
Andreas Lothe OpdahlUniversity of Bergen | UiB · Department of Information Science and Media Studies
Andreas Lothe Opdahl
Ph.D.
About
159
Publications
33,906
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,739
Citations
Citations since 2017
Introduction
Additional affiliations
August 1992 - present
April 1988 - December 1991
Education
March 1988 - December 1992
August 1983 - March 1988
Publications
Publications (159)
Over the past few years, social media has become an indispensable part of the news generation and dissemination cycle on the global stage. These digital channels along with the easy-to-use editing tools have unfortunately created a medium for spreading mis-/disinformation containing visual content. Media practitioners and fact-checkers continue to...
ICT platforms for news production, distribution, and consumption must exploit the ever-growing availability of digital data. These data originate from different sources and in different formats; they arrive at different velocities and in different volumes. Semantic knowledge graphs (KGs) is an established technique for integrating such heterogeneou...
Increasing competition and loss of revenues force newsrooms to explore new digital solutions. The new solutions employ artificial intelligence and big data techniques such as machine learning and knowledge graphs to manage and support the knowledge work needed in all stages of news production. The result is an emerging type of intelligent informati...
The last two decades have witnessed major disruptions to the traditional media industry as a result of technological breakthroughs. New opportunities and challenges continue to arise, most recently as a result of the rapid advance and adoption of artificial intelligence technologies. On the one hand, the broad adoption of these technologies may int...
For news organizations to survive and thrive in today's media landscape, they must utilize big data and artificial intelligence technologies effectively. News organizations that want to exploit techniques like machine learning and knowledge graphs for big data may manage to use them independently, but struggle to get everything to work together. A...
Journalism relies more and more on information and communication technology (ICT). ICT-based journalistic knowledge platforms continuously harvest potentially news-relevant information from the Internet and make it useful for journalists. Because information about the same event is available from different sources and formats vary widely, knowledge...
Safety is a fundamental concern in modern society, and security is a precondition for safety. Ensuring safety and security of complex integrated systems requires a coordinated approach that involve different stakeholder groups going beyond safety and security experts and system developers. The authors have therefore proposed CHASSIS (Combined Harm...
The Internet of Things, crowdsourcing, social media, public authorities, and other sources generate bigger and bigger data sets. Big and open data offers many benefits for emergency management, but also pose new challenges. This chapter will review the sources of big data and their characteristics. We then discuss potential benefits of big data for...
Emergency-relevant data comes in many varieties. It can be high volume and high velocity, and reaction times are critical, calling for efficient and powerful techniques for data analysis and management. Knowledge graphs represent data in a rich, flexible, and uniform way that is well matched with the needs of emergency management. They build on exi...
Journalism is challenged by digitalisation and social media, resulting in lower subscription numbers and reduced advertising income. Information and communication techniques (ICT) offer new opportunities. Our research group is collaborating with a software developer of news production tools for the international market to explore how social, open,...
Journalism is under pressure from loss of advertisement and revenues, while experiencing an increase in digital consumption and user demands for quality journalism and trusted sources. Journalistic Knowledge Platforms (JKPs) are an emerging generation of platforms which combine state-of-the-art artificial intelligence (AI) techniques such as knowle...
Journalistic knowledge platforms (JKPs) leverage data from the news, social media and other sources. They collect large amounts of data and attempt to extract potentially news-relevant information for news production. At the same time, by harvesting and recombining big data, they can challenge data privacy ethically and legally. Knowledge graphs of...
Emergency-relevant data comes in many varieties. It can be high volume and high velocity, and reaction times are critical, calling for efficient and powerful techniques for data analysis and management. Knowledge graphs represent data in a rich, flexible, and uniform way that is well matched with the needs of emergency management. They build on exi...
The Internet of Things, crowdsourcing, social media, public authorities, and other sources generate bigger and bigger data sets. Big and open data offers many benefits for emergency management, but also pose new challenges. This chapter will review the sources of big data and their characteristics. We then discuss potential benefits of big data for...
A key skill for a journalist is the ability to assess the newsworthiness of an event or situation. To this purpose journalists often rely on news angles, conceptual criteria that are used both i) to assess whether something is newsworthy and also ii) to shape the structure of the resulting news item. As journalism becomes increasingly computer-supp...
An enormous amount of digital information is expressed as natural-language (NL) text that is not easily processable by computers. Knowledge Graphs (KG) offer a widely used format for representing information in computer-processable form. Natural Language Processing (NLP) is therefore needed for mining (or lifting) knowledge graphs from NL texts. A...
Recent decades have seen a significant increase in the frequency, intensity, and impact of natural disasters and other emergencies, forcing the governments around the world to make emergency response and disaster management national priorities. The growth of extremely large and complex datasets — commonly referred to as big data — and various advan...
Journalism relies more and more on information and communication technology (ICT). New journalistic ICT platforms continuously harvest potentially news-related information from the internet and try to make it useful for journalists. Because the information sources and formats vary widely, knowledge graphs are emerging as a preferred technology for...
Finding good angles on news events is a central journalistic and editorial skill. As news work becomes increasingly computer-assisted and big-data based, journalistic tools therefore need to become better able to support news angles too. This paper outlines a big-data platform that is able to suggest appropriate angles on news events to journalists...
Smart cities attempt to use big data, machine learning, and other topical information and communication techniques (ICTs) to improve energy-consumption, mobility, waste management, and other crucial city functions. Many international research projects have been reported but, so far, few of them have addressed mobility in Norwegian cities specifical...
Journalism is challenged by digitalisation and social media, resulting in lower subscription numbers and reduced advertising income. Information and communication techniques (ICT) offer new opportunities. We are exploring how social, open, and other data sources can be leveraged for journalistic purposes through techniques such as knowledge graphs,...
The benefits of enterprise modeling (EM) and its contribution to organizational tasks are largely undisputed in business and information systems engineering. EM as a discipline has been around for several decades but is typically performed by a limited number of people in organizations with an affinity to modeling. What is captured in models is onl...
Safety is a fundamental concern in modern society, and security is a precondition for safety. Ensuring safety and security of complex integrated systems requires a coordinated approach that involve different stakeholder groups going beyond safety and security experts and system developers. We have therefore proposed CHASSIS (Combined Harm Assessmen...
Modern device-agnostic web sites aim to offer web pages that adapt themselves seamlessly to the front-end equipment they are displayed on, whether it is a desktop computer, a mobile device, or another type of equipment. At the same time, mobile devices and other front-end equipment with limited processing powers, screen resolutions, and network cap...
Enterprise modelling (EM) as a discipline has been around for several decades with a huge body of knowledge on EM in academic literature. The benefits of modelling and its contributions to organizational tasks are largely undisputed. Thus, from an inside-out perspective, EM appears to be a mature and established discipline. However, for initiating...
Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security issues. This paper undertakes a scientific approach...
Many techniques have been proposed for eliciting software security requirements during the early requirements engineering phase. However, few techniques so far provide dedicated views of security issues in a software systems architecture context. This is a problem, because almost all requirements work today happens in a given architectural context,...
In this paper, we summarise REFSQ 2013 - the 19th International Working Conference on Requirements Engineering: Foundation for Software Quality - which took place in Essen, Germany on April 8-11 2013.
The paper reports a study that investigates the use of enterprise modeling empirically in eight combined process change and information technology initiatives. The paper targets a need in academia and industry for knowing more about enterprise modeling in practice. The authors identify five different types of modeling initiatives by analyzing how e...
While security assessments of information systems are being increasingly performed with support of security modelling, safety assessments are still undertaken with traditional techniques such as Failure Mode and Effect Analysis (FMEA). As system modelling is becoming an increasingly important part of developing more safety critical systems, the saf...
The information science study at the University of Bergen has human-computer interaction and semantic technologies as two of its focal points, with software development as a third focus that supports the two others. This talk will review the department's courses in semantic technologies at bachelor and graduate levels, with emphasis on the introduc...
Safety and security assessments aim to keep harm away from systems. Although they consider different causes of harm, the mitigations suggested by the assessments are often interrelated and affect each other, either by strengthening or weakening the other. Considering the relations and effects, a combined process for safety and security could save r...
Semantic or "rich" tagging can be a source of valuable metadata which can be used for discovery and interoperability. We present a tool that uses semantic tags to construct lightweight ontologies which can provide valuable semantic metadata about the tagged resources, and can enhance interoperability and knowledge discovery on the basis of these ta...
When developing systems where safety and security are important aspects, these aspects have to be given special attention throughout the development, in particular in the requirements phase. There are many similar techniques within the safety and security fields, but few comparisons about what lessons that could be learnt and benefits to be gained....
The last decade has seen an increasing focus on addressing security already during the earliest stages of system development, such as requirements determination. Attack trees and misuse cases are established techniques for representing security threats along with their potential mitigations. Previous work has compared attack trees and misuse cases...
The project RecSeq - Requirements for Security (2008-2012) developed and evaluated techniques that can be used visualise security and other dependability concerns, such as safety, early in the planning of new information systems. A central concern was to allow inclusion of a variety of stakeholders, in particular non-ICT/non-security experts, in th...
Ontological analysis of modelling languages has been mainly used for evaluating quality of modelling language w.r.t. one specific upper ontology. Generally speaking this evaluation has been done by identifying the coverage of the modelling language constructs w.r.t. the ontology and vice-versa. However, a quite limited support has been developed fo...
[Context and motivation] In air traffic management (ATM) safety assessments are performed with traditional techniques such as failure mode and effect analysis (FMEA). [Question/problem] As system modelling is becoming an increasingly important part of developing ATM systems, techniques that integrate safety aspects and modelling are needed. [Princi...
The paper describes enterprise modeling in a combined process change and ICT initiative in
a small Norwegian Home Builder company. The paper contributes to understanding of modeling
practice by reporting modeling experiences and recommendations and by relating modeling to a series
of change activities. At an overarching level change took place in t...
The Unified Enterprise Modelling Language (UEML) aims to support precise semantic definition of a wide variety of enterprise- and IS-modelling languages. In the longer run, it is also intended as a hub for integrated use of enterprise and information system (IS) models expressed in different languages. To achieve this, UEML provides a common ontolo...
The paper provides a message of the chairs of the 6th International Workshop on Vocabularies, Ontologies and Rules for The Enterprise (VORTE 2011) held at 15th EDOC International EDOC Conference.
The idea of security aware system development from the start of the engineering process is generally accepted nowadays and is becoming applied in practice. Many recent initiatives support this idea with special focus on security requirements elicitation. However, there are so far no techniques that provide integrated overviews of security threats a...
With the continuously developing technology and growing complexity of software and systems, new demands and challenges appear for security, calling for new techniques and methods in addition to the already existing ones. The variety of initiatives and the variations in the characterizations makes it hard for users to select the most appropriate one...
Purpose
The purpose of this paper is to address a theoretical gap in the business process management (BPM) literature on factors that influence the acceptance and use of business process modelling (PM) in organisations. The paper seeks to contribute to theory building and practice in BPM through better understanding of important determinants of PM...
Interoperability between model-driven software technologies can become easier to achieve if the models and modelling languages used are made interoperable too. One way to achieve interoperability is to capture the semantics of modelling language constructs and model elements by mapping them to semantic models, such as ontologies. The paper proposes...
The Unified Enterprise Modelling Language (UEML) aims to become a hub for integrated use of enterprise and information systems
(IS) models expressed using different languages. A central part of this hub is an extendible ontology into which modelling
languages and their constructs can be mapped, so that precise semantic relations between the languag...
This volume constitutes the proceedings of the 4th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling, held in Oslo, Norway, during November 2-3, 2011. The conference series is a dedicated forum where the use of enterprise modeling (EM) in practice is addressed by bringing together researchers, users, and practitioners in order t...
Various techniques have been proposed to model attacks on systems. In order to understand such attacks and thereby propose
efficient mitigations, the sequence of steps in the attack should be analysed thoroughly. However, there is a lack of techniques
to represent intrusion scenarios across a system architecture. This paper proposes a new technique...
The Unified Enterprise Modelling Language (UEML) aims to become a hub for integrated use of enterprise and information systems
(IS) models expressed using different languages. The paper explains how central constructs from UML’s class and activity diagrams
have been incorporated into UEML. As a result, the semantics of UML’s central constructs for...
The paper shows how to describe the semantics of domain-specific enterprise and information system (IS) modelling languages using the Unified Enterprise Modelling Language (UEML). The approach is illustrated with a fragment of a domain-specific modelling language based on the new ISO 15926 standard for data integration, sharing and hand-over betwee...
Security must be addressed at an early stage of information systems development, and one must learn from previous hacker attacks to avoid similar exploits in the future. Many security threats are hard to understand for stakeholders with a less technical background. To address this issue, we present a five-step method that represents hacker intrusio...
[Context and motivation] In the development of secure software, work on requirements and on architecture need to be closely intertwined, because
possible threats and the chosen architecture depend on each other mutually. [Question/problem] Nevertheless, most security requirement techniques do not take architecture into account. The transition from...
We are developing an approach to organizing bookmarks and other information resources by annotating them with metadata in the form of synsets taken from WordNet. This paper shows how a collection of annotated bookmarks can be semantically enriched by adding hyper-/hyponym relations from WordNet. It then illustrates how the semantically enriched boo...
The Unified Enterprise Modelling Language (UEML) aims at supporting integrated use of enterprise and IS models expressed using different languages. To achieve this aim, UEML offers a hub through which modelling languages can be connected, thereby paving the way for also connecting the models expressed in those languages. This paper motivates and pr...
Goal-oriented modelling languages are important during requirements engineering (RE). However, goal-oriented languages differ significantly in both syntax and semantics. The paper analyses and compares the semantics of GRL and KAOS using the UEML approach, which supports fine-grained analysis and comparison of modelling constructs based on the Bung...
This article addresses a theoretical gap in the BPM literature on factors that influence the acceptance of process modeling (PM) in organizations. Literature review on PM and 34 qualitative interviews were combined into a PM acceptance model and empirically tested with data from 74 companies showing that PM is to a large extent a mandated activity,...
The Unified Enterprise Modelling Language (UEML) provides a hub for integrated use of the many different modelling languages
available for representing enterprises and their information systems (IS). For this purpose, UEML centres around a common
ontology that interrelates the semantics of existing modelling languages and their constructs. This pap...
Goal modelling is emerging as a central requirements engineering (RE) technique. Unfortunately, current goal-oriented languages are not interop-erable with one another or with modelling languages that address other model-ling perspectives. This is a problem because the emerging generation of model-driven information systems are likely to depend on...
A number of methods have been proposed or adapted to include security in the requirements analysis stage, but the industrial take-up has been limited and there are few empirical and comparative evaluations. This paper reports on a pair of controlled experiments that compared two methods for early elicitation of security threats, namely attack trees...
Misuse case analysis is a technique for early elicitation of security-related threats and requirements to planned information systems. Since the technique was first proposed in 2000, there have been many follow-up contributions both by the originators, their students and by other researchers. These contributions have focused partly on extensions an...
The paper revises an existing model of process-modelling practice and uses it in a survey of Norwegian model-based process-change projects. In particular, management support and in-project training are robust predictors of project outcome. Practical and theoretical implications are presented and discussed. Important paths for further work include i...
Despite the importance of process modelling for business process management and related tasks, there are few theories and empirical studies of process-modelling practice available that can serve as the basis for understanding and improving this important practice. To contribute to the development of better theory, this paper proposes a model of pro...
The Unified Modeling Language (UML) has been widely accepted as the standard object-oriented (OO) modeling language for modeling various aspects of software and information systems. The UML is an extensible language, in the sense that it provides mechanisms to introduce new elements for specific domains if necessary, such as web applications, datab...
The paper revises an existing model of process-modelling practice and uses it in a survey of Norwegian model-based process-change projects. A central hypothesis is confirmed: There is a positive relationship between modelling processes in terms of management support, lack of resistance, in-project training, model types, and project outcome. Further...
This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 27th International Conference on Conceptual Modeling, ER 2008, in Barcelona, Spain, in October 2008.
The 42 revised full papers presented were carefully reviewed and selected from 108 submissions. Topics addressed by the workshops are...
Deliverable of INTEROP NoE http://www.interop-vlab.eu
A Roadmap for Unified enterprise modelling language
The UEML approach is comprising an ontological approach to representation of modeling languages; innovative ideas are i) ontology is not fixed but evolve, ii) ontological analysis outcome is a standardized meta-model of a language, mapping abstract syntax artifacts on ontological artifacts, Hi) automated mechanisms for understanding similarities be...
Process modelling is a central topic in the information systems field. This paper reports from an empirical study of 34 Norwegian process change projects where process modelling was used. The paper investigates which factors that were most important for effective process modelling: project-specific factors or modelling-related factors? By comparing...
Goal-oriented modelling languages are central in the information systems (IS) field, both for aligning new IS with organisational
needs and for developing agent-oriented software systems. However, existing goal-oriented languages differ significantly in
both syntax and semantics. The paper analyses and compares the syntax and semantics of GRL and K...
To improve the focus on security and other dependability issues it might be useful to include such concerns into mainstream diagram notations used in information systems analysis. In particular, there have been proposals introducing inverted icons to depict functionality not wanted in the system (e.g., misuse cases) or actors with malicious intent...
The paper reviews a line of conceptual-modelling research that originated in Arne Sølvberg’s Information Systems Group at the Norwegian University of Science and Technology in the 1980-ies. The line of research has since produced results such as facet modelling, ontological analyses and evaluations of modelling languages and a template-based approa...
Goal modeling is emerging as a central requirements engineering (RE) technique. Unfortunately, current goal-oriented languages are not interoperable with one another or with modeling languages that address other modeling perspectives. This problematic because the emerging generation of model-driven information systems is likely to depend on coordin...
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema.
Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne Sølvberg’s 6...