
Shuichiro YamamotoNagoya University | Meidai · Graduate School of Information Science
Shuichiro Yamamoto
Phd
About
156
Publications
27,386
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
861
Citations
Introduction
My current research interests are how to promote and visualize Digital Transformation with Enterprise Architecture Frameworks. The followings are my current researches.
1) Digital Balanced Scorecard toward Digital Transformation
2) DX Visualization Approach Using ArchiMate
3) Tailoring Approach on Enterprise Architecture Framework towards DX
Additional affiliations
December 2009 - present
December 2009 - present
April 2007 - December 2009
Publications
Publications (156)
As the socio technological has complex resonant relationship, the resonance coupling of functions is necessary to analyze. Functional Resonance Analysis Method (FRAM) has been used to investigate the resonance couplings by using aspects to connect each other. There have been proposed two types of matrix representations of FRAM to exhaustively analy...
The Sustainable Development Goals (SDGs) initiative by corporations requires that their business activities be linked to the 17 SDGs. Moreover, the digital transformation (DX) of enterprises requires the use of digital technology to realize a digital company with competitive advantage. It is inefficient to implement the SDGs and DX initiatives sepa...
As the socio technological has complex resonant relationship, the resonance coupling of functions is necessary to analyze. Functional Resonance Analysis Method (FRAM) has been used to investigate the resonance couplings by using aspects to connect each other. There have been proposed two types of matrix representations of FRAM to exhaustively analy...
In this study, we consider projects in which systems are developed using machine learning (ML) techniques. An ML project canvas has been proposed to represent the project so that stakeholders can have a common understanding of the project. In many cases, this canvas must be constructed by business division practitioners without sufficient support f...
The research domains and solutions of information technology have been rapidly changed as information technology continuously and deeply deployed into our society. On the other hand, it can be considered that there are some common knowledge creation processes in information technology researches.
In this paper, we propose a common research process...
Enterprise architecture (EA) is useful for promoting digital transformation in global companies and information societies. In this paper, the authors investigated and analyzed the process for digital transformation in global companies, together with related work in using and applying an enterprise architecture framework for the digital era named th...
Assurance cases are documents for arguing that systems satisfy required properties such as safety and security in the given environment based on sufficient evidence. As systems become complex and networked, the importance of assurance cases has become significant. However, we observe that creating assurance cases has some essential difficulties, an...
EA (Enterprise Architecture) visualization methodologies have been explored by researchers and engineers to conduct EA modeling. The objectives of EA modeling are to clarify enterprise strategies, visualize business processes, and model information systems to manage resources, improve organization structure, adjust information strategy, and create...
Goal-oriented NFR (Non-Functional Requirement) assurance approaches were used to qualitatively evaluate software architectures. Assurance cases using quantitative method have not been applied to evaluate NFR assurance for software architectures. This paper presents a system architecture evaluation method which is able to conduct quantitative NFR as...
This article proposes a tool supported approach to detect omitted requirements that are not implemented in a corresponding architectural design document using difference sets of words or word senses between a software requirements specification document and a software architectural design document. First, the proposed approach extracts sets of sing...
In this study, we consider the construction of a model for representing an artificial intelligence (AI) service system project. When developing a system using AI technologies to support a business task in a company, all project members from both business and IT divisions must have common understandings on the project before starting it. For this pu...
To promote the digital transformation, it is important to develop a digital strategy that can improve profits. So far, a method for creating corporate IT strategies using a balanced scorecard has been proposed. In this paper, the four perspectives of the balanced scorecard are visually described as business management, customer experience, digital...
Although there were many comparative literatures of Business Models, there were not clear comparison criteria. Therefore, these comparisons were fragmented based on different viewpoints. In general, questions on business models can be categorized by interrogatives. In other words, the interrogatives imply a set of key features of business model not...
An electronic health record (EHR) is a repository of information regarding health status and longitudinal electronic records of patient information. During the past decade, EHR use has grown in Australia significantly, while adoption rates of EHR across the United States reached more than 90%. To support this expansion, enterprise architecture (EA)...
In this work, we consider the construction of a model on a project developing an Artificial Intelligence (AI) Takeuchi,Hironori and propose a modeling approach to represent the project for various application domains by using Enterprise Architecture (EA) modeling. By the proposed modeling approach, we confirmed Yamamoto,Shuichiro project members fr...
The demand on the innovation of enterprise services are rapidly increased. There are various modeling methods that can be applied to design digital transformation of services. However, there are few visual modeling methods to design innovations. Without consistent visual modeling methods, it is difficult to integrate service innovations and digital...
Internets of Things (IoT) and Big Data applications and services have spread and are rapidly being deployed in the information services of the healthcare and financial industries, etc. However, the previous paper suggested that the current IoT services were individually developed, therefore, the open platform and architecture for the above IoT serv...
Internets of Things (IoT) applications and services have spread and are rapidly being deployed in the information services of the healthcare and financial industries, etc. However, the previous paper suggested that the current IoT services were individually developed, therefore, the open platform and architecture for the above IoT services of the h...
It is well known that IT management is the critical success factor for operating IT systems. However, the quantitative knowledge to evaluate the IT management capability of organizations has not been known. This paper proposes a quantitative IT management activity knowledge to evaluate IT management capability of organizations. The IT management ac...
Considering the relation between Enterprise Architecture (EA) and IT is a prerequisite when promoting the uptake of IT by societies. In this paper, the authors propose an “Adaptive Integrated EA framework,” based on the results of a survey, to support the strategy of promoting cloud/mobile IT. They considered a unique advanced case and provide deta...
ArchiMate is the language to model Enterprise Architecture using diagrams. Although ArchiMate is the powerful language to describe the whole content of Enterprise Architecture, it is not easy to learn and use correctly ArchiMate because it has approximately 60 graphical icons. The application knowledge how to use ArchiMate is highly expected.
In th...
In this work, we propose a model of a project to develop an artificial intelligence (AI) service system used in an office environment. Our model is based on enterprise architecture (EA) approach and consists of business layer elements, application layer elements, and motivation extensions, so that project participants from both business and IT divi...
In this research, we considered projects to develop systems that use AI technologies including machine learning techniques for office environment. In many AI system development projects, both developers and users need to be involved in order to reach a consensus on discussion items before starting a project. To facilitate this, we propose a method...
p> Although there were many comparison literatures of EA frameworks, these literature use qualitative criteria based on intuitive practitioner’s experience. The paper first defines 36 concrete features of EA frameworks using six categories and six interrogatives. Then we concretely compare typical EA frameworks based on the key features. The result...
This article aims to investigate solutions incorporated by a group called an Architecture Board in the global healthcare enterprises (GHE) for solving issues and mitigating related architecture risks while implementing “Adaptive Integrated EA framework,” which can be applied in companies promoting IT strategy using Cloud/Mobile IT. The distribution...
For assuring dependability among systems, it is necessary to describe not only system architecture, but also assurance argument between elements of systems. The composite dependability means for assuring dependability between components of a system. Several approaches have been focused to show the assurance of one single system. Moreover, a unified...
It is difficult to reliably prevent failures occurring after the release of software products, and efforts to do so vary from company to company. In this paper, we will propose a two-stage third-party(2S3P) review method that focuses on the design process from the perspective of Enterprise Architecture and carries out a stepwise review of design do...
It is well known that requirements specification is the critical success factor for developing information systems. However, the quantitative index to evaluate the requirements specification capability of the system development organizations has not been known. This paper proposes a requirements specification capability index to evaluate informatio...
A portal is expected to promote the creation of enterprise communication. In this paper, the communication process of the Architecture Board utilizing a global enterprise portal is analysed. On the basis of the results, a method for promoting the global enterprise portal is evaluated and proposed for the near future.
Considering the relation between Enterprise Architecture (EA) and IT is a prerequisite when promoting the uptake of IT by societies. In this paper, the authors propose an “Adaptive Integrated EA framework,” based on the results of a survey, to support the strategy of promoting cloud/mobile IT. They considered a unique advanced case and provide deta...
This paper presents the result of the empirical evaluation of detection of omitted requirements that are not described by using words appearance and words senses appearance. The evaluation investigated whether omitted requirements can be detected by difference between a set of words in software requirement document and a set of words in software ar...
This paper proposes an exhaustive check items for IT service management operation and a pCAPD (prepare-Check-Analyze-Plan-Do) method based on the check items. We also describe a case study on an actual service management operation to evaluate pCAPD. The 1884 check items are extracted from full life cycle of ITIL document. We define an evidence base...
For managing information systems operation, it is necessary to clearly describe not only dynamic interactions between subjects and target operations on the information systems, but also their environmental context. In this paper, a method to elicit and design systems operation knowledge is proposed based on the structural model of human activities....
With the development of technology and hardware, it has been assumed IoT(Internet of Things) society in the future that any device leads. In the automotive industry, in order to provide advanced services, such as automatic driving, any things are expected to lead the vehicle. In the IoT society, so that the lead is more than one system each other q...
The knowledge which is needed on automotive software development, increases significantly according to large-scale, complexity of automotive software. Therefore, it is very difficult for an engineer to understand the whole software development. This paper introduces a way of constructing a meta-model, which visualizes the knowledge of expert engine...
Given that the Balanced Scorecard (BSC) can also be used to decompose business goals into a tree- type structure, one would expect there to be a need for structuring and expressing business goals using Goal Structuring Notation (GSN). This article proposes Business Goal Structuring Notation (BGSN) based on an idea derived from said consideration. I...
Since the year 2000, Enterprise Architecture has been the object of focus as a method to for promoting an IT architecture which that establishes consistency between corporate business strategy and IT strategy, and it has been applied mostly in global corporations. On the other hand, with the recent progress in mobile ITMobile IT technology and Clou...
Recently, critical incidents have occurred in complex Information Technology (IT) systems
. Thus, how to confirm the dependability of a system using dependability cases is becoming necessary. Information related to dependability is important knowledge that must be shared among stakeholders. However, in the previous methods used to describe dependab...
This paper validates the safety requirements using descriptions of safety cases, which show arguments about safety with evidences to guarantee it, to improve social receptivity for automated vehicles. Automated vehicles work using interconnections with other independently operated systems to gather necessary information and communicate with other e...
This book constitutes the refereed proceedings of the 345h International Conference on Conceptual Modeling, ER 2016, held in Gifu, Japan, in November 2016.
The 23 full and 18 short papers presented together with 3 keynotes were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on Analytics and Concep...
It is necessary to integrate practical software development and operation body of knowledge to deploy development and operation methods for assuring safety. In this paper, the knowledge for system safety verification and validation will be categorized by the basic knowledge, the plan knowledge, the analysis and design knowledge, and the verificatio...
In order to develop a system with high safety, it is necessary to determine countermeasures for hazards that extracted using analysis methods like HAZOP, FTA, and so on. Furthermore, it is necessary to able to explain that countermeasures are surely embedded into a developed system in order to be accepted the analysis result by stakeholders. In thi...
The resolution of conflicts among non-functional requirements are difficult problem during the analysis of non-functional requirements. To mitigate the problem, the weighted softgoal is proposed based on the Softgoal Interdependency Graphs (SIG) that help engineers resolve conflicts among non-functional requirements. It is also shown evaluation res...
This paper describes a method to create assurance cases for the Open Dependability through Assuredness (O-DA) standard of The Open Group (TOG) based on ArchiMate. ArchiMate provides Enterprise Architecture (EA) models to describe Business, Application and Technology Architectures. Although O-DA shows the necessity of agreeing on the assuredness of...
The NFR (Non Functional Requirements) framework was used to quantitatively evaluate software architectures. Assurance cases using GSN (Goal Structuring Notation) have not been applied to quantitatively evaluate software architectures. In this paper, GSN will be extended to define quantitative attributes for this purpose. Then, the architecture eval...
In this paper, the authors present a new method for writing assurance cases. Assurance cases are documented bodies of evidence that provide a convincing and valid argument that a system is adequately dependable for a given application in a given environment. Assurance cases have been used mostly in the safety field, but are now beginning to be wide...
After producing the D-case based on DFD, a question about the consistency of the produced D-case was raised. In this paper we will be discussing consistency checks for the produced D-case according to DFD and D-case rules and propose some approaches based on it . There are some rules used to define and formalize the DFD, in the same manner we will...
In this paper, the authors present a new method for writing assurance cases. Assurance cases are documented bodies of evidence that provide a convincing and valid argument that a system is adequately dependable for a given application in a given environment. Assurance cases have been used mostly in the safety field, but are now beginning to be wide...
It is necessary to integrate practical software development and operation body of knowledge to deploy development and operation methods for assuring safety. In this paper, an approach based on the method architecture is proposed to develop an integrated method for describing various software related bodies of knowledge and the safety case for assur...
To assure the sufficiency of testing, it is necessary to build consensus among stakeholders such as system acquirers, developers, and test engineers who validate that implementation of the system satisfies requirements. In this paper, a safety case pattern is proposed to assure the sufficiency of testing based on requirements descriptions and devia...
As modern systems are becoming complex and large rapidly, the dependability of these systems are important. Standards and regulations for developing software of these systems usually need restricted programming language and formal methods. For reasons of scale and complexities of these large systems it is preferable to use the modern object-oriente...
Assurance case has been applied to various safety software domains. Many argument patterns approaches were proposed for reusing assurance cases. One of the issues of argument pattern based assurance case development is the application orders of patterns. In this paper, the argument algebra is proposed to define argument expressions for assurance ca...
A workspace computer and/or a runtime computer of the present invention determines a D value quantitatively indicative of a value of dependability of a target system, in accordance with dependability description data indicative of a requirement and specification regarding the dependability of the target system.
In this paper, we will introduce some of the problem areas that software engineers are susceptible during the creation of assurance cases, based on the author's educational experience with assurance cases. To mitigate these problems, assurance case patterns are proposed based on Data flow diagrams that help engineers develop assurance cases by reus...
Recently, serious failures of complex IT systems are becoming social problems. Assurance case attracts an attention as a technique to assure the dependability of critical systems. We have proposed d* framework which is an extended assurance case notation based on the network of dependable actors. In this paper, The assurance case creation procedure...
System developers should explain system errors sufficiently, during a system failure situation. This is an essential act in order to verify the dependability of systems. Dependability Case (D-Case) is one method for confirming systems of dependability suffciently, against a system failure situations. However, in D-Case, we could not clearly describ...
Recently, critical incidents have occurred in complex IT systems. Thus, how to confirm the dependability of a system via dependability cases is becoming necessary. Information related to dependability is important knowledge that must be shared among stakeholders. However, in previous methods used to describe dependability cases, the relation betwee...
In this paper we present a new reasonable method for writing security cases. A security case is one form of assurance case as there are other forms such as safety case, reliability case, dependability case and so on. Assurance case is a technique to structure assurance requirements concerning a system. It contains argumentation structure and eviden...
An analysis methodology is proposed for sustainable knowledge collaboration services. The methodology consists of three layered knowledge collaboration architecture, knowledge collaboration community analysis method, knowledge collaboration architecture analysis method, knowledge collaboration structure analysis method, and knowledge collaboration...
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots of security tools and methods that are being created and used within institutes and organizations in order to mitigate risk, threats and vulnerabilities to systems. However, the publicized information so far still has holes and lim...
Now, information systems are developed as open system that depend on each other. Assurance cases are expected to confirm a dependability of open systems. D*Framework is a method that can make assurance case for open system. In this paper we defined d*Framework formally. Furthermore we apply this method with case study and made discussion.
The paper discusses the use of Data flow diagram(DFD) to assure dependability. Until now, DFD has beenwidely used to track data movement from input to outputmaking it easy to organize processes and have an overallunderstanding of the system. However, no studies exist ondependability using Data Flow Diagrams. After examiningseveral D-Cases (dependab...
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots of security models, tools and methods that are being created and used within institutes and organizations in order to mitigate risk, threats and vulnerabilities of systems. However, the publicized information so far still has holes...