Context management in modeling information systems (IS)

https://doi.org/10.1016/S0950-5849(99)00070-1Get rights and content

Abstract

Knowledge engineering methods are shown to have an important role in addressing the challenge of building trusted contexts; namely, in providing solutions to the problems of complexity, conformity, changeability and invisibility. Current information systems (IS) design practices, however, are seen to solve only those problems pertaining to the global enterprise system, while leaving the validation issues related to user/local models unresolved. Context management mechanisms associated with the user/local models are shown to provide a basis for dynamic validation of user requirements. The proposed context management process has been developed to allow context representation and dynamic knowledge structuring at the epistemological level.

Introduction

The complexity of modern information systems (IS), particularly those designed for electronic commerce or enterprise-wide solutions, such as supply chain management, is based on the high levels of commercial integrity and performance now required to deliver value to customers in a globally competitive environment. The need to model the performance of these mission-critical systems and to establish that the requirements/contribution of all stakeholders have been accurately captured, validated and integrated in the design of the requisite system is, therefore, critical if the IS conceptual foundations and modeling methodologies are to be trusted.

Trusted systems have traditionally referred to highly secure, complex systems, typically in defence and the intelligence communities, and more recently, in electronic payment systems. Formal methods have often been used to specify such systems requirements, and real-world modeling is regarded as essential in validating real-time control and command environments of specified operational performance. More recently, formal methods have been used to model the requirements of complex commercial systems, such as corporate EDI gateways [21], but the high level of trust required of such systems can only be satisfied with effective mapping processes between the requirements specification and the IS design. With the disappearance of financial paper, such as share certificates, and more generally, the move to digital certification technologies for authentication and validation, and in evidence based medicine for example, there is an overarching requirement for trusted systems.

In 1987, Brooks [4] described four essential difficulties that are inherent in software products, namely, complexity, conformity, changeability and invisibility. As software products are, in fact, at the core of any computerized IS, these difficulties can also be identified as pertinent to enterprise-wide IS solutions. It is, therefore, necessary to extend the original descriptions to encompass IS systems and to ask what other properties are required for trusted systems?

Complexity: IS are inherently complex in terms of a number of elements and their states and interactions that are needed to achieve the system functions.

Conformity: IS must conform to the business and technical environments they operate in, otherwise they fail to provide the functionality that is expected of them.

Changeability: IS are embedded in a cultural matrix of business processes, users, laws and technology solutions that change continually, forcing changes upon the information systems.

Invisibility: Software is invisible and unable to be visualized. Therefore, all IS requirements that are not explicitly represented become hidden in the programs that implement them.These difficulties are not mutually exclusive. Invisibility makes it difficult to maintain conformity, as the original requirements are not apparent when validating the requirements or implementing necessary changes. Changeability is affected by complexity since it is more difficult to plan and design changes in a complex system. And of course, conformity must be continuously maintained in the ever-changing business and technical environments.

It is also important to understand that the four issues are equally relevant, both when developing an initial IS solution, and also, when IS modifications are forced by changing requirements. The design and development methods employed to build the system decide how easy or difficult it is to make subsequent modifications. Subsequent changes should also be expected to affect, usually adversely, the system's maintainability!

In this paper, contemporary IS development practices, addressing the difficulties cited earlier, are reviewed. In particular, it is shown that knowledge acquisition and representation techniques are being combined with traditional development methods to create more efficient development environments. It is argued that development techniques and knowledge modeling methods currently in use, focus on efficiency rather than the requirement for trusted system, and therefore, are inadequate to address invisibility and conformity problems. The need for contextual reference and context management is identified to resolve the underlying conflict between local and global requirements in building trusted systems.

Section snippets

Handling complexity

Information systems methodologies can be classified as either process, data or object oriented. The structured analysis and design methods [8], [22] are mainly focused on process modeling. On the other hand, information engineering methods [7], [11] place emphasis on data modeling. Modern object-oriented methods [1], [9], [15] integrate data and behavior into classes. All of them, however, employ the ‘divide and conquer strategy’ in order to address the problem of information system complexity.

Invisibility

As systems development progresses, early analysis and design models typically become disassociated from the more specific builder and subcontractor models. Eventually, many domain rules, design assumptions and decisions may be hidden in the application code. In order to perform any modification of the system, the code and low level (programming) specifications of the system have to be studied to discover all relevant information that is not recoverable anymore from the initial, high-level

Conformity

An information system has to conform first and foremost to the business requirements. There are two sources of requirements; namely, the users and the business experts! The users specify IS support needed to perform individual business tasks, while the experts are concerned with overall business rules and processes. And while some methodologies are enterprise-oriented and others user-centered, there is, in fact, a need to draw on both the users' and business experts' expertise in order to

Context management requirements

A global enterprise model is the result of successful interpretation of the stakeholders' goals, and subsequently, context-dependent unification of local and global requirements.

Existing knowledge representation methods like KADS or conceptual graphs, which are usually based on a single domain knowledge representation, cannot provide the requisite bridge between local models and the global entity, unless complemented with higher order conceptual structures for knowledge modeling, which entails

Future research

The importance of context management in creating trusted IS has justified new research initiatives to discover.

  • Representation of trusted contexts in IS specification and design practices, particularly in such domains as electronic commerce. The ECORP project on opportunistic reasoning contexts in electronic trading (Garner and Song, unpublished research) has informed our understanding of this issue!

  • Context classification process: As requirements are gathered and captured with their contexts,

Conclusion

This paper explains how existing knowledge engineering methods can help in overcoming the four difficulties inherent in IS; namely, complexity, conformity, changeability and invisibility. Current approaches are seen to solve only those problems pertaining to the global enterprise system, however, while leaving the validation issues related to user/local models unresolved. Context management mechanisms associated with the user/local models are shown to provide a basis for dynamic validation of

References (22)

  • R.J. Brachman

    On the epistemological status of semantic networks

  • R.J. Brachman et al.

    An overview of the KL-ONE knowledge representation system

    Cognitive Science

    (1985)
  • G. Booch et al.

    The Unified Modelling Language User Manual

    (1999)
  • F. Brooks

    No silver bullet: essence and accidents of software engineering

    Computer

    (1987)
  • X. Chen et al.

    Towards an integrated method for hybrid information system development

    Software Engineering: IEE Proceedings

    (1997)
  • P. Devanbu et al.

    LaSSIE: a knowledge-based software information system

    Communication of the ACM

    (1991)
  • C. Finkelstein

    Information Engineering

    (1991)
  • C. Gane

    Rapid System Development: using Structured Techniques and Relational Technology

    (1989)
  • I. Jacobson et al.

    The Unified Software Development Process

    (1999)
  • D. Lukose, Goal interpretation as a knowledge acquisition mechanism, unpublished PhD thesis, Department of Computing...
  • J. Martin

    Information Engineering

    (1990)
  • Cited by (12)

    • Fault-tolerant context development and requirement validation in ERP systems

      2015, Computer Standards and Interfaces
      Citation Excerpt :

      In this paper, we have specifically addressed this limitation, by applying context classification to the models presented in [1,6]. We have modeled this dynamic activity in the context of knowledge engineering, which is typically employed in order to develop trusted contexts in information systems [4]. In this regard, we prove that knowledge acquisition, representation, and integration techniques can be successfully combined with our context modeling method.

    • Reusing enterprise models to build platform independent computer models

      2017, Information Systems and e-Business Management
    • Modern automated designing systems

      2013, Intelligent Technologies in Logistics and Mechatronics Systems, ITELMS 2013 - Proceedings of the 8th International Conference
    View all citing articles on Scopus
    View full text