Provider-Independent Social Identity. Management for Personal and. Professional Applications

Size: px
Start display at page:

Download "Provider-Independent Social Identity. Management for Personal and. Professional Applications"

Transcription

1 Provider-Independent Social Identity Management for Personal and Professional Applications Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften eingereicht an der Fakultät für Wirtschaftswissenschaften der Universität Regensburg vorgelegt von: Moritz Riesner Berichterstatter: Prof. Dr. Günther Pernul Prof. Dr. Guido Schryen Tag der Disputation: 11. Juli 2013

2 V Table of Contents 1 Introduction Motivation of the Dissertation Topic The Relevance of the Social Web is Increasing Privacy and Data Protection on Social Networking Sites Require Provider-Independent Social Identity Management PSIdM is Relevant in an Enterprise Environment PSIdM is a Novel and Relevant Research Topic Research Questions Research Methodology The Design Research Paradigm Application to the Dissertation Project Problem Identification and Motivation Objectives of a Solution Solution Design and Development Demonstration and Evaluation Communication Chapter Structure 10 1 Foundations and Motivation 13 2 Defining Internet Social Networking A Short History of Internet Communication Social Networking Sites (SNS) Internet Social Networking Properties for Distinguishing SNS SNS Function Set 21

3 2.2.4 SNS Architectures recliniceli Means lor SNS Access Iechnic.il Basics I Risi OAuth OpenSoci.il lacebook API I'wttter A l'i Concepts and Notions within SNS Users and User Profiles User Profile Elements The SNS User Profile as a Digital Identity Relationships Between SNS Entities Other Constructs in SNS Friend Lists, Groups and Events Messages Albums and Media Items Organizations Chapter Summary 34 Privacy and Social Identity Management in SNS Conventional Privacy and Identity Management Defining Privacy Identities and Online Identities Identity Management The Need for Social Identity Management (SIdM) Reevaluating Privacy and Identity Management applied to SNS SNS Data Increases in Quantity and Criticality SIdM on SNS becomes a Necessity User-performed SIdM is Currently Unsatisfactory Defining Social Identity Management and its Requirements High-Level SIdM Requirements Analysis Unrestricted Identity Creation and Control Multiple Representations of Self Social Circles Contact Permission Assignment Permission Targets Fine-Grained Sharing Decisions for Attribute Values Control How Contacts Shape the Users Profile Advanced Controls for Permission Assignment 54

4 VII 3.4 Chapter Summary 55 4 The Need for Provider-Independent Social Identity Management (PSIdM) Using Multiple SNS is Relevant and Desirable User Scenarios Casual End-User Scenario Enterprise Collaboration Scenario Cross-Company Collaboration Scenario Multiple SNS are Currently Used Multiple SNS Should be Used Envisioning Provider-Independent Social Identity Management SIdM Challenges when Using Multiple SNS Proposed Solution for PSIdM The Benefits of PSIdM Contribution of PISdM to SIdM Contribution of PISdM to the Use of Multiple SNS Enabler for Alternative, Privacy-friendly SNS Academic Contributions of PSIdM Research Problem Scope and Attacker Model Related Work Decentralized Approaches to Social Networking Federated Social Networking Architecture Peer-to-Peer Social Networking Architecture Access Control within SNS Social Network Management across Multiple SNS Description Languages for Social Entities Academic SNS-Spanning Management Approaches Implemented Solutions for Managing Multiple SNS Chapter Summary 79 II Proposed Solution for Provider-Independent Social Identity Management 81 5 High-Level Solution Concept for PSIdM Overview of the Proposed Solution for PSIdM The Use of Models in the Proposed Solution Global Provider-Independent Social Identity Model Elements of the Global Model Identifying Conflicts Using the Global Model Conflicts on the Attribute Level 90

5 Vili TABLE OF CONTENTS Conflicts on the Attribute Value Level Considering Overlapping SeAs Intertemporal Conflict Detection Performing SIdM within the Global Model Attribute Value Management Contact Management Persona and Audience Management Conflict Detection Management Provider-Specific Models Provider-Specific Target Models The Preliminary Provider-Dependent Target Model as a Subset of the Global Model Adapting the Preliminary Target Model to the SNS' SIdM Capabilities Deriving Actual Provider-Specific Models from the Current State in the SNS Composing the Global Model States and Transitions of the PSIdM-Solution Chapter Summary Detailed Design Considerations for the PSIdM Solution Building the Initial Global Identity Model Deriving Actual Provider-Dependent Models SNS Meta Information Structural Model for Provider-Specific Models Gathering Model Data from the SNS Composing the initial Global Model Ill Creating Global Contacts Identifying Global Audiences Creating Global Attributes and Personas Global Associations between Audiences and Personas A Refined Conception of the Global Identity Model Extensions to the Global Identity Model User View on the Global Model Main View on the Global Model Focus View for Particular SNS Context-based Information on SeAs and Personas Context-based Information on Contacts and Attribute Values PSIdM Operations 123

6 IX Indicate and Resolve Inconsistencies from the Composition Process Core SIdM Operations Maintaining Consistency of Disclosed Attribute Values Maintaining Consistency with the SNS Decomposition into Target Models Audience and Persona Applicability at the Target SNS Attribute Applicability in the Target SNS Application of the Target Models at SNS Reflecting SNS-Changes in the Global Model Chapter Summary Attribute Matching and Transformation between SNS Attribute Properties in SNS Attribute Semantics and Classification Attribute Content and Structure Control over Visibility and Access Attribute Accessibility through APIs A Structured Approach for Attribute Matching and Transformation Attribute Identification at the Target SNS Verifying Proper Representation at the Target SNS Attribute Control at the Target SNS Determining the Target Audience Control over the Attribute Value at the Target SNS Application at the Target SNS Sample Applications of the Attribute Transformation Approach Work Experience Attribute on Linkedin and Facebook Status Updates on Facebook and Twitter Design Alternatives of the Transformation Approach Centralized Static Matching Tables for SNS Attributes Semantic Reasoning based on Attribute Properties Detailed Transformation Approach Based on Semantic Reasoning Input and Output Data Input and Output Ontologies Background Ontology Reasoning Operations Chapter Summary 153

7 III Implementation and Evaluation Applicability of PSIdM to the Status Quo Provider Support Survey Support for General SIdM Constructs Support for Core SIdM Capabilities Unrestricted Identity Creation and Control Multiple Representations of Self Create and Maintain Multiple Social Circles Contact Permission Assignment SIdM Survey Analysis and Reflection API Accessibility Implications of the Available Provider Support for PSIdM Implications of the Available Provider SIdM Support Implications of the Available Provider API Accessibility Chapter Summary PSIdM Prototype Architecture and Implementation Proposed PSIdM Architecture Initial Considerations Architecture Overview Prototype Components Attribute Transformation Component SNS Connectivity Components SNS API Connectivity Component Connecting to SNS through the Web Interface PSIdM User Interface Assisted Audience Segregation Prototype Chapter Summary Evaluation of the PSIdM Proposal An Evaluation Strategy for the PSIdM Proposal Evaluation Building Blocks Suitability of the SIdM Requirements Framework Evaluation of the User Identity Models and their Constructs Model Correctness Construction Adequacy, Relevance and Clarity Systematic Design Comparability Economic Efficiency Applicability of PSIdM to Current SNS 195

8 XI Prototype Evaluation Overall Evaluation of the Proposal Fulfillment of Proposed Benefits and Related Requirements Contribution to SIdM Evaluation Evaluation of the Contribution to the Use of Multiple SNS Evaluation of PSIdM as an Enabler for Alternative SNS User Scenario Evaluation Casual End-User Scenario Enterprise Collaboration Scenario Intercompany Collaboration Scenario Open Research Issues and Future Work Evaluation Summary Conclusions 205 Bibliography 209

Privacy-preserving Infrastructure for. Social Identity Management

Privacy-preserving Infrastructure for. Social Identity Management Privacy-preserving Infrastructure for Social Identity Management Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften (Dr. rer. pol.) eingereicht an der Fakultät für Wirtschaftswissenschaften

More information

A Mediated Access Control Infrastructure for Dynamic Service Selection

A Mediated Access Control Infrastructure for Dynamic Service Selection A Mediated Access Control Infrastructure for Dynamic Service Selection Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften (Dr. rer. pol.) eingereicht an der Fakultat fur

More information

Customer Intimacy Analytics

Customer Intimacy Analytics Customer Intimacy Analytics Leveraging Operational Data to Assess Customer Knowledge and Relationships and to Measure their Business Impact by Francois Habryn Scientific Publishing CUSTOMER INTIMACY ANALYTICS

More information

User Guidance in Business Process Modelling

User Guidance in Business Process Modelling User Guidance in Business Process Modelling Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften vorgelegt von Diplom-Wirtschaftsinformatiker (FH) Matthias Born aus Albstadt genehmigt von

More information

Buyout and Distressed Private Equity: Performance and Value Creation

Buyout and Distressed Private Equity: Performance and Value Creation TECHNISCHE UNIVERSITAT MUNCHEN Lehrstuhl fur Betriebswirtschaftslehre - Finanzmanagement und Kapitalmarkte (Univ.-Prof. Dr. Christoph Kaserer) Buyout and Distressed Private Equity: Performance and Value

More information

Targeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context

Targeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context TECHNISCHE UNIVERSITAT MUNCHEN Lehrstuhl fur Betriebswirtschaftslehre - Dienstleistungsund Technologiemarketing Targeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context

More information

Model-Driven Scientific Workflow Engineering

Model-Driven Scientific Workflow Engineering A Framework for Model-Driven Scientific Workflow Engineering Dipl-Inform Guido Scherp Dissertation zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften (Dr-Ing) der Technischen Fakultat

More information

Multi-Channel Distribution Strategies in the Financial Services Industry

Multi-Channel Distribution Strategies in the Financial Services Industry Multi-Channel Distribution Strategies in the Financial Services Industry DISSERTATION der Universität St. Gallen, Hochschule für Wirtschafts-, Rechts- und Sozialwissenschaften (HSG) zur Erlangung der Würde

More information

for High Performance Computing

for High Performance Computing Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov

More information

Satellite-UMTS - Specification of Protocols and Traffic Performance Analysis

Satellite-UMTS - Specification of Protocols and Traffic Performance Analysis Satellite-UMTS - Specification of Protocols and Traffic Performance Analysis Von der Fakultat fur Elektrotechnik und Informationstechnik der Rheinisch-Westfalichen Technischen Hochschule Aachen zur Erlangung

More information

Boom and Bust Cycles in Scientific Literature A Toolbased Big-Data Analysis

Boom and Bust Cycles in Scientific Literature A Toolbased Big-Data Analysis Boom and Bust Cycles in Scientific Literature A Toolbased Big-Data Analysis Bachelorarbeit zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.) im Studiengang Wirtschaftsingenieur der Fakultät

More information

An Enterprise Modeling Framework for Banks using. Algebraic Graph Transformation

An Enterprise Modeling Framework for Banks using. Algebraic Graph Transformation An Enterprise Modeling Framework for Banks using Algebraic Graph Transformation vorgelegt von Diplom-Wirtschaftsinformatiker Christoph Brandt aus Berlin-Lichterfelde von der Fakultät IV - Elektrotechnik

More information

Development of a Portal for HR Executives to Enable Digital Personnel Files

Development of a Portal for HR Executives to Enable Digital Personnel Files Development of a Portal for HR Executives to Enable Digital Personnel Files Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen

More information

Optimized Scheduling in Real-Time Environments with Column Generation

Optimized Scheduling in Real-Time Environments with Column Generation JG U JOHANNES GUTENBERG UNIVERSITAT 1^2 Optimized Scheduling in Real-Time Environments with Column Generation Dissertation zur Erlangung des Grades,.Doktor der Naturwissenschaften" am Fachbereich Physik,

More information

COUNTERACTING PHISHING THROUGH HCI: DETECTING ATTACKS AND WARNING USERS

COUNTERACTING PHISHING THROUGH HCI: DETECTING ATTACKS AND WARNING USERS COUNTERACTING PHISHING THROUGH HCI: DETECTING ATTACKS AND WARNING USERS DISSERTATION an der Fakultat fur Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat Munchen vorgelegt von Diplom-Medieninformatiker

More information

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many

More information

Requirements and Challenges for the Migration from EDIFACT-Invoices to XML-Based Invoices. Master Thesis

Requirements and Challenges for the Migration from EDIFACT-Invoices to XML-Based Invoices. Master Thesis Requirements and Challenges for the Migration from EDIFACT-Invoices to XML-Based Invoices Master Thesis zur Erlangung des akademischen Grades "Master of Science (M.Sc.)" im Studiengang Wirtschaftswissenschaften

More information

Introduction to Big Data Science

Introduction to Big Data Science Introduction to Big Data Science 13 th Period Project: Situation Awareness and Statistical Analysis On Big Data Big Data Science 1 Contents What is Situation Awareness (SA)? 3 Levels for SA Role of Data

More information

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August 1999. Version 2.

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August 1999. Version 2. Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model August 1999 Version 2.1 CCIMB-99-031 Part 1: Introduction and general model Foreword This version of

More information

Taxonomy of social network data types

Taxonomy of social network data types Richthammer et al. EURASIP Journal on Information Security 2014, 2014:11 RESEARCH Open Access Taxonomy of social network types Christian Richthammer *, Michael Netter, Moritz Riesner, Johannes Sänger and

More information

3SL. Requirements Definition and Management Using Cradle

3SL. Requirements Definition and Management Using Cradle 3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification

More information

Implementation requirements for knowledge management components into ERP Systems: Comparison of software producers and companies

Implementation requirements for knowledge management components into ERP Systems: Comparison of software producers and companies Implementation requirements for knowledge management components into ERP : Comparison of software producers and companies Bachelorarbeit Zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.)

More information

Three Contributions to Experimental Economics

Three Contributions to Experimental Economics Three Contributions to Experimental Economics Dissertation zur Erlangung des wirtschaftswissenschaftlichen Doktorgrades der Wirtschaftswissenschaftlichen Fakultät der Georg-August-Universität Göttingen

More information

Tool-Based Business Process Modeling using the SOM Approach

Tool-Based Business Process Modeling using the SOM Approach 1 Ferstl, Sinz, et.al. : Tool-Based Business Process Modeling... Tool-Based Business Process Modeling using the SOM Approach Abstract Business processes play an important role in analyzing and designing

More information

2. MOTIVATING SCENARIOS 1. INTRODUCTION

2. MOTIVATING SCENARIOS 1. INTRODUCTION Multiple Dimensions of Concern in Software Testing Stanley M. Sutton, Jr. EC Cubed, Inc. 15 River Road, Suite 310 Wilton, Connecticut 06897 ssutton@eccubed.com 1. INTRODUCTION Software testing is an area

More information

Master Data Management

Master Data Management Master Data Management David Loshin AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO Ик^И V^ SAN FRANCISCO SINGAPORE SYDNEY TOKYO W*m k^ MORGAN KAUFMANN PUBLISHERS IS AN IMPRINT OF ELSEVIER

More information

PiCsMu: A Cloud Overlay to Store and Manage Data

PiCsMu: A Cloud Overlay to Store and Manage Data 35th NMRG meeting @ Windsor Atlântica Rio de Janeiro, Brazil, 17th November 2014 PiCsMu: A Cloud Overlay to Store and Manage Data Guilherme Sperb Machado, Burkhard Stiller Department of Informatics IFI,

More information

Professional Diploma in Digital Marketing

Professional Diploma in Digital Marketing Professional Diploma in Digital Marketing Agenda Day 1: Day 2: Day 3: Day 4: Day 5: to Digital Marketing Search Engine Optimisation Search Engine Marketing Email Marketing Digital Display Advertising Mobile

More information

Network Technology (10101)

Network Technology (10101) Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use

More information

D6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013

D6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013 D6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013 The purpose of these questions is to establish that the students understand the basic ideas that underpin the course. The answers

More information

Contributions To Ontology-Driven Requirements Engineering

Contributions To Ontology-Driven Requirements Engineering Dissertation Contributions To Ontology-Driven Requirements Engineering bearbeitet von Dipl.-Medieninf. Katja Siegemund geboren am 26.05.1981 in Leipzig vorgelegt an der Technischen Universität Dresden

More information

Table of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24

Table of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24 Table of Contents CHAPTER 1 Web-Based Systems 1 The Web 1 Web Applications 2 Let s Introduce a Case Study 3 Are WebApps Really Computer Software? 4 Are the Attributes of WebApps Different from the Attributes

More information

Getting Started with Service- Oriented Architecture (SOA) Terminology

Getting Started with Service- Oriented Architecture (SOA) Terminology Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a

More information

A Systematic Security Approach in Software Requirements Engineering

A Systematic Security Approach in Software Requirements Engineering A Systematic Security Approach in Software Requirements Engineering (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. (2) Dr.K.Alagarsamy, Associate

More information

A Declarative Definition Language for the Representation of Three-Dimensional Information Visualization

A Declarative Definition Language for the Representation of Three-Dimensional Information Visualization A Declarative Definition Language for the Representation of Three-Dimensional Information Visualization Gerald Jäschke Fachgebiet Informationssysteme, Universität Duisburg-Essen, Campus Duisburg 2005-06-15

More information

BIOMETRIC AUTHENTICATION AND AUTHORISATION INFRASTRUCTURES

BIOMETRIC AUTHENTICATION AND AUTHORISATION INFRASTRUCTURES BIOMETRIC AUTHENTICATION AND AUTHORISATION INFRASTRUCTURES Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften eingereicht an der Wirtschaftswissenschaftlichen Fakultät der

More information

Handbook on E-marketing

Handbook on E-marketing Handbook on E-marketing for Tourism Destinations Fully revised and extended version 3.0 Table of Contents Foreword Acknowledgements How to Use this Handbook Executive Summary xiii xv xvii xix 1 Introduction

More information

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53 Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

A Process Model for Data Warehouses Integration to Enable Business Intelligence: An Applicability Check for the Airline Sector.

A Process Model for Data Warehouses Integration to Enable Business Intelligence: An Applicability Check for the Airline Sector. A Process Model for Data Warehouses Integration to Enable Business Intelligence: An Applicability Check for the Airline Sector Bachelorarbeit Zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.)

More information

Essays on Enforcement of Accounting Standards, Audit Quality, and Lobbying

Essays on Enforcement of Accounting Standards, Audit Quality, and Lobbying Essays on Enforcement of Accounting Standards, Audit Quality, and Lobbying Inaugural-Dissertation zur Erlangung des Doktorgrades des Fachbereichs Wirtschaftswissenschaften der Johann Wolfgang Goethe-Universitat

More information

Information Systems Development Process (Software Development Life Cycle)

Information Systems Development Process (Software Development Life Cycle) Information Systems Development Process (Software Development Life Cycle) Phase 1 Feasibility Study Concerned with analyzing the benefits and solutions for the identified problem area Includes development

More information

Capgemini Financial Services. 29 July 2010

Capgemini Financial Services. 29 July 2010 Regulatory Compliance: The critical importance of data quality Capgemini Financial Services ACORD IT Club Presentation 29 July 2010 Confidentiality Agreement Notice to the Recipient of this Document The

More information

Prüfung von Traceability Links -Workshop

Prüfung von Traceability Links -Workshop 1 Prüfung von Traceability Links -Workshop Darmstadt, 7.12.2007 Agenda des Workshops 2 10.00 Begrüßung und Vorstellung der Teilnehmer 10.30 Erörterung der Entwicklungsmethoden 11.30 Mittagspause 12.15

More information

Ontology for PLM Implementation to Facilitate Inorganic Growth for an Organization

Ontology for PLM Implementation to Facilitate Inorganic Growth for an Organization Ontology for PLM Implementation to Facilitate Inorganic Growth for an Organization By Subbanarasaiah K.V.Akshintala, Ganeshraj Machandran and Pitchiah Ramaswamy Introduction Corporate mergers occur when

More information

Comparing Social Media Sites: A Facebook Case Study about Employer Branding. Bachelorarbeit

Comparing Social Media Sites: A Facebook Case Study about Employer Branding. Bachelorarbeit Comparing Social Media Sites: A Facebook Case Study about Employer Branding Bachelorarbeit zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen

More information

THE ROLE OF SMALL MANUFACTURING ENTERPRISES IN SUSTAINABLE REGIONAL DEVELOPMENT

THE ROLE OF SMALL MANUFACTURING ENTERPRISES IN SUSTAINABLE REGIONAL DEVELOPMENT THE ROLE OF SMALL MANUFACTURING ENTERPRISES IN SUSTAINABLE REGIONAL DEVELOPMENT Ismailia governorate as a case study in Egypt Als Dissertation zur Erlangung des akademischen Grades Doctor rerum naturalium

More information

Fabrice Mogo Nem. Engineering Networks Holistic approach for multidiscipiinary Product Lifecycle Management. Band 9

Fabrice Mogo Nem. Engineering Networks Holistic approach for multidiscipiinary Product Lifecycle Management. Band 9 / TECHNISCHE UNIVERSITÄT Lehrstuhl für Virtuelle Produktentwicklung KAISERSLAUTERN Prof. Dr.-lng. Martin Eigner Fabrice Mogo Nem Engineering Networks Holistic approach for multidiscipiinary Product Lifecycle

More information

System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director

System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical

More information

Problems in Diaspora: A Distributed Social Network

Problems in Diaspora: A Distributed Social Network Problems in Diaspora: A Distributed Social Network Yousra Javed yjaved@uncc.edu ABSTRACT Recently, the notion of distributed social network has been introduced to address the limitations of centralized

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

This approach could be a promising IT-adaptation of the worksheet technique suggested by Hansen and Andreasen [Hans-99].

This approach could be a promising IT-adaptation of the worksheet technique suggested by Hansen and Andreasen [Hans-99]. INTERNATIONAL DESIGN CONFERENCE - DESIGN 2004 Dubrovnik, May 18-21, 2004. New Ideas for Knowledge Management in Product Development Projects Christian Weber, Martin Pohl, Michael Steinbach Keywords: knowledge

More information

Development of a Half-Automated Product Database for Search Engine Optimization. Masterarbeit

Development of a Half-Automated Product Database for Search Engine Optimization. Masterarbeit Development of a Half-Automated Product Database for Search Engine Optimization Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen

More information

Appendix B Data Quality Dimensions

Appendix B Data Quality Dimensions Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

More information

Agenda. Overview. Federation Requirements. Panlab IST034305 Teagle for Partners

Agenda. Overview. Federation Requirements. Panlab IST034305 Teagle for Partners Agenda Panlab IST034305 Teagle for Partners Sebastian Wahle, sebastian.wahle@fokus.fraunhofer.de Overview Testbed Federation Requirements Panlab Roles Federation Architecture Functional Components of Teagle

More information

MEMBI PRIVACY POLICY

MEMBI PRIVACY POLICY MEMBI 1 PURPOSE OF OUR POLICY 1.1 Membi Limited (Company Number 09775238) of 396a Kingston Road, Kingston Road, London SW20 8LL, United Kingdom (Membi, we, us or our) provides the services offered on the

More information

Table of Contents. Preface. Chapter 1 Introduction 1.1 Background. 1.2 Problem description. 1.3 The role of standardization. 1.4 Scope and objectives

Table of Contents. Preface. Chapter 1 Introduction 1.1 Background. 1.2 Problem description. 1.3 The role of standardization. 1.4 Scope and objectives Table of Contents Table of Contents Preface Chapter 1 Introduction 1.1 Background 1.2 Problem description 1.3 The role of standardization 1.4 Scope and objectives 1.5 Approach 1.6 Related work 1.7 General

More information

SQMB '11 Automated Model Quality Rating of Embedded Systems

SQMB '11 Automated Model Quality Rating of Embedded Systems SQMB '11 Automated Model Quality Rating of Embedded Systems Jan Scheible (jan.scheible@daimler.com) Daimler AG - Group Research and Advanced Engineering Hartmut Pohlheim (pohlheim@model-engineers.com)

More information

Advanced Service Creation: Bridging the Gap Between Requirements Elicitation and Service Design

Advanced Service Creation: Bridging the Gap Between Requirements Elicitation and Service Design Advanced Service Creation: Bridging the Gap Between Requirements Elicitation and Service Design Dionisis X. Adamopoulos 1, Constantine A. Papandreou 2 1 University of Piraeus, Greece and Centre for Communication

More information

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2 Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität

More information

Exploring Architectural Design Decision Management Paradigms for Global Software Development

Exploring Architectural Design Decision Management Paradigms for Global Software Development Exploring Architectural Design Decision Management Paradigms for Global Software Development Meiru Che, Dewayne E. Perry Department of Electrical & Computer Engineering The University of Texas at Austin

More information

Information for Students, Teachers and Examiners Annex 6: Marking

Information for Students, Teachers and Examiners Annex 6: Marking Information for Students, Teachers and Examiners Annex 6: Marking 1 All examination scripts resulting from timed unseen examinations shall be anonymous for the purpose of marking. Candidates will be assigned

More information

POST-ACQUISITION INTEGRATION OF SMALL BIOTECHNOLOGY FIRMS

POST-ACQUISITION INTEGRATION OF SMALL BIOTECHNOLOGY FIRMS POST-ACQUISITION INTEGRATION OF SMALL BIOTECHNOLOGY FIRMS IN THE STRUCTURE OF LARGE PHARMACEUTICAL COMPANIES Inauguraldissertation zur Erlangung des Grades eines doctor rerum politicarum (Dr. rer. pol.)

More information

FDD Process #1: Develop an Overall Model

FDD Process #1: Develop an Overall Model FDD Process #1: Develop an Overall Model A initial project-wide activity with domain and development members under the guidance of an experienced object modeller in the role of Chief Architect. A high-level

More information

SoberIT Software Business and Engineering Institute

SoberIT Software Business and Engineering Institute Kumbang Modeler: A Prototype Tool for Modeling Variability Hanna Koivu, Mikko Raatikainen, Marko Nieminen, Tomi Männistö Helsinki University of Technology (TKK) Finland 1 Content Background: Kumbang, software

More information

Tool Support for Software Variability Management and Product Derivation in Software Product Lines

Tool Support for Software Variability Management and Product Derivation in Software Product Lines Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,

More information

Content management and protection using Trusted Computing and MPEG-21 technologies

Content management and protection using Trusted Computing and MPEG-21 technologies Technische Universität München Lehrstuhl für Datenverarbeitung Univ.-Prof. Dr.-Ing. K. Diepold Content management and protection using Trusted Computing and MPEG-21 technologies Florian Schreiner Vollständiger

More information

Balancing Data Utility and Privacy Protection in the Socially Aware Data Cloud

Balancing Data Utility and Privacy Protection in the Socially Aware Data Cloud Balancing Data Utility and Privacy Protection in the Socially Aware Data Cloud Yuh-Jong Hu hu@cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,

More information

EDOS Distribution System: a P2P architecture for open-source content dissemination

EDOS Distribution System: a P2P architecture for open-source content dissemination EDOS Distribution System: a P2P architecture for open-source content Serge Abiteboul 1, Itay Dar 2, Radu Pop 3, Gabriel Vasile 1 and Dan Vodislav 4 1. INRIA Futurs, France {firstname.lastname}@inria.fr

More information

The SPES Methodology Modeling- and Analysis Techniques

The SPES Methodology Modeling- and Analysis Techniques The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München boehmw@in.tum.de Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

Certified Information Professional 2016 Update Outline

Certified Information Professional 2016 Update Outline Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability

More information

Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009)

Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009) Electronic Communications of the EASST Volume X (2009) Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009) Poporo: A Formal Framework for Social Networking

More information

Requirements Traceability. Mirka Palo

Requirements Traceability. Mirka Palo Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS

More information

Digital Identity Management

Digital Identity Management Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University bertino@cs.purdue.edu Digital Identity Management What is DI? Digital identity (DI)

More information

Software Configuration Management Plan

Software Configuration Management Plan For Database Applications Document ID: Version: 2.0c Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 22 Copyright 2000-2005 Digital Publications LLC.

More information

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp. Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms

More information

Social Networking: Power to the People

Social Networking: Power to the People Social Networking: Power to the People Stefano Bortoli, Paolo Bouquet, and Themis Palpanas University of Trento, Dept. of Information Science and Engineering, Trento, Italy {bortoli, bouquet, themis}@disi.unitn.eu

More information

City of Portland Job Code: 30000560. Systems Accountant GENERAL PURPOSE DISTINGUISHING CHARACTERISTICS ESSENTIAL DUTIES AND RESPONSIBILITIES

City of Portland Job Code: 30000560. Systems Accountant GENERAL PURPOSE DISTINGUISHING CHARACTERISTICS ESSENTIAL DUTIES AND RESPONSIBILITIES City of Portland Job Code: 30000560 Systems Accountant FLSA Status: Union Representation: Exempt Nonrepresented GENERAL PURPOSE Under general supervision, performs difficult and responsible accounting

More information

Secure Document Circulation Using Web Services Technologies

Secure Document Circulation Using Web Services Technologies Secure Document Circulation Using Web Services Technologies Shane Bracher Bond University, Gold Coast QLD 4229, Australia Siemens AG (Corporate Technology), Otto-Hahn-Ring 6, 81739 Munich, Germany sbracher@student.bond.edu.au

More information

Secure Cooperative Data Access in Multi-Cloud Environment

Secure Cooperative Data Access in Multi-Cloud Environment Mason Archival Repository Service http://mars.gmu.edu etd @ Mason (Electronic Theses and Dissertations) The Volgenau School of Engineering 2013 Secure Cooperative Data Access in Multi-Cloud Environment

More information

Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue

Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Milene Serrano 1 and Maurício Serrano 1 1 Universidade de Brasília (UnB/FGA), Curso de Engenharia de Software,

More information

The Internet of Products

The Internet of Products Robert Neumann The Internet of Products An Approach to Establishing Total Transparency in Electronic Markets 4y Springer Vieweg Abstract V Acronyms XIII List of Figures.' XV List of Tables ;...., XIX Listings

More information

Requirements Management Database

Requirements Management Database Project Whitepaper Compliance with Pragmatic Marketing s That Work, LLC Project Whitepaper - Pragmatic Marketing's That Work Page 1 of 16 Introduction The Database has been designed for maximum flexibility

More information

COMPONENTS in a database environment

COMPONENTS in a database environment COMPONENTS in a database environment DATA data is integrated and shared by many users. a database is a representation of a collection of related data. underlying principles: hierarchical, network, relational

More information

Privacy Seminar - Social Networks

Privacy Seminar - Social Networks Privacy Seminar - Social Networks Robert Kleinpenning & Judith van Stegeren 5th June 2015 Defining social networks What is a social network anyway? Defining social networks What is a social network anyway?

More information

Contents. Acknowledgments

Contents. Acknowledgments Abstract Acknowledgments Acronyms iii v xiii 1 Introduction 1 1.1 Problems and Motivation 3 1.1.1 Competition by Web/Internet Application Service Providers 3 1.1.2 Web-Telecom Service and Application Convergence

More information

A Personalized Emotional Intelligent Tutoring System. Based on AI Planning

A Personalized Emotional Intelligent Tutoring System. Based on AI Planning A Personalized Emotional Intelligent Tutoring System Based on AI Planning Dissertation zur Erlangung des Doktorgrades Doktor der Naturwissenschaften (Dr. rer. nat.) der Fakultät für Ingenieurwissenschaften

More information

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

ISSA Guidelines on Master Data Management in Social Security

ISSA Guidelines on Master Data Management in Social Security ISSA GUIDELINES ON INFORMATION AND COMMUNICATION TECHNOLOGY ISSA Guidelines on Master Data Management in Social Security Dr af t ve rsi on v1 Draft version v1 The ISSA Guidelines for Social Security Administration

More information

Social Application Guide

Social Application Guide Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved

More information

Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II)

Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

E-banking Services for Automated Agent-based Trading

E-banking Services for Automated Agent-based Trading E-banking Services for Automated Agent-based Trading Monique Calisti Whitestein Technologies AG Ghotthardstrasse 50 8002 Zurich, Switzerland mca@whitestein.com Emma Rollon Laboratoire d Intelligence Artificielle

More information

Mastering increasing product complexity with Collaborative Systems Engineering and PLM

Mastering increasing product complexity with Collaborative Systems Engineering and PLM Mastering increasing product complexity with Collaborative Systems Engineering and PLM Thierry Ambroisine Dassault Systèmes 10 rue Marcel Dassault, 78140 Vélizy Villacoublay, France thierry.ambroisine@3ds.com

More information

Custom Development Methodology Appendix

Custom Development Methodology Appendix 1 Overview Custom Development Methodology Appendix Blackboard s custom software development methodology incorporates standard software development lifecycles in a way that allows for rapid development

More information

Brauchen die Digital Humanities eine eigene Methodologie?

Brauchen die Digital Humanities eine eigene Methodologie? Deutsche DH, Passau 26.03.2014 Brauchen die Digital Humanities eine eigene Methodologie? 26. März 2014 Heyer / Niekler / Wiedemann 1 Übersicht Aspekte der Operationalisierung geistes- und sozialwissenschaftlicher

More information

Software Project Models

Software Project Models INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 1, ISSUE 4 135 Software Project Models Abhimanyu Chopra, Abhinav Prashar, Chandresh Saini Email-abhinav.prashar@gmail.com,

More information

A Framework for Software Product Line Engineering

A Framework for Software Product Line Engineering Günter Böckle Klaus Pohl Frank van der Linden 2 A Framework for Software Product Line Engineering In this chapter you will learn: o The principles of software product line subsumed by our software product

More information

Behavioral Service Substitution: Analysis and Synthesis

Behavioral Service Substitution: Analysis and Synthesis Behavioral Service Substitution: Analysis and Synthesis D I S S E R T A T I O N zur Erlangung des akademischen Grades Dr. rer. nat. im Fach Informatik eingereicht an der Mathematisch-Naturwissenschaftlichen

More information

DESIGN SCIENCE IN NFC RESEARCH

DESIGN SCIENCE IN NFC RESEARCH DESIGN SCIENCE IN NFC RESEARCH Busra OZDENIZCI, Mehmet N. AYDIN, Vedat COSKUN and Kerem OK Department of Information Technology ISIK University, Istanbul, Turkey The 5th International Conference on Internet

More information