New Research Directions
In the literature, various definitions of the term Business Intelligence have been proposed, both in academia and industry. Each of these definitions, in their own wording, define Business Intelligence as the process by which data is transformed into information which can then be used by decision makers in an informed way. This is done by using various technologies and tools. In this book, we focused on one such technology, namely transactional risk, to achieve Business Intelligence in various business applications. The approaches and techniques detailed in this book systematically tackle the process of assessing transactional risk in business activities and take this into account when making an informed interaction-based decision. Specifically, in this book, we have proposed computational methods for the assessment of the subcategories of transactional risk, according to the context- specific, assessment criteria-specific and dynamic-specific characteristics, combining these assessments to ascertain the severity of transactional risk and evaluate and manage it for the successful completion of the business activity. We believe that the proposed approach for transactional risk analysis in this book, when combined with the existing techniques for trust and security assessments, will assist in providing the required technologies for Business Intelligence in various business applications.
KeywordsService Provider Cloud Computing Service User Service Level Agreement Service Selection
Unable to display preview. Download preview PDF.
- 1.Gwebu, K.L., Wang, J., Troutt, M.D.: A Conceptual framework for understanding trust building and maintenance in virtual organizations. Journal of Information Technology Theory and Application 9, 43–63 (2007)Google Scholar
- 7.Hammadi, A.M., Hussain, O.K.: Transactional Risk Assessment-Based Approach for Service Degradability Management. In: IEEE International Conference on e-Business Engineering, Beijing, pp. 142–152 (2011)Google Scholar
- 8.Quillinan, T.B., Clark, K.P., Warnier, M., Brazier, F.M.T., Rana, O.: Negotiation and Monitoring of Service Level Agreements. In: Wieder, P., Yahyapour, R., Ziegler, W. (eds.) Grids and Service-Oriented Architectures for Service Level Agreements, pp. 167–176 (2010)Google Scholar
- 9.Khader, D., Padget, J., Warnier, M.: Reactive Monitoring of Service Level Agreements. In: Wieder, P., Yahyapour, R., Ziegler, W. (eds.) Grids and Service-Oriented Architectures for Service Level Agreements, pp. 13–22 (2010)Google Scholar
- 12.Stankovic, J.A., He, T., Abdelzaher, T., Marley, M., Tao, G., Son, S., Lu, C.: Feedback control scheduling in distributed real-time systems. In: Proceedings of the 22nd IEEE Real-Time Systems Symposium, London, pp. 59–70 (2001)Google Scholar
- 14.Yfoulis, C.A., Gounaris, A.: Honoring SLAs on cloud computing services: A control perspective. In: European Control Conference, Hungary, pp. 1–6 (2009)Google Scholar