2017 11th International Conference on Research Challenges in Information Science (RCIS)

10-12 May 2017

Filter Results

Displaying Results 1 - 25 of 76
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):1 - 5
    Request permission for reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (6 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive information security and privacy

    Publication Year: 2017, Page(s): 17
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (38 KB) | HTML iconHTML

    Although security and privacy by design underpin effective engineering of software intensive systems, the dynamic reality of modern information systems means that such systems are the subject of changes of many different forms that can affect their operational environment, their behaviour, and the behaviour of their users, both legitimate and malicious. Systems must therefore be adaptive by design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research methods and examples of empirical research in information security

    Publication Year: 2017, Page(s): 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (39 KB)

    Summary form only given. Over the last years, there is an increasing number of descriptive works observing and describing complex phenomena, e.g., the efficiency of different spam campaigns, the distribution of bots, or the likelihood of users to accept false identities as friends in social networks. These studies are characterized by large sets of samples. Future research will focus on networks a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conceptual modelling: How to do it right?

    Publication Year: 2017, Page(s): 19
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (37 KB)

    Providing individual and immediate feedback in educational situations is a critical factor for improving knowledge and skills acquisition. This is especially important for complex ill-structured learning tasks, i.e. tasks that are characterized by having multiple good solutions (ill-structured), allowing individual learners to follow different routes for achieving the final learning objectives, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 1: Business process management

    Publication Year: 2017, Page(s): 20
    Request permission for reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • A modeling framework for business process reengineering using big data analytics and a goal-orientation

    Publication Year: 2017, Page(s):21 - 32
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1824 KB) | HTML iconHTML

    A business process is a collection of activities to create more business values and its continuous improvement aligned with business goals is essential to survive in fast changing business environment. However, it is quite challenging to find out whether a change of business processes positively affects business goals or not, if there are problems in the changing, what the reasons of the problems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CEFOP: A method for the Continual Evolution of Organisational Processes

    Publication Year: 2017, Page(s):33 - 43
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2161 KB) | HTML iconHTML

    This paper presents CEFOP (Continual Evolution For Organisational Processes), a method for analysing, diagnosing and evolving the organisational processes. The dynamicity of the business environment requires from organisations to evolve their processes for maintaining their competitive advantage, but this can be time and cost consuming and cause great internal resistance. CEFOP method aims to limi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach

    Publication Year: 2017, Page(s):44 - 55
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 2: Compliance and regulation

    Publication Year: 2017, Page(s): 56
    Request permission for reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • What can information systems do for regulators? A review of the state-of-practice in Canada

    Publication Year: 2017, Page(s):57 - 65
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Regulations constitute a rich source of requirements for software systems, especially so for information systems that handle sensitive data. However, there has been little attention paid to regulators and their requirements for managing the regulatory lifecycle. This paper presents a study of the state-of-practice for regulators in Canada by examining seven Government of Canada (GoC) agencies resp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool-supported compliance process for software systems

    Publication Year: 2017, Page(s):66 - 76
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    Laws and regulations impact the design of software systems, as they may introduce additional requirements and possible conflicts with pre-existing requirements. We propose a systematic, tool-supported process for establishing compliance of a software system with a given law. The process elicits new requirements from the law, compares them with existing ones and manages conflicts, exploiting a set ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A definition of Information Security Classification in cybersecurity context

    Publication Year: 2017, Page(s):77 - 82
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    The concept of Information Security Classification is variable and sometimes uninformative. Most of definitions are coming from Standards and weren't updated for years even if the scope and the challenges in security are now becoming larger with Cybersecurity. Based on a literature review, we propose a new definition of Information Security Classification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 3: Conceptual modelling

    Publication Year: 2017, Page(s): 83
    Request permission for reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • A metamodel and code generation approach for symmetric unary associations

    Publication Year: 2017, Page(s):84 - 94
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (999 KB) | HTML iconHTML

    The concept of association appears in almost every modelling language, and plays a crucial role in defining how classes (or other kinds of types) can be related to each other, both in conceptual models and code. Often, associations are assumed to be binary (i.e. linking two types), and sometimes higher-arity associations are also considered, such as in UML. However, little attention has been paid ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From user goals to process-based service compositions: A flexible semantic-based approach

    Publication Year: 2017, Page(s):95 - 102
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Complex user's needs often require heterogeneous services to be combined together. In this paper, we explore a novel approach to enable flexible and dynamic composition of heterogeneous services for end users who are usually not familiar with technical process models. End-users are only required to model their goals and semantic reasoning is used for the composition itself. The possible service co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-framing “the AMN”: A case study eliciting and modelling a System of Systems using the Afghan Mission Network

    Publication Year: 2017, Page(s):103 - 108
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    The term System of Systems (SoS) is often used to classify an arrangement of independent and interdependent systems delivering unique capabilities. There appear to be many examples of SoSs, but the term has become a source of confusion. While many approaches have been proposed for engineering SoSs, there are few illustrative examples demonstrating their initial classification and resulting SoS str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 4: Fraud detection and management

    Publication Year: 2017, Page(s): 109
    Request permission for reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • The dbMark: A benchmarking system for watermarking methods for relational databases

    Publication Year: 2017, Page(s):110 - 119
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Digital technology keeps falling prey to the ease with which the unauthorized reproduction and distribution of digital objects can be achieved. Research on copyright protection of digital data must counterbalance the failures of legal measures against digital piracy. Digital watermarking tops the list of technical countermeasures and recent research has focused on proposing watermarking methods fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRAWL: Protection against rogue sites for the masses

    Publication Year: 2017, Page(s):120 - 127
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    The number of smartphones reached 3.4 billion in the third quarter of 2016 [1]. These devices facilitate our daily lives and have become the primary way of accessing the web. Although all desktop browsers filter rogue websites, their mobile counterparts often do not filter them at all, exposing their users to websites serving malware or hosting phishing attacks. In this paper we revisit the anti-p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing, reasoning and predicting fraud using fraud plans

    Publication Year: 2017, Page(s):128 - 133
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    The efforts of fraudsters to think up new ways of committing fraud, and of law enforcers to detect and prosecute those fraud, often feel like a long-running competition. Yet all too often, law enforcement is accused of falling far behind the fraudsters, especially in situations where the responsibility for detecting frauds falls on non-specialists in security or on the general public. This paper p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 5: Knowledge discovery and data

    Publication Year: 2017, Page(s): 134
    Request permission for reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • Wikipedia-based extraction of key information from resumes

    Publication Year: 2017, Page(s):135 - 145
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (607 KB) | HTML iconHTML

    There is a vast amount of information about individuals available on the Web that has potential uses in Human Resource Management (HRM) - both for recruiters and job seekers. Since people names are inherently ambiguous, finding information related to a specific person is challenging and a simple query by name will likely return web pages related to several different individuals who happen to share... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-based web service discovery framework with QoS considerations

    Publication Year: 2017, Page(s):146 - 155
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1331 KB) | HTML iconHTML

    Hiking a relevant web service in the current environment full of various options is similar to looking for a needle in a haystack. The best possible web service is the one that completely fulfills the required functions while satisfying the QoS requested by a user. In this paper, we introduce a new context-based solution based on QoS (Quality of Service) exploiting both functional and non-function... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.