A URI parsing technique and algorithm for anti-pattern detection in RESTful Web services

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Fuad Sameh Alshraiedeh ◽  
Norliza Katuk

Purpose Many REpresentational State Transfer (RESTful) Web services suffered from anti-patterns problem, which may diminish the sustainability of the services. The anti-patterns problem could happen in the code of the programme or the uniform resource identifiers (URIs) of RESTful Web services. This study aims to address the problem by proposing a technique and an algorithm for detecting anti-patterns in RESTful Web services. Specifically, the technique is designed based on URIs parsing process. Design/methodology/approach The study was conducted following the design science research process, which has six activities, namely, identifying problems, identifying solutions, design the solutions, demonstrate the solution, evaluation and communicate the solution. The proposed technique was embedded in an algorithm and evaluated in four phases covering the process of extracting the URIs, implementing the anti-pattern detection algorithm, detecting the anti-patterns and validating the results. Findings The results of the study suggested an acceptable level of accuracy for the anti-patterns detection with 82.30% of precision, 87.86% of recall and 84.93% of F-measure. Practical implications The technique and the algorithm can be used by developers of RESTful Web services to detect possible anti-pattern occurrences in the service-based systems. Originality/value The technique is personalised to detect amorphous URI and ambiguous name anti-patterns in which it scans the Web service URIs using specified rules and compares them with pre-determined syntax and corpus.

2020 ◽  
Vol 22 (3) ◽  
pp. 227-244
Author(s):  
João Serrado ◽  
Ruben Filipe Pereira ◽  
Miguel Mira da Silva ◽  
Isaías Scalabrin Bianchi

Purpose Data can nowadays be seen as the main asset of organizations and data leaks have a considerable impact on the organization’s image, revenues and possible consequences to the affected clients. One of the most critical industries is the bank. Information security frameworks (ISF) have been created to assist organizations and other frameworks evolved to update these domain practices. Recently, the European Union decided to create the general data protection regulation (GDPR), applicable to all organizations dealing with personal data of citizens residing in the European Union. Although considered a general regulation, GDPR implementation needs to align with some industries’ laws and policies. Especially in the Bank industry. How these ISF can assist the implementation of GDPR is not clear. Design/methodology/approach The design science research process was followed and semi-structured interviews performed. Findings A list of practices to assist the bank industry in GDPR implementation is provided. How each practice map with assessed ISF and GDPR requirements is also presented. Research limitations/implications As GDPR is a relatively recent subject, it is hard to find experts in the area. It is more difficult if the authors intend to find experienced people in the GDPR and bank industry. That is one of the main reasons this study does not include more interviews. Originality/value This research provides a novel artefact to the body of knowledge. The proposed artefact lists which ISF practices banks should implement to comply with GDPR. By doing it the artefact provides a centralized view about which ISF frameworks (or part of them) could be implemented to help banks comply with GDPR.


2011 ◽  
Vol 135-136 ◽  
pp. 806-808 ◽  
Author(s):  
Hong Jun Li

In order to make the Web services, web sites in Java more powerful and flexible, building unified web applications is vital important. By introducing a new style─Representational State Transfer (REST), this paper studied the Java RESTful frameworks and the ways to develop Restful Web Service in Java. The RESTful frameworks in Java can effectively simplify the web development in many ways.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Larissa Ane Hora de Souza ◽  
Victor Diogho Heuer de Carvalho ◽  
Roberio José Rogério dos Santos ◽  
Jonhatan Magno Norte da Silva

PurposeThis article aims to present a methodology applied to the transition between the “as-is” and “to-be” stages of the Business Process Management (BPM) life cycle, supporting its implementation and maintenance for the organizational stability, using techniques from Operations Research and Information and Decision Theories, applied by a gamified system.Design/methodology/approachThe study used Design Science Research, considering the following methodological elements: (1) artifact model, after initial analysis of the organization; (2) problem relevance, incorporating components to the Markov transition matrix and the integer programming model for resource optimization; (3) model evaluation, establishing mechanisms to validate the methodology created; (4) research contributions, showing benefits found; (5) systematic approach, detailing methods used; (6) model's research process, revealing the means for execution; and (7) final presentation of results.FindingsAfter planning three scenarios for the company, containing zero, one or two implemented processes, the matrix of states in the Markov chain effectively identified the states of greater and lesser transition uncertainty. At the same time, the optimization model guided the organization toward a stable change in its operational and financial areas.Practical implicationsThe company's planning capacity has increased, as its managers now have a methodology to promote rational decisions about the development of plans. Before, managers believed that the methodology used was only for large companies. However, this view changed with the results, showing a structured view of the ability to absorb new customers, relocate established ones, increase the comfort level for employees and increase profitability for the company's business.Originality/valueThe study showed that the combination of techniques opens a new perspective to the incorporation of BPM in organizations, allows a smooth change between the current and future state, making it possible to predict the evolution of transition scenarios.


REpresentational State Transfer (REST) is an architectural style that has recently emerged as a new approach to develop and deliver Web services. In fact, a great number of companies, such as eBay™, Twitter™, and Amazon.com™, have adopted REST to deliver Web services and Web feeds. This chapter offers a review of the support for consuming RESTful Web services in Adobe™ Flex™; then, it presents two case studies about the development of third-party RESTful Web services-based Rich Internet Applications (RIAs) using Adobe Flex™ along with HyperText Markup Languages (HTML) and JavaScript. The case studies presented in this chapter are intended to explain the common prerequisites for using RESTful Web services Application Programming Interfaces (APIs) as well as the particular implementation details, including the challenges and alternatives facing the capabilities and limitations of the target technologies. In addition, they exemplify the use of some User Interface (UI) patterns.


Author(s):  
José Renato Villela Dantas ◽  
Pedro Porfirio Muniz Farias

In the internet environment, web services based on representational state transfer (REST) have become the de facto standard. The addition of semantics is intended to enhance the description of web services with information that enables automatic agents to understand their data. However, the existence of different languages to semantically describe services makes it difficult to discover and select the service that best meets a requirement. Furthermore, relatively few proposals have a RESTful service semantic description, making the discovery process for RESTful services more difficult. This work proposes a RESTful semantic web service discovery architecture based on semantic interfaces (SERIN). SERIN is an ontology with annotations that semantically describe RESTful web services. This architecture enables software agents to automatically discover and make service calls in order to execute a determined task.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shong-lee Ivan Su ◽  
Xuemei Fan ◽  
Yongyi Shou

PurposeThe study aims to explore and develop a smart route planning system for the cross-docking delivery operations of a large supermarket chain using an action research (AR) approach and assessing through a design science research (DSR) lens.Design/methodology/approachThis study took a problem-solving AR (PAR) approach toward the delivery operational issue of the case firm. The research process has accorded with the solution incubation and the refinement phases defined by a DSR framework. An intervention-based research framework for DSR is developed to assess the validity of this study as a DSR research and derive mid-range theories.FindingsDramatic operational and financial improvements were achieved for the case firm. Significant and unintended environmental and social benefits were also found. A design proposition (DP) and several mid-range theories are proposed as an extension of AR research to DSR research.Research limitations/implicationsA problem-solving DSR research can be better assessed by the intervention-based DSR framework developed in this study. DSR studies should be encouraged for both practical and theoretical advancement purposes.Practical implicationsA challenging business problem-solving study can be tackled effectively through an industry/academic collaboration taking a PAR approach to deliver substantial values and organization transformational results.Social implicationsDrivers and store associates are safer with smart delivery operations in the case firm.Originality/valueThere are still limited PAR design science case studies in the supply chain/logistics research literature. The research experience and findings gained from this study provide more insights toward how this type of research can be conducted and assessed.


2019 ◽  
Vol 32 (3) ◽  
pp. 477-495 ◽  
Author(s):  
Johannes Zrenner ◽  
Frederik Oliver Möller ◽  
Christian Jung ◽  
Andreas Eitel ◽  
Boris Otto

Purpose Current business challenges force companies to exchange critical and sensitive data. The data provider pays great attention to the usage of their data and wants to control it by policies. The purpose of this paper is to develop usage control architecture options to enable data sovereignty in business ecosystems. Design/methodology/approach The architecture options are developed following the design science research process. Based on requirements from an automotive use case, the authors develop architecture options. The different architecture options are demonstrated and evaluated based on the case study with practitioners from the automotive industry. Findings This paper introduces different architecture options for implementing usage control (UC). The proposed architecture options represent solutions for UC in business ecosystems. The comparison of the architecture options shows the respective advantages and disadvantages for data provider and data consumer. Research limitations/implications In this work, the authors address only one case stemming from the German automotive sector. Practical implications Technical enforcement of data providers policies instead of relying on trust to support collaborative data exchange between companies. Originality/value This research is among the first to introduce architecture options that provide a technical concept for the implementation of data sovereignty in business ecosystems using UC. Consequently, it supports the decision process for the technical implementation of data sovereignty.


2019 ◽  
Vol 42 (1) ◽  
pp. 141-154
Author(s):  
Mónica Ramos-Mejía ◽  
Juan Manuel Jauregui-Becker ◽  
Marlies Koers-Stuiver ◽  
María-Laura Franco-Garcia

Purpose This paper aims at explaining the design process of a learning model targeting potential entrepreneurs with no technical or business expertise aiming to develop sustainable business models in deprived areas. The case that the paper explores focuses on experiential learning and learning in adulthood to design a learning model that considers context and socio-demographic characteristics, makes clear the interconnections between sustainability principles, entrepreneurship rationale and design methodologies and includes actions and processes of reflection and contextual interaction. Design/methodology/approach Following a recursive argument, the paper applies design research methodology (DRM) to systematically design the “transformative innovation model” that Product Co Creation Centers (PC3) from the University of Twente (The Netherlands) has developed. Findings Building on Kolb’s cycle of experiential learning, the result of applying DRM is a learning cycle of confrontation, observation, practice and application. The proposed learning model is applied to a specific setting in Colombia, allowing to verify and validate whether the learning model leads to the expected outcomes. It is argued that an interdisciplinary approach, a focus on feedback loops and the consideration of the context are important elements for addressing and transforming complex problems related to sustainable development from the bottom-up. Originality/value This paper contributes to academic research in management emphasizing a solution-finding approach based on a prescription-driven research process, informed by design science research.


KWALON ◽  
2021 ◽  
Vol 26 (1) ◽  
pp. 43-51
Author(s):  
Jing Hiah

Abstract Navigating the research and researchers’ field: Reflections on positionality in (assumed) insider research To challenge rigid ideas about objectivity in social science research, qualitative researchers question their own subjectivity in the research process. In such endeavors, the focus is mainly on the positionality of the researcher vis-à-vis their respondents in the research field. In this contribution, I argue that the positionality of the researcher in academia, what I refer to as the researchers’ field, is equally important as it influences the way research findings are received and evaluated. Through reflections on positionality in my insider research concerning labour relations and exploitation in Chinese migrant businesses in the Netherlands and Romania, I explore how my positionality as an insider negatively influenced my credibility and approachability in the researchers’ field. I conclude that it is necessary to pay more attention to researchers’ positionality in academia as it may shed light on and make it possible to discuss the written and unwritten standards of researchers’ credibility and approachability as an academic in the researchers’ field. Accordingly, this could provide insights into the causes of inequalities in academia and contribute to the current challenge for more diversity in academia.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Bayu Rima Aditya ◽  
Ridi Ferdiana ◽  
Sri Suning Kusumawardani

PurposeExisting literature has reported a barrier list that could affect the implementation of digital transformation in higher education, yet the research question of how to identify barriers remained unanswered. Thus, this study intended to address this gap.Design/methodology/approachThe research design adopted a mixed-methods approach based on the problem-centered design science research (DSR) process model for the development and evaluation of framework.FindingsThis study proposed a systematic framework of three sets of components: (1) the initial set of barriers; (2) the barrier rating scheme and (3) the barrier scoring matrix. The three-component of the framework is to identify and prioritize barriers to the successful implementation of digital transformation in higher education.Research limitations/implicationsThe evaluation of the framework was only based on an expert opinion.Practical implicationsThis study provided a direction to the policymakers for designing sensible strategies to increase the chances of a successful digital transformation in higher education.Originality/valueThis study contributes to the knowledge body by offering a more systematic understanding of barriers to digital transformation in higher education.


Sign in / Sign up

Export Citation Format

Share Document