Context management in modeling information systems (IS)
Introduction
The complexity of modern information systems (IS), particularly those designed for electronic commerce or enterprise-wide solutions, such as supply chain management, is based on the high levels of commercial integrity and performance now required to deliver value to customers in a globally competitive environment. The need to model the performance of these mission-critical systems and to establish that the requirements/contribution of all stakeholders have been accurately captured, validated and integrated in the design of the requisite system is, therefore, critical if the IS conceptual foundations and modeling methodologies are to be trusted.
Trusted systems have traditionally referred to highly secure, complex systems, typically in defence and the intelligence communities, and more recently, in electronic payment systems. Formal methods have often been used to specify such systems requirements, and real-world modeling is regarded as essential in validating real-time control and command environments of specified operational performance. More recently, formal methods have been used to model the requirements of complex commercial systems, such as corporate EDI gateways [21], but the high level of trust required of such systems can only be satisfied with effective mapping processes between the requirements specification and the IS design. With the disappearance of financial paper, such as share certificates, and more generally, the move to digital certification technologies for authentication and validation, and in evidence based medicine for example, there is an overarching requirement for trusted systems.
In 1987, Brooks [4] described four essential difficulties that are inherent in software products, namely, complexity, conformity, changeability and invisibility. As software products are, in fact, at the core of any computerized IS, these difficulties can also be identified as pertinent to enterprise-wide IS solutions. It is, therefore, necessary to extend the original descriptions to encompass IS systems and to ask what other properties are required for trusted systems?
Complexity: IS are inherently complex in terms of a number of elements and their states and interactions that are needed to achieve the system functions.
Conformity: IS must conform to the business and technical environments they operate in, otherwise they fail to provide the functionality that is expected of them.
Changeability: IS are embedded in a cultural matrix of business processes, users, laws and technology solutions that change continually, forcing changes upon the information systems.
Invisibility: Software is invisible and unable to be visualized. Therefore, all IS requirements that are not explicitly represented become hidden in the programs that implement them.These difficulties are not mutually exclusive. Invisibility makes it difficult to maintain conformity, as the original requirements are not apparent when validating the requirements or implementing necessary changes. Changeability is affected by complexity since it is more difficult to plan and design changes in a complex system. And of course, conformity must be continuously maintained in the ever-changing business and technical environments.
It is also important to understand that the four issues are equally relevant, both when developing an initial IS solution, and also, when IS modifications are forced by changing requirements. The design and development methods employed to build the system decide how easy or difficult it is to make subsequent modifications. Subsequent changes should also be expected to affect, usually adversely, the system's maintainability!
In this paper, contemporary IS development practices, addressing the difficulties cited earlier, are reviewed. In particular, it is shown that knowledge acquisition and representation techniques are being combined with traditional development methods to create more efficient development environments. It is argued that development techniques and knowledge modeling methods currently in use, focus on efficiency rather than the requirement for trusted system, and therefore, are inadequate to address invisibility and conformity problems. The need for contextual reference and context management is identified to resolve the underlying conflict between local and global requirements in building trusted systems.
Section snippets
Handling complexity
Information systems methodologies can be classified as either process, data or object oriented. The structured analysis and design methods [8], [22] are mainly focused on process modeling. On the other hand, information engineering methods [7], [11] place emphasis on data modeling. Modern object-oriented methods [1], [9], [15] integrate data and behavior into classes. All of them, however, employ the ‘divide and conquer strategy’ in order to address the problem of information system complexity.
Invisibility
As systems development progresses, early analysis and design models typically become disassociated from the more specific builder and subcontractor models. Eventually, many domain rules, design assumptions and decisions may be hidden in the application code. In order to perform any modification of the system, the code and low level (programming) specifications of the system have to be studied to discover all relevant information that is not recoverable anymore from the initial, high-level
Conformity
An information system has to conform first and foremost to the business requirements. There are two sources of requirements; namely, the users and the business experts! The users specify IS support needed to perform individual business tasks, while the experts are concerned with overall business rules and processes. And while some methodologies are enterprise-oriented and others user-centered, there is, in fact, a need to draw on both the users' and business experts' expertise in order to
Context management requirements
A global enterprise model is the result of successful interpretation of the stakeholders' goals, and subsequently, context-dependent unification of local and global requirements.
Existing knowledge representation methods like KADS or conceptual graphs, which are usually based on a single domain knowledge representation, cannot provide the requisite bridge between local models and the global entity, unless complemented with higher order conceptual structures for knowledge modeling, which entails
Future research
The importance of context management in creating trusted IS has justified new research initiatives to discover.
- •
Representation of trusted contexts in IS specification and design practices, particularly in such domains as electronic commerce. The ECORP project on opportunistic reasoning contexts in electronic trading (Garner and Song, unpublished research) has informed our understanding of this issue!
- •
Context classification process: As requirements are gathered and captured with their contexts,
Conclusion
This paper explains how existing knowledge engineering methods can help in overcoming the four difficulties inherent in IS; namely, complexity, conformity, changeability and invisibility. Current approaches are seen to solve only those problems pertaining to the global enterprise system, however, while leaving the validation issues related to user/local models unresolved. Context management mechanisms associated with the user/local models are shown to provide a basis for dynamic validation of
References (22)
On the epistemological status of semantic networks
- et al.
An overview of the KL-ONE knowledge representation system
Cognitive Science
(1985) - et al.
The Unified Modelling Language User Manual
(1999) No silver bullet: essence and accidents of software engineering
Computer
(1987)- et al.
Towards an integrated method for hybrid information system development
Software Engineering: IEE Proceedings
(1997) - et al.
LaSSIE: a knowledge-based software information system
Communication of the ACM
(1991) Information Engineering
(1991)Rapid System Development: using Structured Techniques and Relational Technology
(1989)- et al.
The Unified Software Development Process
(1999) - D. Lukose, Goal interpretation as a knowledge acquisition mechanism, unpublished PhD thesis, Department of Computing...
Information Engineering
Cited by (12)
Fault-tolerant context development and requirement validation in ERP systems
2015, Computer Standards and InterfacesCitation Excerpt :In this paper, we have specifically addressed this limitation, by applying context classification to the models presented in [1,6]. We have modeled this dynamic activity in the context of knowledge engineering, which is typically employed in order to develop trusted contexts in information systems [4]. In this regard, we prove that knowledge acquisition, representation, and integration techniques can be successfully combined with our context modeling method.
The use of a virtual building design and construction model for developing an effective project concept in 5D environment
2010, Automation in ConstructionThe intentional relationship of representation between the constructs of a language and reality
2009, Data and Knowledge EngineeringA method to evaluate quality of modelling languages based on the Zachman reference taxonomy
2019, Software Quality JournalReusing enterprise models to build platform independent computer models
2017, Information Systems and e-Business ManagementModern automated designing systems
2013, Intelligent Technologies in Logistics and Mechatronics Systems, ITELMS 2013 - Proceedings of the 8th International Conference