Search results

1 – 10 of over 8000
Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1037

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 11 September 2009

Ryan K.L. Ko, Stephen S.G. Lee and Eng Wah Lee

In the last two decades, a proliferation of business process management (BPM) modeling languages, standards and software systems has given rise to much confusion and obstacles to…

16113

Abstract

Purpose

In the last two decades, a proliferation of business process management (BPM) modeling languages, standards and software systems has given rise to much confusion and obstacles to adoption. Since new BPM languages and notation terminologies were not well defined, duplicate features are common. This paper seeks to make sense of the myriad BPM standards, organising them in a classification framework, and to identify key industry trends.

Design/methodology/approach

An extensive literature review is conducted and relevant BPM notations, languages and standards are referenced against the proposed BPM Standards Classification Framework, which lists each standard's distinct features, strengths and weaknesses.

Findings

The paper is unaware of any classification of BPM languages. An attempt is made to classify BPM languages, standards and notations into four main groups: execution, interchange, graphical, and diagnosis standards. At the present time, there is a lack of established diagnosis standards. It is hoped that such a classification facilitates the meaningful adoption of BPM languages, standards and notations.

Practical implications

The paper differentiates BPM standards, thereby resolving common misconceptions; establishes the need for diagnosis standards; identifies the strengths and limitations of current standards; and highlights current knowledge gaps and future trends. Researchers and practitioners may wish to position their work around this review.

Originality/value

Currently, to the best of one's knowledge, such an overview and such an analysis of BPM standards have not so far been undertaken.

Details

Business Process Management Journal, vol. 15 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 1 June 1992

Bruno Carrier

Formulates a new theoretical basis for a formal approach to strategies for multidimensional investment. Summarizes the concepts on which the model is based and shows how they are…

Abstract

Formulates a new theoretical basis for a formal approach to strategies for multidimensional investment. Summarizes the concepts on which the model is based and shows how they are combined within a dynamic schema. In order to prepare operational policies for multidimensional investment, enlarges the basic notion underlying investment epistemology, i.e. capital. Defines and analyses the concept of multidimensional capital and develops the notion of how to model dynamic networks of interacting active units, w hich self‐organize a multidimensional field into which systemic strategies of investment can be inserted

Details

Kybernetes, vol. 21 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 26 June 2023

Somia Boubedra, Cherif Tolba, Pietro Manzoni, Djamila Beddiar and Youcef Zennir

With the demographic increase, especially in big cities, heavy traffic, traffic congestion, road accidents and augmented pollution levels hamper transportation networks. Finding…

Abstract

Purpose

With the demographic increase, especially in big cities, heavy traffic, traffic congestion, road accidents and augmented pollution levels hamper transportation networks. Finding the optimal routes in urban scenarios is very challenging since it should consider reducing traffic jams, optimizing travel time, decreasing fuel consumption and reducing pollution levels accordingly. In this regard, the authors propose an enhanced approach based on the Ant Colony algorithm that allows vehicle drivers to search for optimal routes in urban areas from different perspectives, such as shortness and rapidness.

Design/methodology/approach

An improved ant colony algorithm (ACO) is used to calculate the optimal routes in an urban road network by adopting an elitism strategy, a random search approach and a flexible pheromone deposit-evaporate mechanism. In addition, the authors make a trade-off between route length, travel time and congestion level.

Findings

Experimental tests show that the routes found using the proposed algorithm improved the quality of the results by 30% in comparison with the ACO algorithm. In addition, the authors maintain a level of accuracy between 0.9 and 0.95. Therefore, the overall cost of the found solutions decreased from 67 to 40. In addition, the experimental results demonstrate that the authors’ improved algorithm outperforms not only the original ACO algorithm but also popular meta-heuristic algorithms such as the genetic algorithm (GA) and particle swarm optimization (PSO) in terms of reducing travel costs and improving overall fitness value.

Originality/value

The proposed improvements to the ACO to search for optimal paths for urban roads include incorporating multiple factors, such as travel length, time and congestion level, into the route selection process. Furthermore, random search, elitism strategy and flexible pheromone updating rules are proposed to consider the dynamic changes in road network conditions and make the proposed approach more relevant and effective. These enhancements contribute to the originality of the authors’ work, and they have the potential to advance the field of traffic routing.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 16 no. 4
Type: Research Article
ISSN: 1756-378X

Keywords

Open Access
Article
Publication date: 29 June 2020

Paolo Manghi, Claudio Atzori, Michele De Bonis and Alessia Bardi

Several online services offer functionalities to access information from “big research graphs” (e.g. Google Scholar, OpenAIRE, Microsoft Academic Graph), which correlate…

4533

Abstract

Purpose

Several online services offer functionalities to access information from “big research graphs” (e.g. Google Scholar, OpenAIRE, Microsoft Academic Graph), which correlate scholarly/scientific communication entities such as publications, authors, datasets, organizations, projects, funders, etc. Depending on the target users, access can vary from search and browse content to the consumption of statistics for monitoring and provision of feedback. Such graphs are populated over time as aggregations of multiple sources and therefore suffer from major entity-duplication problems. Although deduplication of graphs is a known and actual problem, existing solutions are dedicated to specific scenarios, operate on flat collections, local topology-drive challenges and cannot therefore be re-used in other contexts.

Design/methodology/approach

This work presents GDup, an integrated, scalable, general-purpose system that can be customized to address deduplication over arbitrary large information graphs. The paper presents its high-level architecture, its implementation as a service used within the OpenAIRE infrastructure system and reports numbers of real-case experiments.

Findings

GDup provides the functionalities required to deliver a fully-fledged entity deduplication workflow over a generic input graph. The system offers out-of-the-box Ground Truth management, acquisition of feedback from data curators and algorithms for identifying and merging duplicates, to obtain an output disambiguated graph.

Originality/value

To our knowledge GDup is the only system in the literature that offers an integrated and general-purpose solution for the deduplication graphs, while targeting big data scalability issues. GDup is today one of the key modules of the OpenAIRE infrastructure production system, which monitors Open Science trends on behalf of the European Commission, National funders and institutions.

Details

Data Technologies and Applications, vol. 54 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 22 June 2010

Sherif Sakr and Ghazi Al‐Naymat

The purpose of this paper is to provide a detailed discussion for different types of graph queries and a different mechanism for indexing and querying graph databases.

1154

Abstract

Purpose

The purpose of this paper is to provide a detailed discussion for different types of graph queries and a different mechanism for indexing and querying graph databases.

Design/methodology/approach

The paper reviews the existing approaches and techniques for indexing and querying graph databases. For each approach, the strengths and weaknesses are discussed with particular emphasis on the target application domain. Based on an analysis of the state‐of‐the‐art of research literature, the paper provides insights for future research directions and untouched challenging research aspects.

Findings

Several graph indexing and querying techniques have been proposed in the literature. However, there is still a clear room for improvement and further research issues in that domain.

Research limitations/implications

The paper identifies the advantages and disadvantages of the different graph indexing mechanisms and their suitability for different practical applications. The paper provides some guidelines and recommendations which are useful for future research in the area of graph databases.

Practical implications

The paper has practical implications for social networks, protein networks, chemical compounds, multimedia database, and semantic web.

Originality/value

The paper contributes to the implementation of an efficient indexing and querying mechanism for graph databases in different application domains.

Details

International Journal of Web Information Systems, vol. 6 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 17 April 2009

Antonia Albani and Jan L.G. Dietz

Modern enterprises face a strong economical pressure to increase competitiveness, to operate on a global market, and to engage in alliances of several kinds. In order to meet the…

3681

Abstract

Purpose

Modern enterprises face a strong economical pressure to increase competitiveness, to operate on a global market, and to engage in alliances of several kinds. In order to meet the requirements and challenges of participating in such alliances, companies must be able to cooperate effectively and efficiently. The purpose of this paper is to provide an overview of some major directions in inter‐organizational cooperation.

Design/methodology/approach

In order to cope with the challenges of inter‐organizational cooperation, to share innovative research issues and to facilitate profound discussions about them, the authors organized a series of workshops on Modeling Inter‐Organizational Systems (MIOS‐CIAO!) starting at the annual OTM Federated Conference and Continuing at the Annual CAiSE Conference. This paper summarizes the results of the workshops.

Findings

This paper provides an overview of what has been established and what is going on regarding the cooperation of enterprises in networks. The focus has been on the modeling of cooperation, from the business level down to the implementation level.

Practical implications

This overview is a useful source of knowledge for those who want to have a quick insight in the relevant aspects of cooperation, and in many well‐known modeling approaches and techniques. It is also an inspiring source for those who want to investigate yet unsolved or unsatisfactorily solved problems. Although developments, both in theory and in practice, will go on, no landslides are expected. Particularly for practice, the value of this report will therefore last for a considerable time.

Originality/value

Several core notions in the area of inter‐organizational cooperation are clarified, such as collaboration, cooperation, enterprise network, choreography, and orchestration. The whole process of developing or investigating an enterprise network is covered.

Details

Journal of Enterprise Information Management, vol. 22 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Open Access
Article
Publication date: 5 April 2023

Tomás Lopes and Sérgio Guerreiro

Testing business processes is crucial to assess the compliance of business process models with requirements. Automating this task optimizes testing efforts and reduces human error…

2610

Abstract

Purpose

Testing business processes is crucial to assess the compliance of business process models with requirements. Automating this task optimizes testing efforts and reduces human error while also providing improvement insights for the business process modeling activity. The primary purposes of this paper are to conduct a literature review of Business Process Model and Notation (BPMN) testing and formal verification and to propose the Business Process Evaluation and Research Framework for Enhancement and Continuous Testing (bPERFECT) framework, which aims to guide business process testing (BPT) research and implementation. Secondary objectives include (1) eliciting the existing types of testing, (2) evaluating their impact on efficiency and (3) assessing the formal verification techniques that complement testing.

Design/methodology/approach

The methodology used is based on Kitchenham's (2004) original procedures for conducting systematic literature reviews.

Findings

Results of this study indicate that three distinct business process model testing types can be found in the literature: black/gray-box, regression and integration. Testing and verification approaches differ in aspects such as awareness of test data, coverage criteria and auxiliary representations used. However, most solutions pose notable hindrances, such as BPMN element limitations, that lead to limited practicality.

Research limitations/implications

The databases selected in the review protocol may have excluded relevant studies on this topic. More databases and gray literature could also be considered for inclusion in this review.

Originality/value

Three main originality aspects are identified in this study as follows: (1) the classification of process model testing types, (2) the future trends foreseen for BPMN model testing and verification and (3) the bPERFECT framework for testing business processes.

Details

Business Process Management Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 7 October 2021

Lantian Li and Bahareh Pahlevanzadeh

Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and…

Abstract

Purpose

Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and compliance. This paper aims to maximize the covered human resource (HR) vulnerabilities and minimize the security costs in the enterprise cloud using a fuzzy-based method and firefly optimization algorithm.

Design/methodology/approach

Cloud computing provides a platform to improve the quality and availability of IT resources. It changes the way people communicate and conduct their businesses. However, some security concerns continue to derail the expansion of cloud-based systems into all parts of human life. Enterprise cloud security is a vital component in ensuring the long-term stability of cloud technology by instilling trust. In this paper, a fuzzy-based method and firefly optimization algorithm are suggested for optimizing HR vulnerabilities while mitigating security expenses in organizational cloud environments. MATLAB is employed as a simulation tool to assess the efficiency of the suggested recommendation algorithm. The suggested approach is based on the firefly algorithm (FA) since it is swift and reduces randomization throughout the lookup for an optimal solution, resulting in improved performance.

Findings

The fuzzy-based method and FA unveil better performance than existing met heuristic algorithms. Using a simulation, all the results are verified. The study findings showed that this method could simulate complex and dynamic security problems in cloud services.

Practical implications

The findings may be utilized to assist the cloud provider or tenant of the cloud infrastructure system in taking appropriate risk mitigation steps.

Originality/value

Using a fuzzy-based method and FA to maximize the covered HR vulnerabilities and minimize the security costs in the enterprise cloud is the main novelty of this paper.

Details

Kybernetes, vol. 51 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 15 July 2022

Hongming Gao, Hongwei Liu, Weizhen Lin and Chunfeng Chen

Purchase conversion prediction aims to improve user experience and convert visitors into real buyers to drive sales of firms; however, the total conversion rate is low, especially…

Abstract

Purpose

Purchase conversion prediction aims to improve user experience and convert visitors into real buyers to drive sales of firms; however, the total conversion rate is low, especially for e-retailers. To date, little is known about how e-retailers can scientifically detect users' intents within a purchase conversion funnel during their ongoing sessions and strategically optimize real-time marketing tactics corresponding to dynamic intent states. This study mainly aims to detect a real-time state of the conversion funnel based on graph theory, which refers to a five-class classification problem in the overt real-time choice decisions (RTCDs)—click, tag-to-wishlist, add-to-cart, remove-from-cart and purchase—during an ongoing session.

Design/methodology/approach

The authors propose a novel graph-theoretic framework to detect different states of the conversion funnel by identifying a user's unobserved mindset revealed from their navigation process graph, namely clickstream graph. First, the raw clickstream data are identified into individual sessions based on a 30-min time-out heuristic approach. Then, the authors convert each session into a sequence of temporal item-level clickstream graphs and conduct a temporal graph feature engineering according to the basic, single-, dyadic- and triadic-node and global characteristics. Furthermore, the synthetic minority oversampling technique is adopted to address with the problem of classifying imbalanced data. Finally, the authors train and test the proposed approach with several popular artificial intelligence algorithms.

Findings

The graph-theoretic approach validates that users' latent intent states within the conversion funnel can be interpreted as time-varying natures of their online graph footprints. In particular, the experimental results indicate that the graph-theoretic feature-oriented models achieve a substantial improvement of over 27% in line with the macro-average and micro-average area under the precision-recall curve, as compared to the conventional ones. In addition, the top five informative graph features for RTCDs are found to be Transitivity, Edge, Node, Degree and Reciprocity. In view of interpretability, the basic, single-, dyadic- and triadic-node and global characteristics of clickstream graphs have their specific advantages.

Practical implications

The findings suggest that the temporal graph-theoretic approach can form an efficient and powerful AI-based real-time intent detecting decision-support system. Different levels of graph features have their specific interpretability on RTCDs from the perspectives of consumer behavior and psychology, which provides a theoretical basis for the design of computer information systems and the optimization of the ongoing session intervention or recommendation in e-commerce.

Originality/value

To the best of the authors' knowledge, this is the first study to apply clickstream graphs and real-time decision choices in conversion prediction and detection. Most studies have only meditated on a binary classification problem, while this study applies a graph-theoretic approach in a five-class classification problem. In addition, this study constructs temporal item-level graphs to represent the original structure of clickstream session data based on graph theory. The time-varying characteristics of the proposed approach enhance the performance of purchase conversion detection during an ongoing session.

Details

Kybernetes, vol. 52 no. 11
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 8000