Shuichiro Yamamoto

Shuichiro Yamamoto
Nagoya University | Meidai · Graduate School of Information Science

Phd

About

149
Publications
20,020
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
656
Citations
Introduction
My current research interests are how to promote and visualize Digital Transformation with Enterprise Architecture Frameworks. The followings are my current researches. 1) Digital Balanced Scorecard toward Digital Transformation 2) DX Visualization Approach Using ArchiMate 3) Tailoring Approach on Enterprise Architecture Framework towards DX
Additional affiliations
December 2009 - present
Nagoya University
Position
  • Professor
December 2009 - present
Nagoya University
Position
  • Professor (Full)
April 2007 - December 2009
NTT DATA Corporation
Position
  • Manager

Publications

Publications (149)
Article
Enterprise architecture (EA) is useful for promoting digital transformation in global companies and information societies. In this paper, the authors investigated and analyzed the process for digital transformation in global companies, together with related work in using and applying an enterprise architecture framework for the digital era named th...
Article
The research domains and solutions of information technology have been rapidly changed as information technology continuously and deeply deployed into our society. On the other hand, it can be considered that there are some common knowledge creation processes in information technology researches. In this paper, we propose a common research process...
Article
Assurance cases are documents for arguing that systems satisfy required properties such as safety and security in the given environment based on sufficient evidence. As systems become complex and networked, the importance of assurance cases has become significant. However, we observe that creating assurance cases has some essential difficulties, an...
Article
Full-text available
EA (Enterprise Architecture) visualization methodologies have been explored by researchers and engineers to conduct EA modeling. The objectives of EA modeling are to clarify enterprise strategies, visualize business processes, and model information systems to manage resources, improve organization structure, adjust information strategy, and create...
Article
Full-text available
Goal-oriented NFR (Non-Functional Requirement) assurance approaches were used to qualitatively evaluate software architectures. Assurance cases using quantitative method have not been applied to evaluate NFR assurance for software architectures. This paper presents a system architecture evaluation method which is able to conduct quantitative NFR as...
Article
Full-text available
This article proposes a tool supported approach to detect omitted requirements that are not implemented in a corresponding architectural design document using difference sets of words or word senses between a software requirements specification document and a software architectural design document. First, the proposed approach extracts sets of sing...
Article
Full-text available
In this study, we consider the construction of a model for representing an artificial intelligence (AI) service system project. When developing a system using AI technologies to support a business task in a company, all project members from both business and IT divisions must have common understandings on the project before starting it. For this pu...
Article
Full-text available
To promote the digital transformation, it is important to develop a digital strategy that can improve profits. So far, a method for creating corporate IT strategies using a balanced scorecard has been proposed. In this paper, the four perspectives of the balanced scorecard are visually described as business management, customer experience, digital...
Article
Full-text available
Although there were many comparative literatures of Business Models, there were not clear comparison criteria. Therefore, these comparisons were fragmented based on different viewpoints. In general, questions on business models can be categorized by interrogatives. In other words, the interrogatives imply a set of key features of business model not...
Conference Paper
An electronic health record (EHR) is a repository of information regarding health status and longitudinal electronic records of patient information. During the past decade, EHR use has grown in Australia significantly, while adoption rates of EHR across the United States reached more than 90%. To support this expansion, enterprise architecture (EA)...
Chapter
In this work, we consider the construction of a model on a project developing an Artificial Intelligence (AI) Takeuchi,Hironori and propose a modeling approach to represent the project for various application domains by using Enterprise Architecture (EA) modeling. By the proposed modeling approach, we confirmed Yamamoto,Shuichiro project members fr...
Chapter
The demand on the innovation of enterprise services are rapidly increased. There are various modeling methods that can be applied to design digital transformation of services. However, there are few visual modeling methods to design innovations. Without consistent visual modeling methods, it is difficult to integrate service innovations and digital...
Chapter
Full-text available
Internets of Things (IoT) and Big Data applications and services have spread and are rapidly being deployed in the information services of the healthcare and financial industries, etc. However, the previous paper suggested that the current IoT services were individually developed, therefore, the open platform and architecture for the above IoT serv...
Chapter
Full-text available
Internets of Things (IoT) applications and services have spread and are rapidly being deployed in the information services of the healthcare and financial industries, etc. However, the previous paper suggested that the current IoT services were individually developed, therefore, the open platform and architecture for the above IoT services of the h...
Chapter
It is well known that IT management is the critical success factor for operating IT systems. However, the quantitative knowledge to evaluate the IT management capability of organizations has not been known. This paper proposes a quantitative IT management activity knowledge to evaluate IT management capability of organizations. The IT management ac...
Chapter
Considering the relation between Enterprise Architecture (EA) and IT is a prerequisite when promoting the uptake of IT by societies. In this paper, the authors propose an “Adaptive Integrated EA framework,” based on the results of a survey, to support the strategy of promoting cloud/mobile IT. They considered a unique advanced case and provide deta...
Article
Full-text available
ArchiMate is the language to model Enterprise Architecture using diagrams. Although ArchiMate is the powerful language to describe the whole content of Enterprise Architecture, it is not easy to learn and use correctly ArchiMate because it has approximately 60 graphical icons. The application knowledge how to use ArchiMate is highly expected. In th...
Article
Full-text available
In this work, we propose a model of a project to develop an artificial intelligence (AI) service system used in an office environment. Our model is based on enterprise architecture (EA) approach and consists of business layer elements, application layer elements, and motivation extensions, so that project participants from both business and IT divi...
Article
Full-text available
p> Although there were many comparison literatures of EA frameworks, these literature use qualitative criteria based on intuitive practitioner’s experience. The paper first defines 36 concrete features of EA frameworks using six categories and six interrogatives. Then we concretely compare typical EA frameworks based on the key features. The result...
Article
Full-text available
This article aims to investigate solutions incorporated by a group called an Architecture Board in the global healthcare enterprises (GHE) for solving issues and mitigating related architecture risks while implementing “Adaptive Integrated EA framework,” which can be applied in companies promoting IT strategy using Cloud/Mobile IT. The distribution...
Article
Full-text available
For assuring dependability among systems, it is necessary to describe not only system architecture, but also assurance argument between elements of systems. The composite dependability means for assuring dependability between components of a system. Several approaches have been focused to show the assurance of one single system. Moreover, a unified...
Article
Full-text available
It is difficult to reliably prevent failures occurring after the release of software products, and efforts to do so vary from company to company. In this paper, we will propose a two-stage third-party(2S3P) review method that focuses on the design process from the perspective of Enterprise Architecture and carries out a stepwise review of design do...
Article
Full-text available
It is well known that requirements specification is the critical success factor for developing information systems. However, the quantitative index to evaluate the requirements specification capability of the system development organizations has not been known. This paper proposes a requirements specification capability index to evaluate informatio...
Article
Full-text available
A portal is expected to promote the creation of enterprise communication. In this paper, the communication process of the Architecture Board utilizing a global enterprise portal is analysed. On the basis of the results, a method for promoting the global enterprise portal is evaluated and proposed for the near future.
Article
Full-text available
Considering the relation between Enterprise Architecture (EA) and IT is a prerequisite when promoting the uptake of IT by societies. In this paper, the authors propose an “Adaptive Integrated EA framework,” based on the results of a survey, to support the strategy of promoting cloud/mobile IT. They considered a unique advanced case and provide deta...
Conference Paper
This paper presents the result of the empirical evaluation of detection of omitted requirements that are not described by using words appearance and words senses appearance. The evaluation investigated whether omitted requirements can be detected by difference between a set of words in software requirement document and a set of words in software ar...
Article
Full-text available
This paper proposes an exhaustive check items for IT service management operation and a pCAPD (prepare-Check-Analyze-Plan-Do) method based on the check items. We also describe a case study on an actual service management operation to evaluate pCAPD. The 1884 check items are extracted from full life cycle of ITIL document. We define an evidence base...
Article
Full-text available
For managing information systems operation, it is necessary to clearly describe not only dynamic interactions between subjects and target operations on the information systems, but also their environmental context. In this paper, a method to elicit and design systems operation knowledge is proposed based on the structural model of human activities....
Article
Full-text available
With the development of technology and hardware, it has been assumed IoT(Internet of Things) society in the future that any device leads. In the automotive industry, in order to provide advanced services, such as automatic driving, any things are expected to lead the vehicle. In the IoT society, so that the lead is more than one system each other q...
Article
Full-text available
The knowledge which is needed on automotive software development, increases significantly according to large-scale, complexity of automotive software. Therefore, it is very difficult for an engineer to understand the whole software development. This paper introduces a way of constructing a meta-model, which visualizes the knowledge of expert engine...
Conference Paper
Given that the Balanced Scorecard (BSC) can also be used to decompose business goals into a tree- type structure, one would expect there to be a need for structuring and expressing business goals using Goal Structuring Notation (GSN). This article proposes Business Goal Structuring Notation (BGSN) based on an idea derived from said consideration. I...
Conference Paper
Full-text available
Since the year 2000, Enterprise Architecture has been the object of focus as a method to for promoting an IT architecture which that establishes consistency between corporate business strategy and IT strategy, and it has been applied mostly in global corporations. On the other hand, with the recent progress in mobile ITMobile IT technology and Clou...
Chapter
Recently, critical incidents have occurred in complex Information Technology (IT) systems . Thus, how to confirm the dependability of a system using dependability cases is becoming necessary. Information related to dependability is important knowledge that must be shared among stakeholders. However, in the previous methods used to describe dependab...
Article
This paper validates the safety requirements using descriptions of safety cases, which show arguments about safety with evidences to guarantee it, to improve social receptivity for automated vehicles. Automated vehicles work using interconnections with other independently operated systems to gather necessary information and communicate with other e...
Book
This book constitutes the refereed proceedings of the 345h International Conference on Conceptual Modeling, ER 2016, held in Gifu, Japan, in November 2016. The 23 full and 18 short papers presented together with 3 keynotes were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on Analytics and Concep...
Article
Full-text available
It is necessary to integrate practical software development and operation body of knowledge to deploy development and operation methods for assuring safety. In this paper, the knowledge for system safety verification and validation will be categorized by the basic knowledge, the plan knowledge, the analysis and design knowledge, and the verificatio...
Article
Full-text available
In order to develop a system with high safety, it is necessary to determine countermeasures for hazards that extracted using analysis methods like HAZOP, FTA, and so on. Furthermore, it is necessary to able to explain that countermeasures are surely embedded into a developed system in order to be accepted the analysis result by stakeholders. In thi...
Conference Paper
The resolution of conflicts among non-functional requirements are difficult problem during the analysis of non-functional requirements. To mitigate the problem, the weighted softgoal is proposed based on the Softgoal Interdependency Graphs (SIG) that help engineers resolve conflicts among non-functional requirements. It is also shown evaluation res...
Conference Paper
This paper describes a method to create assurance cases for the Open Dependability through Assuredness (O-DA) standard of The Open Group (TOG) based on ArchiMate. ArchiMate provides Enterprise Architecture (EA) models to describe Business, Application and Technology Architectures. Although O-DA shows the necessity of agreeing on the assuredness of...
Conference Paper
The NFR (Non Functional Requirements) framework was used to quantitatively evaluate software architectures. Assurance cases using GSN (Goal Structuring Notation) have not been applied to quantitatively evaluate software architectures. In this paper, GSN will be extended to define quantitative attributes for this purpose. Then, the architecture eval...
Article
Full-text available
In this paper, the authors present a new method for writing assurance cases. Assurance cases are documented bodies of evidence that provide a convincing and valid argument that a system is adequately dependable for a given application in a given environment. Assurance cases have been used mostly in the safety field, but are now beginning to be wide...
Research
Full-text available
After producing the D-case based on DFD, a question about the consistency of the produced D-case was raised. In this paper we will be discussing consistency checks for the produced D-case according to DFD and D-case rules and propose some approaches based on it . There are some rules used to define and formalize the DFD, in the same manner we will...
Chapter
In this paper, the authors present a new method for writing assurance cases. Assurance cases are documented bodies of evidence that provide a convincing and valid argument that a system is adequately dependable for a given application in a given environment. Assurance cases have been used mostly in the safety field, but are now beginning to be wide...
Article
Full-text available
It is necessary to integrate practical software development and operation body of knowledge to deploy development and operation methods for assuring safety. In this paper, an approach based on the method architecture is proposed to develop an integrated method for describing various software related bodies of knowledge and the safety case for assur...
Article
To assure the sufficiency of testing, it is necessary to build consensus among stakeholders such as system acquirers, developers, and test engineers who validate that implementation of the system satisfies requirements. In this paper, a safety case pattern is proposed to assure the sufficiency of testing based on requirements descriptions and devia...
Conference Paper
As modern systems are becoming complex and large rapidly, the dependability of these systems are important. Standards and regulations for developing software of these systems usually need restricted programming language and formal methods. For reasons of scale and complexities of these large systems it is preferable to use the modern object-oriente...
Conference Paper
Assurance case has been applied to various safety software domains. Many argument patterns approaches were proposed for reusing assurance cases. One of the issues of argument pattern based assurance case development is the application orders of patterns. In this paper, the argument algebra is proposed to define argument expressions for assurance ca...
Patent
Full-text available
A workspace computer and/or a runtime computer of the present invention determines a D value quantitatively indicative of a value of dependability of a target system, in accordance with dependability description data indicative of a requirement and specification regarding the dependability of the target system.
Article
In this paper, we will introduce some of the problem areas that software engineers are susceptible during the creation of assurance cases, based on the author's educational experience with assurance cases. To mitigate these problems, assurance case patterns are proposed based on Data flow diagrams that help engineers develop assurance cases by reus...
Conference Paper
Recently, serious failures of complex IT systems are becoming social problems. Assurance case attracts an attention as a technique to assure the dependability of critical systems. We have proposed d* framework which is an extended assurance case notation based on the network of dependable actors. In this paper, The assurance case creation procedure...
Article
Full-text available
System developers should explain system errors sufficiently, during a system failure situation. This is an essential act in order to verify the dependability of systems. Dependability Case (D-Case) is one method for confirming systems of dependability suffciently, against a system failure situations. However, in D-Case, we could not clearly describ...
Article
Full-text available
Recently, critical incidents have occurred in complex IT systems. Thus, how to confirm the dependability of a system via dependability cases is becoming necessary. Information related to dependability is important knowledge that must be shared among stakeholders. However, in previous methods used to describe dependability cases, the relation betwee...