Conceptual Modeling of Electronic Content and Documents in ECM Systems Design: Results from a Modeling Project at Hoval

Author(s):  
Alexander Simons ◽  
Jan vom Brocke ◽  
Stefan Fleischer ◽  
Jörg Becker
2008 ◽  
pp. 679-692
Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernandez-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data. Therefore, a final DW solution should consider the final users that can have access to certain specific information. Unfortunately, methodologies that incorporate security are based on an operational environment and not on an analytical one. Therefore, they do not include security into the multidimensional approaches to work with DWs. In this chapter, we present a comparison of six secure-systems design methodologies. Next, an extension of the UML that allows us to specify main security aspects in the multidimensional conceptual modeling is proposed, thereby allowing us to design secure DWs. Finally, we present how the conceptual model can be implemented with Oracle Label Security (OLS10g).


2008 ◽  
pp. 1048-1061
Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernandez-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data. Therefore, a final DW solution should consider the final users that can have access to certain specific information. Unfortunately, methodologies that incorporate security are based on an operational environment and not on an analytical one. Therefore, they do not include security into the multidimensional approaches to work with DWs. In this chapter, we present a comparison of six secure-systems design methodologies. Next, an extension of the UML that allows us to specify main security aspects in the multidimensional conceptual modeling is proposed, thereby allowing us to design secure DWs. Finally, we present how the conceptual model can be implemented with Oracle Label Security (OLS10g).


Author(s):  
Vladimir L. Uskov ◽  
Jeffrey P. Bakken ◽  
Srinivas Karri ◽  
Alexander V. Uskov ◽  
Colleen Heinemann ◽  
...  

2018 ◽  
Vol 33 (2) ◽  
pp. 105-123 ◽  
Author(s):  
Owen Eriksson ◽  
Paul Johannesson ◽  
Maria Bergholtz

Conceptual models are intended to capture knowledge about the world. Hence, the design of conceptual models could be informed by theories about what entities exist in the world and how they are constituted. Further, a common assumption within the field of conceptual modeling is that conceptual models and information systems describe entities in the real world, outside the systems. An alternative view is provided by an ontological commitment that recognizes that the institutional world is constructed through language use and the creation of institutional facts. Such an ontological commitment implies that there is an institutional reality, which, to a great extent, is constructed using information infrastructures. Accordingly, conceptual models have not only a descriptive role but also a prescriptive one, meaning that modelers set up a framework of rules that restrict and enable people to construct institutional reality using information infrastructures. Understanding the prescriptive role of conceptual models may revive the area of conceptual modeling in the information systems research community. Reviving conceptual modeling through institutional modeling is motivated by the effect that implemented conceptual models have on information infrastructures and institutions. The purpose of this article is to propose an institutional ontology that can support the design of information infrastructures. The ontology is theoretically informed by institutional theory and a communicative perspective on information systems design, as well as being empirically based on several case studies. It is illustrated using a case study in the welfare sector. A number of guidelines for modeling institutional reality are also proposed.


Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernández-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data. Therefore, a final DW solution should consider the final users that can have access to certain specific information. Unfortunately, methodologies that incorporate security are based on an operational environment and not on an analytical one. Therefore, they do not include security into the multidimensional approaches to work with DWs. In this chapter, we present a comparison of six secure-systems design methodologies. Next, an extension of the UML that allows us to specify main security aspects in the multidimensional conceptual modeling is proposed, thereby allowing us to design secure DWs. Finally, we present how the conceptual model can be implemented with Oracle Label Security (OLS10g).


Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernandez-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data. Therefore, a final DW solution should consider the final users that can have access to certain specific information. Unfortunately, methodologies that incorporate security are based on an operational environment and not on an analytical one. Therefore, they do not include security into the multidimensional approaches to work with DWs. In this chapter, we present a comparison of six secure-systems design methodologies. Next, an extension of the UML that allows us to specify main security aspects in the multidimensional conceptual modeling is proposed, thereby allowing us to design secure DWs. Finally, we present how the conceptual model can be implemented with Oracle Label Security (OLS10g).


2021 ◽  
Vol 248 ◽  
pp. 02005
Author(s):  
Andrey Gavrilov ◽  
Galina Volkova ◽  
Olga Novoselova

The article describes the tool for designing information-active systems - the integrated environment “IS-2”: the concept of the methodology automation of intellectual labor (MAIL), the method of modeling the visual integrated environment, its structure, and features of the software solution. The Methodology Automation of Intellectual Labor (MAIL) offers an industrial way to create information-active, intelligent, automated and other systems. Their design involves the formation of models at three stages - initial modeling, conceptual modeling, and infological modeling. To automate the design process according to MAIL, a visual integrated environment (VIS) that supports this process is being developed at MSUT “STANKIN”. A formal description of the structure of the models, the structure of creating models process, the method of modeling VIS has been completed. The features of the integrated environment “IS-2”, obtained in the process of its development such as the formation of a universal (library of universal components used in the development of modules) component and specialized, are described. The composition of the versions is described including graphical editors for forming constituent models and their linking, means of intermediate documentation of models in the form of diagrams and specifications, and prototypes of modules for supporting analytical processing and synthesis of models.


Author(s):  
Sherman Karp ◽  
Larry B. Stotts

2011 ◽  
Author(s):  
Karen Feigh ◽  
Zarrin Chua ◽  
Chaya Garg ◽  
Alan Jacobsen ◽  
John O'Hara ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document