Conference Paper

Designing ERM Ontology to Evaluate Records Management System.

Virginia Commonwealth Univ., Richmond, VA, USA
DOI: 10.1109/HICSS.2011.149 Conference: 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI, USA
Source: DBLP

ABSTRACT Organizations seek to improve their records management (RM) system to have better efficiency and to meet legislative requirements. For achieving these two goals, evaluation of RM, which is normally done manually, is a necessity for every firm. In this paper, we design and evaluate an ontology that will help in evaluating RM systems. Building the ontology will be the first step in developing an ontology-based RM evaluation system. We argue that the proposed ontology based RM evaluation system has promising features and benefits. Evaluation by using ontology will raise the efficiency of the evaluation process as well as facilitate sharing and communicating the results of evaluation.

0 Bookmarks
 · 
105 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In an attempt to solve the current and future problems in electronic recordkeeping the Dutch government, namely the Minister of the Interior, and the Minister of Culture, established a nation wide program: Digital Longevity (Digitale Duurzaamheid). The program is run by a bureau, staffed by consultants from the ministry of the Interior, the National Archives, and a province. By various means the bureau creates awareness at the political and senior management levels, develops policies for electronic recordkeeping, and supports implementation. The program contributes to the developing of theories in the area, supports research, and cooperates in education and training. Via pilot projects the consultants keep in touch with record creating organizations. As an opus magnum the program works on a generic design of a recordkeeping system, including a structured definition of recordkeeping functional requirements.
    Archives and Museum Informatics 08/1997; 11(3):235-240.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: To support the sharing and reuse of formally represented knowledge among AI systems, it is useful to define the common vocabulary in which shared knowledge is represented. A specification of a representational vocabulary for a shared domain of discourse—definitions of classes, relations, functions, and other objects—is called an ontology. This paper describes a mechanism for defining ontologies that are portable over representation systems. Definitions written in a standard format for predicate calculus are translated by a system called Ontolingua into specialized representations, including frame-based systems as well as relational languages. This allows researchers to share and reuse ontologies, while retaining the computational benefits of specialized implementations.We discuss how the translation approach to portability addresses several technical problems. One problem is how to accommodate the stylistic and organizational differences among representations while preserving declarative content. Another is how to translate from a very expressive language into restricted languages, remaining system-independent while preserving the computational efficiency of implemented systems. We describe how these problems are addressed by basing Ontolingua itself on an ontology of domain-independent, representational idioms.
    Knowledge Acquisition 01/1993; 5(2):199–220.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The paramount complexity of enterprise in formation leads to hard-to-deal security management issues and system configurations. We present a security management framework of an arbitrary information system (IS) which builds upon knowledge-based resources, such as security ontology (SO) providing reusable security knowledge interoperability, aggregation and reasoning exploiting security knowledge from diverse sources; in addition, the separation of security requirements from their technical implementations facilitates the security management. We provide a feasible framework which links the high-level policy statements and deployable security controls and facilitates the security expert's work
    20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria; 01/2006