Ontologies for Guaranteeing the Interoperability in e-Business

Author(s):  
Stephan Zelewski ◽  
Adina Silvia Bruns ◽  
Martin Kowalski

For e-business, the computer-based processing of value-creation, especially for knowledge-intensive business processes, plays a prominent role with the help of modern information and communication techniques. At least since the further development of the classical Internet for the Semantic Web, the content-based knowledge processing and knowledge transfer have gained more importance. In this chapter it is shown that ontologies represent an auspicious instrument to ensure the interoperability of information and communication systems that have to work together on the work-sharing development of knowledge-intensive business processes. Ontologies become important when agents with heterogeneous knowledge backgrounds co-operate on such business processes. Firstly, the complex and often ill-considered use of the definition of ontology will be discussed critically and its meaning specified. Thereupon it will be shown (with the help of two application areas) how ontologies can be used effectively to support knowledge-intensive business processes in e-business. On the one hand, the chapter is concerned with the management of knowledge of competences, which agents have to have a command of for successful process execution. On the other hand, it is about the management of know-how, which has already been collected from completed projects and should be reused in new projects.

2021 ◽  
Vol 16 (6) ◽  
pp. 21-30
Author(s):  
A. V. Kornev

The paper examines activity as the most important component of human life. The author elucidates the features of activity from the standpoint of various fields of knowledge: philosophy, psychology, sociology. The preference is given to the activity approach, which is based on the category of “substantive activity.” It is substantive in nature and does not simply define the activity as human interaction with the outside world, but reflects the changes that constitute the result of human activity. Various aspects of theoretical and practical activity are touched upon on the example of legal activity, which is of a complex intellectual nature. Legal activity is often characterized through legal practice — one of the varieties of social practices. Some similarities of these categories are reflected, as well as differences between them. The paper gives the author’s definition of legal activity focused on professional legal activity. The definition cannot claim to be universal due to various types of professional legal activity. Nevertheless, it is specified that professional legal activity is always an activity carried out on the basis of law, in legal forms; it is aimed at achieving the goals determined by law. The author demonstrates the impact of digital technologies on various types of legal activities. Especially in the conditions of the pandemic when traditional forms of communication have given way to virtual ones. It is noted that this influence is of a dual nature, that is, on the one hand, it increases the efficiency of communications, and, on the other hand, it leads to some risks and problems, in particular, against the background of the fact that a significant part of our population still does not have access to modern information and communication systems.


Author(s):  
O. V. Korotkova

The article is devoted to the study of theoretical and applied aspects of the impact of digital technology on business and the process of ensuring the economic security of enterprises. It is shown that a significant aspect of maintaining an enterprise in a state of economic security is the ability to adapt to the changing external environment in which the enterprise operates. The paper considers the main functional components of the economic security of enterprises. The features of the influence of digital technologies on the effectiveness of individual functional components of economic security are investigated. The list of objects of digital transformation processes for enterprises is determined in order to ensure economic security. Digital transformation objects are grouped into three blocks: the infrastructure for ensuring economic security using digital technologies, information and communication systems, business processes and management systems. The features of economic security of entrepreneurial activity and the main factors of the introduction of digital technologies in enterprises are highlighted. The author formulated the main tasks of the economic security system of an enterprise in the context of digital transformations. The basic requirements for creating the appropriate conditions for ensuring transformational information and technological processes are determined.


Author(s):  
Sergiy O. Gnatyuk ◽  
Vitaliy V. Kishchenko ◽  
Vitaliy V. Kotelianets ◽  
Madina Bauyrzhan

Information and communication technologies implementation in most areas of human life is aimed at improving the efficiency of business processes, but the emergence of new vulnerabilities and cyberthreats generates cybersecurity incidents. To localize and neutralize incidents effective management techniques are necessary. These processes are very actual for critical information infrastructure of the state, because destructive influences on objects of critical information infrastructure can cause big losses for the state (human life, material and status losses). Known methods for incidents management are not oriented on some special components and parameters of the cyberspace. It complicates implementation of these methods in real information and communication systems. From this viewpoint, in this paper the concept of network-centric incident management was developed. It allows to identify the most important (real) objects of critical information infrastructure protection and cybersecurity incidents to predict the categories that arise as a result of specific cyberattacks and their risk level. Further research study consists in instrumental tools based on mentioned concept. These tools can be useful for incidents prediction (character and level of losses) in information and communication systems of state critical infrastructure objects.


2015 ◽  
Vol 54 (3) ◽  
pp. 369-393 ◽  
Author(s):  
Diego Dueñas-Fernández ◽  
Carlos Iglesias-Fernández ◽  
Raquel Llorente-Heras

The expansion of services and the dissemination of information and communication technologies (ICTs) are identified as important factors for improving employment opportunities for women, reducing labour differences by gender. The objective of the study is to determine to what extent services, and especially those most closely linked with knowledge and ICTs such as knowledge-intensive services (KIS), are changing some of the basics of labour gender differences. To do this, first we measure and characterize employment related to the service sector and KIS, comparing the existing gender wage-gap in these activities with the one observed in the overall economy. Then we carry out an analysis of decomposition over these gaps (in term of total distribution of wages and by quantiles). Our results indicate that, although KIS improve the wage situation of women, they are unable substantially to reduce gender wage inequality in the Spanish labour market, perhaps because the same gendered structures of the workplace are replicated in the KIS activities.


2008 ◽  
pp. 1615-1635
Author(s):  
Christopher Payne ◽  
Bhuvan Unhelkar

This chapter discusses how globalization in the publishing domain is achieved through global information and communication systems. Global information systems (GIS) enable not only integration of applications within an organization (leading to what is known as EAI), but also enable extensive connectivity between applications across varied platforms and software domains both within and outside the organization. This timely connectivity has created tremendous opportunities for the publishing industry — increasingly dependent on split-second timings to report news — to integrate its business processes as well as devise new and innovative ways of collecting, assimilating, and disbursing information. This chapter is based on the experience of the lead author in one of Australia’s largest publishing groups, John Fairfax Holdings Ltd.


Author(s):  
Nina Jellentrup ◽  
Michael Meyer zu Hörste

Train drivers as well as signallers interact with several computer based information and communication systems to ensure safe and effective train operations. So far the technical progress mostly determines the design of such interactive systems and requirements out of a human factors perspective are not integrated. Beside the development of technical functions it is essential to take the usability as a quality attribute of every interactive system into account. If the usability is not considered during system development, it could occur that there are several functions available within a system but the user does not know how to use them in an efficient way. This chapter describes a psychological approach to design or redesign usable interactive systems within the railway domain. Some examples will be discussed to demonstrate the approach and the results.


Author(s):  
Stephan Manning ◽  
Marcus Møller Larsen ◽  
Chacko George Kannothra

The chapter reviews key drivers, trends, and consequences of global sourcing of business processes—the sourcing of administrative and more knowledge-intensive processes from globally dispersed locations. It is argued that global sourcing, which is also associated with ‘offshoring’ and ‘offshore outsourcing’, has co-evolved over the last three decades with the advancement of information and communication technology, a growing pool of low-cost, yet-often-qualified labour and expertise in developing countries, and increasing client-side global sourcing experience. It is shown how this dynamic has led firms to develop new global capabilities, governance and business models, changed the geographical distribution of work and expertise, and promoted the emergence of new geographical knowledge services clusters. Further, three new trends are introduced—the emergence of global delivery models, information technology-enabled service automation, and impact sourcing—and discuss future directions for research.


2011 ◽  
Vol 1 (3) ◽  
Author(s):  
Nicolas Guelfi

AbstractThe goal of this article is to provide a rigorous conceptual framework for defining the concepts of dependability and resilience. Since the seventies, the terms dependability and resilience have been used in nearly all the scientific and technological fields related to Information and Communication systems. The introduction and use of these concepts in all these fields makes it difficult to have a common and precise definition. Having such a definition is nevertheless mandatory for the software and systems engineering research community that create development processes, languages and tools to support the engineering of products that would be required to be dependable or resilient. For this, we introduce an abstract and generic terminology defined mathematically to be used when speaking about dependability and resiliency. We also provide some abstract semantic descriptions to these terminological elements. This formal framework is defined from a software engineering perspective, which means that we define its components such that they are useful for the development or improvement of analysis, architectural design, detailed design, implementation, verification and maintenance phases. To this aim, we provide the necessary elements in accordance with a model driven engineering perspective that enable the definition of a new modelling language for dependable and resilient systems.


Author(s):  
A. V. Sokolov ◽  
O. N. Zhdanov

In recent decades, perfect algebraic constructions are successfully being use to signal systems synthesis, to construct block and stream cryptographic algorithms, to create pseudo-random sequence generators as well as in many other fields of science and technology. Among perfect algebraic constructions a significant place is occupied by bent-sequences and the class of perfect binary arrays associated with them. Bent-sequences are used for development of modern cryptographic primitives, as well as for constructing constant amplitude codes (C-codes) used in code division multiple access technology. In turn, perfect binary arrays are used for constructing correction codes, systems of biphase phase- shifted signals and multi-level cryptographic systems. The development of methods of many-valued logic in modern information and communication systems has attracted the attention of researchers to the improvement of methods for synthesizing many-valued bent-sequences for cryptography and information transmission tasks. The new results obtained in the field of the synthesis of ternary bent-sequences, make actual the problem of researching the class of perfect ternary arrays. In this paper we consider the problem of extending the definition of perfect binary arrays to three-valued logic case, as a result of which the definition of a perfect ternary array was introduced on the basis of the determination of the unbalance of the ternary function. A complete class of perfect ternary arrays of the third order is obtained by a regular method, bypassing the search. Thus, it is established that the class of perfect ternary arrays is a union of four subclasses, in each of which the corresponding methods of reproduction are determined. The paper establishes the relationship between the class of ternary bent-sequences and the class of perfect ternary arrays. The obtained results are the basis for the introduction of perfect ternary arrays into modern cryptographic and telecommunication algorithms.


Author(s):  
Anca Gabriela Petrescu ◽  
Marius Petrescu ◽  
Ioana Panagore ◽  
Florentina Raluca Bîlcan

During the last period, information and communication systems became an essential component of our society that, at its turn, became more and more dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process which, besides its benefits come to raise specific threats to their users' interests. Due to the high level of interconnectivity, it is essential that all members of the cyber community to be aware of their responsibilities in information security. Rising awareness is the first step towards a more trustful and credible communication information environment that is a pre-requisite of the information society. This chapter demonstrates, on the one hand, how Romanian organizations are able to optimize their information security risk in order to streamline their activities and, on the other hand, how security mechanisms have to be properly designed and commensurate with the specific threats for the specific types of information.


Sign in / Sign up

Export Citation Format

Share Document