New Research Directions
Introduction
In the literature, various definitions of the term Business Intelligence have been proposed, both in academia and industry. Each of these definitions, in their own wording, define Business Intelligence as the process by which data is transformed into information which can then be used by decision makers in an informed way. This is done by using various technologies and tools. In this book, we focused on one such technology, namely transactional risk, to achieve Business Intelligence in various business applications. The approaches and techniques detailed in this book systematically tackle the process of assessing transactional risk in business activities and take this into account when making an informed interaction-based decision. Specifically, in this book, we have proposed computational methods for the assessment of the subcategories of transactional risk, according to the context- specific, assessment criteria-specific and dynamic-specific characteristics, combining these assessments to ascertain the severity of transactional risk and evaluate and manage it for the successful completion of the business activity. We believe that the proposed approach for transactional risk analysis in this book, when combined with the existing techniques for trust and security assessments, will assist in providing the required technologies for Business Intelligence in various business applications.
Keywords
Service Provider Cloud Computing Service User Service Level Agreement Service SelectionPreview
Unable to display preview. Download preview PDF.
References
- 1.Gwebu, K.L., Wang, J., Troutt, M.D.: A Conceptual framework for understanding trust building and maintenance in virtual organizations. Journal of Information Technology Theory and Application 9, 43–63 (2007)Google Scholar
- 2.Babar, M.A., Verner, J.M., Nguyen, P.T.: Establishing and Maintaining trust in software outsourcing relationship: an empirical investigation. The Journal of System and Software 80, 1438–1449 (2007)CrossRefGoogle Scholar
- 3.Ruppel, C., Underwood-Queen, L., Harrington, S.J.: e-Commerce: The Roles of Trust, Security, and Type of e-Commerce Involvement. e-Service Journal 2, 25–45 (2003)CrossRefGoogle Scholar
- 4.Winch, G., Joyce, P.: Exploring the dynamics of building, and losing, consumer trust in B2C eBusiness. International Journal of Retail & Distribution Management 34, 541–555 (2006)CrossRefGoogle Scholar
- 5.Chang, E., Dillon, T., Hussain, F.K.: Trust and Reputation for Service-Oriented Environments. John Wiley & Sons, Ltd., West Sussex (2006)CrossRefGoogle Scholar
- 6.
- 7.Hammadi, A.M., Hussain, O.K.: Transactional Risk Assessment-Based Approach for Service Degradability Management. In: IEEE International Conference on e-Business Engineering, Beijing, pp. 142–152 (2011)Google Scholar
- 8.Quillinan, T.B., Clark, K.P., Warnier, M., Brazier, F.M.T., Rana, O.: Negotiation and Monitoring of Service Level Agreements. In: Wieder, P., Yahyapour, R., Ziegler, W. (eds.) Grids and Service-Oriented Architectures for Service Level Agreements, pp. 167–176 (2010)Google Scholar
- 9.Khader, D., Padget, J., Warnier, M.: Reactive Monitoring of Service Level Agreements. In: Wieder, P., Yahyapour, R., Ziegler, W. (eds.) Grids and Service-Oriented Architectures for Service Level Agreements, pp. 13–22 (2010)Google Scholar
- 10.Diao, Y., Hellerstein, J.L., Parekh, S.: Using fuzzy control to maximize profits in service level management. IBM Systems Journal 41, 403–420 (2002)CrossRefGoogle Scholar
- 11.Lu, C., Stankovic, J.A., Son, S.H., Tao, G.: Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms. Journal of Real-Time Systems 23, 85–126 (2002)MATHCrossRefGoogle Scholar
- 12.Stankovic, J.A., He, T., Abdelzaher, T., Marley, M., Tao, G., Son, S., Lu, C.: Feedback control scheduling in distributed real-time systems. In: Proceedings of the 22nd IEEE Real-Time Systems Symposium, London, pp. 59–70 (2001)Google Scholar
- 13.Wang, Z., Zhu, X., Singhal, S.: Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions. In: Schönwälder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol. 3775, pp. 133–144. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 14.Yfoulis, C.A., Gounaris, A.: Honoring SLAs on cloud computing services: A control perspective. In: European Control Conference, Hungary, pp. 1–6 (2009)Google Scholar
- 15.Sanabria, L.A., Dillon, T.S.: Stochastic power flow using cumulants and Von Mises functions. Electrical Power and Energy Systems 8, 47–80 (1986)CrossRefGoogle Scholar
- 16.Sanabria, L.A., Dillon, T.S.: An Error Correction Algorithm for Stochastic Production Costing. IEEE Transactions on Power Systems 3, 94–100 (1988)CrossRefGoogle Scholar