Proximal Business Intelligence on the Semantic Web

  • David Bell
  • Thinh Nguyen
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 58)


Ubiquitous information systems (UBIS) extend current Information System thinking to explicitly differentiate technology between devices and software components with relation to people and process. Adapting business data and management information to support specific user actions in context is an ongoing topic of research. Approaches typically focus on providing mechanisms to improve specific information access and transcoding but not on how the information can be accessed in a mobile, dynamic and ad-hoc manner. Although web ontology has been used to facilitate the loading of data warehouses, less research has been carried out on ontology based mobile reporting. This paper explores how business data can be modeled and accessed using the web ontology language and then re-used to provide the invisibility of pervasive access; uncovering more effective architectural models for adaptive information system strategies of this type. This exploratory work is guided in part by a vision of business intelligence that is highly distributed, mobile and fluid, adapting to sensory understanding of the underlying environment in which it operates. A proof-of-concept mobile and ambient data access architecture is developed in order to further test the viability of such an approach. The paper concludes with an ontology engineering framework for systems of this type – named UBIS-ONTO.


Pervasive Informatics Business Intelligence Semantic Web 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Baumbach, J., Brinkrolf, K., Czaja, L.F., Rahmann, S., Tauch, A.: CoryneRegNet: An ontology-based data warehouse of corynebacterial transcription factors and regulatory networks. BMC Genomics 7(24) (2006)Google Scholar
  2. 2.
    Bose, I., Mahapatra, R.: Business Data Mining – A Machine Learning Perspective. Information & Management 39, 211–225 (2001)CrossRefGoogle Scholar
  3. 3.
    Campbell, A.T., Eisenman, S.B., Lane, N.D., Miluzzo, E., Peterson, R.A., Lu, H., Zheng, X., Musolesi, M., Fodor, K., Ahn, G.: The Rise of People-Centric Sensing. IEEE Internet Computing 12(4), 12–21 (2008), doi:10.1109/MIC.2008.90CrossRefGoogle Scholar
  4. 4.
    Chen, H., Finin, T., Jishi, A.: Using OWL in a Pervasive Computing Broker. In: Proceedings of Workshop on Ontologies in Open Agent Systems, AAMAS 2003 (2003)Google Scholar
  5. 5.
    Chen, H., Perich, F., Finin, T., Joshi, A.: SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications. In: Int. Conf. on Mobile and Ubiquitous Systems: Networking and Services (August 2004)Google Scholar
  6. 6.
    Daniel, H., Albert, P., Mike, P.: RFID, A Guide To Radio Frequency Identification. Wiley, USA (2007)Google Scholar
  7. 7.
    Gruber, T.R.: Toward Principles for the Design of Ontologies Used for Knowledge Sharing. International Journal of Human and Computer Studies 43(5/6), 907–928 (1995)CrossRefGoogle Scholar
  8. 8.
    Gruninger, M., Fox, M.: Methodology for the design and evaluation of ontologies. In: Proceedings of the Workshop on Basic Ontological Issues in Knowledge Sharing held in Conjunction with IJCAI 1995, Montreal, Canada (1995)Google Scholar
  9. 9.
    Hevner, A., March, S., Park, J., Ram, S.: Design Science in Information Systems Research. MIS Quarterly 28(1) (2004)Google Scholar
  10. 10.
    Mizoguchi, R.: Tutorial on Ontologial Engineering Part 2: Ontology Development, Tools and Languages. New Generation Computing 22, 61–96 (2004)CrossRefGoogle Scholar
  11. 11.
    Nunamaker, J., Chen, M., Purdin, T.: System Development in Information Systems Research. Journal of Management Information Systems 7(3), 89–106 (1991)Google Scholar
  12. 12.
    Pendyala, V.S., Shim, S.S.Y.: The Web as the Ubiquitous Computer. Computer 42(9) (2009)Google Scholar
  13. 13.
    Raman, B., Chebrolu, K.: Censor networks: a critique of "sensor networks" from a systems perspective. SIGCOMM Comput. Commun. Rev. 38(3), 75–78 (2008)CrossRefGoogle Scholar
  14. 14.
    Ridhawi, Y., Harroud, H., Karmouch, A., Agoulmine, N.: Policy Driven Context-Aware Services in Mobile Enviroments. Innovation in Information Technology, 558–562 (2008)Google Scholar
  15. 15.
    Salguero, A., Araque, F., Delgado, C.: Ontology based framework for data integration. WSEAS Trans. Info. Sci. and App. 5(6), 953–962 (2008)Google Scholar
  16. 16.
    Simson, G., Beth, R. (eds.): RFID Applications, Security, and Privacy. Addison Wesley, United States (2006)Google Scholar
  17. 17.
    Schmidt, A.: Ubiquitous Computing: Are we there yet? Computer 43(2) (2010)Google Scholar
  18. 18.
    Stanford, V.: Pervasive computing goes the last hundred feet with RFID systems. Pervasive Computing 2(2), 9–14 (2003)CrossRefGoogle Scholar
  19. 19.
    Uschold, M., King, M., Moralee, S., Zorgios, Y.: The Knowledge Engineering Review 13, 31–89 (1998)CrossRefGoogle Scholar
  20. 20.
    Weiser, M.: Hot topics-ubiquitous computing. Computer 26(10), 71–72 (1993)CrossRefGoogle Scholar
  21. 21.
    Weiser, M.: The Computer for the 21th Century. Scientific American 265(3), 94–101 (1991)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • David Bell
    • 1
  • Thinh Nguyen
    • 1
  1. 1.Department of Information Systems and Computing (DISC)Brunel UniversityUK

Personalised recommendations