Andreas Lothe Opdahl

Andreas Lothe Opdahl
University of Bergen | UiB · Department of Information Science and Media Studies

Ph.D.

About

159
Publications
33,906
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,739
Citations
Citations since 2017
27 Research Items
985 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Additional affiliations
August 1992 - present
University of Bergen
April 1988 - December 1991
Norwegian University of Science and Technology
Position
  • PhD Student
Education
March 1988 - December 1992
August 1983 - March 1988
Norwegian University of Science and Technology
Field of study
  • Computer technology

Publications

Publications (159)
Article
Full-text available
Over the past few years, social media has become an indispensable part of the news generation and dissemination cycle on the global stage. These digital channels along with the easy-to-use editing tools have unfortunately created a medium for spreading mis-/disinformation containing visual content. Media practitioners and fact-checkers continue to...
Article
Full-text available
ICT platforms for news production, distribution, and consumption must exploit the ever-growing availability of digital data. These data originate from different sources and in different formats; they arrive at different velocities and in different volumes. Semantic knowledge graphs (KGs) is an established technique for integrating such heterogeneou...
Article
Full-text available
Increasing competition and loss of revenues force newsrooms to explore new digital solutions. The new solutions employ artificial intelligence and big data techniques such as machine learning and knowledge graphs to manage and support the knowledge work needed in all stages of news production. The result is an emerging type of intelligent informati...
Article
Full-text available
The last two decades have witnessed major disruptions to the traditional media industry as a result of technological breakthroughs. New opportunities and challenges continue to arise, most recently as a result of the rapid advance and adoption of artificial intelligence technologies. On the one hand, the broad adoption of these technologies may int...
Conference Paper
Full-text available
For news organizations to survive and thrive in today's media landscape, they must utilize big data and artificial intelligence technologies effectively. News organizations that want to exploit techniques like machine learning and knowledge graphs for big data may manage to use them independently, but struggle to get everything to work together. A...
Article
Full-text available
Journalism relies more and more on information and communication technology (ICT). ICT-based journalistic knowledge platforms continuously harvest potentially news-relevant information from the Internet and make it useful for journalists. Because information about the same event is available from different sources and formats vary widely, knowledge...
Chapter
Safety is a fundamental concern in modern society, and security is a precondition for safety. Ensuring safety and security of complex integrated systems requires a coordinated approach that involve different stakeholder groups going beyond safety and security experts and system developers. The authors have therefore proposed CHASSIS (Combined Harm...
Preprint
Full-text available
The Internet of Things, crowdsourcing, social media, public authorities, and other sources generate bigger and bigger data sets. Big and open data offers many benefits for emergency management, but also pose new challenges. This chapter will review the sources of big data and their characteristics. We then discuss potential benefits of big data for...
Preprint
Full-text available
Emergency-relevant data comes in many varieties. It can be high volume and high velocity, and reaction times are critical, calling for efficient and powerful techniques for data analysis and management. Knowledge graphs represent data in a rich, flexible, and uniform way that is well matched with the needs of emergency management. They build on exi...
Article
Full-text available
Journalism is challenged by digitalisation and social media, resulting in lower subscription numbers and reduced advertising income. Information and communication techniques (ICT) offer new opportunities. Our research group is collaborating with a software developer of news production tools for the international market to explore how social, open,...
Conference Paper
Full-text available
Journalism is under pressure from loss of advertisement and revenues, while experiencing an increase in digital consumption and user demands for quality journalism and trusted sources. Journalistic Knowledge Platforms (JKPs) are an emerging generation of platforms which combine state-of-the-art artificial intelligence (AI) techniques such as knowle...
Conference Paper
Full-text available
Journalistic knowledge platforms (JKPs) leverage data from the news, social media and other sources. They collect large amounts of data and attempt to extract potentially news-relevant information for news production. At the same time, by harvesting and recombining big data, they can challenge data privacy ethically and legally. Knowledge graphs of...
Chapter
Emergency-relevant data comes in many varieties. It can be high volume and high velocity, and reaction times are critical, calling for efficient and powerful techniques for data analysis and management. Knowledge graphs represent data in a rich, flexible, and uniform way that is well matched with the needs of emergency management. They build on exi...
Chapter
The Internet of Things, crowdsourcing, social media, public authorities, and other sources generate bigger and bigger data sets. Big and open data offers many benefits for emergency management, but also pose new challenges. This chapter will review the sources of big data and their characteristics. We then discuss potential benefits of big data for...
Article
Full-text available
A key skill for a journalist is the ability to assess the newsworthiness of an event or situation. To this purpose journalists often rely on news angles, conceptual criteria that are used both i) to assess whether something is newsworthy and also ii) to shape the structure of the resulting news item. As journalism becomes increasingly computer-supp...
Article
Full-text available
An enormous amount of digital information is expressed as natural-language (NL) text that is not easily processable by computers. Knowledge Graphs (KG) offer a widely used format for representing information in computer-processable form. Natural Language Processing (NLP) is therefore needed for mining (or lifting) knowledge graphs from NL texts. A...
Article
Recent decades have seen a significant increase in the frequency, intensity, and impact of natural disasters and other emergencies, forcing the governments around the world to make emergency response and disaster management national priorities. The growth of extremely large and complex datasets — commonly referred to as big data — and various advan...
Chapter
Journalism relies more and more on information and communication technology (ICT). New journalistic ICT platforms continuously harvest potentially news-related information from the internet and try to make it useful for journalists. Because the information sources and formats vary widely, knowledge graphs are emerging as a preferred technology for...
Conference Paper
Full-text available
Finding good angles on news events is a central journalistic and editorial skill. As news work becomes increasingly computer-assisted and big-data based, journalistic tools therefore need to become better able to support news angles too. This paper outlines a big-data platform that is able to suggest appropriate angles on news events to journalists...
Conference Paper
Full-text available
Smart cities attempt to use big data, machine learning, and other topical information and communication techniques (ICTs) to improve energy-consumption, mobility, waste management, and other crucial city functions. Many international research projects have been reported but, so far, few of them have addressed mobility in Norwegian cities specifical...
Conference Paper
Full-text available
Journalism is challenged by digitalisation and social media, resulting in lower subscription numbers and reduced advertising income. Information and communication techniques (ICT) offer new opportunities. We are exploring how social, open, and other data sources can be leveraged for journalistic purposes through techniques such as knowledge graphs,...
Article
Full-text available
The benefits of enterprise modeling (EM) and its contribution to organizational tasks are largely undisputed in business and information systems engineering. EM as a discipline has been around for several decades but is typically performed by a limited number of people in organizations with an affinity to modeling. What is captured in models is onl...
Article
Full-text available
Safety is a fundamental concern in modern society, and security is a precondition for safety. Ensuring safety and security of complex integrated systems requires a coordinated approach that involve different stakeholder groups going beyond safety and security experts and system developers. We have therefore proposed CHASSIS (Combined Harm Assessmen...
Article
Full-text available
Modern device-agnostic web sites aim to offer web pages that adapt themselves seamlessly to the front-end equipment they are displayed on, whether it is a desktop computer, a mobile device, or another type of equipment. At the same time, mobile devices and other front-end equipment with limited processing powers, screen resolutions, and network cap...
Conference Paper
Enterprise modelling (EM) as a discipline has been around for several decades with a huge body of knowledge on EM in academic literature. The benefits of modelling and its contributions to organizational tasks are largely undisputed. Thus, from an inside-out perspective, EM appears to be a mature and established discipline. However, for initiating...
Article
Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security issues. This paper undertakes a scientific approach...
Article
Many techniques have been proposed for eliciting software security requirements during the early requirements engineering phase. However, few techniques so far provide dedicated views of security issues in a software systems architecture context. This is a problem, because almost all requirements work today happens in a given architectural context,...
Article
In this paper, we summarise REFSQ 2013 - the 19th International Working Conference on Requirements Engineering: Foundation for Software Quality - which took place in Essen, Germany on April 8-11 2013.
Article
The paper reports a study that investigates the use of enterprise modeling empirically in eight combined process change and information technology initiatives. The paper targets a need in academia and industry for knowing more about enterprise modeling in practice. The authors identify five different types of modeling initiatives by analyzing how e...
Article
Full-text available
While security assessments of information systems are being increasingly performed with support of security modelling, safety assessments are still undertaken with traditional techniques such as Failure Mode and Effect Analysis (FMEA). As system modelling is becoming an increasingly important part of developing more safety critical systems, the saf...
Conference Paper
The information science study at the University of Bergen has human-computer interaction and semantic technologies as two of its focal points, with software development as a third focus that supports the two others. This talk will review the department's courses in semantic technologies at bachelor and graduate levels, with emphasis on the introduc...
Conference Paper
Safety and security assessments aim to keep harm away from systems. Although they consider different causes of harm, the mitigations suggested by the assessments are often interrelated and affect each other, either by strengthening or weakening the other. Considering the relations and effects, a combined process for safety and security could save r...
Conference Paper
Semantic or "rich" tagging can be a source of valuable metadata which can be used for discovery and interoperability. We present a tool that uses semantic tags to construct lightweight ontologies which can provide valuable semantic metadata about the tagged resources, and can enhance interoperability and knowledge discovery on the basis of these ta...
Article
When developing systems where safety and security are important aspects, these aspects have to be given special attention throughout the development, in particular in the requirements phase. There are many similar techniques within the safety and security fields, but few comparisons about what lessons that could be learnt and benefits to be gained....
Article
The last decade has seen an increasing focus on addressing security already during the earliest stages of system development, such as requirements determination. Attack trees and misuse cases are established techniques for representing security threats along with their potential mitigations. Previous work has compared attack trees and misuse cases...
Article
The project RecSeq - Requirements for Security (2008-2012) developed and evaluated techniques that can be used visualise security and other dependability concerns, such as safety, early in the planning of new information systems. A central concern was to allow inclusion of a variety of stakeholders, in particular non-ICT/non-security experts, in th...
Article
Ontological analysis of modelling languages has been mainly used for evaluating quality of modelling language w.r.t. one specific upper ontology. Generally speaking this evaluation has been done by identifying the coverage of the modelling language constructs w.r.t. the ontology and vice-versa. However, a quite limited support has been developed fo...
Conference Paper
Full-text available
[Context and motivation] In air traffic management (ATM) safety assessments are performed with traditional techniques such as failure mode and effect analysis (FMEA). [Question/problem] As system modelling is becoming an increasingly important part of developing ATM systems, techniques that integrate safety aspects and modelling are needed. [Princi...
Conference Paper
The paper describes enterprise modeling in a combined process change and ICT initiative in a small Norwegian Home Builder company. The paper contributes to understanding of modeling practice by reporting modeling experiences and recommendations and by relating modeling to a series of change activities. At an overarching level change took place in t...
Article
Full-text available
The Unified Enterprise Modelling Language (UEML) aims to support precise semantic definition of a wide variety of enterprise- and IS-modelling languages. In the longer run, it is also intended as a hub for integrated use of enterprise and information system (IS) models expressed in different languages. To achieve this, UEML provides a common ontolo...
Conference Paper
The paper provides a message of the chairs of the 6th International Workshop on Vocabularies, Ontologies and Rules for The Enterprise (VORTE 2011) held at 15th EDOC International EDOC Conference.
Conference Paper
The idea of security aware system development from the start of the engineering process is generally accepted nowadays and is becoming applied in practice. Many recent initiatives support this idea with special focus on security requirements elicitation. However, there are so far no techniques that provide integrated overviews of security threats a...
Conference Paper
With the continuously developing technology and growing complexity of software and systems, new demands and challenges appear for security, calling for new techniques and methods in addition to the already existing ones. The variety of initiatives and the variations in the characterizations makes it hard for users to select the most appropriate one...
Article
Full-text available
Purpose The purpose of this paper is to address a theoretical gap in the business process management (BPM) literature on factors that influence the acceptance and use of business process modelling (PM) in organisations. The paper seeks to contribute to theory building and practice in BPM through better understanding of important determinants of PM...
Conference Paper
Interoperability between model-driven software technologies can become easier to achieve if the models and modelling languages used are made interoperable too. One way to achieve interoperability is to capture the semantics of modelling language constructs and model elements by mapping them to semantic models, such as ontologies. The paper proposes...
Conference Paper
Full-text available
The Unified Enterprise Modelling Language (UEML) aims to become a hub for integrated use of enterprise and information systems (IS) models expressed using different languages. A central part of this hub is an extendible ontology into which modelling languages and their constructs can be mapped, so that precise semantic relations between the languag...
Book
Full-text available
This volume constitutes the proceedings of the 4th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling, held in Oslo, Norway, during November 2-3, 2011. The conference series is a dedicated forum where the use of enterprise modeling (EM) in practice is addressed by bringing together researchers, users, and practitioners in order t...
Conference Paper
Various techniques have been proposed to model attacks on systems. In order to understand such attacks and thereby propose efficient mitigations, the sequence of steps in the attack should be analysed thoroughly. However, there is a lack of techniques to represent intrusion scenarios across a system architecture. This paper proposes a new technique...
Conference Paper
The Unified Enterprise Modelling Language (UEML) aims to become a hub for integrated use of enterprise and information systems (IS) models expressed using different languages. The paper explains how central constructs from UML’s class and activity diagrams have been incorporated into UEML. As a result, the semantics of UML’s central constructs for...
Conference Paper
The paper shows how to describe the semantics of domain-specific enterprise and information system (IS) modelling languages using the Unified Enterprise Modelling Language (UEML). The approach is illustrated with a fragment of a domain-specific modelling language based on the new ISO 15926 standard for data integration, sharing and hand-over betwee...
Conference Paper
Security must be addressed at an early stage of information systems development, and one must learn from previous hacker attacks to avoid similar exploits in the future. Many security threats are hard to understand for stakeholders with a less technical background. To address this issue, we present a five-step method that represents hacker intrusio...
Conference Paper
[Context and motivation] In the development of secure software, work on requirements and on architecture need to be closely intertwined, because possible threats and the chosen architecture depend on each other mutually. [Question/problem] Nevertheless, most security requirement techniques do not take architecture into account. The transition from...
Conference Paper
We are developing an approach to organizing bookmarks and other information resources by annotating them with metadata in the form of synsets taken from WordNet. This paper shows how a collection of annotated bookmarks can be semantically enriched by adding hyper-/hyponym relations from WordNet. It then illustrates how the semantically enriched boo...
Article
Full-text available
The Unified Enterprise Modelling Language (UEML) aims at supporting integrated use of enterprise and IS models expressed using different languages. To achieve this aim, UEML offers a hub through which modelling languages can be connected, thereby paving the way for also connecting the models expressed in those languages. This paper motivates and pr...
Chapter
Goal-oriented modelling languages are important during requirements engineering (RE). However, goal-oriented languages differ significantly in both syntax and semantics. The paper analyses and compares the semantics of GRL and KAOS using the UEML approach, which supports fine-grained analysis and comparison of modelling constructs based on the Bung...
Conference Paper
Full-text available
This article addresses a theoretical gap in the BPM literature on factors that influence the acceptance of process modeling (PM) in organizations. Literature review on PM and 34 qualitative interviews were combined into a PM acceptance model and empirically tested with data from 74 companies showing that PM is to a large extent a mandated activity,...
Chapter
The Unified Enterprise Modelling Language (UEML) provides a hub for integrated use of the many different modelling languages available for representing enterprises and their information systems (IS). For this purpose, UEML centres around a common ontology that interrelates the semantics of existing modelling languages and their constructs. This pap...
Article
Full-text available
Goal modelling is emerging as a central requirements engineering (RE) technique. Unfortunately, current goal-oriented languages are not interop-erable with one another or with modelling languages that address other model-ling perspectives. This is a problem because the emerging generation of model-driven information systems are likely to depend on...
Article
A number of methods have been proposed or adapted to include security in the requirements analysis stage, but the industrial take-up has been limited and there are few empirical and comparative evaluations. This paper reports on a pair of controlled experiments that compared two methods for early elicitation of security threats, namely attack trees...
Article
Misuse case analysis is a technique for early elicitation of security-related threats and requirements to planned information systems. Since the technique was first proposed in 2000, there have been many follow-up contributions both by the originators, their students and by other researchers. These contributions have focused partly on extensions an...
Article
Full-text available
The paper revises an existing model of process-modelling practice and uses it in a survey of Norwegian model-based process-change projects. In particular, management support and in-project training are robust predictors of project outcome. Practical and theoretical implications are presented and discussed. Important paths for further work include i...
Conference Paper
Full-text available
Despite the importance of process modelling for business process management and related tasks, there are few theories and empirical studies of process-modelling practice available that can serve as the basis for understanding and improving this important practice. To contribute to the development of better theory, this paper proposes a model of pro...
Conference Paper
The Unified Modeling Language (UML) has been widely accepted as the standard object-oriented (OO) modeling language for modeling various aspects of software and information systems. The UML is an extensible language, in the sense that it provides mechanisms to introduce new elements for specific domains if necessary, such as web applications, datab...
Conference Paper
Full-text available
The paper revises an existing model of process-modelling practice and uses it in a survey of Norwegian model-based process-change projects. A central hypothesis is confirmed: There is a positive relationship between modelling processes in terms of management support, lack of resistance, in-project training, model types, and project outcome. Further...
Book
Full-text available
This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 27th International Conference on Conceptual Modeling, ER 2008, in Barcelona, Spain, in October 2008. The 42 revised full papers presented were carefully reviewed and selected from 108 submissions. Topics addressed by the workshops are...
Article
Deliverable of INTEROP NoE http://www.interop-vlab.eu
Article
Full-text available
A Roadmap for Unified enterprise modelling language
Conference Paper
The UEML approach is comprising an ontological approach to representation of modeling languages; innovative ideas are i) ontology is not fixed but evolve, ii) ontological analysis outcome is a standardized meta-model of a language, mapping abstract syntax artifacts on ontological artifacts, Hi) automated mechanisms for understanding similarities be...
Conference Paper
Full-text available
Process modelling is a central topic in the information systems field. This paper reports from an empirical study of 34 Norwegian process change projects where process modelling was used. The paper investigates which factors that were most important for effective process modelling: project-specific factors or modelling-related factors? By comparing...
Chapter
Goal-oriented modelling languages are central in the information systems (IS) field, both for aligning new IS with organisational needs and for developing agent-oriented software systems. However, existing goal-oriented languages differ significantly in both syntax and semantics. The paper analyses and compares the syntax and semantics of GRL and K...
Article
To improve the focus on security and other dependability issues it might be useful to include such concerns into mainstream diagram notations used in information systems analysis. In particular, there have been proposals introducing inverted icons to depict functionality not wanted in the system (e.g., misuse cases) or actors with malicious intent...
Chapter
The paper reviews a line of conceptual-modelling research that originated in Arne Sølvberg’s Information Systems Group at the Norwegian University of Science and Technology in the 1980-ies. The line of research has since produced results such as facet modelling, ontological analyses and evaluations of modelling languages and a template-based approa...
Chapter
Goal modeling is emerging as a central requirements engineering (RE) technique. Unfortunately, current goal-oriented languages are not interoperable with one another or with modeling languages that address other modeling perspectives. This problematic because the emerging generation of model-driven information systems is likely to depend on coordin...
Book
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema. Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne Sølvberg’s 6...