Interoperability Frameworks for Networked Information Systems: A Comparative Analysis and Discussion

2019 ◽  
Vol 28 (01) ◽  
pp. 1950002 ◽  
Author(s):  
Claudia-Melania Chituc

Interoperability frameworks provide specifications for different aspects of interoperability, for communicating and sharing information. Ten prominent industry-neutral interoperability frameworks are analyzed in this paper, distinguishing between operational interoperability frameworks and conceptual interoperability frameworks. To support this analysis, 16 criteria were defined, which represent the basis of a comparison framework. The operational interoperability frameworks analyzed have similarities and differences, and complement each other in some aspects (e.g. messaging service). The differences refer to the manner they handle (or not) different interoperability details relevant for performing e-business, e.g. only ebXML provides guidelines for negotiation and setting-up a collaboration agreement prior to conducting e-business. The five conceptual interoperability frameworks were analyzed based on specific structural elements, as they tackle differently the notion of interoperability, i.e. targeting types of integration, interoperability barriers, levels of interoperability. Despite the advances of interoperability frameworks, full interoperability is not yet achieved. The analysis performed allowed to conclude that although interoperability frameworks represent a good direction towards seamless interoperability in a networked environment, a big challenge is the harmonization of different aspects of the interoperability frameworks towards attaining full interoperability in complex cross-sectorial e-business scenarios, which can be addressed by joint actions of the scientific community and practitioners. Finally, this analysis yields a set of directions for future research work.

2019 ◽  
Vol IV (III) ◽  
pp. 45-54
Author(s):  
Akbar Ali ◽  
Muhammad Anees ◽  
Bilal Khan

The present research work intends to analyze and compare the sentence structures in English and Pashto Language. The researcher has focused mainly on the passivization process in this regard. The primary reason for the research is to highlight the similarities and differences between the passivization processes in both languages. Moreover, the researcher has delimited the study to tenses used in both the languages. The study follows qualitative method of research where the researcher has collected the data for the English passivization from the various grammar books while for the collection of data in the form of Pashto passive structures, the researcher has used test as research tools. The researcher has compared the passivization process in each tense between English and Pashto in the data analysis chapter. The study highlighted some similarities but many differences in the passivization process in English and Pashto languages.


2021 ◽  
pp. 109634802098763
Author(s):  
Mohamed Azali ◽  
Norazlyn Kamal Basha ◽  
Yee-Shan Chang ◽  
Xin-Jean Lim ◽  
Jun-Hwa Cheah

The importance of halal tourism has prompted countries and business operators to place more emphasis on this lucrative sector. The purpose of this study is to investigate the effects of halal-friendly destination attributes on inbound tourists’ behavioral intention in the context of Malaysia. Furthermore, a comparative analysis was conducted to investigate the similarities and differences between Chinese and Indonesian Muslim tourists. A total of 666 observations were collected using surveys and the data sets were analyzed via partial least squares structural equation modeling. The empirical results show that both countries have indicated variations in terms of preferences for social environment, services, and facilities. We contribute to the knowledge on the constitutive attributes of the halal-friendly destination, while providing theoretical explanations for the differences among Muslim tourists in the Asian markets. Finally, directions for future research are proposed.


2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


Author(s):  
Hairul Azhar Mohamad ◽  
Muhammad Luthfi Mohaini ◽  
Pavithran Ravinthra Nath

This research investigated into the lexical density and frequencies of five types of lexical chunks located in 300 online business letters. Top 10 websites on business correspondence had been identified in terms of traffic visitors and bounce rate under one million web rankings worldwide. Criterion Sampling method was identified prior to extracting the sample letters from the websites. The data was then run with Antconc Concordance Program (ACP) for lexical density and frequency analysis. Top 15 lexical chunks in online business letters (OBL) were compared against those top 15 in Business Letter Corpus (BLC). Findings revealed that there was a total of 39 916-word tokens and 939 counts of lexical chunks found in this corpus. It was found that more lexical words do not imply more lexical chunks used in based on types of business letters.  All 5 types of lexical chunks were identified and ranked in descending order; Sentence Builders (SB) as the most frequent type, followed by Collocations (COL), Deictic locutions (DLs), Polywords (POLs) and Institutionalized Expressions (IUs) as the least frequent type of lexical chunk. Sub-divisional analysis indicated that Grammatical Collocations (GCs) were more common than Lexical Collocations (LCs). Majority of lexical chunks were formed more at sentence level than phrasal level. Comparative analysis between top 15 lexical chunks in OBL and BLC discovered that most top lexical chunks in online business letters are representative of those corporate business letters in BLC. Pedagogical implications in terms of the reliability of online business letters for academic reference and future research considerations are also addressed.


2017 ◽  
Vol 28 (1) ◽  
pp. 23-40
Author(s):  
Masoodi Marjan

Abstract The purpose of this article is to compare two qualitative approaches that can be used in different researches: phenomenology and grounded theory. This overview is done to (1) summarize similarities and differences between these two approaches, with attention to their historical development, goals, methods, audience, and products (2) familiarize the researchers with the origins and details of these approaches in the way that they can make better matches between their research question(s) and the goals and products of the study (3) discuss a brief outline of each methodology along with their origin, essence and procedural steps undertaken (4) illustrate how the procedures of data analysis (coding), theoretical memoing and sampling are applied to systematically generate a grounded theory (5) briefly examine the major challenges for utilizing two approaches in grounded theory, the Glaserian and Straussian. As a conclusion, this overview reveals that it is essential to ensure that the method matches the research question being asked, helps the researchers determine the suitability of their applied approach and provides a continues training for the novice researchers, especially PhD or research students who lack solid knowledge and background experience in multiple research methods.


Author(s):  
M.A. Kobilev ◽  
E.S. Abramov

The article considers false information systems and conducts their comparative analysis, considering the tasks that they perform, which technologies rely on, and what role is played in protecting information when they are used. The goal is to identify relevant false information systems, to formulate criteria in accordance with which classification is carried out. The problems of false information systems are identified, further work in this topic is determined.


Author(s):  
Pankaj Musyuni ◽  
Geeta Aggarwal ◽  
Manju Nagpal ◽  
Ramesh K. Goyal

Background: Protecting intellectual property rights are important and particularly pertinent for inventions which are an outcome of rigorous research and development. While the grant of patents is subject to establishing novelty and inventive step, it further indicates the technological development and helpful for researchers working in the same technical domain. The aim of the present research work is to map the existing work through analysis of patent literature, in the field of Coronaviruses (CoV), particularly COVID-19 (2019-nCoV). CoV is a large family of viruses known to cause illness in human and animals, particularly known for causing respiratory infections as evidenced in earlier times such as in MERS i.e. Middle East Respiratory Syndrome; SRS i.e. Severe Acute Respiratory Syndrome. A recently identified novel-coronavirus has known as COVID-19 which has currently caused pandemic situation across the globe. Objective: To expand analysis of patents related to CoV and 2019-nCoV. Evaluation has been conducted by patenting trends of particular strains of identified CoV diseases by present legal status, main concerned countries via earliest priority years and its assignee types and inventors of identified relevant patents. We analyzed the global patent documents to check the scope of claims along with focuses and trends of the published patent documents for the entire CoV family including 2019- nCoV through the present landscape. Methods: To extract the results, Derwent Innovation database is used by a combination of different key-strings. Approximately 3800 patents were obtained and further scrutinized and analyzed. The present write-up also discusses the recent progress of patent applications in a period of the year 2010 to 2020 (present) along with the recent developments in India for the treatment options for CoV and 2019-nCoV. Results: Present analysis showed that key areas of the inventions have been focused on vaccines and diagnostic kits apart from the composition for treatment of CoV. We also observed that no specific vaccine treatments is available for treatment of 2019-nCov, however, developing novel chemical or biological drugs and kits for early diagnosis, prevention and disease management is the primarily governing topic among the patented inventions. The present study also indicates potential research opportunities for the future, particularly to combat 2019-nCoV. Conclusion: The present paper analyzes the existing patents in the field of Coronaviruses and 2019-nCoV and suggests a way forward for the effective contribution in this upcoming research area. From the trend analysis, it was observed an increase in filing of the overall trend of patent families for a period of 2010 to the current year. This multifaceted analysis of identified patent literature provides an understanding of the focuses on present ongoing research and grey area in terms of the trends of technological innovations in disease management in patients with CoV and 2019-nCoV. Further, the findings and outcome of the present study offer insights for the proposed research and innovation opportunities and provide actionable information in order to facilitate policymakers, academia, research driven institutes and also investors to make better decisions regarding programmed steps for research and development for the diagnosis, treatment and taking preventive measures for CoV and 2019-nCoV. The present article also emphasizes on the need for future development and the role of academia and collaboration with industry for speedy research with a rationale.


Author(s):  
Reeta Yadav

Employee’s perception regarding fairness in the organization is termed as organizational justice. The objective of this paper is to study the antecedents and consequences of organizational justice on the basis of earlier relevant studies from the period ranging from 1964 to 2015. Previous research identified employee participation, communication, justice climate as the antecedents and trust, job satisfaction, commitment, turnover intentions, organizational citizenship behavior and performance as the consequences of organizational justice. Finding reveals the gaps existing in the literature and gives suggestions for future research work.


2016 ◽  
Vol 1 (1) ◽  
pp. 50-53 ◽  
Author(s):  
Varun Sharma ◽  
Narpat Singh

In the recent research work, the handwritten signature is a suitable field to detection of valid signature from different environment such online signature and offline signature. In early research work, a lot of unauthorized person put the signature and theft the data in illegal manner from organization or industries. So we have to need identify, the right person on the basis of various parameters that can be detected. In this paper, we have proposed two methods namely LDA and Neural Network for the offline signature from the scan signature image. For efficient research, we have focused the comparative analysis in terms of FRR, SSIM, MSE, and PSNR. These parameters are compared with the early work and the recent work. Our proposed work is more effective and provides the suitable result through our method which leads to existing work. Our method will help to find legal signature of authorized use for security and avoid illegal work.


Sign in / Sign up

Export Citation Format

Share Document