The Practice of Enterprise Modeling: 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2022
|
Ausgabe: | 1st ed |
Schriftenreihe: | Lecture Notes in Business Information Processing Series
v.456 |
Schlagworte: | |
Online-Zugang: | HWR01 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (256 Seiten) |
ISBN: | 9783031214882 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049408762 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 231114s2022 |||| o||u| ||||||eng d | ||
020 | |a 9783031214882 |9 978-3-031-21488-2 | ||
035 | |a (ZDB-30-PQE)EBC7141580 | ||
035 | |a (ZDB-30-PAD)EBC7141580 | ||
035 | |a (ZDB-89-EBL)EBL7141580 | ||
035 | |a (OCoLC)1351199807 | ||
035 | |a (DE-599)BVBBV049408762 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 260 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Barn, Balbir S. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Practice of Enterprise Modeling |b 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
250 | |a 1st ed | ||
264 | 1 | |a Cham |b Springer International Publishing AG |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (256 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Business Information Processing Series |v v.456 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Organization -- Contents -- Models in Information System Development -- Investigating The Effectiveness of Model-Based Testing on Testing Skill Acquisition -- 1 Introduction -- 2 Related Work -- 2.1 Teaching of Software Testing -- 2.2 Model-Based Testing -- 2.3 MERODE Code Generator and TesCaV -- 3 Research Method -- 3.1 Hypotheses -- 3.2 Experimental Design -- 3.3 Evaluation -- 4 Results -- 4.1 Personal Characteristic of the Participants -- 4.2 Test Case Coverage Scores -- 5 Discussion -- 5.1 Contributions -- 5.2 Internal Validity -- 5.3 External Validity -- 6 Conclusion -- 7 Further Research -- References -- Generating Low-Code Applications from Enterprise Ontology -- 1 Introduction -- 2 Theoretical Background -- 2.1 Enterprise Ontology -- 2.2 Enterprise Implementation -- 2.3 Model-Based Engineering and Low-Code Technology -- 3 Mapping -- 4 Implementation and Evaluation -- 5 Conclusions and Discussion -- References -- Supporting the Individuation, Analysis and Gamification of Software Components for Acceptance Requirements Fulfilment -- 1 Introduction -- 2 Motivation and Lessons Learned -- 2.1 Agon Framework -- 2.2 Activities and Lessons Learned. -- 3 SiaGAM Algorithm and Process -- 4 Case Study and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Modeling Enterprise Architectures -- Historization of Enterprise Architecture Models via Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background and Related Work -- 2.1 EA Debts and Smells -- 2.2 Graph-Based Analysis of EA Models -- 2.3 Graph Historization -- 3 Toward Historization for EA Models -- 3.1 Graph Structure -- 3.2 Storage -- 3.3 Historization Properties -- 4 Implementation -- 5 Analysis -- 6 Discussion -- 7 Conclusion -- References -- Towards Ontology-Based Validation of EA Principles -- 1 Introduction -- 2 Literature Review | |
505 | 8 | |a 2.1 Enterprise Architecture Management(EAM) -- 2.2 Formalizing Enterprise Architecture Models -- 2.3 Enterprise Architecture Principles -- 2.4 Formalizing EA Principles -- 2.5 Research Objective -- 3 Research Method -- 4 Automated Ontology-Based Validation of EA Principles -- 4.1 Knowledge in Models and EA Principles -- 4.2 Representing EA Models in an Enterprise Ontology -- 4.3 Representing EA Principles in an Enterprise Ontology -- 5 Step-By-Step Formalization and Validation of EA Principles -- 5.1 Step 1 - Specification of EA Principles -- 5.2 Step 2 - Creation of SBVR Rules -- 5.3 Step 3 - Formalization of the Vocabulary as an Ontology -- 5.4 Step 4 - Extending EA Models and EA Principles with Domain Knowledge -- 5.5 Step 5 - Formalization of the SBVR Rules -- 6 Evaluation -- 6.1 Case Description -- 6.2 Implemented Approach -- 7 Conclusion and Future Work -- References -- Ontological Analysis and Redesign of Security Modeling in ArchiMate -- 1 Introduction -- 2 Security Modeling in Archimate -- 2.1 The Original ArchiMate Risk and Security Overlay -- 2.2 Redesigned Risk Elements of ArchiMate Based on COVER -- 3 Ontological Foundations of Security -- 4 Ontologically-Founded Analysis of Security Modeling -- 5 Redesigning the Security Elements of ArchiMate -- 6 Related Work -- 7 Final Remarks -- References -- Modeling Capabilities and Ecosystems -- Foundations of Capability Maps - A Conceptual Comparison -- 1 Introduction -- 2 Background -- 3 Analytical Model -- 3.1 Overview of the Analytical Model -- 3.2 Conceptualization of a Capability -- 3.3 Conceptualization of a Capability Map -- 3.4 Conceptualization of In-Use Context -- 4 Research Results -- 4.1 The Studied Capability and Capability Map Constructs -- 4.2 Characterization of Capability Constructs -- 4.3 Characterization of Capability Map Constructs -- 4.4 Conceptualization of In-Use Context | |
505 | 8 | |a 5 Discussion -- 6 Conclusions -- References -- Applying and Evaluating the KYKLOS Method -- 1 Introduction -- 2 Background -- 2.1 Background on Modeling Methods and Evaluation Activities -- 2.2 Overview of KYKLOS -- 3 Methodology -- 4 The Case Study -- 4.1 Case Analysis -- 5 Evaluation Results -- 6 Discussion -- 7 Conclusions -- References -- Using Tangible Modeling to Create an e3value Conceptual Model for Digital Ecosystems -- 1 Introduction -- 2 Related Work -- 3 Relating TED and e3value : Study Design -- 4 The TED Methodology for Ecosystem Design -- 5 The e3value Methodology for Ecosystem Value Modeling -- 6 Relating the TED SM to e3value : The Mobility Platform -- 6.1 Use Case - Digital Platform for Mobility Services -- 6.2 TED SM Model for the Mobility Ecosystem -- 6.3 The e3value Model of the Mobility Ecosystem -- 6.4 Evaluation of the TED SM Model and the e3value Model -- 6.5 Analysis of TED SM Model and e3value Model Correspondences -- 7 Conclusion and Future Work -- References -- DSML and Meta-modeling -- Dynamic Models - The MetaMorph Formalism and Model-Operations -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 Systematization of Operations - Structural Events and Domain Events -- 2.3 ProVis - Probability Visualized -- 2.4 MetaMorph -- 3 Dynamic Models Through Operations -- 4 The Building Blocks of Domain-Specific Operations - Structural Events -- 5 Language Specific Operations - Domain Events -- 5.1 Creation Phase vs. Operationalization Phase -- 5.2 Lifted Structural Events and Domain Events for Operationalization -- 5.3 Case Study -- 6 Conclusion and Outlook -- References -- Establishing Interoperability Between the EMF and the MSDKVS Metamodeling Platforms*-4pt -- 1 Introduction -- 2 Metamodeling Foundations -- 2.1 EMF -- 2.2 MSDKVS -- 3 Related Work -- 3.1 Transformation Bridges -- 3.2 EMF and Microsoft DSL Tools | |
505 | 8 | |a 4 Comparative Analysis of EMF and MSDKVS -- 4.1 Abstract Syntax Features -- 4.2 Graphical Concrete Syntax Features -- 5 Transformation Bridge -- 5.1 EMF2MSDKVS -- 5.2 MSDKVS2EMF -- 5.3 MSDKVS2EMF Transformation Example -- 6 Evaluation -- 6.1 Research Questions -- 6.2 Experimental Setup -- 6.3 Results -- 6.4 Limitations -- 7 Conclusion -- References -- Beyond Business Development: Regulatory Assessment of Energy Sector Projects with Contextual Requirements Engineering -- 1 Introduction -- 2 Motivating Scenario -- 3 Requirements and Existing Modeling Approaches -- 3.1 Requirements -- 3.2 Selecting a Modeling Approach -- 4 Modeling the Motivating Scenario -- 5 Discussion -- 5.1 Lessons Learned -- 5.2 Towards Intertwining Regulation and Business Development -- 6 Concluding Outlook -- References -- Participatory Modeling -- A Methodology for DSML-Assisted Participatory Agent-Based Enterprise Modelling -- 1 Introduction -- 2 Case Study -- 3 Agent-Based Modelling Methodologies -- 4 DSML Methodologies -- 5 A Methodology for DSML-Assisted Participatory Agent-Based Modelling -- 5.1 System Analysis -- 5.2 Model Formalisation -- 5.3 Implementation -- 5.4 Evaluation -- 6 Conclusions -- References -- Advantages and Limitations of Experiments for Researching Participatory Enterprise Modeling and Recommendations for Their Implementation*-4pt -- 1 Introduction -- 2 Participatory Enterprise Modeling -- 3 Research Design Options for Examining PEM -- 4 Example Studies on Participatory Enterprise Modeling -- 4.1 Case Studies -- 4.2 Experimental Studies -- 5 Why Experiments on Participatory Modeling? -- 6 Lessons Learned and Recommendations for Future Experiments -- 6.1 The Kind of Model -- 6.2 Time Limits -- 6.3 Modeling Task and Participatory Culture -- 6.4 Who is Modeling? -- 6.5 The Challenges of Online Participatory Modeling | |
505 | 8 | |a 6.6 Assessing Subjective Perceptions as Dependent Variables -- 6.7 Dealing with Small Sample Sizes -- 6.8 Modeling Experts Might Be Seen as Co-owners -- 6.9 Be Prepared, but Do Not Expect to Be Able to Foresee Everything -- 7 Conclusion -- References -- Designing an Ontology for Human Rights Violations Documentation Through Practitioner Input and Information Infrastructure Theory -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Human Rights Protection System and Technologies -- 2.2 Previous Relevant Ontology Research -- 3 Approach to Develop the Proposed Ontology -- 3.1 Overall Research Framework: Design Science Research -- 3.2 Design Theory: Information Infrastructures -- 4 Requirements Elicitation -- 4.1 Non-functional Requirements Elicitation -- 4.2 Functional Requirements Elicitation -- 4.3 Validation of Requirements -- 5 The Proposed Ontology -- 5.1 Full OntoRights -- 5.2 Simple OntoRights -- 5.3 Demonstration -- 6 Discussion -- 7 Conclusion -- References -- Correction to: Generating Low-Code Applications from Enterprise Ontology -- Correction to: Chapter "Generating Low-Code Applications from Enterprise Ontology" in: B. S. Barn and K. Sandkuhl (Eds.): The Practice of Enterprise Modeling, LNBIP 456, https://doi.org/10.1007/978-3-031-21488-2_2 -- Author Index | |
650 | 4 | |a Business enterprises-Data processing | |
650 | 0 | 7 | |a Unternehmensmodell |0 (DE-588)4201186-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prozessmanagement |0 (DE-588)4353072-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2022 |z London |2 gnd-content | |
689 | 0 | 0 | |a Unternehmensmodell |0 (DE-588)4201186-3 |D s |
689 | 0 | 1 | |a Prozessmanagement |0 (DE-588)4353072-2 |D s |
689 | 0 | 2 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 3 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sandkuhl, Kurt |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Barn, Balbir S. |t The Practice of Enterprise Modeling |d Cham : Springer International Publishing AG,c2022 |z 9783031214875 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034735846 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7141580 |l HWR01 |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804186133520711680 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Barn, Balbir S. |
author_facet | Barn, Balbir S. |
author_role | aut |
author_sort | Barn, Balbir S. |
author_variant | b s b bs bsb |
building | Verbundindex |
bvnumber | BV049408762 |
classification_rvk | QP 345 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Organization -- Contents -- Models in Information System Development -- Investigating The Effectiveness of Model-Based Testing on Testing Skill Acquisition -- 1 Introduction -- 2 Related Work -- 2.1 Teaching of Software Testing -- 2.2 Model-Based Testing -- 2.3 MERODE Code Generator and TesCaV -- 3 Research Method -- 3.1 Hypotheses -- 3.2 Experimental Design -- 3.3 Evaluation -- 4 Results -- 4.1 Personal Characteristic of the Participants -- 4.2 Test Case Coverage Scores -- 5 Discussion -- 5.1 Contributions -- 5.2 Internal Validity -- 5.3 External Validity -- 6 Conclusion -- 7 Further Research -- References -- Generating Low-Code Applications from Enterprise Ontology -- 1 Introduction -- 2 Theoretical Background -- 2.1 Enterprise Ontology -- 2.2 Enterprise Implementation -- 2.3 Model-Based Engineering and Low-Code Technology -- 3 Mapping -- 4 Implementation and Evaluation -- 5 Conclusions and Discussion -- References -- Supporting the Individuation, Analysis and Gamification of Software Components for Acceptance Requirements Fulfilment -- 1 Introduction -- 2 Motivation and Lessons Learned -- 2.1 Agon Framework -- 2.2 Activities and Lessons Learned. -- 3 SiaGAM Algorithm and Process -- 4 Case Study and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Modeling Enterprise Architectures -- Historization of Enterprise Architecture Models via Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background and Related Work -- 2.1 EA Debts and Smells -- 2.2 Graph-Based Analysis of EA Models -- 2.3 Graph Historization -- 3 Toward Historization for EA Models -- 3.1 Graph Structure -- 3.2 Storage -- 3.3 Historization Properties -- 4 Implementation -- 5 Analysis -- 6 Discussion -- 7 Conclusion -- References -- Towards Ontology-Based Validation of EA Principles -- 1 Introduction -- 2 Literature Review 2.1 Enterprise Architecture Management(EAM) -- 2.2 Formalizing Enterprise Architecture Models -- 2.3 Enterprise Architecture Principles -- 2.4 Formalizing EA Principles -- 2.5 Research Objective -- 3 Research Method -- 4 Automated Ontology-Based Validation of EA Principles -- 4.1 Knowledge in Models and EA Principles -- 4.2 Representing EA Models in an Enterprise Ontology -- 4.3 Representing EA Principles in an Enterprise Ontology -- 5 Step-By-Step Formalization and Validation of EA Principles -- 5.1 Step 1 - Specification of EA Principles -- 5.2 Step 2 - Creation of SBVR Rules -- 5.3 Step 3 - Formalization of the Vocabulary as an Ontology -- 5.4 Step 4 - Extending EA Models and EA Principles with Domain Knowledge -- 5.5 Step 5 - Formalization of the SBVR Rules -- 6 Evaluation -- 6.1 Case Description -- 6.2 Implemented Approach -- 7 Conclusion and Future Work -- References -- Ontological Analysis and Redesign of Security Modeling in ArchiMate -- 1 Introduction -- 2 Security Modeling in Archimate -- 2.1 The Original ArchiMate Risk and Security Overlay -- 2.2 Redesigned Risk Elements of ArchiMate Based on COVER -- 3 Ontological Foundations of Security -- 4 Ontologically-Founded Analysis of Security Modeling -- 5 Redesigning the Security Elements of ArchiMate -- 6 Related Work -- 7 Final Remarks -- References -- Modeling Capabilities and Ecosystems -- Foundations of Capability Maps - A Conceptual Comparison -- 1 Introduction -- 2 Background -- 3 Analytical Model -- 3.1 Overview of the Analytical Model -- 3.2 Conceptualization of a Capability -- 3.3 Conceptualization of a Capability Map -- 3.4 Conceptualization of In-Use Context -- 4 Research Results -- 4.1 The Studied Capability and Capability Map Constructs -- 4.2 Characterization of Capability Constructs -- 4.3 Characterization of Capability Map Constructs -- 4.4 Conceptualization of In-Use Context 5 Discussion -- 6 Conclusions -- References -- Applying and Evaluating the KYKLOS Method -- 1 Introduction -- 2 Background -- 2.1 Background on Modeling Methods and Evaluation Activities -- 2.2 Overview of KYKLOS -- 3 Methodology -- 4 The Case Study -- 4.1 Case Analysis -- 5 Evaluation Results -- 6 Discussion -- 7 Conclusions -- References -- Using Tangible Modeling to Create an e3value Conceptual Model for Digital Ecosystems -- 1 Introduction -- 2 Related Work -- 3 Relating TED and e3value : Study Design -- 4 The TED Methodology for Ecosystem Design -- 5 The e3value Methodology for Ecosystem Value Modeling -- 6 Relating the TED SM to e3value : The Mobility Platform -- 6.1 Use Case - Digital Platform for Mobility Services -- 6.2 TED SM Model for the Mobility Ecosystem -- 6.3 The e3value Model of the Mobility Ecosystem -- 6.4 Evaluation of the TED SM Model and the e3value Model -- 6.5 Analysis of TED SM Model and e3value Model Correspondences -- 7 Conclusion and Future Work -- References -- DSML and Meta-modeling -- Dynamic Models - The MetaMorph Formalism and Model-Operations -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 Systematization of Operations - Structural Events and Domain Events -- 2.3 ProVis - Probability Visualized -- 2.4 MetaMorph -- 3 Dynamic Models Through Operations -- 4 The Building Blocks of Domain-Specific Operations - Structural Events -- 5 Language Specific Operations - Domain Events -- 5.1 Creation Phase vs. Operationalization Phase -- 5.2 Lifted Structural Events and Domain Events for Operationalization -- 5.3 Case Study -- 6 Conclusion and Outlook -- References -- Establishing Interoperability Between the EMF and the MSDKVS Metamodeling Platforms*-4pt -- 1 Introduction -- 2 Metamodeling Foundations -- 2.1 EMF -- 2.2 MSDKVS -- 3 Related Work -- 3.1 Transformation Bridges -- 3.2 EMF and Microsoft DSL Tools 4 Comparative Analysis of EMF and MSDKVS -- 4.1 Abstract Syntax Features -- 4.2 Graphical Concrete Syntax Features -- 5 Transformation Bridge -- 5.1 EMF2MSDKVS -- 5.2 MSDKVS2EMF -- 5.3 MSDKVS2EMF Transformation Example -- 6 Evaluation -- 6.1 Research Questions -- 6.2 Experimental Setup -- 6.3 Results -- 6.4 Limitations -- 7 Conclusion -- References -- Beyond Business Development: Regulatory Assessment of Energy Sector Projects with Contextual Requirements Engineering -- 1 Introduction -- 2 Motivating Scenario -- 3 Requirements and Existing Modeling Approaches -- 3.1 Requirements -- 3.2 Selecting a Modeling Approach -- 4 Modeling the Motivating Scenario -- 5 Discussion -- 5.1 Lessons Learned -- 5.2 Towards Intertwining Regulation and Business Development -- 6 Concluding Outlook -- References -- Participatory Modeling -- A Methodology for DSML-Assisted Participatory Agent-Based Enterprise Modelling -- 1 Introduction -- 2 Case Study -- 3 Agent-Based Modelling Methodologies -- 4 DSML Methodologies -- 5 A Methodology for DSML-Assisted Participatory Agent-Based Modelling -- 5.1 System Analysis -- 5.2 Model Formalisation -- 5.3 Implementation -- 5.4 Evaluation -- 6 Conclusions -- References -- Advantages and Limitations of Experiments for Researching Participatory Enterprise Modeling and Recommendations for Their Implementation*-4pt -- 1 Introduction -- 2 Participatory Enterprise Modeling -- 3 Research Design Options for Examining PEM -- 4 Example Studies on Participatory Enterprise Modeling -- 4.1 Case Studies -- 4.2 Experimental Studies -- 5 Why Experiments on Participatory Modeling? -- 6 Lessons Learned and Recommendations for Future Experiments -- 6.1 The Kind of Model -- 6.2 Time Limits -- 6.3 Modeling Task and Participatory Culture -- 6.4 Who is Modeling? -- 6.5 The Challenges of Online Participatory Modeling 6.6 Assessing Subjective Perceptions as Dependent Variables -- 6.7 Dealing with Small Sample Sizes -- 6.8 Modeling Experts Might Be Seen as Co-owners -- 6.9 Be Prepared, but Do Not Expect to Be Able to Foresee Everything -- 7 Conclusion -- References -- Designing an Ontology for Human Rights Violations Documentation Through Practitioner Input and Information Infrastructure Theory -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Human Rights Protection System and Technologies -- 2.2 Previous Relevant Ontology Research -- 3 Approach to Develop the Proposed Ontology -- 3.1 Overall Research Framework: Design Science Research -- 3.2 Design Theory: Information Infrastructures -- 4 Requirements Elicitation -- 4.1 Non-functional Requirements Elicitation -- 4.2 Functional Requirements Elicitation -- 4.3 Validation of Requirements -- 5 The Proposed Ontology -- 5.1 Full OntoRights -- 5.2 Simple OntoRights -- 5.3 Demonstration -- 6 Discussion -- 7 Conclusion -- References -- Correction to: Generating Low-Code Applications from Enterprise Ontology -- Correction to: Chapter "Generating Low-Code Applications from Enterprise Ontology" in: B. S. Barn and K. Sandkuhl (Eds.): The Practice of Enterprise Modeling, LNBIP 456, https://doi.org/10.1007/978-3-031-21488-2_2 -- Author Index |
ctrlnum | (ZDB-30-PQE)EBC7141580 (ZDB-30-PAD)EBC7141580 (ZDB-89-EBL)EBL7141580 (OCoLC)1351199807 (DE-599)BVBBV049408762 |
dewey-full | 260 |
dewey-hundreds | 200 - Religion |
dewey-ones | 260 - Christian social and ecclesiastical theology |
dewey-raw | 260 |
dewey-search | 260 |
dewey-sort | 3260 |
dewey-tens | 260 - Christian social and ecclesiastical theology |
discipline | Wirtschaftswissenschaften Theologie / Religionswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften Theologie / Religionswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11156nmm a2200601zcb4500</leader><controlfield tag="001">BV049408762</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231114s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031214882</subfield><subfield code="9">978-3-031-21488-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC7141580</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC7141580</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL7141580</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1351199807</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049408762</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">260</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Barn, Balbir S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Practice of Enterprise Modeling</subfield><subfield code="b">15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (256 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Business Information Processing Series</subfield><subfield code="v">v.456</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- Models in Information System Development -- Investigating The Effectiveness of Model-Based Testing on Testing Skill Acquisition -- 1 Introduction -- 2 Related Work -- 2.1 Teaching of Software Testing -- 2.2 Model-Based Testing -- 2.3 MERODE Code Generator and TesCaV -- 3 Research Method -- 3.1 Hypotheses -- 3.2 Experimental Design -- 3.3 Evaluation -- 4 Results -- 4.1 Personal Characteristic of the Participants -- 4.2 Test Case Coverage Scores -- 5 Discussion -- 5.1 Contributions -- 5.2 Internal Validity -- 5.3 External Validity -- 6 Conclusion -- 7 Further Research -- References -- Generating Low-Code Applications from Enterprise Ontology -- 1 Introduction -- 2 Theoretical Background -- 2.1 Enterprise Ontology -- 2.2 Enterprise Implementation -- 2.3 Model-Based Engineering and Low-Code Technology -- 3 Mapping -- 4 Implementation and Evaluation -- 5 Conclusions and Discussion -- References -- Supporting the Individuation, Analysis and Gamification of Software Components for Acceptance Requirements Fulfilment -- 1 Introduction -- 2 Motivation and Lessons Learned -- 2.1 Agon Framework -- 2.2 Activities and Lessons Learned. -- 3 SiaGAM Algorithm and Process -- 4 Case Study and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Modeling Enterprise Architectures -- Historization of Enterprise Architecture Models via Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background and Related Work -- 2.1 EA Debts and Smells -- 2.2 Graph-Based Analysis of EA Models -- 2.3 Graph Historization -- 3 Toward Historization for EA Models -- 3.1 Graph Structure -- 3.2 Storage -- 3.3 Historization Properties -- 4 Implementation -- 5 Analysis -- 6 Discussion -- 7 Conclusion -- References -- Towards Ontology-Based Validation of EA Principles -- 1 Introduction -- 2 Literature Review</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.1 Enterprise Architecture Management(EAM) -- 2.2 Formalizing Enterprise Architecture Models -- 2.3 Enterprise Architecture Principles -- 2.4 Formalizing EA Principles -- 2.5 Research Objective -- 3 Research Method -- 4 Automated Ontology-Based Validation of EA Principles -- 4.1 Knowledge in Models and EA Principles -- 4.2 Representing EA Models in an Enterprise Ontology -- 4.3 Representing EA Principles in an Enterprise Ontology -- 5 Step-By-Step Formalization and Validation of EA Principles -- 5.1 Step 1 - Specification of EA Principles -- 5.2 Step 2 - Creation of SBVR Rules -- 5.3 Step 3 - Formalization of the Vocabulary as an Ontology -- 5.4 Step 4 - Extending EA Models and EA Principles with Domain Knowledge -- 5.5 Step 5 - Formalization of the SBVR Rules -- 6 Evaluation -- 6.1 Case Description -- 6.2 Implemented Approach -- 7 Conclusion and Future Work -- References -- Ontological Analysis and Redesign of Security Modeling in ArchiMate -- 1 Introduction -- 2 Security Modeling in Archimate -- 2.1 The Original ArchiMate Risk and Security Overlay -- 2.2 Redesigned Risk Elements of ArchiMate Based on COVER -- 3 Ontological Foundations of Security -- 4 Ontologically-Founded Analysis of Security Modeling -- 5 Redesigning the Security Elements of ArchiMate -- 6 Related Work -- 7 Final Remarks -- References -- Modeling Capabilities and Ecosystems -- Foundations of Capability Maps - A Conceptual Comparison -- 1 Introduction -- 2 Background -- 3 Analytical Model -- 3.1 Overview of the Analytical Model -- 3.2 Conceptualization of a Capability -- 3.3 Conceptualization of a Capability Map -- 3.4 Conceptualization of In-Use Context -- 4 Research Results -- 4.1 The Studied Capability and Capability Map Constructs -- 4.2 Characterization of Capability Constructs -- 4.3 Characterization of Capability Map Constructs -- 4.4 Conceptualization of In-Use Context</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5 Discussion -- 6 Conclusions -- References -- Applying and Evaluating the KYKLOS Method -- 1 Introduction -- 2 Background -- 2.1 Background on Modeling Methods and Evaluation Activities -- 2.2 Overview of KYKLOS -- 3 Methodology -- 4 The Case Study -- 4.1 Case Analysis -- 5 Evaluation Results -- 6 Discussion -- 7 Conclusions -- References -- Using Tangible Modeling to Create an e3value Conceptual Model for Digital Ecosystems -- 1 Introduction -- 2 Related Work -- 3 Relating TED and e3value : Study Design -- 4 The TED Methodology for Ecosystem Design -- 5 The e3value Methodology for Ecosystem Value Modeling -- 6 Relating the TED SM to e3value : The Mobility Platform -- 6.1 Use Case - Digital Platform for Mobility Services -- 6.2 TED SM Model for the Mobility Ecosystem -- 6.3 The e3value Model of the Mobility Ecosystem -- 6.4 Evaluation of the TED SM Model and the e3value Model -- 6.5 Analysis of TED SM Model and e3value Model Correspondences -- 7 Conclusion and Future Work -- References -- DSML and Meta-modeling -- Dynamic Models - The MetaMorph Formalism and Model-Operations -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 Systematization of Operations - Structural Events and Domain Events -- 2.3 ProVis - Probability Visualized -- 2.4 MetaMorph -- 3 Dynamic Models Through Operations -- 4 The Building Blocks of Domain-Specific Operations - Structural Events -- 5 Language Specific Operations - Domain Events -- 5.1 Creation Phase vs. Operationalization Phase -- 5.2 Lifted Structural Events and Domain Events for Operationalization -- 5.3 Case Study -- 6 Conclusion and Outlook -- References -- Establishing Interoperability Between the EMF and the MSDKVS Metamodeling Platforms*-4pt -- 1 Introduction -- 2 Metamodeling Foundations -- 2.1 EMF -- 2.2 MSDKVS -- 3 Related Work -- 3.1 Transformation Bridges -- 3.2 EMF and Microsoft DSL Tools</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4 Comparative Analysis of EMF and MSDKVS -- 4.1 Abstract Syntax Features -- 4.2 Graphical Concrete Syntax Features -- 5 Transformation Bridge -- 5.1 EMF2MSDKVS -- 5.2 MSDKVS2EMF -- 5.3 MSDKVS2EMF Transformation Example -- 6 Evaluation -- 6.1 Research Questions -- 6.2 Experimental Setup -- 6.3 Results -- 6.4 Limitations -- 7 Conclusion -- References -- Beyond Business Development: Regulatory Assessment of Energy Sector Projects with Contextual Requirements Engineering -- 1 Introduction -- 2 Motivating Scenario -- 3 Requirements and Existing Modeling Approaches -- 3.1 Requirements -- 3.2 Selecting a Modeling Approach -- 4 Modeling the Motivating Scenario -- 5 Discussion -- 5.1 Lessons Learned -- 5.2 Towards Intertwining Regulation and Business Development -- 6 Concluding Outlook -- References -- Participatory Modeling -- A Methodology for DSML-Assisted Participatory Agent-Based Enterprise Modelling -- 1 Introduction -- 2 Case Study -- 3 Agent-Based Modelling Methodologies -- 4 DSML Methodologies -- 5 A Methodology for DSML-Assisted Participatory Agent-Based Modelling -- 5.1 System Analysis -- 5.2 Model Formalisation -- 5.3 Implementation -- 5.4 Evaluation -- 6 Conclusions -- References -- Advantages and Limitations of Experiments for Researching Participatory Enterprise Modeling and Recommendations for Their Implementation*-4pt -- 1 Introduction -- 2 Participatory Enterprise Modeling -- 3 Research Design Options for Examining PEM -- 4 Example Studies on Participatory Enterprise Modeling -- 4.1 Case Studies -- 4.2 Experimental Studies -- 5 Why Experiments on Participatory Modeling? -- 6 Lessons Learned and Recommendations for Future Experiments -- 6.1 The Kind of Model -- 6.2 Time Limits -- 6.3 Modeling Task and Participatory Culture -- 6.4 Who is Modeling? -- 6.5 The Challenges of Online Participatory Modeling</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.6 Assessing Subjective Perceptions as Dependent Variables -- 6.7 Dealing with Small Sample Sizes -- 6.8 Modeling Experts Might Be Seen as Co-owners -- 6.9 Be Prepared, but Do Not Expect to Be Able to Foresee Everything -- 7 Conclusion -- References -- Designing an Ontology for Human Rights Violations Documentation Through Practitioner Input and Information Infrastructure Theory -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Human Rights Protection System and Technologies -- 2.2 Previous Relevant Ontology Research -- 3 Approach to Develop the Proposed Ontology -- 3.1 Overall Research Framework: Design Science Research -- 3.2 Design Theory: Information Infrastructures -- 4 Requirements Elicitation -- 4.1 Non-functional Requirements Elicitation -- 4.2 Functional Requirements Elicitation -- 4.3 Validation of Requirements -- 5 The Proposed Ontology -- 5.1 Full OntoRights -- 5.2 Simple OntoRights -- 5.3 Demonstration -- 6 Discussion -- 7 Conclusion -- References -- Correction to: Generating Low-Code Applications from Enterprise Ontology -- Correction to: Chapter "Generating Low-Code Applications from Enterprise Ontology" in: B. S. Barn and K. Sandkuhl (Eds.): The Practice of Enterprise Modeling, LNBIP 456, https://doi.org/10.1007/978-3-031-21488-2_2 -- Author Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises-Data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmensmodell</subfield><subfield code="0">(DE-588)4201186-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">London</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmensmodell</subfield><subfield code="0">(DE-588)4201186-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sandkuhl, Kurt</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Barn, Balbir S.</subfield><subfield code="t">The Practice of Enterprise Modeling</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783031214875</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034735846</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7141580</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2022 London gnd-content |
genre_facet | Konferenzschrift 2022 London |
id | DE-604.BV049408762 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:05:37Z |
indexdate | 2024-07-10T10:06:17Z |
institution | BVB |
isbn | 9783031214882 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034735846 |
oclc_num | 1351199807 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (256 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes in Business Information Processing Series |
spelling | Barn, Balbir S. Verfasser aut The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings 1st ed Cham Springer International Publishing AG 2022 ©2022 1 Online-Ressource (256 Seiten) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Business Information Processing Series v.456 Description based on publisher supplied metadata and other sources Intro -- Preface -- Organization -- Contents -- Models in Information System Development -- Investigating The Effectiveness of Model-Based Testing on Testing Skill Acquisition -- 1 Introduction -- 2 Related Work -- 2.1 Teaching of Software Testing -- 2.2 Model-Based Testing -- 2.3 MERODE Code Generator and TesCaV -- 3 Research Method -- 3.1 Hypotheses -- 3.2 Experimental Design -- 3.3 Evaluation -- 4 Results -- 4.1 Personal Characteristic of the Participants -- 4.2 Test Case Coverage Scores -- 5 Discussion -- 5.1 Contributions -- 5.2 Internal Validity -- 5.3 External Validity -- 6 Conclusion -- 7 Further Research -- References -- Generating Low-Code Applications from Enterprise Ontology -- 1 Introduction -- 2 Theoretical Background -- 2.1 Enterprise Ontology -- 2.2 Enterprise Implementation -- 2.3 Model-Based Engineering and Low-Code Technology -- 3 Mapping -- 4 Implementation and Evaluation -- 5 Conclusions and Discussion -- References -- Supporting the Individuation, Analysis and Gamification of Software Components for Acceptance Requirements Fulfilment -- 1 Introduction -- 2 Motivation and Lessons Learned -- 2.1 Agon Framework -- 2.2 Activities and Lessons Learned. -- 3 SiaGAM Algorithm and Process -- 4 Case Study and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Modeling Enterprise Architectures -- Historization of Enterprise Architecture Models via Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background and Related Work -- 2.1 EA Debts and Smells -- 2.2 Graph-Based Analysis of EA Models -- 2.3 Graph Historization -- 3 Toward Historization for EA Models -- 3.1 Graph Structure -- 3.2 Storage -- 3.3 Historization Properties -- 4 Implementation -- 5 Analysis -- 6 Discussion -- 7 Conclusion -- References -- Towards Ontology-Based Validation of EA Principles -- 1 Introduction -- 2 Literature Review 2.1 Enterprise Architecture Management(EAM) -- 2.2 Formalizing Enterprise Architecture Models -- 2.3 Enterprise Architecture Principles -- 2.4 Formalizing EA Principles -- 2.5 Research Objective -- 3 Research Method -- 4 Automated Ontology-Based Validation of EA Principles -- 4.1 Knowledge in Models and EA Principles -- 4.2 Representing EA Models in an Enterprise Ontology -- 4.3 Representing EA Principles in an Enterprise Ontology -- 5 Step-By-Step Formalization and Validation of EA Principles -- 5.1 Step 1 - Specification of EA Principles -- 5.2 Step 2 - Creation of SBVR Rules -- 5.3 Step 3 - Formalization of the Vocabulary as an Ontology -- 5.4 Step 4 - Extending EA Models and EA Principles with Domain Knowledge -- 5.5 Step 5 - Formalization of the SBVR Rules -- 6 Evaluation -- 6.1 Case Description -- 6.2 Implemented Approach -- 7 Conclusion and Future Work -- References -- Ontological Analysis and Redesign of Security Modeling in ArchiMate -- 1 Introduction -- 2 Security Modeling in Archimate -- 2.1 The Original ArchiMate Risk and Security Overlay -- 2.2 Redesigned Risk Elements of ArchiMate Based on COVER -- 3 Ontological Foundations of Security -- 4 Ontologically-Founded Analysis of Security Modeling -- 5 Redesigning the Security Elements of ArchiMate -- 6 Related Work -- 7 Final Remarks -- References -- Modeling Capabilities and Ecosystems -- Foundations of Capability Maps - A Conceptual Comparison -- 1 Introduction -- 2 Background -- 3 Analytical Model -- 3.1 Overview of the Analytical Model -- 3.2 Conceptualization of a Capability -- 3.3 Conceptualization of a Capability Map -- 3.4 Conceptualization of In-Use Context -- 4 Research Results -- 4.1 The Studied Capability and Capability Map Constructs -- 4.2 Characterization of Capability Constructs -- 4.3 Characterization of Capability Map Constructs -- 4.4 Conceptualization of In-Use Context 5 Discussion -- 6 Conclusions -- References -- Applying and Evaluating the KYKLOS Method -- 1 Introduction -- 2 Background -- 2.1 Background on Modeling Methods and Evaluation Activities -- 2.2 Overview of KYKLOS -- 3 Methodology -- 4 The Case Study -- 4.1 Case Analysis -- 5 Evaluation Results -- 6 Discussion -- 7 Conclusions -- References -- Using Tangible Modeling to Create an e3value Conceptual Model for Digital Ecosystems -- 1 Introduction -- 2 Related Work -- 3 Relating TED and e3value : Study Design -- 4 The TED Methodology for Ecosystem Design -- 5 The e3value Methodology for Ecosystem Value Modeling -- 6 Relating the TED SM to e3value : The Mobility Platform -- 6.1 Use Case - Digital Platform for Mobility Services -- 6.2 TED SM Model for the Mobility Ecosystem -- 6.3 The e3value Model of the Mobility Ecosystem -- 6.4 Evaluation of the TED SM Model and the e3value Model -- 6.5 Analysis of TED SM Model and e3value Model Correspondences -- 7 Conclusion and Future Work -- References -- DSML and Meta-modeling -- Dynamic Models - The MetaMorph Formalism and Model-Operations -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 Systematization of Operations - Structural Events and Domain Events -- 2.3 ProVis - Probability Visualized -- 2.4 MetaMorph -- 3 Dynamic Models Through Operations -- 4 The Building Blocks of Domain-Specific Operations - Structural Events -- 5 Language Specific Operations - Domain Events -- 5.1 Creation Phase vs. Operationalization Phase -- 5.2 Lifted Structural Events and Domain Events for Operationalization -- 5.3 Case Study -- 6 Conclusion and Outlook -- References -- Establishing Interoperability Between the EMF and the MSDKVS Metamodeling Platforms*-4pt -- 1 Introduction -- 2 Metamodeling Foundations -- 2.1 EMF -- 2.2 MSDKVS -- 3 Related Work -- 3.1 Transformation Bridges -- 3.2 EMF and Microsoft DSL Tools 4 Comparative Analysis of EMF and MSDKVS -- 4.1 Abstract Syntax Features -- 4.2 Graphical Concrete Syntax Features -- 5 Transformation Bridge -- 5.1 EMF2MSDKVS -- 5.2 MSDKVS2EMF -- 5.3 MSDKVS2EMF Transformation Example -- 6 Evaluation -- 6.1 Research Questions -- 6.2 Experimental Setup -- 6.3 Results -- 6.4 Limitations -- 7 Conclusion -- References -- Beyond Business Development: Regulatory Assessment of Energy Sector Projects with Contextual Requirements Engineering -- 1 Introduction -- 2 Motivating Scenario -- 3 Requirements and Existing Modeling Approaches -- 3.1 Requirements -- 3.2 Selecting a Modeling Approach -- 4 Modeling the Motivating Scenario -- 5 Discussion -- 5.1 Lessons Learned -- 5.2 Towards Intertwining Regulation and Business Development -- 6 Concluding Outlook -- References -- Participatory Modeling -- A Methodology for DSML-Assisted Participatory Agent-Based Enterprise Modelling -- 1 Introduction -- 2 Case Study -- 3 Agent-Based Modelling Methodologies -- 4 DSML Methodologies -- 5 A Methodology for DSML-Assisted Participatory Agent-Based Modelling -- 5.1 System Analysis -- 5.2 Model Formalisation -- 5.3 Implementation -- 5.4 Evaluation -- 6 Conclusions -- References -- Advantages and Limitations of Experiments for Researching Participatory Enterprise Modeling and Recommendations for Their Implementation*-4pt -- 1 Introduction -- 2 Participatory Enterprise Modeling -- 3 Research Design Options for Examining PEM -- 4 Example Studies on Participatory Enterprise Modeling -- 4.1 Case Studies -- 4.2 Experimental Studies -- 5 Why Experiments on Participatory Modeling? -- 6 Lessons Learned and Recommendations for Future Experiments -- 6.1 The Kind of Model -- 6.2 Time Limits -- 6.3 Modeling Task and Participatory Culture -- 6.4 Who is Modeling? -- 6.5 The Challenges of Online Participatory Modeling 6.6 Assessing Subjective Perceptions as Dependent Variables -- 6.7 Dealing with Small Sample Sizes -- 6.8 Modeling Experts Might Be Seen as Co-owners -- 6.9 Be Prepared, but Do Not Expect to Be Able to Foresee Everything -- 7 Conclusion -- References -- Designing an Ontology for Human Rights Violations Documentation Through Practitioner Input and Information Infrastructure Theory -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Human Rights Protection System and Technologies -- 2.2 Previous Relevant Ontology Research -- 3 Approach to Develop the Proposed Ontology -- 3.1 Overall Research Framework: Design Science Research -- 3.2 Design Theory: Information Infrastructures -- 4 Requirements Elicitation -- 4.1 Non-functional Requirements Elicitation -- 4.2 Functional Requirements Elicitation -- 4.3 Validation of Requirements -- 5 The Proposed Ontology -- 5.1 Full OntoRights -- 5.2 Simple OntoRights -- 5.3 Demonstration -- 6 Discussion -- 7 Conclusion -- References -- Correction to: Generating Low-Code Applications from Enterprise Ontology -- Correction to: Chapter "Generating Low-Code Applications from Enterprise Ontology" in: B. S. Barn and K. Sandkuhl (Eds.): The Practice of Enterprise Modeling, LNBIP 456, https://doi.org/10.1007/978-3-031-21488-2_2 -- Author Index Business enterprises-Data processing Unternehmensmodell (DE-588)4201186-3 gnd rswk-swf Prozessmanagement (DE-588)4353072-2 gnd rswk-swf Architektur Informatik (DE-588)4139374-0 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2022 London gnd-content Unternehmensmodell (DE-588)4201186-3 s Prozessmanagement (DE-588)4353072-2 s Betriebliches Informationssystem (DE-588)4069386-7 s Architektur Informatik (DE-588)4139374-0 s DE-604 Sandkuhl, Kurt Sonstige oth Erscheint auch als Druck-Ausgabe Barn, Balbir S. The Practice of Enterprise Modeling Cham : Springer International Publishing AG,c2022 9783031214875 |
spellingShingle | Barn, Balbir S. The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings Intro -- Preface -- Organization -- Contents -- Models in Information System Development -- Investigating The Effectiveness of Model-Based Testing on Testing Skill Acquisition -- 1 Introduction -- 2 Related Work -- 2.1 Teaching of Software Testing -- 2.2 Model-Based Testing -- 2.3 MERODE Code Generator and TesCaV -- 3 Research Method -- 3.1 Hypotheses -- 3.2 Experimental Design -- 3.3 Evaluation -- 4 Results -- 4.1 Personal Characteristic of the Participants -- 4.2 Test Case Coverage Scores -- 5 Discussion -- 5.1 Contributions -- 5.2 Internal Validity -- 5.3 External Validity -- 6 Conclusion -- 7 Further Research -- References -- Generating Low-Code Applications from Enterprise Ontology -- 1 Introduction -- 2 Theoretical Background -- 2.1 Enterprise Ontology -- 2.2 Enterprise Implementation -- 2.3 Model-Based Engineering and Low-Code Technology -- 3 Mapping -- 4 Implementation and Evaluation -- 5 Conclusions and Discussion -- References -- Supporting the Individuation, Analysis and Gamification of Software Components for Acceptance Requirements Fulfilment -- 1 Introduction -- 2 Motivation and Lessons Learned -- 2.1 Agon Framework -- 2.2 Activities and Lessons Learned. -- 3 SiaGAM Algorithm and Process -- 4 Case Study and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Modeling Enterprise Architectures -- Historization of Enterprise Architecture Models via Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background and Related Work -- 2.1 EA Debts and Smells -- 2.2 Graph-Based Analysis of EA Models -- 2.3 Graph Historization -- 3 Toward Historization for EA Models -- 3.1 Graph Structure -- 3.2 Storage -- 3.3 Historization Properties -- 4 Implementation -- 5 Analysis -- 6 Discussion -- 7 Conclusion -- References -- Towards Ontology-Based Validation of EA Principles -- 1 Introduction -- 2 Literature Review 2.1 Enterprise Architecture Management(EAM) -- 2.2 Formalizing Enterprise Architecture Models -- 2.3 Enterprise Architecture Principles -- 2.4 Formalizing EA Principles -- 2.5 Research Objective -- 3 Research Method -- 4 Automated Ontology-Based Validation of EA Principles -- 4.1 Knowledge in Models and EA Principles -- 4.2 Representing EA Models in an Enterprise Ontology -- 4.3 Representing EA Principles in an Enterprise Ontology -- 5 Step-By-Step Formalization and Validation of EA Principles -- 5.1 Step 1 - Specification of EA Principles -- 5.2 Step 2 - Creation of SBVR Rules -- 5.3 Step 3 - Formalization of the Vocabulary as an Ontology -- 5.4 Step 4 - Extending EA Models and EA Principles with Domain Knowledge -- 5.5 Step 5 - Formalization of the SBVR Rules -- 6 Evaluation -- 6.1 Case Description -- 6.2 Implemented Approach -- 7 Conclusion and Future Work -- References -- Ontological Analysis and Redesign of Security Modeling in ArchiMate -- 1 Introduction -- 2 Security Modeling in Archimate -- 2.1 The Original ArchiMate Risk and Security Overlay -- 2.2 Redesigned Risk Elements of ArchiMate Based on COVER -- 3 Ontological Foundations of Security -- 4 Ontologically-Founded Analysis of Security Modeling -- 5 Redesigning the Security Elements of ArchiMate -- 6 Related Work -- 7 Final Remarks -- References -- Modeling Capabilities and Ecosystems -- Foundations of Capability Maps - A Conceptual Comparison -- 1 Introduction -- 2 Background -- 3 Analytical Model -- 3.1 Overview of the Analytical Model -- 3.2 Conceptualization of a Capability -- 3.3 Conceptualization of a Capability Map -- 3.4 Conceptualization of In-Use Context -- 4 Research Results -- 4.1 The Studied Capability and Capability Map Constructs -- 4.2 Characterization of Capability Constructs -- 4.3 Characterization of Capability Map Constructs -- 4.4 Conceptualization of In-Use Context 5 Discussion -- 6 Conclusions -- References -- Applying and Evaluating the KYKLOS Method -- 1 Introduction -- 2 Background -- 2.1 Background on Modeling Methods and Evaluation Activities -- 2.2 Overview of KYKLOS -- 3 Methodology -- 4 The Case Study -- 4.1 Case Analysis -- 5 Evaluation Results -- 6 Discussion -- 7 Conclusions -- References -- Using Tangible Modeling to Create an e3value Conceptual Model for Digital Ecosystems -- 1 Introduction -- 2 Related Work -- 3 Relating TED and e3value : Study Design -- 4 The TED Methodology for Ecosystem Design -- 5 The e3value Methodology for Ecosystem Value Modeling -- 6 Relating the TED SM to e3value : The Mobility Platform -- 6.1 Use Case - Digital Platform for Mobility Services -- 6.2 TED SM Model for the Mobility Ecosystem -- 6.3 The e3value Model of the Mobility Ecosystem -- 6.4 Evaluation of the TED SM Model and the e3value Model -- 6.5 Analysis of TED SM Model and e3value Model Correspondences -- 7 Conclusion and Future Work -- References -- DSML and Meta-modeling -- Dynamic Models - The MetaMorph Formalism and Model-Operations -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 Systematization of Operations - Structural Events and Domain Events -- 2.3 ProVis - Probability Visualized -- 2.4 MetaMorph -- 3 Dynamic Models Through Operations -- 4 The Building Blocks of Domain-Specific Operations - Structural Events -- 5 Language Specific Operations - Domain Events -- 5.1 Creation Phase vs. Operationalization Phase -- 5.2 Lifted Structural Events and Domain Events for Operationalization -- 5.3 Case Study -- 6 Conclusion and Outlook -- References -- Establishing Interoperability Between the EMF and the MSDKVS Metamodeling Platforms*-4pt -- 1 Introduction -- 2 Metamodeling Foundations -- 2.1 EMF -- 2.2 MSDKVS -- 3 Related Work -- 3.1 Transformation Bridges -- 3.2 EMF and Microsoft DSL Tools 4 Comparative Analysis of EMF and MSDKVS -- 4.1 Abstract Syntax Features -- 4.2 Graphical Concrete Syntax Features -- 5 Transformation Bridge -- 5.1 EMF2MSDKVS -- 5.2 MSDKVS2EMF -- 5.3 MSDKVS2EMF Transformation Example -- 6 Evaluation -- 6.1 Research Questions -- 6.2 Experimental Setup -- 6.3 Results -- 6.4 Limitations -- 7 Conclusion -- References -- Beyond Business Development: Regulatory Assessment of Energy Sector Projects with Contextual Requirements Engineering -- 1 Introduction -- 2 Motivating Scenario -- 3 Requirements and Existing Modeling Approaches -- 3.1 Requirements -- 3.2 Selecting a Modeling Approach -- 4 Modeling the Motivating Scenario -- 5 Discussion -- 5.1 Lessons Learned -- 5.2 Towards Intertwining Regulation and Business Development -- 6 Concluding Outlook -- References -- Participatory Modeling -- A Methodology for DSML-Assisted Participatory Agent-Based Enterprise Modelling -- 1 Introduction -- 2 Case Study -- 3 Agent-Based Modelling Methodologies -- 4 DSML Methodologies -- 5 A Methodology for DSML-Assisted Participatory Agent-Based Modelling -- 5.1 System Analysis -- 5.2 Model Formalisation -- 5.3 Implementation -- 5.4 Evaluation -- 6 Conclusions -- References -- Advantages and Limitations of Experiments for Researching Participatory Enterprise Modeling and Recommendations for Their Implementation*-4pt -- 1 Introduction -- 2 Participatory Enterprise Modeling -- 3 Research Design Options for Examining PEM -- 4 Example Studies on Participatory Enterprise Modeling -- 4.1 Case Studies -- 4.2 Experimental Studies -- 5 Why Experiments on Participatory Modeling? -- 6 Lessons Learned and Recommendations for Future Experiments -- 6.1 The Kind of Model -- 6.2 Time Limits -- 6.3 Modeling Task and Participatory Culture -- 6.4 Who is Modeling? -- 6.5 The Challenges of Online Participatory Modeling 6.6 Assessing Subjective Perceptions as Dependent Variables -- 6.7 Dealing with Small Sample Sizes -- 6.8 Modeling Experts Might Be Seen as Co-owners -- 6.9 Be Prepared, but Do Not Expect to Be Able to Foresee Everything -- 7 Conclusion -- References -- Designing an Ontology for Human Rights Violations Documentation Through Practitioner Input and Information Infrastructure Theory -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Human Rights Protection System and Technologies -- 2.2 Previous Relevant Ontology Research -- 3 Approach to Develop the Proposed Ontology -- 3.1 Overall Research Framework: Design Science Research -- 3.2 Design Theory: Information Infrastructures -- 4 Requirements Elicitation -- 4.1 Non-functional Requirements Elicitation -- 4.2 Functional Requirements Elicitation -- 4.3 Validation of Requirements -- 5 The Proposed Ontology -- 5.1 Full OntoRights -- 5.2 Simple OntoRights -- 5.3 Demonstration -- 6 Discussion -- 7 Conclusion -- References -- Correction to: Generating Low-Code Applications from Enterprise Ontology -- Correction to: Chapter "Generating Low-Code Applications from Enterprise Ontology" in: B. S. Barn and K. Sandkuhl (Eds.): The Practice of Enterprise Modeling, LNBIP 456, https://doi.org/10.1007/978-3-031-21488-2_2 -- Author Index Business enterprises-Data processing Unternehmensmodell (DE-588)4201186-3 gnd Prozessmanagement (DE-588)4353072-2 gnd Architektur Informatik (DE-588)4139374-0 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
subject_GND | (DE-588)4201186-3 (DE-588)4353072-2 (DE-588)4139374-0 (DE-588)4069386-7 (DE-588)1071861417 |
title | The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
title_auth | The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
title_exact_search | The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
title_exact_search_txtP | The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
title_full | The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
title_fullStr | The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
title_full_unstemmed | The Practice of Enterprise Modeling 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
title_short | The Practice of Enterprise Modeling |
title_sort | the practice of enterprise modeling 15th ifip wg 8 1 working conference poem 2022 london uk november 23 25 2022 proceedings |
title_sub | 15th IFIP WG 8. 1 Working Conference, PoEM 2022, London, UK, November 23-25, 2022, Proceedings |
topic | Business enterprises-Data processing Unternehmensmodell (DE-588)4201186-3 gnd Prozessmanagement (DE-588)4353072-2 gnd Architektur Informatik (DE-588)4139374-0 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
topic_facet | Business enterprises-Data processing Unternehmensmodell Prozessmanagement Architektur Informatik Betriebliches Informationssystem Konferenzschrift 2022 London |
work_keys_str_mv | AT barnbalbirs thepracticeofenterprisemodeling15thifipwg81workingconferencepoem2022londonuknovember23252022proceedings AT sandkuhlkurt thepracticeofenterprisemodeling15thifipwg81workingconferencepoem2022londonuknovember23252022proceedings |