879 resultados para Ontology enterprise
Resumo:
This paper argues that the problems commonly associated with the joint enterprise doctrine might be alleviated by supplementing the cognitive mens rea standard of foresight with a volitional element that looks to how the defendant related to the foreseen risk. A re-examination of the case law suggests that a mens rea conception of foresight plus endorsement might be within interpretative reach. The paper considers possible objections to such a development but ultimately rejects them. It concludes that it is not necessary to wait for Parliament to put in place reforms: joint enterprise is a creature of the common law, and the common law is able to tame it unaided.
Resumo:
This paper empirically tests the effectiveness of information and communications technology (ICT) knowledge transfer and adoption in the multinational enterprise (MNE) as an issue of critical importance to contemporary MNE functioning. In contrast to mainstream thinking on absorptive capacity, but in line with prevailing international business theory, our research supports the proposition that perceptions of procedural justice, rather than absorptive capacity, determine effectiveness, especially in cases of high tacit knowledge transfers. Data was collected from senior ICT representatives in 86 Canadian subsidiaries of foreign owned MNEs. Each of these subsidiaries recently experienced a significant ICT transfer imposed by the parent organization. Support was found for the main propositions: Procedural justice significantly predicted successful ICT transfer and adoption, while absorptive capacity was not significant. These findings are consistent even when knowledge tacitness was high. The perceived success of the ICT transfer as well as its adoption varied widely across these firms. The potential reasons for this divergence in effectiveness are manifold, but our findings suggest that in situations of substantial knowledge tacitness, a higher level of procedural justice, rather than a higher level of absorptive capacity, is critical to effective transfer and adoption.
Resumo:
This paper introduces a pragmatic and practical method for requirements modeling. The method is built using the concepts of our goal sketching technique together with techniques from an enterprise architecture modeling language. Our claim is that our method will help project managers who want to establish early control of their projects and will also give managers confidence in the scope of their project. In particular we propose the inclusion of assumptions as first class entities in the ArchiMate enterprise architecture modeling language and an extension of the ArchiMate Motivation Model principle to allow radical as well as normative analyses. We demonstrate the usefulness of this method using a simple university library system as an example.
Resumo:
This paper is about the use of natural language to communicate with computers. Most researches that have pursued this goal consider only requests expressed in English. A way to facilitate the use of several languages in natural language systems is by using an interlingua. An interlingua is an intermediary representation for natural language information that can be processed by machines. We propose to convert natural language requests into an interlingua [universal networking language (UNL)] and to execute these requests using software components. In order to achieve this goal, we propose OntoMap, an ontology-based architecture to perform the semantic mapping between UNL sentences and software components. OntoMap also performs component search and retrieval based on semantic information formalized in ontologies and rules.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Belief Revision deals with the problem of adding new information to a knowledge base in a consistent way. Ontology Debugging, on the other hand, aims to find the axioms in a terminological knowledge base which caused the base to become inconsistent. In this article, we propose a belief revision approach in order to find and repair inconsistencies in ontologies represented in some description logic (DL). As the usual belief revision operators cannot be directly applied to DLs, we propose new operators that can be used with more general logics and show that, in particular, they can be applied to the logics underlying OWL-DL and Lite.
Resumo:
Architectural description languages (ADLs) are used to specify high-level, compositional view of a software application. ADLs usually come equipped with a rigourous state-transition style semantics, facilitating specification and analysis of distributed and event-based systems. However, enterprise system architectures built upon newer middleware (implementations of Java’s EJB specification, or Microsoft’s COM+/ .NET) require additional expressive power from an ADL. The TrustME ADL is designed to meet this need. In this paper, we describe several aspects of TrustME that facilitate specification and anlysis of middleware-based architectures for the enterprise.
Resumo:
Semantic Analysis is a business analysis method designed to capture system requirements. While these requirements may be represented as text, the method also advocates the use of Ontology Charts to formally denote the system's required roles, relationships and forms of communication. Following model driven engineering techniques, Ontology Charts can be transformed to temporal Database schemas, class diagrams and component diagrams, which can then be used to produce software systems. A nice property of these transformations is that resulting system design models lend themselves to complicated extensions that do not require changes to the design models. For example, resulting databases can be extended with new types of data without the need to modify the database schema of the legacy system. Semantic Analysis is not widely used in software engineering, so there is a lack of experts in the field and no design patterns are available. This make it difficult for the analysts to pass organizational knowledge to the engineers. This study describes an implementation that is readily usable by engineers, which includes an automated technique that can produce a prototype from an Ontology Chart. The use of such tools should enable developers to make use of Semantic Analysis with minimal expertise of ontologies and MDA.
Resumo:
Este documento constitui uma dissertação de mestrado, requisito parcial para a obtenção do grau de Mestre em Administração pela Universidade Federal do Rio Grande do Sul. O tema da pesquisa é o relacionamento existente entre as características técnicas de um projeto de sistema de informação e apoio à decisão e os comportamentos dos usuários no seu uso. O objetivo é desenvolver e apresentar um modelo conceitual de EIS (“Enterprise Information Systems”), a partir da literatura, das tendências tecnológicas e de estudos de caso, que identifique características para comportamentos proativos dos usuários na recuperação de informações. Adotou-se o conceito de comportamento proativo na recuperação de informações como a combinação das categorias exploração de dados e busca focada. Entre os principais resultados, pode-se destacar a definição de categorias relacionadas com as características dos sistemas - flexibilidade, integração e apresentação - e de categorias relacionadas com os comportamentos dos usuários na recuperação de informações - exploração de dados e busca focada, bem como a apresentação de um modelo conceitual para sistemas EIS. Pode-se destacar também a exploração de novas técnicas para análise qualitativa de dados, realizada com o objetivo de buscar uma maior preservação do contexto nos estudos de caso.
Resumo:
A tecnologia de informação e, mais especificamente, os Enterprise Systems (ESs), têm recebido enorme atenção e investimentos maciços nas organizações. Por se tratar de uma tecnologia relativamente nova, os estudos sobre ESs não têm claro os seus impactos na transformação organizacional em termos das pessoas e cultura numa perspectiva sociotécnica, estruturalista e humanista. Por meio de um estudo qualitativo fruto de bricolagem com vários ambientes de análise, características de sujeitos e com a ferramenta de análise do conteúdo do discurso, puderam-se confirmar as hipóteses sobre os impactos dos ESs quanto à melhoria nas relações pessoa/pessoa, pessoa/alta gerência e pessoa/trabalho, base do levantamento "Um Excelente Lugar para se Trabalhar", bem como, impactos em outras variáveis analisadas. O estudo estendeu-se um pouco mais e verificou as habilidades dos implantadores dos sistemas e desenvolvedores dos softwares, as características das empresas com relação à fase de maturidade evolutiva e os objetivos pouco claros de implantação dos ESs como fatores dificultadores de implantação, resultando em sub-utilização e resistência e perda de recursos. O trabalho realiza também uma ampla pesquisa bibliográfica que evidencia que ainda não há um grau médio de clareza sobre as reais características do fenômeno "implantação de ES", suas justificativas, problemas, objetivos, fatores determinantes de sucesso, etc.