustainable Murray Darling Basin: The legal challenges
12. A Sustainable Murray Darling Basin: The legal challenges Douglas Fisher Introduction The range of legal instruments informing how the Murray Darling Basin (MDB) is managed is extensive. Some provide
More informationSocio-technical Organisation
Socio-technical Organisation Virginia Dignum 1 (Agent) Socio-technical Organizations Develop theory and tools for engineering complex multi-actor systems, integrating artificial and human partners, based
More informationIFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004
INTERNATIONAL FEDERATION OF ACCOUNTANTS 545 Fifth Avenue, 14th Floor Tel: +1 (212) 286-9344 New York, New York 10017 Fax: +1 (212) 856-9420 Internet: http://www.ifac.org Agenda Item 8-C First Issued July
More informationManual for writing a Strategic Programme Plan (SPP)
Manual for writing a Strategic Programme Plan (SPP) Introduction Partner organisations that seek financial support for their multi-annual programmes from Red een Kind (ReK) or Woord en Daad (WD) are requested
More informationHuman Resource Management
Synopsis Human Resource Management 1. The Origins and Nature of Human Resource Management understand what is meant by human resource management (HRM); describe the main factors which led to the emergence
More informationtit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation
tit Inland Revenue Te Tan i Taake Inland Revenue report: Update on Inland Revenue's approach to business and systems transformation Date: 6 April 2011 Priority: Low Security level: In Confidence Report
More informationVersion 1.0. The Contract Management Standard Final Edition. Version 1.0
The Management Standard Final Edition 1 Purpose of the Management Standard The purpose of the Management Standard is to describe the nature of contract management in terms of the contract management processes
More informationIntroduction to Software Engineering
Introduction to Software Engineering 2. Requirements Collection Mircea F. Lungu Based on a lecture by Oscar Nierstrasz. Roadmap > The Requirements Engineering Process > Functional and non-functional requirements
More informationThe software process
Software Processes The software process A structured set of activities required to develop a software system Specification; Design; Validation; Evolution. A software process model is an abstract representation
More informationFuture Trends in State Courts 2011
Future Trends in State Courts 2011 NCSC ISBN: 0-89656-279-4 Future Trends in State Courts 2011 Special Focus on Access to Justice Principles of Judicial Administration: The Lens of Change Daniel J. Hall
More informationA Simulation Platform for Multiagent Systems in Logistics
A Simulation Platform for Multiagent Systems in Logistics Heinz Ulrich, Swiss Federal Institute of Technology, Zürich Summary: The challenges in today s global economy are flexibility and fast reactions
More informationService Oriented Architecture
Service Oriented Architecture Part I INTRODUCING SOA Service Oriented Architecture- Presented by Hassan.Tanabi@Gmail.com 2 Fundamental SOA 1. The term "service-oriented" has existed for some time, it has
More informationCLASS/YEAR: II MCA SUB.CODE&NAME: MC7303, SOFTWARE ENGINEERING. 1. Define Software Engineering. Software Engineering: 2. What is a process Framework? Process Framework: UNIT-I 2MARKS QUESTIONS AND ANSWERS
More informationUnstructured Nature of Important Decisions. Understanding the Business Value of Systems and Managing Change. Diversity of Managerial Roles
Unstructured Nature of Important Decisions Understanding the Business Value of Systems and Managing Change Many important decisions, especially in the areas of strategic planning and knowledge are not
More informationISO/IEC JTC 1 N 10998
ISO/IEC JTC 1 N 10998 ISO/IEC JTC 1 Information technology Secretariat: ANSI (USA) Document type: Title: Status: Text for PDTR ballot or comment Text of 2nd PDTR 38502, Governance of IT - Framework and
More informationRequirement Engineering. L3 The requirement study. Change is constant. Communication problem? People are hard to understand!
Requirement Engineering L3 The requirement study Fang Chen Requirement are ubiquitous part of our lives Understand the requirement through communication Requirement Creation Communication problem? People
More informationExtended Enterprise Architecture ViewPoints Support Guide
Extended Enterprise Architecture ViewPoints Support Guide Editorial Writer: J. Schekkerman Version 1.8 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve
More informationCHAPTER 2 LITERATURE SURVEY
10 CHAPTER 2 LITERATURE SURVEY This chapter provides the related work that has been done about the software performance requirements which includes the sub sections like requirements engineering, functional
More informationCOPYRIGHTED MATERIAL PROCESS IMPROVEMENT DEVELOPMENTS IN PROCESS MANAGEMENT
PROCESS IMPROVEMENT DEVELOPMENTS IN PROCESS MANAGEMENT CHAPTER 1 Businesses, whether commercial or not - for - profit organizations, inevitably have a wish to remain in operation; to have sustainable and
More informationVersion 1.0. The Contract Management Standard Final Edition. Version 1.0
The Management Standard Final Edition 1 Purpose of the Management Standard The purpose of the Management Standard is to describe the nature of contract management in terms of the contract management processes
More informationGuidance on project management
BSI Standards Publication NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW raising standards worldwide Guidance on project management BRITISH STANDARD National foreword This British
More informationThe Systems and Software Product Line Engineering Lifecycle Framework
Revised January 27, 2013 Contact Information: info@biglever.com www.biglever.com 512-426-2227 The Systems and Software Product Line Engineering Lifecycle Framework Report ##200805071r4 Mainstream forces
More informationCAPTURING INFORMATION SYSTEM S REQUIREMENT USING BUSINESS PROCESS SIMULATION
CAPTURING INFORMATION SYSTEM S REQUIREMENT USING BUSINESS PROCESS SIMULATION Alan Serrano Department of Information Systems and Computing Brunel University Uxbridge Middlesex UB8 3PH, London, UK KEYWORDS
More informationInternational Standards for the Professional Practice of Internal Auditing (Standards)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Attribute Standards 1000 Purpose, Authority, and Responsibility The purpose, authority, and responsibility of the
More informationWhite Paper. Transforming Contact Centres using Simulation-based Scenario Modelling
White Paper Transforming Contact Centres using Simulation-based Scenario Modelling Meet Your KPI s, Deliver Consistently High Service and Reduce Customer Churn to Increase Your Bottom Line Results PM@SIMUL8.com
More information