Knowledge

Author(s):  
Shadi Ettantawi ◽  
Asim El-Sheikh

A number of disciplines have approached the concept of knowledge. None of the existing definitions of knowledge can be generalized to other disciplines, and most importantly, none of such attempts fit the requirements of information systems (IS). This chapter suggests to perceive knowledge from the point of view of IS, as an attempt to answer IS requirements better. The proposed vision of knowledge is based on Information Systems’ layers.

1998 ◽  
Vol 37 (04/05) ◽  
pp. 518-526 ◽  
Author(s):  
D. Sauquet ◽  
M.-C. Jaulent ◽  
E. Zapletal ◽  
M. Lavril ◽  
P. Degoulet

AbstractRapid development of community health information networks raises the issue of semantic interoperability between distributed and heterogeneous systems. Indeed, operational health information systems originate from heterogeneous teams of independent developers and have to cooperate in order to exchange data and services. A good cooperation is based on a good understanding of the messages exchanged between the systems. The main issue of semantic interoperability is to ensure that the exchange is not only possible but also meaningful. The main objective of this paper is to analyze semantic interoperability from a software engineering point of view. It describes the principles for the design of a semantic mediator (SM) in the framework of a distributed object manager (DOM). The mediator is itself a component that should allow the exchange of messages independently of languages and platforms. The functional architecture of such a SM is detailed. These principles have been partly applied in the context of the HEllOS object-oriented software engineering environment. The resulting service components are presented with their current state of achievement.


Author(s):  
Teresa Onorati ◽  
Alessio Malizia ◽  
Paloma Díaz ◽  
Ignacio Aedo

The interaction design for web emergency management information systems (WEMIS) is an important aspect to keep in mind due to the criticality of the domain: decision making, updating available resources, defining a task list, and trusting in proposed information. A common interaction design strategy for WEMIS seems to be needed, but currently there are few references in literature. The aim of this study is to contribute to this lack with a set of interactive principles for WEMIS. From the emergency point of view, existing WEMIS have been analyzed to extract common features and to design interactive principles for emergency. Furthermore, the authors studied design principles extracted from a well-known (DERMIS) model relating them to emergency phases and features. The result proposed here is a set of design principles for supporting interactive properties for WEMIS. Finally, two case studies have been considered as applications of proposed design principles.


Author(s):  
Jorge Gomes ◽  
Mário José Batista Romão

Healthcare organisations must improve their business practices and internal procedures in order to meet the increasing demands of health professionals and the public in general for better information. Hospitals have adopted a patient-centred care approach and have invested massively in information systems and technology (IS/IT), in the hope that these investments will improve medical care and that they will meet patient demands. From the point of view of public service, the focus of healthcare system is the patient, and therefore any intervention should be based on their needs and expectations. It has become more and more important that investments in information systems and technology (IS/IT) support not only short-term objectives, but also long-term benefits, in order to provide a sustainable service for organisations, professionals and users. The main objective of this research is to study how organisational maturity, enhanced by IS/IT investments and project management best practices, leads to successful projects in healthcare organisations.


Author(s):  
Aysu Altaş

Technology has penetrated every aspect of life and it proceeds with the aim of facilitating people's lives. Geographical information systems as a part of the developing technology provide services in every area with different forms. One of these areas is museology. The desire to make visual and written information and cultural heritage that are presented by museums with auditory and interactive experiences has brought together digital technologies and cultural and historical activities. From this point of view, the “Müze Asist” is a remarkable application in terms of the fact that it is a local app and in use in most of the museums in Turkey and the convenience provided for all tourists who want to visit a museum, especially for those who prefer self-guided tours. This chapter may be a guide to its objects and to the next researchers.


Author(s):  
Luís Enrique Sánchez ◽  
Antonio Santos-Olmo ◽  
Eduardo Fernandez-Medina ◽  
Mario Piattini

The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size Enterprises (SMEs). However, this type of companies requires ISMSs which have been adapted to their specific characteristics, and these systems must be optimized from the point of view of the resources necessary to deploy and maintain them. Over the last 10 years, the authors have obtained considerable experience in the establishment of ISMSs, and during this time, they have observed that the structure and characteristics of SMEs as regards security management are frequently very similar (since they can all be grouped by business size and sector), thus signifying that it is possible to construct patterns for ISMSs that can be reused and refined. In this chapter, the authors present the strategy that they have designed to manage and reuse security information in information system security management. This strategy is framed within a methodology designed for integral security management and its information systems maturity, denominated as “Methodology for Security Management and Maturity in Small and Medium-size Enterprises (MSM2-SME),” and it is defined in a reusable model called “Reusable Pattern for Security Management (RPSM),” which systematically defines, manages, and reuses the aforementioned methodology through a sub-process denominated as “Generation of Security Management Patterns (GSMP).” This model is currently being applied in real cases, and is thus constantly improving.


Author(s):  
Peter Fettke ◽  
Peter Loos

Within the information systems field, reference models have been known for many years. A reference model is a conceptual framework and may be used as a blueprint for information systems development. Despite the relevance of reference model quality, little research has been undertaken on their systematical analysis and evaluation. In this chapter, we describe how reference models can be analyzed from an ontological point of view. Such an analysis consists of four steps: 1) developing a transformation mapping, 2) identifying ontological modeling deficiencies, 3) transforming the reference model, and 4) assessing the results. The usefulness of our method will be demonstrated by analyzing Scheer’s reference model for production planning and control. Although our approach is based on sound theory, we argue that this approach is not inherently superior to other approaches of reference model analysis and evaluation.


Author(s):  
Ana André ◽  
Fernanda Sampaio

Information Systems (IS) Outsourcing has emerged as a strategic option to be considered and has been increasingly adopted by managers. However, many contracts still fail during their initial years, meaning that Outsourcing has also been subject to strong criticism. There are advantages to Outsourcing but also significant risks associated to it, and the assessment of both is therefore of great relevance for informed decision-making. The objective of this chapter is to determine to what extent a common view about risks and benefits associated to IS Outsourcing is shared by the Portuguese market players: Service Providers, Clients and Opinion Makers. In order to accomplish this, an on-line Delphi study was conducted, combined with the Q-sort technique, which allowed to obtain the perspective of each player on the risks and benefits IS Outsourcing. Comparing these perspectives it was possible to understand that the market players don’t share the same point of view.


Author(s):  
S. Saghiri

Concentrating on the role of supply chain decoupling point, this chapter introduces different levels of customisation and mass operations and three types of mass customisation. It argues that in each mass customisation type, information systems which are upstream and downstream of the decoupling point can be varied. Consequently, information flows in different types of mass customisation have been examined. This analysis is an endeavour to organise mass customisation information systems across the supply chain, while it can be a useful structure for future researches in this area as well.


2006 ◽  
pp. 115-164 ◽  
Author(s):  
Rami Rifaieh ◽  
Aïcha-Nabila Benharkat

Shared understanding in an enterprise is necessary to permit a unifying framework serving as the basis of communication between people, interoperability between systems, and other system engineering benefits such as reusability, reliability, and specification. Bringing systems to work together is increasingly becoming essential for leveraging the Enterprise Information Systems (EIS) and reaching common goals. Currently, enterprises develop their systems independently with low consideration for the collaboration that systems can play with other systems. Certainly, semantic sharing represents the daunting barrier for making these systems work together through common shared understanding. In the last decade, theoretical research such as ontologies and context were suggested separately as formal support for treating the semantics-sharing problem. In order to resolve this main problem, we intend to pair up the two notions of Context and Ontologies. Typically, contextualization can be seen at the ontology level in order to enable the multiple views and multi-representation requirements. Hence, the formal representation of contextual ontologies should preserve adequate reasoning mechanisms. A machine understandable semantics and interpretation should be also given for information in a context, according to a specific system’s point of view. However, we perceived a growing ontology phobia in many enterprises. This fear is based on misunderstanding of ontologies’ advantages and lack of practical applications for theoretical proposals. The aim of this chapter is twofold. On one hand, it concentrates on studying the application of tightening together context and ontologies which can serve as formal background for reaching a suitable EIS environment. It invests in resolving the semantic-sharing problem between these systems. It focuses on suggesting a formalism for contextual ontologies based on a combination of Description Logics and Modal Logics. On the other hand, it investigates issues and arguments helping to overcome the ontology phobia. It shows with examples the usefulness of these contextual ontologies for resolving the semantic-sharing problem between some EIS.


Sign in / Sign up

Export Citation Format

Share Document