Provider-Independent Social Identity. Management for Personal and. Professional Applications
|
|
- Ruby Reeves
- 8 years ago
- Views:
Transcription
1 Provider-Independent Social Identity Management for Personal and Professional Applications Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften eingereicht an der Fakultät für Wirtschaftswissenschaften der Universität Regensburg vorgelegt von: Moritz Riesner Berichterstatter: Prof. Dr. Günther Pernul Prof. Dr. Guido Schryen Tag der Disputation: 11. Juli 2013
2 V Table of Contents 1 Introduction Motivation of the Dissertation Topic The Relevance of the Social Web is Increasing Privacy and Data Protection on Social Networking Sites Require Provider-Independent Social Identity Management PSIdM is Relevant in an Enterprise Environment PSIdM is a Novel and Relevant Research Topic Research Questions Research Methodology The Design Research Paradigm Application to the Dissertation Project Problem Identification and Motivation Objectives of a Solution Solution Design and Development Demonstration and Evaluation Communication Chapter Structure 10 1 Foundations and Motivation 13 2 Defining Internet Social Networking A Short History of Internet Communication Social Networking Sites (SNS) Internet Social Networking Properties for Distinguishing SNS SNS Function Set 21
3 2.2.4 SNS Architectures recliniceli Means lor SNS Access Iechnic.il Basics I Risi OAuth OpenSoci.il lacebook API I'wttter A l'i Concepts and Notions within SNS Users and User Profiles User Profile Elements The SNS User Profile as a Digital Identity Relationships Between SNS Entities Other Constructs in SNS Friend Lists, Groups and Events Messages Albums and Media Items Organizations Chapter Summary 34 Privacy and Social Identity Management in SNS Conventional Privacy and Identity Management Defining Privacy Identities and Online Identities Identity Management The Need for Social Identity Management (SIdM) Reevaluating Privacy and Identity Management applied to SNS SNS Data Increases in Quantity and Criticality SIdM on SNS becomes a Necessity User-performed SIdM is Currently Unsatisfactory Defining Social Identity Management and its Requirements High-Level SIdM Requirements Analysis Unrestricted Identity Creation and Control Multiple Representations of Self Social Circles Contact Permission Assignment Permission Targets Fine-Grained Sharing Decisions for Attribute Values Control How Contacts Shape the Users Profile Advanced Controls for Permission Assignment 54
4 VII 3.4 Chapter Summary 55 4 The Need for Provider-Independent Social Identity Management (PSIdM) Using Multiple SNS is Relevant and Desirable User Scenarios Casual End-User Scenario Enterprise Collaboration Scenario Cross-Company Collaboration Scenario Multiple SNS are Currently Used Multiple SNS Should be Used Envisioning Provider-Independent Social Identity Management SIdM Challenges when Using Multiple SNS Proposed Solution for PSIdM The Benefits of PSIdM Contribution of PISdM to SIdM Contribution of PISdM to the Use of Multiple SNS Enabler for Alternative, Privacy-friendly SNS Academic Contributions of PSIdM Research Problem Scope and Attacker Model Related Work Decentralized Approaches to Social Networking Federated Social Networking Architecture Peer-to-Peer Social Networking Architecture Access Control within SNS Social Network Management across Multiple SNS Description Languages for Social Entities Academic SNS-Spanning Management Approaches Implemented Solutions for Managing Multiple SNS Chapter Summary 79 II Proposed Solution for Provider-Independent Social Identity Management 81 5 High-Level Solution Concept for PSIdM Overview of the Proposed Solution for PSIdM The Use of Models in the Proposed Solution Global Provider-Independent Social Identity Model Elements of the Global Model Identifying Conflicts Using the Global Model Conflicts on the Attribute Level 90
5 Vili TABLE OF CONTENTS Conflicts on the Attribute Value Level Considering Overlapping SeAs Intertemporal Conflict Detection Performing SIdM within the Global Model Attribute Value Management Contact Management Persona and Audience Management Conflict Detection Management Provider-Specific Models Provider-Specific Target Models The Preliminary Provider-Dependent Target Model as a Subset of the Global Model Adapting the Preliminary Target Model to the SNS' SIdM Capabilities Deriving Actual Provider-Specific Models from the Current State in the SNS Composing the Global Model States and Transitions of the PSIdM-Solution Chapter Summary Detailed Design Considerations for the PSIdM Solution Building the Initial Global Identity Model Deriving Actual Provider-Dependent Models SNS Meta Information Structural Model for Provider-Specific Models Gathering Model Data from the SNS Composing the initial Global Model Ill Creating Global Contacts Identifying Global Audiences Creating Global Attributes and Personas Global Associations between Audiences and Personas A Refined Conception of the Global Identity Model Extensions to the Global Identity Model User View on the Global Model Main View on the Global Model Focus View for Particular SNS Context-based Information on SeAs and Personas Context-based Information on Contacts and Attribute Values PSIdM Operations 123
6 IX Indicate and Resolve Inconsistencies from the Composition Process Core SIdM Operations Maintaining Consistency of Disclosed Attribute Values Maintaining Consistency with the SNS Decomposition into Target Models Audience and Persona Applicability at the Target SNS Attribute Applicability in the Target SNS Application of the Target Models at SNS Reflecting SNS-Changes in the Global Model Chapter Summary Attribute Matching and Transformation between SNS Attribute Properties in SNS Attribute Semantics and Classification Attribute Content and Structure Control over Visibility and Access Attribute Accessibility through APIs A Structured Approach for Attribute Matching and Transformation Attribute Identification at the Target SNS Verifying Proper Representation at the Target SNS Attribute Control at the Target SNS Determining the Target Audience Control over the Attribute Value at the Target SNS Application at the Target SNS Sample Applications of the Attribute Transformation Approach Work Experience Attribute on Linkedin and Facebook Status Updates on Facebook and Twitter Design Alternatives of the Transformation Approach Centralized Static Matching Tables for SNS Attributes Semantic Reasoning based on Attribute Properties Detailed Transformation Approach Based on Semantic Reasoning Input and Output Data Input and Output Ontologies Background Ontology Reasoning Operations Chapter Summary 153
7 III Implementation and Evaluation Applicability of PSIdM to the Status Quo Provider Support Survey Support for General SIdM Constructs Support for Core SIdM Capabilities Unrestricted Identity Creation and Control Multiple Representations of Self Create and Maintain Multiple Social Circles Contact Permission Assignment SIdM Survey Analysis and Reflection API Accessibility Implications of the Available Provider Support for PSIdM Implications of the Available Provider SIdM Support Implications of the Available Provider API Accessibility Chapter Summary PSIdM Prototype Architecture and Implementation Proposed PSIdM Architecture Initial Considerations Architecture Overview Prototype Components Attribute Transformation Component SNS Connectivity Components SNS API Connectivity Component Connecting to SNS through the Web Interface PSIdM User Interface Assisted Audience Segregation Prototype Chapter Summary Evaluation of the PSIdM Proposal An Evaluation Strategy for the PSIdM Proposal Evaluation Building Blocks Suitability of the SIdM Requirements Framework Evaluation of the User Identity Models and their Constructs Model Correctness Construction Adequacy, Relevance and Clarity Systematic Design Comparability Economic Efficiency Applicability of PSIdM to Current SNS 195
8 XI Prototype Evaluation Overall Evaluation of the Proposal Fulfillment of Proposed Benefits and Related Requirements Contribution to SIdM Evaluation Evaluation of the Contribution to the Use of Multiple SNS Evaluation of PSIdM as an Enabler for Alternative SNS User Scenario Evaluation Casual End-User Scenario Enterprise Collaboration Scenario Intercompany Collaboration Scenario Open Research Issues and Future Work Evaluation Summary Conclusions 205 Bibliography 209
Privacy-preserving Infrastructure for. Social Identity Management
Privacy-preserving Infrastructure for Social Identity Management Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften (Dr. rer. pol.) eingereicht an der Fakultät für Wirtschaftswissenschaften
More informationE-Commerce Design and Implementation Tutorial
A Mediated Access Control Infrastructure for Dynamic Service Selection Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften (Dr. rer. pol.) eingereicht an der Fakultat fur
More informationCustomer Intimacy Analytics
Customer Intimacy Analytics Leveraging Operational Data to Assess Customer Knowledge and Relationships and to Measure their Business Impact by Francois Habryn Scientific Publishing CUSTOMER INTIMACY ANALYTICS
More informationBuyout and Distressed Private Equity: Performance and Value Creation
TECHNISCHE UNIVERSITAT MUNCHEN Lehrstuhl fur Betriebswirtschaftslehre - Finanzmanagement und Kapitalmarkte (Univ.-Prof. Dr. Christoph Kaserer) Buyout and Distressed Private Equity: Performance and Value
More informationTargeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context
TECHNISCHE UNIVERSITAT MUNCHEN Lehrstuhl fur Betriebswirtschaftslehre - Dienstleistungsund Technologiemarketing Targeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context
More informationUser Guidance in Business Process Modelling
User Guidance in Business Process Modelling Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften vorgelegt von Diplom-Wirtschaftsinformatiker (FH) Matthias Born aus Albstadt genehmigt von
More informationModel-Driven Scientific Workflow Engineering
A Framework for Model-Driven Scientific Workflow Engineering Dipl-Inform Guido Scherp Dissertation zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften (Dr-Ing) der Technischen Fakultat
More informationMulti-Channel Distribution Strategies in the Financial Services Industry
Multi-Channel Distribution Strategies in the Financial Services Industry DISSERTATION der Universität St. Gallen, Hochschule für Wirtschafts-, Rechts- und Sozialwissenschaften (HSG) zur Erlangung der Würde
More informationfor High Performance Computing
Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov
More informationSatellite-UMTS - Specification of Protocols and Traffic Performance Analysis
Satellite-UMTS - Specification of Protocols and Traffic Performance Analysis Von der Fakultat fur Elektrotechnik und Informationstechnik der Rheinisch-Westfalichen Technischen Hochschule Aachen zur Erlangung
More informationBoom and Bust Cycles in Scientific Literature A Toolbased Big-Data Analysis
Boom and Bust Cycles in Scientific Literature A Toolbased Big-Data Analysis Bachelorarbeit zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.) im Studiengang Wirtschaftsingenieur der Fakultät
More informationAn Enterprise Modeling Framework for Banks using. Algebraic Graph Transformation
An Enterprise Modeling Framework for Banks using Algebraic Graph Transformation vorgelegt von Diplom-Wirtschaftsinformatiker Christoph Brandt aus Berlin-Lichterfelde von der Fakultät IV - Elektrotechnik
More informationOptimized Scheduling in Real-Time Environments with Column Generation
JG U JOHANNES GUTENBERG UNIVERSITAT 1^2 Optimized Scheduling in Real-Time Environments with Column Generation Dissertation zur Erlangung des Grades,.Doktor der Naturwissenschaften" am Fachbereich Physik,
More informationDevelopment of a Portal for HR Executives to Enable Digital Personnel Files
Development of a Portal for HR Executives to Enable Digital Personnel Files Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen
More informationCOUNTERACTING PHISHING THROUGH HCI: DETECTING ATTACKS AND WARNING USERS
COUNTERACTING PHISHING THROUGH HCI: DETECTING ATTACKS AND WARNING USERS DISSERTATION an der Fakultat fur Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat Munchen vorgelegt von Diplom-Medieninformatiker
More informationRequirements and Challenges for the Migration from EDIFACT-Invoices to XML-Based Invoices. Master Thesis
Requirements and Challenges for the Migration from EDIFACT-Invoices to XML-Based Invoices Master Thesis zur Erlangung des akademischen Grades "Master of Science (M.Sc.)" im Studiengang Wirtschaftswissenschaften
More informationScalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
More informationThree Contributions to Experimental Economics
Three Contributions to Experimental Economics Dissertation zur Erlangung des wirtschaftswissenschaftlichen Doktorgrades der Wirtschaftswissenschaftlichen Fakultät der Georg-August-Universität Göttingen
More informationImplementation requirements for knowledge management components into ERP Systems: Comparison of software producers and companies
Implementation requirements for knowledge management components into ERP : Comparison of software producers and companies Bachelorarbeit Zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.)
More informationTaxonomy of social network data types
Richthammer et al. EURASIP Journal on Information Security 2014, 2014:11 RESEARCH Open Access Taxonomy of social network types Christian Richthammer *, Michael Netter, Moritz Riesner, Johannes Sänger and
More informationDevelopment of a Half-Automated Product Database for Search Engine Optimization. Masterarbeit
Development of a Half-Automated Product Database for Search Engine Optimization Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen
More informationProfessional Diploma in Digital Marketing
Professional Diploma in Digital Marketing Agenda Day 1: Day 2: Day 3: Day 4: Day 5: to Digital Marketing Search Engine Optimisation Search Engine Marketing Email Marketing Digital Display Advertising Mobile
More informationBIOMETRIC AUTHENTICATION AND AUTHORISATION INFRASTRUCTURES
BIOMETRIC AUTHENTICATION AND AUTHORISATION INFRASTRUCTURES Dissertation zur Erlangung des Grades eines Doktors der Wirtschaftswissenschaften eingereicht an der Wirtschaftswissenschaftlichen Fakultät der
More informationTool-Based Business Process Modeling using the SOM Approach
1 Ferstl, Sinz, et.al. : Tool-Based Business Process Modeling... Tool-Based Business Process Modeling using the SOM Approach Abstract Business processes play an important role in analyzing and designing
More informationA Systematic Security Approach in Software Requirements Engineering
A Systematic Security Approach in Software Requirements Engineering (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. (2) Dr.K.Alagarsamy, Associate
More informationA Declarative Definition Language for the Representation of Three-Dimensional Information Visualization
A Declarative Definition Language for the Representation of Three-Dimensional Information Visualization Gerald Jäschke Fachgebiet Informationssysteme, Universität Duisburg-Essen, Campus Duisburg 2005-06-15
More informationHandbook on E-marketing
Handbook on E-marketing for Tourism Destinations Fully revised and extended version 3.0 Table of Contents Foreword Acknowledgements How to Use this Handbook Executive Summary xiii xv xvii xix 1 Introduction
More informationSchneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
More informationIntroduction to Big Data Science
Introduction to Big Data Science 13 th Period Project: Situation Awareness and Statistical Analysis On Big Data Big Data Science 1 Contents What is Situation Awareness (SA)? 3 Levels for SA Role of Data
More informationA Process Model for Data Warehouses Integration to Enable Business Intelligence: An Applicability Check for the Airline Sector.
A Process Model for Data Warehouses Integration to Enable Business Intelligence: An Applicability Check for the Airline Sector Bachelorarbeit Zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.)
More information2. MOTIVATING SCENARIOS 1. INTRODUCTION
Multiple Dimensions of Concern in Software Testing Stanley M. Sutton, Jr. EC Cubed, Inc. 15 River Road, Suite 310 Wilton, Connecticut 06897 ssutton@eccubed.com 1. INTRODUCTION Software testing is an area
More informationFabrice Mogo Nem. Engineering Networks Holistic approach for multidiscipiinary Product Lifecycle Management. Band 9
/ TECHNISCHE UNIVERSITÄT Lehrstuhl für Virtuelle Produktentwicklung KAISERSLAUTERN Prof. Dr.-lng. Martin Eigner Fabrice Mogo Nem Engineering Networks Holistic approach for multidiscipiinary Product Lifecycle
More informationPrüfung von Traceability Links -Workshop
1 Prüfung von Traceability Links -Workshop Darmstadt, 7.12.2007 Agenda des Workshops 2 10.00 Begrüßung und Vorstellung der Teilnehmer 10.30 Erörterung der Entwicklungsmethoden 11.30 Mittagspause 12.15
More informationComparing Social Media Sites: A Facebook Case Study about Employer Branding. Bachelorarbeit
Comparing Social Media Sites: A Facebook Case Study about Employer Branding Bachelorarbeit zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen
More informationCommon Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August 1999. Version 2.
Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model August 1999 Version 2.1 CCIMB-99-031 Part 1: Introduction and general model Foreword This version of
More informationContributions To Ontology-Driven Requirements Engineering
Dissertation Contributions To Ontology-Driven Requirements Engineering bearbeitet von Dipl.-Medieninf. Katja Siegemund geboren am 26.05.1981 in Leipzig vorgelegt an der Technischen Universität Dresden
More informationFDD Process #1: Develop an Overall Model
FDD Process #1: Develop an Overall Model A initial project-wide activity with domain and development members under the guidance of an experienced object modeller in the role of Chief Architect. A high-level
More informationContent management and protection using Trusted Computing and MPEG-21 technologies
Technische Universität München Lehrstuhl für Datenverarbeitung Univ.-Prof. Dr.-Ing. K. Diepold Content management and protection using Trusted Computing and MPEG-21 technologies Florian Schreiner Vollständiger
More informationInformation for Students, Teachers and Examiners Annex 6: Marking
Information for Students, Teachers and Examiners Annex 6: Marking 1 All examination scripts resulting from timed unseen examinations shall be anonymous for the purpose of marking. Candidates will be assigned
More informationPOST-ACQUISITION INTEGRATION OF SMALL BIOTECHNOLOGY FIRMS
POST-ACQUISITION INTEGRATION OF SMALL BIOTECHNOLOGY FIRMS IN THE STRUCTURE OF LARGE PHARMACEUTICAL COMPANIES Inauguraldissertation zur Erlangung des Grades eines doctor rerum politicarum (Dr. rer. pol.)
More informationContents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53
Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software
More informationHow To Create A Social Web With A Free And Open Source Web Browser (W3C)
Balancing Data Utility and Privacy Protection in the Socially Aware Data Cloud Yuh-Jong Hu hu@cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,
More information3SL. Requirements Definition and Management Using Cradle
3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification
More informationTHE ROLE OF SMALL MANUFACTURING ENTERPRISES IN SUSTAINABLE REGIONAL DEVELOPMENT
THE ROLE OF SMALL MANUFACTURING ENTERPRISES IN SUSTAINABLE REGIONAL DEVELOPMENT Ismailia governorate as a case study in Egypt Als Dissertation zur Erlangung des akademischen Grades Doctor rerum naturalium
More informationKnowledge Management and Design - New Ideas
INTERNATIONAL DESIGN CONFERENCE - DESIGN 2004 Dubrovnik, May 18-21, 2004. New Ideas for Knowledge Management in Product Development Projects Christian Weber, Martin Pohl, Michael Steinbach Keywords: knowledge
More informationTable of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24
Table of Contents CHAPTER 1 Web-Based Systems 1 The Web 1 Web Applications 2 Let s Introduce a Case Study 3 Are WebApps Really Computer Software? 4 Are the Attributes of WebApps Different from the Attributes
More informationProblems in Diaspora: A Distributed Social Network
Problems in Diaspora: A Distributed Social Network Yousra Javed yjaved@uncc.edu ABSTRACT Recently, the notion of distributed social network has been introduced to address the limitations of centralized
More informationSocial Application Guide
Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved
More informationA Personalized Emotional Intelligent Tutoring System. Based on AI Planning
A Personalized Emotional Intelligent Tutoring System Based on AI Planning Dissertation zur Erlangung des Doktorgrades Doktor der Naturwissenschaften (Dr. rer. nat.) der Fakultät für Ingenieurwissenschaften
More informationMaster Data Management
Master Data Management David Loshin AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO Ик^И V^ SAN FRANCISCO SINGAPORE SYDNEY TOKYO W*m k^ MORGAN KAUFMANN PUBLISHERS IS AN IMPRINT OF ELSEVIER
More informationAppendix B Data Quality Dimensions
Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational
More informationExploring Architectural Design Decision Management Paradigms for Global Software Development
Exploring Architectural Design Decision Management Paradigms for Global Software Development Meiru Che, Dewayne E. Perry Department of Electrical & Computer Engineering The University of Texas at Austin
More informationPrivacy Seminar - Social Networks
Privacy Seminar - Social Networks Robert Kleinpenning & Judith van Stegeren 5th June 2015 Defining social networks What is a social network anyway? Defining social networks What is a social network anyway?
More information1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2
Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität
More informationSoftware Project Models
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 1, ISSUE 4 135 Software Project Models Abhimanyu Chopra, Abhinav Prashar, Chandresh Saini Email-abhinav.prashar@gmail.com,
More informationCHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN
CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN Central to this research is how the service industry or service providers use idesign as a new methodology to analyze, design,
More informationOverview of Information Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Information Security Murat Kantarcioglu Pag. 1 Purdue University Outline Information Security: basic concepts Privacy: basic
More informationTool Support for Software Variability Management and Product Derivation in Software Product Lines
Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,
More informationPiCsMu: A Cloud Overlay to Store and Manage Data
35th NMRG meeting @ Windsor Atlântica Rio de Janeiro, Brazil, 17th November 2014 PiCsMu: A Cloud Overlay to Store and Manage Data Guilherme Sperb Machado, Burkhard Stiller Department of Informatics IFI,
More informationSchema Mediation and Query Processing in Peer Data Management Systems
Schema Mediation and Query Processing in Peer Data Management Systems by Jie Zhao B.Sc., Fudan University, 2003 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of
More informationNetwork Technology (10101)
Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use
More informationUniversity of Regensburg
University of Regensburg Modeling the Impact of ICT on Business Performance: Empirical Evidence from SMEs in Germany and Jordan A dissertation presented By Mahmoud R M Almadhoun To The Chair of Innovation
More informationThema: Hybrid IT-Project Management: Design, Application and Analysis
Thema: Hybrid IT-Project Management: Design, Application and Analysis zur Erlangung des akademischen Grades Bachelor of Science (B.Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen
More informationEDOS Distribution System: a P2P architecture for open-source content dissemination
EDOS Distribution System: a P2P architecture for open-source content Serge Abiteboul 1, Itay Dar 2, Radu Pop 3, Gabriel Vasile 1 and Dan Vodislav 4 1. INRIA Futurs, France {firstname.lastname}@inria.fr
More informationSecure Cooperative Data Access in Multi-Cloud Environment
Mason Archival Repository Service http://mars.gmu.edu etd @ Mason (Electronic Theses and Dissertations) The Volgenau School of Engineering 2013 Secure Cooperative Data Access in Multi-Cloud Environment
More informationDESIGN SCIENCE IN NFC RESEARCH
DESIGN SCIENCE IN NFC RESEARCH Busra OZDENIZCI, Mehmet N. AYDIN, Vedat COSKUN and Kerem OK Department of Information Technology ISIK University, Istanbul, Turkey The 5th International Conference on Internet
More information2015. All rights reserved.
DOCUMENT: Future AAMI/IEC 62304:2006/AMD1, 18-August-2015 Final Draft International Standard for Vote, Amendment 1 to IEC 62304: Medical device software Software life cycle processes. Public Review Draft
More informationAdvanced Software Engineering. Software Development Processes
Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma Advanced Software Engineering Software Development Processes Prof. Agostino Poggi Software Development
More informationBusiness Models for Cellular Phones with RFID-Modules
Business Models for Cellular Phones with RFID-Modules Diplomarbeit zur Erlangung des Grades eines Diplom-Ökonomen der Wirtschaftswissenschaftlichen Fakultät der Leibniz Universität Hannover vorgelegt von
More informationFrom Business Process Modeling to the Specification of Distributed Business Application Systems - An Object-Oriented Approach -
From Business Process Modeling to the Specification of Distributed Business Application Systems - An Object-Oriented Approach - Otto K. Ferstl, Elmar J. Sinz 1 Abstract A business application system is
More informationInformation Systems Development Process (Software Development Life Cycle)
Information Systems Development Process (Software Development Life Cycle) Phase 1 Feasibility Study Concerned with analyzing the benefits and solutions for the identified problem area Includes development
More informationMethodological Approaches to Evaluation of Information System Functionality Performances and Importance of Successfulness Factors Analysis
Gordana Platiša Neđo Balaban Methodological Approaches to Evaluation of Information System Functionality Performances and Importance of Successfulness Factors Analysis Article Info:, Vol. 4 (2009), No.
More informationTable of Contents. Preface. Chapter 1 Introduction 1.1 Background. 1.2 Problem description. 1.3 The role of standardization. 1.4 Scope and objectives
Table of Contents Table of Contents Preface Chapter 1 Introduction 1.1 Background 1.2 Problem description 1.3 The role of standardization 1.4 Scope and objectives 1.5 Approach 1.6 Related work 1.7 General
More informationCharacterization of Microemulsions using Small Angle Scattering Techniques
Characterization of Microemulsions using Small Angle Scattering Techniques Dissertation zur Erlangung des akademischen Grades doctor rerum naturalium (Dr. rer. nat.) vorgelegt der Mathematisch-Naturwissenschaftlich-Technischen
More informationPrivacy and Identity Management for Europe
Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information
More informationModeling and Selection of Software Service Variants
Modeling and Selection of Software Service Variants Zur Erlangung des akademischen Grades eines Doktors der Ingenieurwissenschaften (Dr.-Ing.) von der Fakultät für Wirtschaftswissenschaften des Karlsruher
More informationUbiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue
Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Milene Serrano 1 and Maurício Serrano 1 1 Universidade de Brasília (UnB/FGA), Curso de Engenharia de Software,
More informationCapgemini Financial Services. 29 July 2010
Regulatory Compliance: The critical importance of data quality Capgemini Financial Services ACORD IT Club Presentation 29 July 2010 Confidentiality Agreement Notice to the Recipient of this Document The
More informationMobile Claims Management. IT-Based Innovation in Motor Insurance
Mobile Claims Management IT-Based Innovation in Motor Insurance DISSERTATION of the University of St.Gallen Graduate School of Business Administration, Economics, Law and Social Sciences (HSG) to obtain
More informationD6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013
D6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013 The purpose of these questions is to establish that the students understand the basic ideas that underpin the course. The answers
More informationOnline Customer Engagement Management A new trend?
Online Customer Engagement Management Academic Report By Georgia Fotaki, Nicole Gkerpini and Angeliki Iliana Triantou Supervisor: Prof. Sjaak Brinkkemper Utrecht University Business Informatics October
More informationAMACOM AMERICAN MANAGEMENT ASSOCIATION New York Atlanta Brüssels Chicago Mexico City San Francisco Shanghai Tokyo Toronto Washington, D.C.
THE ART OF SOCIAL SELLING Finding and Engaging Customers ort Twitter, Facebook, Linkedln, and Other Social Networks Shannon Belew AMACOM AMERICAN MANAGEMENT ASSOCIATION New York Atlanta Brüssels Chicago
More informationEvolution of Taxonomies and A Supply Chain of Things. Daniel E. O Leary University of Southern California 2012
Evolution of Taxonomies and A Supply Chain of Things Daniel E. O Leary University of Southern California 2012 0. Research about Research Before I drill down on taxonomies and ontologies I would like to
More informationSoberIT Software Business and Engineering Institute
Kumbang Modeler: A Prototype Tool for Modeling Variability Hanna Koivu, Mikko Raatikainen, Marko Nieminen, Tomi Männistö Helsinki University of Technology (TKK) Finland 1 Content Background: Kumbang, software
More informationA Service Modeling Approach with Business-Level Reusability and Extensibility
A Service Modeling Approach with Business-Level Reusability and Extensibility Jianwu Wang 1,2, Jian Yu 1, Yanbo Han 1 1 Institute of Computing Technology, Chinese Academy of Sciences, 100080, Beijing,
More informationMs Juliani -Syllabus Special Education-Language/ Writing
Ms Juliani -Syllabus Special Education-Language/ Writing * As a teacher, I have high expectations for my students and believe that they need to be encouraged, nurtured, and rewarded for their efforts.
More informationTwincore - Zentrum für Experimentelle und Klinische Infektionsforschung Institut für Molekulare Bakteriologie
Twincore - Zentrum für Experimentelle und Klinische Infektionsforschung Institut für Molekulare Bakteriologie 0 HELMHOLTZ I ZENTRUM FÜR INFEKTIONSFORSCHUNG Technische Universität Braunschweig Institut
More informationWEGOV ANALYSIS TOOLS TO CONNECT POLICY MAKERS WITH CITIZENS ONLINE
WEGOV ANALYSIS TOOLS TO CONNECT POLICY MAKERS WITH CITIZENS ONLINE Timo Wandhöfer, GESIS Leibniz Institute for the Social Sciences, Knowledge Technologies for the Social Sciences, Unter Sachsenhausen 6-8,
More informationAdvanced Service Creation: Bridging the Gap Between Requirements Elicitation and Service Design
Advanced Service Creation: Bridging the Gap Between Requirements Elicitation and Service Design Dionisis X. Adamopoulos 1, Constantine A. Papandreou 2 1 University of Piraeus, Greece and Centre for Communication
More informationBehavioral Service Substitution: Analysis and Synthesis
Behavioral Service Substitution: Analysis and Synthesis D I S S E R T A T I O N zur Erlangung des akademischen Grades Dr. rer. nat. im Fach Informatik eingereicht an der Mathematisch-Naturwissenschaftlichen
More informationSocial Networking: Power to the People
Social Networking: Power to the People Stefano Bortoli, Paolo Bouquet, and Themis Palpanas University of Trento, Dept. of Information Science and Engineering, Trento, Italy {bortoli, bouquet, themis}@disi.unitn.eu
More informationProf. Dr.-Ing. Klaus Meißner PD Dr.-Ing. habil. Martin Engelien (Hrsg.)
Technische Universität Dresden Fakultät Informatik Professur für Multimediatechnik, Privat-Dozentur für Angewandte Informatik Prof. Dr.-Ing. Klaus Meißner PD Dr.-Ing. habil. Martin Engelien (Hrsg.) an
More informationHow To Market Your Website Online
Internet marketing Corporate Training Program- Delhi School of Internet Marketing Under the training program all the trainees will not only be trained in internet marketing but they will be working on
More informationThe Internet of Products
Robert Neumann The Internet of Products An Approach to Establishing Total Transparency in Electronic Markets 4y Springer Vieweg Abstract V Acronyms XIII List of Figures.' XV List of Tables ;...., XIX Listings
More informationDevelop Project Charter. Develop Project Management Plan
Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs
More informationSome Research Challenges for Big Data Analytics of Intelligent Security
Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,
More informationCost-Benefit Analysis of Videoconferencing and Telepresence Systems in Virtual Project Environments: a Holistic Approach. D i p l o m a r b e i t
Cost-Benefit Analysis of Videoconferencing and Telepresence Systems in Virtual Project Environments: a Holistic Approach D i p l o m a r b e i t zur Erlangung des Grades eines Diplom-Ökonomen der Wirtschaftswissenschaftlichen
More informationOverview of major concepts in the service oriented extended OeBTO
Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business
More informationRequirements Management Database
Project Whitepaper Compliance with Pragmatic Marketing s That Work, LLC Project Whitepaper - Pragmatic Marketing's That Work Page 1 of 16 Introduction The Database has been designed for maximum flexibility
More informationA Framework for Software Product Line Engineering
Günter Böckle Klaus Pohl Frank van der Linden 2 A Framework for Software Product Line Engineering In this chapter you will learn: o The principles of software product line subsumed by our software product
More information