New Research Directions

  • Omar K. Hussain
  • Tharam S. Dillon
  • Farookh K. Hussain
  • Elizabeth J. Chang
Part of the Studies in Computational Intelligence book series (SCI, volume 412)

Introduction

In the literature, various definitions of the term Business Intelligence have been proposed, both in academia and industry. Each of these definitions, in their own wording, define Business Intelligence as the process by which data is transformed into information which can then be used by decision makers in an informed way. This is done by using various technologies and tools. In this book, we focused on one such technology, namely transactional risk, to achieve Business Intelligence in various business applications. The approaches and techniques detailed in this book systematically tackle the process of assessing transactional risk in business activities and take this into account when making an informed interaction-based decision. Specifically, in this book, we have proposed computational methods for the assessment of the subcategories of transactional risk, according to the context- specific, assessment criteria-specific and dynamic-specific characteristics, combining these assessments to ascertain the severity of transactional risk and evaluate and manage it for the successful completion of the business activity. We believe that the proposed approach for transactional risk analysis in this book, when combined with the existing techniques for trust and security assessments, will assist in providing the required technologies for Business Intelligence in various business applications.

Keywords

Service Provider Cloud Computing Service User Service Level Agreement Service Selection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gwebu, K.L., Wang, J., Troutt, M.D.: A Conceptual framework for understanding trust building and maintenance in virtual organizations. Journal of Information Technology Theory and Application 9, 43–63 (2007)Google Scholar
  2. 2.
    Babar, M.A., Verner, J.M., Nguyen, P.T.: Establishing and Maintaining trust in software outsourcing relationship: an empirical investigation. The Journal of System and Software 80, 1438–1449 (2007)CrossRefGoogle Scholar
  3. 3.
    Ruppel, C., Underwood-Queen, L., Harrington, S.J.: e-Commerce: The Roles of Trust, Security, and Type of e-Commerce Involvement. e-Service Journal 2, 25–45 (2003)CrossRefGoogle Scholar
  4. 4.
    Winch, G., Joyce, P.: Exploring the dynamics of building, and losing, consumer trust in B2C eBusiness. International Journal of Retail & Distribution Management 34, 541–555 (2006)CrossRefGoogle Scholar
  5. 5.
    Chang, E., Dillon, T., Hussain, F.K.: Trust and Reputation for Service-Oriented Environments. John Wiley & Sons, Ltd., West Sussex (2006)CrossRefGoogle Scholar
  6. 6.
  7. 7.
    Hammadi, A.M., Hussain, O.K.: Transactional Risk Assessment-Based Approach for Service Degradability Management. In: IEEE International Conference on e-Business Engineering, Beijing, pp. 142–152 (2011)Google Scholar
  8. 8.
    Quillinan, T.B., Clark, K.P., Warnier, M., Brazier, F.M.T., Rana, O.: Negotiation and Monitoring of Service Level Agreements. In: Wieder, P., Yahyapour, R., Ziegler, W. (eds.) Grids and Service-Oriented Architectures for Service Level Agreements, pp. 167–176 (2010)Google Scholar
  9. 9.
    Khader, D., Padget, J., Warnier, M.: Reactive Monitoring of Service Level Agreements. In: Wieder, P., Yahyapour, R., Ziegler, W. (eds.) Grids and Service-Oriented Architectures for Service Level Agreements, pp. 13–22 (2010)Google Scholar
  10. 10.
    Diao, Y., Hellerstein, J.L., Parekh, S.: Using fuzzy control to maximize profits in service level management. IBM Systems Journal 41, 403–420 (2002)CrossRefGoogle Scholar
  11. 11.
    Lu, C., Stankovic, J.A., Son, S.H., Tao, G.: Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms. Journal of Real-Time Systems 23, 85–126 (2002)MATHCrossRefGoogle Scholar
  12. 12.
    Stankovic, J.A., He, T., Abdelzaher, T., Marley, M., Tao, G., Son, S., Lu, C.: Feedback control scheduling in distributed real-time systems. In: Proceedings of the 22nd IEEE Real-Time Systems Symposium, London, pp. 59–70 (2001)Google Scholar
  13. 13.
    Wang, Z., Zhu, X., Singhal, S.: Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions. In: Schönwälder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol. 3775, pp. 133–144. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    Yfoulis, C.A., Gounaris, A.: Honoring SLAs on cloud computing services: A control perspective. In: European Control Conference, Hungary, pp. 1–6 (2009)Google Scholar
  15. 15.
    Sanabria, L.A., Dillon, T.S.: Stochastic power flow using cumulants and Von Mises functions. Electrical Power and Energy Systems 8, 47–80 (1986)CrossRefGoogle Scholar
  16. 16.
    Sanabria, L.A., Dillon, T.S.: An Error Correction Algorithm for Stochastic Production Costing. IEEE Transactions on Power Systems 3, 94–100 (1988)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Omar K. Hussain
    • 1
  • Tharam S. Dillon
    • 2
  • Farookh K. Hussain
    • 3
  • Elizabeth J. Chang
    • 1
  1. 1.Digital Ecosystems and Business Intelligence InstituteCurtin UniversityPerthAustralia
  2. 2.Department of Computer Science and Computer EngineeringLa Trobe UniversityMelbourneAustralia
  3. 3.School of SoftwareUniversity of TechnologySydneyAustralia

Personalised recommendations