183 resultados para constructive alignment


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The article is concerned with the formal definition of a largely unnoticed factor in narrative structure. Based on the assumptions that (1) the semantics of a written text depend, among other factors, directly on its visual alignment in space, that (2) the formal structure of a text has to meet that of its spatial presentation and that (3) these assumptions hold true also for narrative texts (which, however, in modern times typically conceal their spatial dimensions by a low-key linear layout), it is argued that, how ever low-key, the expected material shape of a given narrative determines the configuration of its plot by its author. The ,implied book' thus denotes an author's historically assumable, not necessarily conscious idea of how his text, which is still in the process of creation, will be dimensionally presented and under these circumstances visually absorbed. Assuming that an author's knowledge of this later (potentially) substantiated material form influences the composition, the implied book is to be understood as a text-genetically determined, structuring moment of the text. Historically reconstructed, it thus serves the methodical analysis of structural characteristics of a completed text.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Metacaspases are cysteine peptidases that could play a role similar to caspases in the cell death programme of plants, fungi and protozoa. The human protozoan parasite Leishmania major expresses a single metacaspase (LmjMCA) harbouring a central domain with the catalytic dyad histidine and cysteine as found in caspases. In this study, we investigated the processing sites important for the maturation of LmjMCA catalytic domain, the cellular localization of LmjMCA polypeptides, and the functional role of the catalytic domain in the cell death pathway of Leishmania parasites. Although LmjMCA polypeptide precursor form harbours a functional mitochondrial localization signal (MLS), we determined that LmjMCA polypeptides are mainly localized in the cytoplasm. In stress conditions, LmjMCA precursor forms were extensively processed into soluble forms containing the catalytic domain. This domain was sufficient to enhance sensitivity of parasites to hydrogen peroxide by impairing the mitochondrion. These data provide experimental evidences of the importance of LmjMCA processing into an active catalytic domain and of its role in disrupting mitochondria, which could be relevant in the design of new drugs to fight leishmaniasis and likely other protozoan parasitic diseases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The anaerobic transcriptional regulator ANR induces the arginine deiminase and denitrification pathways in Pseudomonas aeruginosa during oxygen limitation. The homologous activator FNR of Escherichia coli, when introduced into an anr mutant of P. aeruginosa, could functionally replace ANR for anaerobic growth on nitrate but not for anaerobic induction of arginine deiminase. In an FNR-positive E. coli strain, the ANR-dependent promoter of the arcDABC operon, which encodes the enzymes of the arginine deiminase pathway, was not expressed. To analyse systematically these distinct induction patterns, a lacZ promoter-probe, broad-host-range plasmid containing various -40 regions (the ANR/FNR recognition sequences) and -10 promoter sequences was constructed. These constructs were tested in P. aeruginosa and in E. coli expressing either ANR or FNR. In conjunction with the consensus -10 hexamer of E. coli sigma 70 RNA polymerase (TATAAT), the consensus FNR site (TTGAT ..... ATCAA) was recognized efficiently by ANR and FNR in both hosts. By contrast, when promoters contained the Arc box (TTGAC .... ATCAG), which is found in the arcDABC promoter, or a symmetrical mutant FNR site (CTGAT .... ATCAG), ANR was a more effective activator than was FNR. Conversely, an extended 22 bp, fully symmetrical FNR site allowed better activation with FNR than with ANR. Combination of the arc promoter -10 sequence (CCTAAT) with the Arc box or the consensus FNR site resulted in good ANR-dependent expression in P. aeruginosa but gave practically no expression in E. coli, suggesting that RNA polymerase of P. aeruginosa differs from the E. coli enzyme in -10 recognition specificity. In conclusion, ANR and FNR are able to activate the RNA polymerases of P. aeruginosa and E. coli when the -40 and -10 promoter elements ae identical or close to the E. coli consensus sequences.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nonstructural protein 4B (NS4B) is a key organizer of hepatitis C virus (HCV) replication complex formation. In concert with other nonstructural proteins, it induces a specific membrane rearrangement, designated as membranous web, which serves as a scaffold for the HCV replicase. The N-terminal part of NS4B comprises a predicted and a structurally resolved amphipathic α-helix, designated as AH1 and AH2, respectively. Here, we report a detailed structure-function analysis of NS4B AH1. Circular dichroism and nuclear magnetic resonance structural analyses revealed that AH1 folds into an amphipathic α-helix extending from NS4B amino acid 4 to 32, with positively charged residues flanking the helix. These residues are conserved among hepaciviruses. Mutagenesis and selection of pseudorevertants revealed an important role of these residues in RNA replication by affecting the biogenesis of double-membrane vesicles making up the membranous web. Moreover, alanine substitution of conserved acidic residues on the hydrophilic side of the helix reduced infectivity without significantly affecting RNA replication, indicating that AH1 is also involved in virus production. Selective membrane permeabilization and immunofluorescence microscopy analyses of a functional replicon harboring an epitope tag between NS4B AH1 and AH2 revealed a dual membrane topology of the N-terminal part of NS4B during HCV RNA replication. Luminal translocation was unaffected by the mutations introduced into AH1, but was abrogated by mutations introduced into AH2. In conclusion, our study reports the three-dimensional structure of AH1 from HCV NS4B, and highlights the importance of positively charged amino acid residues flanking this amphipathic α-helix in membranous web formation and RNA replication. In addition, we demonstrate that AH1 possesses a dual role in RNA replication and virus production, potentially governed by different topologies of the N-terminal part of NS4B.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The bacterial siderophore pyochelin is composed of salicylate and two cysteine-derived heterocycles, the second of which is modified by reduction and N-methylation during biosynthesis. In Pseudomonas aeruginosa, the first cysteine residue is converted to its D-isoform during thiazoline ring formation, whereas the second cysteine remains in its L-configuration. Stereochemistry is opposite in the Pseudomonas fluorescens siderophore enantio-pyochelin, in which the first ring originates from L-cysteine and the second ring from D-cysteine. Both siderophores promote growth of the producer organism during iron limitation and induce the expression of their biosynthesis genes by activating the transcriptional AraC-type regulator PchR. However, neither siderophore is functional as an iron carrier or as a transcriptional inducer in the other species, demonstrating that both processes are highly stereospecific. Stereospecificity of pyochelin/enantio-pyochelin-mediated iron uptake is ensured at two levels: (i) by the outer membrane siderophore receptors and (ii) by the cytosolic PchR regulators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe the odorant binding proteins (OBPs) of the red imported fire ant, Solenopsis invicta, obtained from analyses of an EST library and separate 454 sequencing runs of two normalized cDNA libraries. We identified a total of 18 putative functional OBPs in this ant. A third of the fire ant OBPs are orthologs to honey bee OBPs. Another third of the OBPs belong to a lineage-specific expansion, which is a common feature of insect OBP evolution. Like other OBPs, the different fire ant OBPs share little sequence similarity (∼ 20%), rendering evolutionary analyses difficult. We discuss the resulting problems with sequence alignment, phylogenetic analysis, and tests of selection. As previously suggested, our results underscore the importance for careful exploration of the sensitivity to the effects of alignment methods for data comprising widely divergent sequences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Embryonic development in nonmammalian vertebrates depends entirely on nutritional reserves that are predominantly derived from vitellogenin proteins and stored in egg yolk. Mammals have evolved new resources, such as lactation and placentation, to nourish their developing and early offspring. However, the evolutionary timing and molecular events associated with this major phenotypic transition are not known. By means of sensitive comparative genomics analyses and evolutionary simulations, we here show that the three ancestral vitellogenin-encoding genes were progressively lost during mammalian evolution (until around 30-70 million years ago, Mya) in all but the egg-laying monotremes, which have retained a functional vitellogenin gene. Our analyses also provide evidence that the major milk resource genes, caseins, which have similar functional properties as vitellogenins, appeared in the common mammalian ancestor approximately 200-310 Mya. Together, our data are compatible with the hypothesis that the emergence of lactation in the common mammalian ancestor and the development of placentation in eutherian and marsupial mammals allowed for the gradual loss of yolk-dependent nourishment during mammalian evolution

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A variety of cellular proteins has the ability to recognize DNA lesions induced by the anti-cancer drug cisplatin, with diverse consequences on their repair and on the therapeutic effectiveness of this drug. We report a novel gene involved in the cell response to cisplatin in vertebrates. The RDM1 gene (for RAD52 Motif 1) was identified while searching databases for sequences showing similarities to RAD52, a protein involved in homologous recombination and DNA double-strand break repair. Ablation of RDM1 in the chicken B cell line DT40 led to a more than 3-fold increase in sensitivity to cisplatin. However, RDM1-/- cells were not hypersensitive to DNA damages caused by ionizing radiation, UV irradiation, or the alkylating agent methylmethane sulfonate. The RDM1 protein displays a nucleic acid binding domain of the RNA recognition motif (RRM) type. By using gel-shift assays and electron microscopy, we show that purified, recombinant chicken RDM1 protein interacts with single-stranded DNA as well as double-stranded DNA, on which it assembles filament-like structures. Notably, RDM1 recognizes DNA distortions induced by cisplatin-DNA adducts in vitro. Finally, human RDM1 transcripts are abundant in the testis, suggesting a possible role during spermatogenesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Simple reaction times (RTs) to auditory-somatosensory (AS) multisensory stimuli are facilitated over their unisensory counterparts both when stimuli are delivered to the same location and when separated. In two experiments we addressed the possibility that top-down and/or task-related influences can dynamically impact the spatial representations mediating these effects and the extent to which multisensory facilitation will be observed. Participants performed a simple detection task in response to auditory, somatosensory, or simultaneous AS stimuli that in turn were either spatially aligned or misaligned by lateralizing the stimuli. Additionally, we also informed the participants that they would be retrogradely queried (one-third of trials) regarding the side where a given stimulus in a given sensory modality was presented. In this way, we sought to have participants attending to all possible spatial locations and sensory modalities, while nonetheless having them perform a simple detection task. Experiment 1 provided no cues prior to stimulus delivery. Experiment 2 included spatially uninformative cues (50% of trials). In both experiments, multisensory conditions significantly facilitated detection RTs with no evidence for differences according to spatial alignment (though general benefits of cuing were observed in Experiment 2). Facilitated detection occurs even when attending to spatial information. Performance with probes, quantified using sensitivity (d'), was impaired following multisensory trials in general and significantly more so following misaligned multisensory trials. This indicates that spatial information is not available, despite being task-relevant. The collective results support a model wherein early AS interactions may result in a loss of spatial acuity for unisensory information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The death-inducing receptor Fas is activated when cross-linked by the type II membrane protein Fas ligand (FasL). When human soluble FasL (sFasL, containing the extracellular portion) was expressed in human embryo kidney 293 cells, the three N-linked glycans of each FasL monomer were found to be essential for efficient secretion. Based on the structure of the closely related lymphotoxin alpha-tumor necrosis factor receptor I complex, a molecular model of the FasL homotrimer bound to three Fas molecules was generated using knowledge-based protein modeling methods. Point mutations of amino acid residues predicted to affect the receptor-ligand interaction were introduced at three sites. The F275L mutant, mimicking the loss of function murine gld mutation, exhibited a high propensity for aggregation and was unable to bind to Fas. Mutants P206R, P206D, and P206F displayed reduced cytotoxicity toward Fas-positive cells with a concomitant decrease in the binding affinity for the recombinant Fas-immunoglobulin Fc fusion proteins. Although the cytotoxic activity of mutant Y218D was unaltered, mutant Y218R was inactive, correlating with the prediction that Tyr-218 of FasL interacts with a cluster of three basic amino acid side chains of Fas. Interestingly, mutant Y218F could induce apoptosis in murine, but not human cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The goal of this dissertation is to find and provide the basis for a managerial tool that allows a firm to easily express its business logic. The methodological basis for this work is design science, where the researcher builds an artifact to solve a specific problem. In this case the aim is to provide an ontology that makes it possible to explicit a firm's business model. In other words, the proposed artifact helps a firm to formally describe its value proposition, its customers, the relationship with them, the necessary intra- and inter-firm infrastructure and its profit model. Such an ontology is relevant because until now there is no model that expresses a company's global business logic from a pure business point of view. Previous models essentially take an organizational or process perspective or cover only parts of a firm's business logic. The four main pillars of the ontology, which are inspired by management science and enterprise- and processmodeling, are product, customer interface, infrastructure and finance. The ontology is validated by case studies, a panel of experts and managers. The dissertation also provides a software prototype to capture a company's business model in an information system. The last part of the thesis consists of a demonstration of the value of the ontology in business strategy and Information Systems (IS) alignment. Structure of this thesis: The dissertation is structured in nine parts: Chapter 1 presents the motivations of this research, the research methodology with which the goals shall be achieved and why this dissertation present a contribution to research. Chapter 2 investigates the origins, the term and the concept of business models. It defines what is meant by business models in this dissertation and how they are situated in the context of the firm. In addition this chapter outlines the possible uses of the business model concept. Chapter 3 gives an overview of the research done in the field of business models and enterprise ontologies. Chapter 4 introduces the major contribution of this dissertation: the business model ontology. In this part of the thesis the elements, attributes and relationships of the ontology are explained and described in detail. Chapter 5 presents a case study of the Montreux Jazz Festival which's business model was captured by applying the structure and concepts of the ontology. In fact, it gives an impression of how a business model description based on the ontology looks like. Chapter 6 shows an instantiation of the ontology into a prototype tool: the Business Model Modelling Language BM2L. This is an XML-based description language that allows to capture and describe the business model of a firm and has a large potential for further applications. Chapter 7 is about the evaluation of the business model ontology. The evaluation builds on literature review, a set of interviews with practitioners and case studies. Chapter 8 gives an outlook on possible future research and applications of the business model ontology. The main areas of interest are alignment of business and information technology IT/information systems IS and business model comparison. Finally, chapter 9 presents some conclusions.