Abstract
Enterprise Information Systems (EIS) are designed to deal with normal variability in their inputs and data. Empowered by CONTEXT-AWARENESS, some EIS even count on sensors and/or data analytics for capturing changes outside of the system. Nevertheless, context-awareness would often fail when EIS are affected by (large-scale) disruptive events, such as disasters, virus outbreaks, or military conflicts. Hence, in the current paper, we take a step forward, by considering context-awareness for disruptive events. We combine context-awareness with risk management techniques, such as FMECA and FTA, that are useful for defining and mitigating risk events. To avoid having to define the likelihood for such very-low-probability disruptive risks, we use CONSEQUENCE-BASED RISK MANAGEMENT rather than traditional risk management. We augment this approach with the context-awareness paradigm, delivering a contribution that is two-fold: (i) We propose context-awareness-related measures and consequence-based-risk-management-related measures, to address disruptive events; (ii) We reflect this in a method featuring the application of context-awareness and risk management for designing robust and resilient EIS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Snoeck, M.: Enterprise Information Systems Engineering, the MERODE Approach. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10145-3
Shishkov, B.: Designing Enterprise Information Systems, Merging Enterprise Modeling and Software Specification. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-22441-7
Shishkov, B., van Sinderen, M., Verbraeck, A.: Towards flexible inter-enterprise collaboration: a supply chain perspective. In: Filipe, J., Cordeiro, J. (eds.) ICEIS 2009. LNBIP, vol. 24, pp. 513–527. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01347-8_43
Shishkov, B., Larsen, J.B., Warnier, M., Janssen, M.: Three categories of context-aware systems. In: Shishkov, B. (ed.) BMSD 2018. LNBIP, vol. 319, pp. 185–202. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94214-8_12
Wegdam, M.: AWARENESS: a project on context AWARE mobile NEtworks and ServiceS. In: Proceedings of 14th Mobile and Wireless Communications Summit. EURASIP (2005)
Kopják, J., Sebestyén, G.: Comparison of data collecting methods in wireless mesh sensor networks. In: IEEE 16th World Symposium on Applied Machine Intelligence and Informatics (SAMI), Kosice and Her-lany, Slovakia (2018)
Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publ. Inc., San Francisco (2011)
Reuters: Italian PM Orders Businesses to Close All Operations. In: The Guardian - International Edition, London (2020)
Takizawa, K.: Resilience of communities affected by the great east japan earthquake and restoration of their local festivals. In: Bouterey, S., Marceau, L. (eds.) Crisis and Disaster in Japan and New Zealand. Palgrave Macmillan, Singapore (2019)
Shibata, Y.: Writing Shanghai, the atomic bomb, and incest: homelessness and stigmatized womanhood of Hayashi Kyōko. In: Bouterey, S., Marceau, L. (eds.) Crisis and Disaster in Japan and New Zealand. Palgrave Macmillan, Singapore (2019)
Alférez, G.H., Pelechano, V.: Context-aware autonomous web services in software product lines. In: Proceedings of 15th International SPLC Conference. IEEE, CA, USA (2011)
Dey, A.K., Abowd, G.D., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Hum.-Comput. Interact. 16(2), 97–166 (2001)
Dey, A.K., Newberger, A.: Support for context-aware intelligibility and control. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems. ACM, USA (2009)
Papadimitriou G.: Future Internet: The Cross-ETP (2011). http://www.future-internet.eu/fileadmin/documents/reports/Cross-ETPs_FI_Vision_Document_v1_0.pdf. Accessed December 2011
Choraś, M., Kozik, R.: Machine learning techniques applied to detect cyber attacks on web applications. Log. J. IGPL 23(1), 45–56 (2015)
Hopkins, P.: Fundamentals of Risk Management - Understanding, Evaluating, and Implementing Effective Risk Management. IRM (2012)
La Rosa, M., Van Der Aalst, W.M.P., Dumas, M., Milani, F.P.: Business process variability modeling: a survey. ACM Comput. Surv. 50(1), Article 2 (2017)
Dietz, J.L.G.: Enterprise Ontology, Theory and Methodology. Springer, Heidelberg (2006)
Abeywickrama, D.B.: Context-aware services engineering for service-oriented architectures. In: Bouguettaya, A., Sheng, Q., Daniel, F. (eds.) Web Services Foundations. Springer, New York (2014). https://doi.org/10.1007/978-1-4614-7518-7_12
Friedman, B., Hendry, D.G., Borning, A.: A survey of salue sensitive design methods. In: A Survey of Value Sensitive Design Methods, vol. 1. Now Foundations and Trends (2017)
Van den Hoven, J.: Value sensitive design and responsible innovation. In: Owen, R., Bessant, J., Heintz, M. (eds.) Responsible Innovation: Managing the Responsible Emergence of Science and Innovation in Society. Wiley, Hoboken (2013)
Shishkov, B.: Tuning the Behavior of context-aware applications. In: Shishkov, B. (ed.) BMSD 2019. LNBIP, vol. 356, pp. 134–152. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24854-3_9
Shishkov, B., van Sinderen, M.: From user context states to context-aware applications. In: Filipe, J., Cordeiro, J., Cardoso, J. (eds.) ICEIS 2007. LNBIP, vol. 12, pp. 225–239. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88710-2_18
Bunge, M.A.: Treatise on Basic Philosophy. A World of Systems, vol. 4. D. Reidel Publishing Company, Dordrecht (1979)
Shishkov, B., Mendling, J.: Business process variability and public values. In: Shishkov, B. (ed.) BMSD 2018. LNBIP, vol. 319, pp. 401–411. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94214-8_31
Bosems, S., van Sinderen, M.: Models in the design of context-aware well-being applications. In: Meersman, R., et al. (eds.) OTM 2014. LNCS, vol. 8842, pp. 37–42. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45550-0_6
Cano, J., Delaval, G., Rutten, E.: Coordination of ECA rules by verification and control. In: Kühn, E., Pugliese, R. (eds.) COORDINATION 2014. LNCS, vol. 8459, pp. 33–48. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43376-8_3
Alegre, U., Augusto, J.C., Clark, T.: Engineering context-aware systems and applications. J. Syst. Softw. 117(1), 55–83 (2016)
Abeywickrama, D.B., Ramakrishnan, S.: Context-aware services engineering: models, transformations, and verification. ACM Trans. Internet Technol. J. 11(3), Article 1 (2012)
UML: The website of the Unified Modeling Language (2020). http://www.uml.org
Shishkov, B., Janssen, M.: Enforcing context-awareness and privacy-by-design in the specification of information systems. In: Shishkov, B. (ed.) BMSD 2017. LNBIP, vol. 309, pp. 87–111. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78428-1_5
González-Rojas, O., Ochoa-Venegas, L.: A decision model and system for planning and adapting the configuration of enterprise information systems. Comput. Ind. 92–93, 161–177 (2017)
Scott, J.E., Vessey, I.: Managing risks in enterprise systems implementations. Commun. ACM 45(4), 74–81 (2002)
Broad, J.: Risk Management Framework. A Lab-Based Approach to Securing Information Systems. Elsevier, Amsterdam (2013)
NIST: NIST Special Publication (SP) 800-37 Revision 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. NIST, December 2018. https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final
O’Donnel, E.: Enterprise risk management: a systems-thinking framework for the event identification phase. Int. J. Acc. Inf. Syst. 6, 177–195 (2005)
COSO: Enterprise Risk Management - Integrating with Strategy and Performance. Committee of Sponsoring Organization of the Treadway Committee (COSO) (2017)
ISO: ISO 31000 - Risk Management. International Organization for Standardization (ISO), Geneva (2018)
Blanchard, B.S., Fabrycky, W.J.: Systems Engineering and Analysis, 4th edn. Prentice-Hall, Upper Saddle River (2006)
NASA: NASA SP-2016-6105 Rev2: NASA Systems Engineering Handbook. NASA (2016). https://www.nasa.gov/connect/ebooks/nasa-systems-engineering-handbook
NASA: NASA/SP-2011-3422: NASA Risk Management Handbook (2011). https://sma.nasa.gov/sma-disciplines/risk-management
Taleb, N.N.: The Black Swan - The Impact of the Highly Improbable, 2nd edn. Random House, New York (2010)
Haimes, Y.Y.: Chapter 3: risk management. In: Sage, A.P., Rouse, W.B. (eds.) Handbook of Systems Engineering and Management, 2nd edn, pp. 155–204. Wiley, Hoboken (2009)
Hillson, D., Simon, P.: Practical Project Risk Management: The ATOM Methodology, 2nd edn. Management Concepts Press, Tysons Corner (2012)
Underwood, S.: Blockchain Beyond Bitcoin. Commun. ACM 59, 15–17 (2016)
Borissova, D., Cvetkova, P., Garvanov, I., Garvanova, M.: A framework of business intelligence system for decision making in efficiency management. In: Saeed, K., Dvorský, J. (eds.) CISIM 2020. LNCS, vol. 12133, pp. 111–121. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-47679-3_10
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Shishkov, B., Verbraeck, A. (2020). Making Enterprise Information Systems Resilient Against Disruptive Events: A Conceptual View. In: Shishkov, B. (eds) Business Modeling and Software Design. BMSD 2020. Lecture Notes in Business Information Processing, vol 391. Springer, Cham. https://doi.org/10.1007/978-3-030-52306-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-52306-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52305-3
Online ISBN: 978-3-030-52306-0
eBook Packages: Computer ScienceComputer Science (R0)