+ All Categories
Home > Documents > Ontology for Information Systems (O4IS) Design Methodology

Ontology for Information Systems (O4IS) Design Methodology

Date post: 10-Feb-2017
Category:
Upload: nguyendan
View: 218 times
Download: 0 times
Share this document with a friend
354
Ontology for Information Systems (O4IS) Design Methodology Conceptualizing, Designing and Representing Domain Ontologies Vandana Kabilan October 2007. A Dissertation submitted to The Royal Institute of Technology in partial fullfillment of the requirements for the degree of Doctor of Technology . The Royal Institute of Technology School of Information and Communication Technology Department of Computer and Systems Sciences
Transcript
Page 1: Ontology for Information Systems (O4IS) Design Methodology

Ontology for InformationSystems (O4IS) Design

MethodologyConceptualizing, Designing and Representing

Domain Ontologies

Vandana Kabilan

October 2007.

A Dissertation submitted to

The Royal Institute of Technology

in partial fullfillment of the requirements for

the degree of Doctor of Technology .

The Royal Institute of Technology

School of Information and Communication Technology

Department of Computer and Systems Sciences

Page 2: Ontology for Information Systems (O4IS) Design Methodology

IV

DSV Report Series No. 07–013

ISBN 978–91–7178–752–1

ISSN 1101–8526

ISRN SU–KTH/DSV/R– –07/13– –SE

Page 3: Ontology for Information Systems (O4IS) Design Methodology

V

All knowledge that the world has ever received comes from the mind; the

infinite library of the universe is in our own mind.

– Swami Vivekananda. (1863 – 1902) Indian spiritual philosopher.

The whole of science is nothing more than a refinement of everyday thinking.

– Albert Einstein (1879 – 1955) German-Swiss-U.S. scientist.

Science is a mechanism, a way of trying to improve your knowledge of na-

ture. It’s a system for testing your thoughts against the universe, and seeing

whether they match.

– Isaac Asimov. (1920 – 1992) Russian-U.S. science-fiction author.

Page 4: Ontology for Information Systems (O4IS) Design Methodology
Page 5: Ontology for Information Systems (O4IS) Design Methodology

VII

Dedicated to the three KAs of my life: Kabilan, Rithika and Kavin.

Page 6: Ontology for Information Systems (O4IS) Design Methodology
Page 7: Ontology for Information Systems (O4IS) Design Methodology

IX

Abstract. Globalization has opened new frontiers for business enterprises and human com-

munication. There is an information explosion that necessitates huge amounts of informa-

tion to be speedily processed and acted upon. Information Systems aim to facilitate human

decision-making by retrieving context-sensitive information, making implicit knowledge ex-

plicit and to reuse the knowledge that has already been discovered. A possible answer to meet

these goals is the use of Ontology.

Ontology has been studied for a long time in the fields of AI, Logic and Linguistics. Cur-

rent state-of-the art research in Information Systems has focused on the use of ontologies.

However, there remain many obstacles for the practical and commercial use of ontologies for

Information Systems. One such obstacle is that current Information System designers lack

the know-how to successfully design an ontology. Current ontology design methodologies are

difficult to use by Information Systems designers having little theoretical knowledge of ontol-

ogy modeling. Another issue is that business enterprises mostly function in the social domain

where there are complex underlying semantics and pragmatics involved.

This research tries to solve some of these issues by proposing the Ontology for Information

Systems (O4IS) Design Methodology for the design of ontologies for Information Systems. The

research also proposes a Unified Semantic Procedural Pragmatic Design for explicit conceptu-

alization of the semantics and pragmatics of a domain. We further propose a set of Semantic

Analysis Representations as conceptual analysis patterns for semantic relationship identifica-

tion. We also put forward the Dual Conceptual Representation so that the designed ontology

is understandable by both humans and machines. Finally, a logical architecture for domain

ontology design called the Multi-Tier Domain Ontology Architecture is proposed.

We follow the design science in Information Systems research methodology. The proposed

solutions are demonstrated through two case studies carried out in different domains. The

first case study is that of business contract knowledge management, which focuses on the

analysis of contractual obligations, their fulfillment via the performance of business actions,

and the deduction of a contract compliant workflow model. The second case study relates to

military operations simulations and modeling. The emphasis in this case study is to analyze,

model and represent the domain knowledge as a re-usable resource to be used in a number

of modeling and simulation applications.

Page 8: Ontology for Information Systems (O4IS) Design Methodology
Page 9: Ontology for Information Systems (O4IS) Design Methodology

XI

Acknowledgement. It has been an enlightening journey into unknown frontiers, learning to

solve new challenges, and finding more pieces of knowledge scattered along the way. But it

would not have been possible, if not for the gentle steering and supportive guidance of my

supervisor, Prof. Paul Johannesson. I thank – Paul; For being an quintessential supervisor who

like a compass activates the magnets of curiosity, knowledge and wisdom.

I thank all my colleagues at DSV – Maria, Jelena, Birger, Hercules and everyone else at

SYSLAB; For being such excellent listeners, contributors and critics of my theories.

I also acknowledge my colleagues at the Swedish Defence Research Agency – Vahid, Mar-

ianela and Pernilla; For giving me the opportunity to be a part of their team and for the

countless hours of brainstorming.

I acknowledge all the wonderful researchers with whom I have had the opportunity to

meet and exchange ideas. I specially thank Hans Weigand for his collaboration and construc-

tive criticisms.

Last, but not the least, this research would never have become a reality, without the sup-

port and motivation provided by my family – Mama and Athai; For your constant inspiration

and motivation. Mom and Dad; For providing me with the best possible start to life that I could

have ever wished for. Priya; For the being the perfect sister and professional proof-reader.

Special thanks to my children Rithika and Kavin whose innocent smiles wipe away all

exhaustion at the end of each tiring day. Finally, I owe this PhD to the one person who has

believed in me always, pushed me harder, to reach higher – my best friend, my love and

husband, Kabilan. Thank you for truly shining like the North Star, eternally constant without

a flicker.

Page 10: Ontology for Information Systems (O4IS) Design Methodology
Page 11: Ontology for Information Systems (O4IS) Design Methodology

Contents

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.1 Research Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.1.1 Information Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.2 Ontologies for Information Systems . . . . . . . . . . . . . . . . . . . . . . . 3

1.1.3 Conceptual Modeling and Ontology . . . . . . . . . . . . . . . . . . . . . . . 5

1.2 Research Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

1.3 Research Motivation: Information systems need ontology . . . . . . . . . . 7

1.4 Research Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

1.5 Research Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

1.6 Goal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

1.7 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

1.8 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

1.9 Research Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

1.10 Research Evaluation Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

1.11 Case Studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

1.12 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

1.13 Disposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

1.14 Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

2 Knowledge Management and Information Systems . . . . . . . . . . . . . . . . . . 31

2.1 The Data-Information-Knowledge-Wisdom Model . . . . . . . . . . . . . . . . . 31

2.2 Information Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.2.1 Knowledge Base Versus Database Information Systems. . . . . . . 34

2.2.2 Knowledge Bases and Knowledge Base Systems . . . . . . . . . . . . . 35

2.3 Knowledge Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

2.3.1 Knowledge Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

2.3.2 Different Roles of Knowledge Representation . . . . . . . . . . . . . . 38

2.4 Relevance of Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Page 12: Ontology for Information Systems (O4IS) Design Methodology

XIV Contents

3 Ontology and Information Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.1 Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.2 Uses of Ontologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

3.3 Ontology – A Historical Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

3.3.1 From Philosophy, AI and Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

3.3.2 From Linguistics to Information Systems . . . . . . . . . . . . . . . . . . . 47

3.3.3 From Knowledge Management to Information Systems . . . . . . 48

3.3.4 What Information Systems can learn from Philosophical

Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.4 Ontology Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

3.5 Ontology Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

3.6 Ontology Design Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

3.7 Ontology Development Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

3.8 Ontology Design Methodologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

3.8.1 Uschold and Gruninger’s Skeletal Method . . . . . . . . . . . . . . . . . . 57

3.8.2 Gruninger and Fox Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

3.8.3 Noy and McGuinness Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

3.8.4 UPON. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

3.8.5 METHONTOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

3.8.6 Conceptualization in Methontology . . . . . . . . . . . . . . . . . . . . . . . 64

3.9 Relevance of Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

4 Conceptual Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

4.1 Conceptual Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

4.2 Conceptual Modeling Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

4.2.1 ER Modeling Revisited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

4.2.2 Conceptual Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

4.3 Intensional and Extensional Conceptual Modeling . . . . . . . . . . . . . . . . . 74

4.3.1 Conceptual Modeling Languages . . . . . . . . . . . . . . . . . . . . . . . . . . 75

4.4 Using Conceptual Modeling for Ontology Modeling . . . . . . . . . . . . . . . . 75

4.5 Conceptual Modeling Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

4.5.1 Design Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

4.6 Procedural and Behavior Representation Languages . . . . . . . . . . . . . . . 82

4.7 Relevance of Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

5 Ontology for Information Systems Design Methodology . . . . . . . . . . . . . 89

5.1 Requirements on O4IS Design Methodology . . . . . . . . . . . . . . . . . . . . . . 92

5.2 Introducing the O4IS Design Methodology . . . . . . . . . . . . . . . . . . . . . . . 93

5.2.1 Template for describing the O4IS Design Methodology . . . . . . . 95

5.2.2 G1: Establish the scope of the domain . . . . . . . . . . . . . . . . . . . . . 95

Page 13: Ontology for Information Systems (O4IS) Design Methodology

Contents XV

5.2.3 G2: Establish the targeted users, applications, and functional

requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

5.2.4 G3: Choose ontology architecture: physical and logical . . . . . . 98

5.2.5 G4: Choose ontology development approach . . . . . . . . . . . . . . . 99

5.2.6 G5: Choose level of ontology representation . . . . . . . . . . . . . . . . 100

5.2.7 G6: Choose knowledge acquisition methods and tools . . . . . . . 101

5.2.8 G7: Knowledge analysis - conceptualize the domain ontology . 102

5.2.9 G8: Knowledge representation - implement the domain

ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

5.2.10 G9: Evaluate, assess and verify the domain ontology . . . . . . . . 103

5.2.11 G10: Use, maintain and manage the domain ontology . . . . . . . 104

5.3 Multi-tiered Domain Ontology Architecture . . . . . . . . . . . . . . . . . . . . . . 105

5.3.1 Advantages of the Multi-tier Domain Ontology Architecture . . 107

5.4 Dual Conceptual Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

5.4.1 UML for Conceptual Modeling and Ontology Representation . 110

6 Unified Semantic Procedural Pragmatic Design . . . . . . . . . . . . . . . . . . . . . 113

6.1 Semantics, Procedures and Pragmatics . . . . . . . . . . . . . . . . . . . . . . . . . . 115

6.2 Introducing the USP2 Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

6.3 Verb Phrase Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

6.4 Performative Verb Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

6.5 Semantic Analysis Representations: Discovering Semantic

Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

6.5.1 Structural Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

6.5.2 Functional Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

6.5.3 Temporal Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

6.5.4 Deontic Analysis Model: Deontic Relationships . . . . . . . . . . . . . 131

6.5.5 Nested or Complex Deontic Proposition . . . . . . . . . . . . . . . . . . . . 135

6.5.6 ECA Rule Ontology: Prescriptive Relationships . . . . . . . . . . . . . . 140

6.6 Semantic Concept View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

6.6.1 Design Guidelines for the Semantic Concept View . . . . . . . . . . . 144

6.7 Procedural Concept View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

6.7.1 Design Guidelines for the Procedural Concept View . . . . . . . . . 157

6.8 Pragmatic Concept View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

6.8.1 Design Guidelines for the Pragmatic Concept View . . . . . . . . . . 163

7 Case Study I: The Business Contract Knowledge Management Project . 167

7.1 Case Study I Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

7.2 Research Issues in Business Contract Knowledge Management . . . . . . 171

7.3 Objectives for Case Study I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

7.4 Related Research for Business Contracts . . . . . . . . . . . . . . . . . . . . . . . . . 173

Page 14: Ontology for Information Systems (O4IS) Design Methodology

XVI Contents

7.5 Contract Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

7.5.1 Document Centric Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

7.5.2 Process Centric Approach using Deontic Logic . . . . . . . . . . . . . . 175

7.5.3 Normative Approach using Subjective and Deontic Logic . . . . . 176

7.5.4 Standardization Approach using Courteous Logic Programs . . 177

7.5.5 Communicative Approach using FLBC . . . . . . . . . . . . . . . . . . . . . 177

7.5.6 Enterprise Systems Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

7.5.7 Workflow Management Approach . . . . . . . . . . . . . . . . . . . . . . . . . 179

7.6 Multi Tiered Contract Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

7.7 Using O4IS Design Methodology and USP2 Design . . . . . . . . . . . . . . . . 180

7.8 Multi Tier Contract Ontology: Semantic Concept View . . . . . . . . . . . . . 183

7.9 Upper Level Core Contract Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

7.9.1 Basic Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

7.9.2 Contract Obligation Analysis: Pragmatic Concepts Analyzed . . 188

7.9.3 Obligation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

7.9.4 Business Contract Obligation States . . . . . . . . . . . . . . . . . . . . . . . 191

7.10 Specific Domain Level Contract Ontology . . . . . . . . . . . . . . . . . . . . . . . . 196

7.11 Template Level Contract Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

7.12 Deducing Contract Workflow Model: The Procedural Concept View . . 203

7.12.1 Contract Workflow Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

7.12.2 CWM Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

7.12.3 Detailed CWM Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

7.12.4 Using BPMN to model CWMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

7.12.5 CWM-BPMN Transformation Patterns . . . . . . . . . . . . . . . . . . . . . 215

7.13 Uses of MTCO and CWM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

7.13.1 Alignment of Contract to Business Process Models . . . . . . . . . . 224

7.13.2 Contract Execution Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

7.13.3 Exception handling of Process Patterns: Analyzing

Prescriptive Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

7.13.4 Business Contract Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . 227

7.14 Case Study I: Discussion of Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

7.14.1 Summary of Case Study Contributions . . . . . . . . . . . . . . . . . . . . . 230

8 Case Study II: The Defence Conceptual Modeling Framework Project . 233

8.1 Case Study II Background. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

8.1.1 DCMF Project Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

8.1.2 DCMF Project Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

8.2 Functional Requirements of the DCMF Project . . . . . . . . . . . . . . . . . . . . 235

8.3 The DCMF Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

8.4 Role of Ontology in DCMF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

Page 15: Ontology for Information Systems (O4IS) Design Methodology

Contents XVII

8.5 Using the O4IS Design Methodology and USP2 Design . . . . . . . . . . . . . 239

8.6 Defence Conceptual Modeling Framework- Ontology Suite . . . . . . . . . 242

8.6.1 SUMO as the Upper Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

8.6.2 JC3IEDM as the Middle Military Domain Ontology . . . . . . . . . . 244

8.7 Customizing Semantic Analysis Representations for Military Scenarios 248

8.7.1 Global Context ECA Rule - Prescriptive Relationships . . . . . . . . 249

8.7.2 Military Behavior Analysis- ECA Rule Ontology . . . . . . . . . . . . . 251

8.7.3 Global Context: Structural Relationships . . . . . . . . . . . . . . . . . . . 257

8.8 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

8.8.1 Scenario 1: The Kosovo Arms Smuggling Scenario . . . . . . . . . . 261

8.8.2 Scenario 2: The Viking Shield Example: Lord Barkan Hostage

Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

8.8.3 Scenario 3: The Moscow Theater Hostage Crisis . . . . . . . . . . . . 272

8.8.4 Scenario Viewer- application for Knowledge Use . . . . . . . . . . . . 274

8.9 Case Study Results and Evaluations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

9 Discussion of Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

9.1 Assessing the O4IS Design Methodology . . . . . . . . . . . . . . . . . . . . . . . . . 277

9.1.1 Surveyed Ontology Methodologies: A Recap . . . . . . . . . . . . . . . . 277

9.1.2 Requirements Revisited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

9.2 Advantages of O4IS Design Methodology . . . . . . . . . . . . . . . . . . . . . . . . 280

9.2.1 O4IS Design Methodology useful in all ontology building

situations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

9.2.2 O4IS Design methodology proposes Dual Conceptual

Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

9.2.3 O4IS Design Methodology considers functional requirements

of application purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

9.3 Evaluating USP2 Design and the Semantic Analysis Representations . 284

9.4 Summary of Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

10 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

10.1 Problem Identification and Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

10.2 Objectives for a solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

10.3 Design and Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

10.4 Demonstration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

10.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

10.6 Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

10.7 Open Issues and Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

10.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294

References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

Page 16: Ontology for Information Systems (O4IS) Design Methodology

XVIII Contents

A Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

A.1 INCOTERMS: Delivery Patterns for Sale of Goods . . . . . . . . . . . . . . . . . 309

A.2 Sample Contract Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

A.2.1 Phase 1: Contract Type Identification . . . . . . . . . . . . . . . . . . . . . . 316

A.2.2 Phase 2: Contract Instance MetaData . . . . . . . . . . . . . . . . . . . . . . 316

A.2.3 Phase 3: Obligation Performance Events Identification . . . . . . . 316

A.2.4 Phase 4: Obligation, Performance, Non-Performance

Interrelationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

A.2.5 Phase 5: Optional mapping to existing Business Process flows . 323

A.2.6 Phase 6: Contract Workflow Model for sample contract . . . . . . 324

A.3 Sample Contract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

Page 17: Ontology for Information Systems (O4IS) Design Methodology

List of Figures

1.1 Information System Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2 Ontologies for IS and Ontologies of IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.3 Conceptual Modeling Framework proposed by Wand . . . . . . . . . . . . . . . 5

1.4 Research Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

1.5 Current Situation of Ontology Design and Use in Information

Systems: Based on MITRE Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

1.6 Design Science Research Process Model . . . . . . . . . . . . . . . . . . . . . . . . . . 17

1.7 The Proposed Design Methodology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

1.8 Thesis Disposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

3.1 Ontology Architecture proposed by Guarino . . . . . . . . . . . . . . . . . . . . . . . 53

3.2 Illustration for Top Down Development Approach . . . . . . . . . . . . . . . . . . 55

3.3 Motivation for using Middle-Out Approach . . . . . . . . . . . . . . . . . . . . . . . . 56

3.4 Gruninger and Fox Design Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . 58

3.5 UPON. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

3.6 METHONTOLOGY: Constituent activities and their states . . . . . . . . . . . . 63

3.7 Intermediate conceptualizations in METHONTOLOGY . . . . . . . . . . . . . . 64

4.1 Human Knowledge from Different Perspectives . . . . . . . . . . . . . . . . . . . . 72

4.2 Basic DFD Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

4.3 Basic EPC Diagram Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

4.4 Basic UML Activity Diagram Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

4.5 Basic Petrinet Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

4.6 Basic BPMN Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

5.1 Chapter Disposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

5.2 The Ontology for Information Systems Design Methodology . . . . . . . . . 94

5.3 Establishing Domain Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

5.4 Establish the Applications and Users of the Domain. . . . . . . . . . . . . . . . . 97

Page 18: Ontology for Information Systems (O4IS) Design Methodology

XX List of Figures

5.5 Types of Physical Architecture for Ontology . . . . . . . . . . . . . . . . . . . . . . . 98

5.6 Multi-tiered Domain Ontology Architecture . . . . . . . . . . . . . . . . . . . . . . . 99

5.7 Dual Conceptual Representation for Domain Ontology . . . . . . . . . . . . . . 100

5.8 Moving from Generic to Specific Domain Conceptualization . . . . . . . . . 106

5.9 Example for Multi-Tier Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

6.1 Disposition of Chapter: USP2 Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

6.2 Unified Semantic Procedural Pragmatic Perspectives . . . . . . . . . . . . . . . . 117

6.3 Semantics-Procedures-Pragmatics Domain . . . . . . . . . . . . . . . . . . . . . . . . 119

6.4 Semantic Relationships: Classification Levels . . . . . . . . . . . . . . . . . . . . . . 120

6.5 Status primitives from Verb Phrase Ontology . . . . . . . . . . . . . . . . . . . . . . 121

6.6 Interaction primitives from Verb Phrase Ontology . . . . . . . . . . . . . . . . . . 122

6.7 Performative Verb Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

6.8 Temporal Relationships for Closed Intervals . . . . . . . . . . . . . . . . . . . . . . . 130

6.9 Temporal Relationships for Open Intervals . . . . . . . . . . . . . . . . . . . . . . . . 131

6.10 Deontic Analysis Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

6.11 Basic Deontic Proposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

6.12 Nested Deontic Proposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

6.13 Conditional Deontic Proposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

6.14 ECA Rule Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

6.15 ECA Rule Ontology: An Illustrative Example . . . . . . . . . . . . . . . . . . . . . . . 142

6.16 Identifying Concepts and Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

6.17 Extending Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

6.18 Extending the Structural Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

6.19 Adding Semantic Relations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

6.20 Ontology Implementation in Protege Ontology Editor . . . . . . . . . . . . . . . 156

6.21 Procedural Concept View: Car Rental Illustration . . . . . . . . . . . . . . . . . . 158

6.22 Procedural Concept View: Extended Car Rental Scenario . . . . . . . . . . . . 160

6.23 Pragmatic Concept View Car Rental Illustration . . . . . . . . . . . . . . . . . . . . 165

7.1 Case Study I: Disposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

7.2 Three Perspectives of Business Contract Domain . . . . . . . . . . . . . . . . . . . 169

7.3 Lifecycle of a Business Contract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

7.4 Multi-leveled Communication Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

7.5 Multi Tiered Contract Ontology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

7.6 Upper Level Core Contract Ontology: Overview . . . . . . . . . . . . . . . . . . . . 185

7.7 Upper Level Core Contract Ontology: A detailed Semantic Concept

View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

7.8 Performance Event Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

7.9 Business Contract Obligation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

7.10 Business Contract Obligation States: Overview . . . . . . . . . . . . . . . . . . . . 192

Page 19: Ontology for Information Systems (O4IS) Design Methodology

List of Figures XXI

7.11 Business Contract Obligation States: Detail . . . . . . . . . . . . . . . . . . . . . . . . 193

7.12 Typical Contract Obligation Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

7.13 Extract from Sale of Goods Contract showing expanded view for

Buyer’s Obligation to Pay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

7.14 Extract from a Seller’s Obligation to Deliver and its

Fullfillment/Unfullfillment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

7.15 Obligation to Deliver and Related Rights . . . . . . . . . . . . . . . . . . . . . . . . . . 200

7.16 Sample Template Level Contract Ontology Model for Sale of Motor

Vehicle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

7.17 Sample Template Level Contract Ontology Model for Sale of Boats . . . 202

7.18 A Sample Contract Workflow Model using BPMN . . . . . . . . . . . . . . . . . . 218

7.19 Pattern 3: Contract Obligation State Changes . . . . . . . . . . . . . . . . . . . . . . 220

7.20 Pattern 4 and Pattern 5: Contract Performance Event Sequences and

Simultaneous Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

7.21 Pattern 7: Exclusive Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

7.22 Pattern 8: Remedial Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

8.1 Case Study II- Chapter Disposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

8.2 Defence Conceptual Modeling Framework-Ontology Suite . . . . . . . . . . . 242

8.3 The Top Level Concepts in SUMO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

8.4 Main Concepts of DCMF-O: Adapted JC3IEDM . . . . . . . . . . . . . . . . . . . . . 246

8.5 Example of mapping 5Ws and the DCMFO . . . . . . . . . . . . . . . . . . . . . . . . 250

8.6 5Ws-What mapped to DCMFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

8.7 5Ws-Why mapped to DCMFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

8.8 5Ws-When mapped to DCMFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

8.9 Illustration of a Rule of Engagement analyzed using ECA Rule Ontology252

8.10 ECA Rule Ontology implemented in Protege . . . . . . . . . . . . . . . . . . . . . . . 255

8.11 Illustration of ECA Rule Ontology enriched with WORDNET . . . . . . . . . 256

8.12 MUST Kosovo Arms Smuggling Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . 262

8.13 Procedural Concept View: using CWM . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

8.14 Pragmatic Concept View: using DAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

8.15 Lord Barkan Hostage Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

8.16 Lord Barkan Hostage Scenario: Functional Relations . . . . . . . . . . . . . . . 269

8.17 Lord Barkan Hostage Scenario:Prescriptive Behavior Analysis . . . . . . . . 270

8.18 Lord Barkan Hostage Scenario: Scenario Viewer . . . . . . . . . . . . . . . . . . . 271

8.19 Moscow Theater Hostage Scenario: Military Operation . . . . . . . . . . . . . 273

A.1 INCOTERMS:Obligation to Exchange Goods . . . . . . . . . . . . . . . . . . . . . . . 310

A.2 Overview of common features of the INCOTERMS delivery patterns . . 313

A.3 INCOTERMS:Obligation to Exchange Goods . . . . . . . . . . . . . . . . . . . . . . . 314

Page 20: Ontology for Information Systems (O4IS) Design Methodology

XXII List of Figures

A.4 Ex Works: A typical case scenario for contract execution between

seller and buyer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

A.5 Obligation and Performance Events in Time Ordered Sequence . . . . . . 323

A.6 Deduced Contract Workflow Model using EPC Diagram . . . . . . . . . . . . . 325

Page 21: Ontology for Information Systems (O4IS) Design Methodology

List of Tables

2.1 Definitions of Information Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

6.1 Examples of Performative Verbs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

6.2 Structural Relationship Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

6.3 Functional Relationship Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

6.4 Action-Action Functional Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

6.5 Pragmatic Relationships from Storey’s Verb Phrase Ontology . . . . . . . . . 162

8.1 Sample Rules of Engagements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

8.2 Extract of Rules analyzed with only 5Ws . . . . . . . . . . . . . . . . . . . . . . . . . . 253

8.3 Extract of Rules analyzed with ECA Rule Ontology . . . . . . . . . . . . . . . . . 254

8.4 Actor/Role-verb-Actor/role Structural Relationships . . . . . . . . . . . . . . . 258

8.5 Actor/Role-verb-Action Structural Relationships . . . . . . . . . . . . . . . . . . . 259

8.6 Entity-verb-Entity Structural Relationships . . . . . . . . . . . . . . . . . . . . . . . . 260

8.7 Extract from Kosovo Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

8.8 Semantic Analysis Extract for Kosovo Scenario . . . . . . . . . . . . . . . . . . . . . 263

8.9 Extract from Lord Barkan Hostage Scenario . . . . . . . . . . . . . . . . . . . . . . . 267

9.1 Comparison of Ontology Development Methodologies . . . . . . . . . . . . . . 283

A.1 Extract from distribution of obligations in Ex-Works INCOTERMS

delivery patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312

A.2 Phase2- MetaData from Given Contract Example . . . . . . . . . . . . . . . . . . . 317

A.3 Phase 3- List of Obligations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

A.4 Phase 3- Obligation Owner and Ownee . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

A.5 Phase 3- Obligations Summarized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

A.6 Phase 4- Deduced Performance Activities . . . . . . . . . . . . . . . . . . . . . . . . . 320

A.7 Phase 4- Seller and Buyer’s Obligations . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

A.8 Phase 4- Buyer and Seller’s Performances: In Temporal Order . . . . . . . 322

Page 22: Ontology for Information Systems (O4IS) Design Methodology
Page 23: Ontology for Information Systems (O4IS) Design Methodology

v 1

Introduction

Ontology has its origin in philosophy, and since then it has played a vital role in

the realm of AI (Artificial Intelligence), Linguistics and Logic. But of late, with the

development of the Semantic Web (Hendler & Lassila 2001), ontologies have made

their way into conceptual modeling and knowledge engineering fields as can be seen

from the works of Uschold & Gruninger (1996) for enterprise modeling; Fernandez,

Gomez-Perez, Sierra & Pazos (1999) in chemical ontology; Artale, Franconi, Guar-

ino & Pazzi (1996) and Guarino (1998) in the field of knowledge representation

and Bergamaschi, Castano, di Vimercati, Montanari & Vincini (1998) for informa-

tion integration. But, what is ontology within Information Systems? Simply put it is

nothing but a:

“specification of a representational vocabulary for a shared domain of

discourse– definitions of classes, relations, functions and other objects.”

–Gruber (1993a).

A key use of ontology is to share information between people, databases and appli-

cations. Ontologies capture, represent and model domain knowledge in a machine-

readable way so that it can be understood, interpreted and reused by humans and

machines alike. Ontology as a knowledge representation is the key focus of this re-

search.

1.1 Research Fields

Before proceeding further we would like to clarify some of the terms and concepts

relevant to this research. There are three fields of research that are of concern to this

research, namely:

• Information Systems Design.

• Ontology: From philosophy, logic, linguistics, AI and ontology-based Information

Systems.

Page 24: Ontology for Information Systems (O4IS) Design Methodology

2 1 Introduction

• Conceptual Modeling: From Knowledge Management to Information Systems.

We begin by exploring the definition of Information Systems.

1.1.1 Information Systems

For this research we uphold the definition(s) of Information Systems as given below

(based on the proposal by Gupta (2000)):

• Information Systems is a field of study: Information systems is an interdisci-

plinary field influenced by computer science, political science, psychology, oper-

ations research, linguistics, sociology, and organizational theory.

• Information Systems is a type of artifact: Information systems are a broad class

of computer software systems that provide information to aid organization de-

cision making. In other words, an information system creates, processes, stores,

and generates information to help individuals make meaningful decisions.

This research belongs primarily to the second category and we limit ourselves

mainly to the information or domain knowledge analysis, representation and mod-

eling. However, we analyze Information Systems as a field of study to understand

and explore the current state of the art research and related theories relevant to our

research.

As also pointed out by several other Information Systems practioners – an infor-

mation system in an organization provides facts which are to be exploited by the

human users of the system in order to function effectively. (We shall review some

of these other viewpoints in chapter 2). Thus, we see that the human involvement

with any information system cannot be removed. The dependency of an information

system on the human actors may be reduced in some cases, like for example: human

decision making may be supported using decision-support systems; complex analy-

sis of market trends and customer satisfaction index may be computed automatically

using data mining techniques; and knowledge bases or ontology based agents may

monitor or broker electronic contracting. But, the ultimate control or the deciding

factor still remains with the human counterpart who uses such Information Sys-

tems. This is the demarcation line between an information system and an AI agent.

O’Brien (2002), as depicted in figure 1.1, has observed that:

“People have relied on Information Systems to communicate with each

other using a variety of physical devices (hardware), information processing

instructions and procedures (software), communication channels (networks)and stored data (data resources) since the dawn of civilization.”

As seen in figure 1.1, data sources or knowledge resources are a key component

of an information system. In this research, we focus on ontology as that knowledge

Page 25: Ontology for Information Systems (O4IS) Design Methodology

1.1 Research Fields 3

Fig. 1.1. Information System Components

resource. There are several motivating reasons why Information Systems need on-

tology in today’s context as we discuss in section 1.3.

1.1.2 Ontologies for Information Systems

We shall discuss the background, definitions and related research of ontology in

chapter 2. But for now, we aim to establish the background and context in which on-

tology is related to Information Systems. We agree with Fonseca’s (2006) view that

ontology within information science has been explored in two meanings or contexts,namely:

• Ontology of Information Systems: Ontologies that describe Information Sys-

tems and can be used to create better modeling tools. Ontologies of Informa-

tion Systems are mostly theory-focused. This type of ontology has been called

reality-based(R-Ontology) ontology by Smith (2003a). Another example that

may be cited is IEEE supported Information Flow Framework Foundation On-

tology (Kent 2001) that aims to support interoperability between software and

applications, as well as between the ontologies themselves.

• Ontology for Information Systems: Ontologies that describe information that

can be used in Information Systems, hence leading to improved functioning of

Information Systems. Fonesca defines them as “pragmatically oriented ontolo-

gies” that are built by combining philosophical approach with pragmatic objec-

tives. These belong to the epistemological ontology (E-Ontology) as proposed by

Smith (2003a).

Current information science research differs in terms of creation and use of ontolo-

gies for each of the two contexts as illustrated in figure 1.2.

Page 26: Ontology for Information Systems (O4IS) Design Methodology

4 1 Introduction

Fig. 1.2. Ontologies for IS and Ontologies of IS

Wand & Weber (2002) introduced a Conceptual Modeling Framework (see fig-

ure 1.3) in which they support the use of ontologies for validating and supporting

conceptual modeling. They propose a contextual environment in which the Infor-

mation Systems designers and users exist, called the conceptual modeling context.They use a set of constructs and rules that they term conceptual-modeling grammaralong with a set of procedures, conceptual-modeling methods that can guide the In-

formation Systems designer in building conceptual schemas, viz conceptual-modelingscript. Wand & Weber (2004) state “our Information Systems will be only as good

as our ontologies”. They hold the view that a good conceptual model is the key to

a good information system. Therefore, their proposed conceptual modeling frame-

work uses ontology of Information Systems to validate that the conceptual models

are correct.

Ontologies for Information Systems can be used at design time or at run time.

In the design phase of Information Systems, ontologies can be useful in building

the conceptual models for the information system, provide content and meaning to

the information that is to be gathered. The ontology also acts as a common shared

vocabulary amongst multiple Information Systems designers. Domain knowledge

is thus reused. At run time, the same ontologies can support machine-to-machine

Page 27: Ontology for Information Systems (O4IS) Design Methodology

1.1 Research Fields 5

Fig. 1.3. Conceptual Modeling Framework proposed by Wand

interoperability by acting as an ‘interlingua’ (Uschold & Gruninger 1996). Fonseca

(2006) summarizes his discussion on ontologies of IS and ontologies for IS as:

R “Ontologies for IS in the context of ontology driven Information

Systems are theories that describe and explain a domain....Ontology of IS

provides us with tools (conceptual modeling grammar) to validate the mod-

els we use against reality, while Ontology for IS gives us the framework to

validate the models themselves within the domain context of the particular

information system being built.”

The above quote summarizes our understanding of the ontology concept within

the Information Systems context as well. An ontology is a conceptual or mental

model of a particular domain that is intended to be used for a specific purpose as

a knowledge resource in an information system. We shall see more on ontology in

chapter 3. We also accept that conceptual modeling is an integral part of an informa-

tion systems’ design. However, we do not focus on the use of ontology for designing

good conceptual models. Instead, as we shall see later, we propose the use of con-

ceptual modeling to build good ontologies for use in Information Systems.

1.1.3 Conceptual Modeling and Ontology

So far, we have seen the relationship of ontologies and information systems, namely

that of knowledge management. Knowledge in our context includes representation,

modeling and use of collective information. For this research, conceptual modeling

and conceptual models form the bridge between Information Systems and ontologies

for Information Systems. We now draw attention to the field of semiotics introduced

originally by Charles Sanders Pierce. There are three distinct fields of semiotics as

introduced by Pierce and summarized by Kecheng (2000): syntactics (or syntax),

Page 28: Ontology for Information Systems (O4IS) Design Methodology

6 1 Introduction

the study of signs, constructs, rules and grammar for composing complex signs; se-

mantics, the study of meaning or relationship between the sign and what it refers

to; and pragmatics, the study of purposeful use of signs like the behavior, communi-

cation and social norms. In the field of conceptual modeling of Information Systems,

Boman, Johannesson, Janis & Wangler (1997) have further stressed upon the aim

of conceptual modeling to construct a language for reasoning about some parts of

reality. Figure 1.4 shows the relevance of conceptual modeling to this research.

Fig. 1.4. Research Domains

Naeve (2007) has listed a few definitions of key terms used in conceptual mod-

eling, semiotics, linguistics as well as the object-oriented programming domain as:

• A concept is a representation of something that we experience or imagine and

that we can apply to objects that we are aware of.

• A description on the most important concepts and their relations within a specific

problem is called a conceptual model of the domain.

Page 29: Ontology for Information Systems (O4IS) Design Methodology

1.3 Research Motivation: Information systems need ontology 7

• The definition of a concept describes its intention. Intensionality qualities a con-

cept to express and delimit the meaning with respect to its surroundings. For

example the concept ‘Mickey Mouse’ refers to a name of a creature limited to

mouses.

• The set of objects that exemplify a concept is called its extension. Extensionality

refers to the actual denotation of the concept. For example, ‘Mickey Mouse’ refers

to the Walt Disney cartoon character named Mickey Mouse.

• Each member element of the extension set is called an instance of the concept.

The above set of definitions that describe concepts and a conceptual model are

as relevant to the description of a domain ontology. We shall delve deeper in to

the intensionality and extensionality and other aspects of conceptual models and

ontologies in chapter 4. The proximity of conceptual modeling to ontology modeling

makes it a keystone for this research. To round off our current discussion, we quote

Fonseca (2006) as:

“Ontologies of IS and Ontologies for IS are the result of a long term

research effort on conceptual modeling. Ontologies are a step forward to

create better models.”

Bubenko (2007) aptly observes that the growing ‘ontological movement’: (i) seems

to be unaware of the advances made decades earlier in conceptual modeling; (ii) the

purpose and the process of developing an ontological model is not clear. We believe

conceptual modeling to be the key field that can bridge and incorporate research

developments from different fields as illustrated in figure 1.4.

1.2 Research Domain

We now summarize the domain and scope for this research as:

R This research focuses on the creation and use of ontologies forInformation Systems. Our scope of interest revolves around how to create an

ontology that is to be used for a specific objective in Information Systems.

Now that we have established the domain of interest and our primary scope, we

shall motivate why an ontology is needed in Information Systems today.

1.3 Research Motivation: Information systems need ontology

The primary role of ontology within the Information Systems field is its use as a

knowledge source for human interpretation and understanding rather than for the

Page 30: Ontology for Information Systems (O4IS) Design Methodology

8 1 Introduction

purposes of computational logic inferencing as in the case of AI. Currently the infer-

encing capability of ontology is being utilized in Information Systems. But, complete

automation is not the ultimate goal since we would always have human involve-

ment in an information system. However, emerging technologies like Semantic Web

endeavor to make the web machine-readable, for providing the human consumers a

more efficient service, like context-aware information retrieval. Some other emerg-

ing factors that necessitate the use of ontology in Information Systems are discussed

below:

1. Growing needs and technological advances. Information systems are designed

to process data efficiently, speedily and accurately. Now with the onset of Se-

mantic Web technologies, the shift from data processing to knowledge man-

agement is subtle yet inevitable. With this comes a shift in the way we visual-

ize, model and represent information. Earlier, Information Systems were content

with relational data models, then came the object-oriented concepts, and now

we have aspect oriented programming and agile programming techniques. With

the growing use of Internet and globalization, the quest and usage of knowledge

is exponentially increasing. The amount of information that is made available

far exceeds the capacity of any human processing or existing Information Sys-

tems capability. To parse and understand this massive explosion of information

is beyond the scope of any human users of traditional Information Systems.

Information needs to be processed and represented at the knowledge level so

that relevant information can be readily retrieved and understood by the human

users. Information retrieval from the Internet is a growing need. Ontology is an

accepted knowledge representation that can meet this need.

2. Changing market trends and users of Information Systems. The Times maga-

zine (December 2006) has voted the Internet user as the most influential person

of 2006. The Internet has become the medium of social communication, express-

ing opinions, conducting business, as well as entertainment and leisure for its

human users. The advances in mobile technology, electronic gadgets have made

the end user technology savvy. Everyone expects speedy, efficient service. For ex-

ample, users are no longer satisfied by the keyword based or ranking algorithm

based search engines like Google (GOOGLE search engine Web Resource). They

want context aware or meaningful (semantic) information retrieval. Swoogle

(Ding, Finn, Joshi, Peng, Scott Cost, Sachs, Reddivari & Doshi 2004) and Hakia

(HAKIA: The search for meaning Web Resource) are examples of semantic search

engines. The vision of Semantic Web is to make the information contained in the

web pages parsable to electronic agents. Ontology is a key component of Tim

Berners-Lee’s Semantic Web tower (2001).

Page 31: Ontology for Information Systems (O4IS) Design Methodology

1.4 Research Problems 9

3. Seamless and flexible interoperability needed between enterprises. Back-

end office applications and traditional enterprise systems need to ‘interoperate’

with each other, with the Internet and so on. Rigidly coupled Enterprise Applica-

tion Integration is a costly, time consuming and non-flexible solutions. Semantic

interoperability is afforded by ontologies, and the role of ontology for enter-

prise interoperability is the subject of many ongoing research projects like the

IST-INTEROP 1 project.

Following Ackoff’s (1989)’s Data-Information-Knowledge-Wisdom model (dis-

cussed in chapter 2), we know that information needs to be processed and collated

with a better understanding to get knowledge. Information system applications, can

no longer efficiently satisfy the need of the changing market, simply by processing

chunks of data. They need to support higher level of reasoning and provide intel-

ligent suggestions. Ontology, is one candidate, which is now being proposed as an

answer to this quest. We will look closer at ontology and its concepts in chapter 3.

But, for now, we focus on some of the contemporary issues regarding the use of

ontology in Information Systems.

1.4 Research Problems

As we saw in the previous section, the changing needs for Information Systems

require: (i) more expressive and computable knowledge representations, and not

mere data models; (ii) better shared understanding amongst the human trading

partners globally spread out; (iii) improved and easy interoperability between Infor-

mation Systems. Ontology is one possible solution available to Information Systems.

While academic and scientific research in this domain has been making progress,

we see that ontology design and use in information system is still not commercially

widespread. Below we list some of the reasons why ontology is not widely used in

Information Systems:

1. Abstract Research not in tandem with applied research and Industry. We can

see that ontology in Information System is a growing field. Though, as seen in

the survey result in figure 1.5 most of the work is still in the zone of abstract

research.

MITRE (April 2006) also concludes that Semantic Web and Ontologies have not

been embraced by mainstream industry as yet but that there are indications that

it will gradually be incorporated. As per their review, the current technology is in

the phase of ‘early commercialization’, as illustrated in figure 1.5 adapted from

their report. But, a lot needs to be covered in order to promote the uptake of

1 Interoperability Research for Networked Enterprise Applications and Software, FP6508011, www.interop-noe.org

Page 32: Ontology for Information Systems (O4IS) Design Methodology

10 1 Introduction

Fig. 1.5. Current Situation of Ontology Design and Use in Information Systems: Based onMITRE Report

ontology in commercial use. Efforts of standardization groups like the W3C 2

and the OMG 3, aims to bring ontology in to the applied research and com-

mercial usage. This research is focused along the same lines. The slow uptake

of ontology in applied research or in commercial use is not only due to lack of

available tools for design, development and maintenance, but also because the

Information Systems designer needs to be guided in making the transition from

traditional systems engineering approach to the ontological design approach.

2. Ontology design does not cover all of the functional needs of Information

Systems. As said before, typical Information Systems applications have targeted

end users, with specific purpose. The domain knowledge to be captured in such

cases involves not only descriptive definitions of objects and things but also the

prescriptive behaviors and actions of these objects, as well as the constraints

(rules) binding them. These aspects are represented in typical Information Sys-

tems applications as constraints, rules and logic. Some of these concerns are

separated using different logical, physical or conceptual layers (architecture) or

using different representational or operational syntax.

2 World Wide Web Consortium, www.w3c.org3 Object Management Group, www.omg.org

Page 33: Ontology for Information Systems (O4IS) Design Methodology

1.4 Research Problems 11

While the advantages of using ontology as a knowledge representation has been

much discussed (Noy & Hafner Fall 1997), the need for imbibing some of the

strategies and best practices from Information Systems design is still felt. As re-

gards the modeling of prescriptive behavior or operational knowledge, which are

domain concepts in themselves, current research(Grosof, Yannis & Chan (1999),

Guarino (1998)) suggests the use of separate logic layer (using a rule language

like RULEML 4, SWRL 5 etc). But we need to make the domain knowledge ex-

plicit, that includes the behavioral, business constraints and operational knowl-

edge as well. That is, we need to be able to express these different perspectives

of the domain in ontology as well.

3. Ontology design methodologies are not explicit enough and easy to adopt

for IS Designers. Furthermore, ontology design and development is not a

straightforward or easy to adopt practice for the inexperienced Information Sys-

tems designer. Neither is it easy for the targeted users to comprehend, use and

maintain such ontology-based Information Systems, given the lack of compre-

hensive front end tools and interfaces. Thus the Information Systems designer

as well as the users need to be guided with directions on how he is expected to

analyze, capture, represent, model and use ontology in the Information Systems

applications.

4. Ontology design for Information Systems needs to capture and represent

prescriptive behavior in addition to descriptive vocabulary. Many method-

ologies and approaches for the design and development of ontologies have been

proposed like Uschold & Gruninger (1996), Gruninger & Fox (1995), Noy &

McGuinness (2001), Fernandez, Asuncion Gomez-Perez & Juristo (1997) and

De Nicola & Missikoff (2005) to name a few. We shall summarize and review

these in chapter 2. However, we find many practical hurdles in applying any

one of them constructively to the design of a particular domain ontology. In our

research, we have focused on building ontology for different domains, having

different targeted applications and users. We experienced that most of the cur-

rent state-of-the art ontology design methodologies:

• Do not prescribe sufficiently how to handle and merge the functional require-

ments of the information system.

• Are useful for capturing the ‘static’ descriptive semantics only, that is they do

not specifically address the pragmatics, and behavioral aspects. We shall see

more about some of the state of the art ontology design methodologies in

section 3.8.4 Rule Mark-up Language5 Semantic Web Rule Language

Page 34: Ontology for Information Systems (O4IS) Design Methodology

12 1 Introduction

• Overlap each other in some design phases but they are not individually com-

prehensive, that is dealing with all design oriented decisions that a designer

needs to make - architecture, type, functional criteria, knowledge capture

and analysis methods, representation and formalization methods and so

forth. Most ontology design methodologies available today propose design

phases to help build ontology from scratch, where no prior knowledge has

been established. Though most of them advocate the reuse of existing knowl-

edge, clear instruction on how such existing knowledge is missing. In some

cases, reuse of existing ontologies of the same knowledge representation is

possible.

• Except METHONTOLOGY (Fernandez et al. 1997), few methods support

gradual evolution and maintenance of ontology as well.

The above mentioned design philosophies are useful for capturing the semantic

vocabulary of the domain. But, it is not exhaustive or complete, as the implicit

pragmatics is often not made explicit. It is left to the Information Systems de-

signer to apply his human understanding and reasoning to make obvious the

background context.

The above mentioned issues are some of the interests driving this research. These

issues motivate our proposed ontology design methodology targeting Information

Systems designers. This research focuses on the grey zone between science and tech-

nology – To make the transition from being an innovative scientific research theory

(ontology) in to an acceptable, successful and useful technology. Apropos our ear-

lier discussion on the two meanings of Information Systems, our research is a cross

blend of both. It begins with Information Systems as a field of study incorporating

approaches from philosophy, linguistics, logic and computer science. And the re-

search ends in exploring how the designed artifacts (ontologies) may be used in an

information system application. As Kuhn (1996) proposed – ‘extraordinary science’

would indeed affect paradigm shifts, but then by progressive practice of science, it

should pass over into being ‘normal’ science. To improve the hypothesis, it’s the ‘puz-

zle solving’ experiments which provide the test bed and boundaries for improving

scientific theories. 6

1.5 Research Questions

Summarizing the key issues discussed in the previous section, we see:

• There is an exponential growth of information that Information Systems need to

process.

6 Thomas Kuhn’s original version was published in 1962. The current readings are based onthe 3rd edition from Chicago university press.

Page 35: Ontology for Information Systems (O4IS) Design Methodology

1.6 Goal 13

• There is a need for fostering shared understanding in this age of globalization

and e-commerce.

• There is a need for Information Systems to semantically interoperate with others

across the world.

• There is a need to understand the implicit semantics and pragmatic aspects of

social domains.

In this context, we look at ontology as a possible candidate for solving the above

needs. For this research an ontology in Information Systems is a conceptualization

of extensional and intensional representations of domain concepts and their rela-

tionships. That is, for making the domain knowledge explicit we need to capture

the semantics and pragmatics of the domain. This raises the issue – who should de-

sign and develop such a domain ontology? A trained ontologist would be a natural

choice. However, we believe that it should be possible for even Information System

designers to design at least parts of such a targeted domain ontology.

Though we have seen numerous research illustrating the utility of ontologies in

Information Systems, it is still unclear how domain ontologies may be practically

used in Information Systems.

Thus, the fundamental research questions that this thesis aims to address are:

1. How can the semantic and pragmatic aspects of social domains be represented asontologies that are to be used in Information Systems?

2. How should domain ontologies (of social domains) be designed, considering thefunctional requirements of Information Systems, including design choices that anIS designer should make with regard to architecture, development strategy, repre-sentation language, and selection of tools?

3. For what purposes may an ontology of social domains designed for InformationSystems be used?

1.6 Goal

To respond to the question how should the semantic and pragmatic aspects of socialdomains be represented, we delve into the field of semiotics; syntax, semantics and

pragmatics of knowledge representations, particularly emphasizing on the latter two

aspects.

To respond to the question how ontology of social domains should be designed, we

need to study and analyze the current state of the art in ontology design method-

ologies, relevant literature from linguistics, AI, philosophy and Logic that help in

analysis of extensional and intensional representations. Thereafter, we need a de-

sign methodology that describes explicitly how the different aspects of the domain

Page 36: Ontology for Information Systems (O4IS) Design Methodology

14 1 Introduction

are to be represented. Finally, the proposed methodology should be simple enough

for Information Systems designer (but a non-ontology expert) to adopt and follow.

To answer the question of how ontology of social domains can be used we would

need to use and demonstrate its utility in different domains, in different case stud-

ies having different purposes and users. Thus, our goals for this research may be

summarized as:

• To propose a methodology for designing ontologies of social domains with a focuson their semantic and pragmatic aspects.

• To demonstrate the usefulness of this methodology for designing ontologies that canbe used as knowledge resources for designing and using Information Systems.

We clarify some of the terms used to define our research goal below:

Methodology: Avison & Fitzgerald (1995) have defined an information system

development methodology as: “ a collection of procedures, techniques, tools and

documentation aids which help the systems developers in their efforts to implement

a new information system. A methodology will consist of phases, themselves con-

sisting of sub-phases, which will guide the systems developers in their choice of

techniques that might be appropriate at each stage of the project and also help them

to plan, manage, control and evaluate the Information Systems projects.”

We adopt their definition as our objective and scope for the proposed methodol-

ogy.

Domain Ontologies: A layman’s definition of domain ontology maybe given as:

A domain ontology (or domain-specific ontology) models a specific domain,

or part of the world. It represents the particular meanings of terms as they

apply to that domain.

A more theoretical definition of a domain ontology has been given by Guar-

ino (1995, 1998) as a partial explicit account of a conceptualization and a logical

theory that describes the intended meaning of a logical language.

A domain ontology is thus an intensional (intended meaning) conceptualization

of particular domain knowledge. Guarino (1998) categorizes ontologies as top-level

generic ontology, domain ontology specializing on terms from the generic ontology,

task ontology and application ontology. We shall discus more on this in chapter 2.

For this research, by domain ontology we mean an abstract model of a partic-

ular domain that captures, represents and models the implicit and explicit domain

knowledge. We also limit ourselves to domains that involve social norms, behavior

and prescriptions. Also, since we are interested in social domains, the human fac-

tor cannot be neglected. Hence conceptual representations that can be interpreted

by humans is a predominant requirement. We do not delve into formal ontology,

generic foundational ontologies or ontologies of Information Systems.

Page 37: Ontology for Information Systems (O4IS) Design Methodology

1.9 Research Methodology 15

Information System Applications: The proposed uses of the domain ontolo-

gies to be designed are visualized to have the same generic uses of ontology such as

reuse, shared knowledge, making explicit implicit knowledge, interoperability across

systems, communication and so forth. As such, we consider, shared common under-

standing between human users of the proposed domain ontologies as an application

of ontology in Information Systems.

1.7 Purpose

The targeted users for the proposed methodology are the Information Systems (IS)

designers and human end users for potential applications. In fact the designers,

developers, business managers, decision makers and users of any information system

today. The methodology aims to narrow the gap between abstract research, applied

research and the commercial use of ontology in information system.

1.8 Scope

In the light of the research issues discussed above, we limit our analysis and foray

into the realm of ontology design and modeling to the extent of knowledge capture

and representation using conceptual models and expressing them in Web Ontology

Language (OWL). As the primary targeted audience for this research are the IS de-

signers, business managers and decision makers (human designers and users), we

focus more on the knowledge capture and representation aspect than the formal en-

coding of ontology in machine-understandable format. In other words, we choose to

investigate the expressive power of ontology language, design methodology rather

than its computability (as supported by formal ontology specifications like KIF 7).

While the proposed conceptual models and proof-of-concept ontologies using OWL

are computable, accuracy and comprehensiveness have not been within the scope of

this research.

1.9 Research Methodology

As with any research process, there needs to be a planned course of action, that is,

a research methodology. Given the problem and design oriented research goals, we

deem this to belong to the genre of design science research. As stated by Hevner,

March, Park & Ram (2004) - There are two paradigms in Information Systems re-

search - design science and behavioral science. Behavioral science paradigm devel-

ops and verifies theories that explain or predict human behavior or organization.7 Knowledge Interchange Format

Page 38: Ontology for Information Systems (O4IS) Design Methodology

16 1 Introduction

Design science aims to improve or extend the human and organization capabili-

ties by building new artifacts. As Hevner et al. (2004) say – “In the design science

paradigm knowledge and understanding of a problem domain and its solution are

achieved in the building and application of the designed artifact”.

In this research, we strive to attain our stated goals through practical case studies.

We analyze different domain areas for their specific research issues and thereafter,

use existing state of the art literature and available ontology design methodologies

to design, develop and build domain ontologies for each of the case studies.

We agree with (Hevner et al. 2004) that design is both a process and a product.

Our contribution in such context consists of both a design methodology (on how

a given domain may be analyzed, captured and modeled as ontologies) and the

proposed set of ontologies as artifacts. The ontologies are reusable in other future

research or implementation purposes.

Design processes may be ‘build’ and ‘evaluate’. Design artifacts may be ‘con-

structs’, ‘models’, ‘methods’ and ‘instantiations’. Artifacts are built to solve given re-

search problems and their utility is therefore evaluated. Constructs are used as the

language to define the problem and the solution proposed (Schon 1993). Models

are used to represent the real world problem and to provide a better understand-

ing. Methods are used to define the problems and how they may be addressed as

well as how the models solving the identified problems may be built using the con-

structs defined. The difference between routine engineering solutions like building

software applications to solve enterprise management issues and that of design sci-

ence, is that, the former focuses on applying preexisting, and accepted theories and

methods to build new artifacts. Whereas, design science focuses on using new or

improved methods or theories to build artifacts for unsolved problems.

In yet another related research, Peffers and Tuunanen (2006) introduce a concep-

tual process and mental model called the Design Science Research Process (DSRP)

model.

Our research methodology follows the six step (DSRP) Model as illustrated in

figure 1.6 and summarized briefly as follows:

• Problem identification and motivation: Peffers et al. propose that the first step

is to identify the research problem and justify its need for a solution. Thereafter,

the problem definition is to be used to develop an artifact as a solution. The re-

search has to motivate and convince the audience that the results are necessary,

viable and credible. To achieve this, the research has to make use and demon-

strate knowledge of the current state of the art and the relevance of the identified

problem.

• Objectives for solution: In the second step, the research must infer the objec-

tives for the proposed solution to the identified problem. To quote Peffers - “The

Page 39: Ontology for Information Systems (O4IS) Design Methodology

1.9 Research Methodology 17

Fig.

1.6.

Des

ign

Scie

nce

Res

earc

hPr

oces

sM

odel

Page 40: Ontology for Information Systems (O4IS) Design Methodology

18 1 Introduction

objectives are to be based rationally on the identified problems and should lead

to the development of new or improved artifacts.”

• Design and development: The third step is the creation of the artifacts. Arti-

facts may be models, methods, constructs, or instantiations. This step includes

determining the functionality of the artifact and developing it using a theory.

• Demonstration: Research should demonstrate the utility of the developed ar-

tifact. This may be done via experimentation, simulation, case study, proof or

other means. The idea is to demonstrate how the artifact can be used to solve

the identified problem.

• Evaluation: Research should observe and measure how well the artifact solves

the problem. It includes a comparison of the artifact to the original objectives set

up. How far does the artifact fulfill the objectives? Other quantitative assessment

may also be done.

• Communication: Finally the research and its results are to be disseminated. The

knowledge gained should be communicated to other scientific researchers, prac-

ticing professionals via publications in scientific channels, and other channels of

dissemination.

We shall discuss the above mentioned research methodology and at the same

time review our own research with respect to the DSRP in chapter 9. The problem

identification and motivation has been carried out in this chapter. As has the over-

all objectives for the proposed solution been put forward. In chapters 5 and 6 we

present the design and development of our proposed solutions. Chapters 7 and 8

demonstrate the use of the proposed solution through two different case studies.

Evaluation is done through a discussion of results in chapter 9. Communication of

the research has been done through scientific publications (see publication list under

section 1.14).

Our research methodology follows design science philosophies as proposed by

Hevner et al. (2004) and Peffers, Tuunanen, Gengler, Rossi, Hui, Virtanen & Bragge

(2006). Our research is problem-oriented with the goals and scope as described un-

der sections 1.4 to 1.7. The design methodology is based on literature study, there-

after applying them on the targeted case scenarios iteratively till our objectives were

fulfilled. We shall use the above mentioned guidelines as criteria to assess/validate

our current research itself.

1.10 Research Evaluation Criteria

As stated earlier, the design science research guidelines form the first level of eval-

uation criteria. We shall discuss and review our research via the seven guidelines

proposed by Hevner et al. (2004), namely:

Page 41: Ontology for Information Systems (O4IS) Design Methodology

1.11 Case Studies 19

• Design as an Artifact: Must produce a viable artifact, method, model or an

instantiation.

• Problem Relevance: Requires creation of a technology based solution to a real

world problem.

• Design Evaluation: The artifact must be useful and hence must be evaluated for

its utility, quality and efficacy.

• Research Contributions: The artifact must be novel, using a new improved or

innovative approach to solve the problem domain. The research contributions

must be clear and verifiable.

• Research Rigor: The artifact must be coherent, rigorously defined, internally

consistent. Application of rigorous methods in the design and development pro-

cess must be visible.

• Design as a Search Process: The search for an effective artifact requires that

available means and methods must have been utilized.

• Communication of Research: Design science must be effectively communicated

to technology oriented as well as management oriented audiences.

Thereafter, the results of the research are validated as per the evaluation and

communication steps of the DSRP model as:

1. Peer review from other researchers in the same field. This is achieved through

joint research with other researchers, publishing scientific articles in appropriate

circles and also reviews by domain experts and end users for proposed ontolo-

gies.

2. However, the main assessment of the usability,viability of the proposed method-

ology, is to be achieved by applying the same on different case studies, each re-

lating to different domains, having different functional requirements, purposes,

targeted users etc.

1.11 Case Studies

Following the design science research methodology, we need to test or evaluate the

utility of our proposed methodology in the application contexts. For this purpose,

we apply O4IS design methodology in two case studies chosen from different social

domains as follows:

• The first case study deals with ontology capturing the semantics and concepts

of legal business contracts. Common shared knowledge from the cross domain

of legal norms, regulations, legislatures and that from the enterprise and busi-

ness value domains is expressed for Information Systems application purposes.

The use for this ontology is for establishing a common model for understanding

Page 42: Ontology for Information Systems (O4IS) Design Methodology

20 1 Introduction

between humans and human-to-machine. Information systems applications rang-

ing from interoperability of enterprise systems, modeling of contract compliant

business process flows are proposed.

• The second case study delves into the domain of military modeling and simu-

lation. The semantics and pragmatics of the military operations and procedures

are to be captured in an ontology for generating military virtual simulations,

reasoning and inferencing tools etc.

As seen, the two domains chosen differ not only in their semantics and pragmat-

ics but also in regard to targeted users, purpose for the ontology, and have different

functional requirements. The first case study was the first iteration for addressing the

stated research goals. The focus in this phase was on the structural design and devel-

opment of domain knowledge as ontology. Based on the experiences and feedback

received on the outcome of this case study, refinements to the proposed guidelines

were done. The second case study, thus, provides a base for more critical evaluations

on the methods and approaches adopted. Hence the focus in the second case study

has been more on the design methods and models for capturing the intensional as-

pects of ontology than on the denotation of the semantics (as in the first case).

1.12 Results

To fulfill the research goals stated in section 1.6 above, we propose an easy-to-follow

design methodology targeting Information Systems designers to help them in their

quest to build ontologies for Information Systems. The design methodology is aimed

to answer the first goal namely – how ontologies for Information Systems may be

developed.

The proposed design methodology is called the Ontology for Information Systems

(O4IS) design methodology. O4IS design methodology presents a stepwise design

philosophy for ontology conceptualization but also contributes several other meth-

ods, constructs, approaches, and models as artifacts, as illustrated in figure 1.7. O4IS

design methodology by itself is not much different from any other software design

process. Hence, Information Systems designers should be familiar with the different

steps therein. But the approaches, design methods, and patterns that are to be used

as inputs in these steps are original contributions of this research. These are visual-

ized to help the Information Systems designer in his modeling task while developing

the ontology for Information Systems. At the same time, these act as helping aids

to the final end user who shall use the ontology based information system. As illus-

trated in figure 1.3 and discussed earlier, our O4IS design methodology puts forward

a conceptual modeling context (ontologies for IS), prescribes a conceptual model-

ing method (Unified Semantic Procedural and Pragmatic Design), provides sets of

Page 43: Ontology for Information Systems (O4IS) Design Methodology

1.12 Results 21

Fig. 1.7. The Proposed Design Methodology

Page 44: Ontology for Information Systems (O4IS) Design Methodology

22 1 Introduction

conceptual modeling grammar (Semantic Analysis Representations) and shows the

feasible transformation into conceptual modeling scripts (OWL formal ontology).

We briefly discuss an overview of O4IS design methodology and its related artifacts

(as can be seen in figure 1.7):

• G1: Establish the scope of the domain: The domain (or universe of discourse

as it is also known as) refers to the domain of interest which is to be captured in

the ontology. The scope refers to the boundary or limitations that constrain the

extent of the domain conceptualization.

• G2: Establish the targeted users, applications, and functional requirements:

Every information system is designed to provide a specific function for selected

group of users. Thus, the functionality and the targeted audience guides the

design features of Information Systems.

• G3: Choose ontology architecture - physical and logical: In this step, we de-

cide what kind of physical or logical architecture is suitable for our proposed

domain ontology. For the logical architecture we propose a multiple layered ar-

chitecture for the domain conceptualization. (Details in section 5.3)

• G4: Choose ontology development approach: We choose the appropriate de-

velopment approach that suits the particular domain and the requirements. The

possible approaches are:- top down, bottom-up or middle-out.

• G5: Choose level of ontology representation: We choose the appropriate level

of abstraction and required representation formalism that satisfies the targeted

use for the domain ontology. For human users and for shared understanding, it

would be sufficient to represent the ontology as conceptual models. For seman-

tic interoperability, context based information retrieval, we would need formal

machine-readable language like Web Ontology Language (OWL). We propose

that a Dual Conceptual Representation be followed even if a formal OWL repre-

sentation is desired. Advantages and details of Dual Conceptual Representation

shall be discussed in section 5.4.

• G6: Choose knowledge acquisition methods and tools: We choose our tools

and other methods for gathering the required domain knowledge. Guidelines G6

to G7 together comprise our main contribution, namely the Unified Semantic

Procedural Pragmatic (USP2) Design for domain conceptualization. USP2 De-

sign consists of (a) constructs (patterns, conceptual models and ontology) for

the analysis of the domain called the Semantic Analysis Representations(SAR).

The SARs help in the semantic analysis of different types of relationships includ-

ing structural, functional, temporal, prescriptive and deontic; (b) guidelines and

methods for performing this analysis using the above mentioned SARs. The USP2

Design and the included SARs are described in chapter 6.

• G7: Knowledge analysis- conceptualize the domain ontology: Gathered infor-

mation has to be analyzed and then conceptualized. The analyzed information is

Page 45: Ontology for Information Systems (O4IS) Design Methodology

1.12 Results 23

semantically represented using one or more perspectives of USP2 design, namely

the Semantic Concept View, Procedural Concept View and the Pragmatic Concept

View.

• G8: Knowledge representation- implement the domain ontology: Conceptu-

alized knowledge is to be represented in our chosen knowledge representation

language or tool, as decided in G5.

• G9: Evaluate, assess and verify the domain ontology: The designed ontol-

ogy needs to be tested in the targeted application domain. The utility is to be

assessed. The contents need to be verified with respect to the real world being

modeled.

• G10: Use, maintain and manage the ontology: The domain ontology cannot be

forgotten once the development is completed. Like any other information system,

it needs to be used, maintained, and managed. Continuous feedback will require

successive iterations of the proposed O4IS design methodology.

The second goal in our research, that is, to investigate how social domain on-

tologies for Information Systems may be used, we have designed, developed and

used ontologies in two different case studies. The case studies have been outlined in

section 1.11.

The case studies for the research using the proposed methodology, themselves

contribute valuable results of this research such as:

• Case Study I– Multi Tier Contract Ontology: We shall discuss details in chap-

ter 7. Some of the contributions from this case study may be listed as:-

– Contract Conceptual Models: Declarative and prescriptive representations

of a generic upper level contract ontology, a sale of goods contract type

specific domain contract ontology, a number of template contract models,

reusable delivery patterns from the INCOTERMS.

– Contract Obligation State analysis: A deontic and performative analysis of

the contract obligations with respect to their fulfillment via the execution of

business activities.

– Contract Workflow Methodology: A domain specific methodology for the

extraction of the Procedural Concept View from a given business contract.

This is called called a Contract Workflow Model(CWM). A set of workflow

analysis based patterns for helping the designer in deducing the CWM is also

proposed using BPMN (Business Process Modeling Notation).

– Business Contract Risk Assessment methodology: Based on the MTCO

and our obligation state analysis, we also propose a methodology for busi-

ness contract risk assessment and evaluation. We provide a summary in sec-

tion 7.13.4. The methodology itself may be referred to in our publication

(Kabilan & Weigand 2006).

Page 46: Ontology for Information Systems (O4IS) Design Methodology

24 1 Introduction

– Contract-Business Process Alignment: In (Zdravkovic & Kabilan 2005a) we

have proposed a method to align the internal business process models based

on the deduced contract workflow models.

• Case Study II – Defence Conceptual Modeling Framework: While Case study

I has yielded artifacts and models, case study II has contributed to the theoreti-

cal formulations. It has provided us with a testing environment for our proposed

O4IS design methodology and its constituent artifacts. Several new issues have

been revealed leading to further refinement of our methodology. This is an ongo-

ing project and work is still continuing on the ontology suite design. Details are

presented in chapter 8.

– DCMF-Ontology Suite: Consists of a set of ontologies which follow the multi-

tier architecture. The Suggested Upper Merged Ontology (SUMO)(Niles &

Pease 2001) is adopted as the upper ontology. A military standard data model

with over 20,000 concepts is taken as the source for our specific domain

ontology. A number of application specific ontologies have been developed.

– ECA Rule Ontology: The prescriptive behavior of the Rule of Engagement

doctrines have been analyzed and captured using our proposed SAR for pre-

scriptive behavior.

1.13 Disposition

The rest of this thesis is structured as described in figure 1.8. Following the DSRP

model (figure 1.6), we have begun this thesis document by the problem identifi-

cation and motivation in the current chapter. To solve the identified problem we

propose a design in chapters 5, and 6. Research rigor and current state of research

in the area surrounding the identified problem is described in chapters 2, 3, and 4.

So far we have been discussing the role of ontology in Information Systems. We

have argued that the growing demands on the use of Information Systems necessi-

tates that information is processed to a higher degree, more efficiently and faster. So,

the question is – when does information become knowledge? To understand this, we

begin our voyage into the theoretical background by investigating what is knowledgein chapter 2. Chapter 2 concludes by assessing the relationship between knowledge

management and Information Systems.

We have identified ontology as a choice to meet the identified current needs for

information system (section 1.3). In chapter 3 we shall look closely at what is anontology and how it can meet the identified needs. We shall also review some of the

other state-of-the-art design methodologies for building ontologies for Information

Systems.

As we have said, conceptual modeling is a key part of Information Systems de-

sign. Conceptual models are also a vital component in the design of ontologies for

Page 47: Ontology for Information Systems (O4IS) Design Methodology

1.13 Disposition 25

information system (figure 1.3 and 1.1.2). Using conceptual modeling approaches

is one of the key proposals in our O4IS, since, we visualize that such well known

design approaches will enable the Information Systems designer in rapidly design-

ing ontologies. Hence, we review some of the relevant literature and conceptual

modeling approaches in chapter 4.

Our first goal on how to design an ontology for Information Systems is answered

in chapter 5, where we present our Ontology for Information Systems (O4IS) design

methodology. We present a set of patterns for semantic relationships called Semantic

Analysis Representations (SARs) as well as a novel domain perspective conceptual-

ization via the Unified Semantic Procedural Pragmatic (USP2) Design is presented

in chapter 6.

Chapter 2 :KM, IS Design

Chapter 3:Ontology

Related Research

Proposed Design

Chapter 5: Ontologyfor InformationSystems DesignMethodology

Chapter 6:Unified Semantic

Procedural PragmaticDesign

Chapter 4 : ConceptualModeling

Chapter 7: Multi TierContract Ontology

Chapter 8 : DefenceConceptual ModelingFramework: Ontology

Case Studies

Chapter 9:Discussion of Results

Chapter 1:Introduction

Chapter 10 :Conclusion

Fig. 1.8. Thesis Disposition

Page 48: Ontology for Information Systems (O4IS) Design Methodology

26 1 Introduction

So far, we have focused on the question of how an ontology suitable for use in

an Information Systems application context can be designed and developed. In the

next two chapters, chapter 7 and chapter 8 we look at two other issues of interest,

namely:

• How can ontology be used in the Information Systems domain? Are they really

useful? if so, in which contexts or applications can we use them?

- To answer this we take up two case studies from different domains, having

different applications, and the ontology results for these case studies are dis-

cussed in chapter 7 and chapter 8.

• Is the proposed Ontology for Information Systems design methodology useful?

Is the proposed USP2 Design useful for eliciting implicit domain knowledge? In

what applications can such extracted information be used?

- To answer these questions, we make use of the proposed domain ontologies in

both the case studies in specific applications, as shall be discussed in chapter 8

and chapter 7.

A penultimate chapter 9 assesses the key results and reflects upon the lessons learnt.

As stated earlier, we assess our results on the basis of the design science research

criteria as proposed by (Hevner et al. 2004). Finally, we summarize the contributions

made by this research, identify some future work and conclude in chapter 10.

1.14 Publications

The following is a list of scientific publications related to this thesis. I have been

the first author in all except those where it is otherwise mentioned. With each pub-

lication listed below, I also mention the chapters where the contents are referred

to.

1. Vandana Kabilan, Paul Johannesson, Sini Ruohomaa, Pirjo Moen, Andrea Her-

rmann, Rose-Mharie Ahlfeldt, and Hans Weigand. Introducing the Common

Non-Functional Ontology. Proceedings of 3rd International Conference on In-

teroperability for Enterprise Software and Applications, INTEROP-ESA 2007.

This work deals with analysis and representations of non functional aspects in

enterprise systems like trust, privacy, security, misuse and threat, digital rights

management, contracts, risks and quality of service. This paper proposes a com-

mon upper ontology for describing generic non functional aspects. Prof. Paul

Johannesson and I have together been the main architect for this. Furthermore,

the author has contributed with the sub ontology for business contract and risk.

Due to space considerations, this work is not included in this thesis.

Page 49: Ontology for Information Systems (O4IS) Design Methodology

1.14 Publications 27

2. Vandana Kabilan,Pernilla Svan. ECA Rule Ontology: Modeling Prescriptive Rules

as Descriptive Ontology. Proceedings of 3rd International Conference on Web

Information Systems and Technologies, WEBIST2007, Barcelona, 2007.

Parts of this paper has been included in section 6.5.6 and in section 8.7.2.

3. Vandana Kabilan,Hans Weigand. Risk Assessment of Business Contracts. 1st In-

ternational Workshop on Interoperability Solutions to Trust, Security, Policies

and QoS for Enhanced Enterprise Systems (IS-TSPQ ) 2006, collocated with

INTEROP-ESA 2006.

An overview of this work has been given in section 7.13.4. Details may be re-

ferred in the publication.

4. Vandana Kabilan, Antonio De Nicola, Michele Missikoff,Vahid Mojtahed. Practi-

cal Issues in Ontology Modeling: The Case of the Defence Conceptual Modeling

Framework-Ontology. INTEROP-ESA 2006.

The requirements analyzed in this paper have been integrated in to the require-

ments for our proposed O4IS design methodology.

5. Jelena Zdravkovic, Vandana Kabilan. Enabling Business Process Interoperability

Using Contract Workflow Models. Proceedings of 13th International Conference

on Co-operative Information Systems (CooPIS) 2005.

I am the second author for this paper and I contributed the sections relating to

the multi-tier contract ontology, the contract workflow, and the case scenarios.

6. Vandana Kabilan, Contract Workflow Model Patterns Using BPMN. Proceedings

of 10th International Workshop on Exploring Modeling Methods in System Anal-

ysis and Design,collocated with CAiSE 2005.

Parts of this work has been included in section 7.12.5.

7. Vandana Kabilan, Jelena Zdravkovic, Paul Johannesson. Using Multi-Tier Con-

tract Ontology to Deduce Contract Workflow Models for Enterprise Process In-

teroperability. Proceedings of 2nd INTEROP-EMOI Open Workshop on Enterprise

Models and Ontologies for Interoperability, Co Located with CAiSE 2005.

Parts of this work may be seen in section 7.12.3.

8. Vandana Kabilan, Paul Johannesson. UML for Ontology Modeling and Interoper-

ability. Proceedings of 1st INTEROP-EMOI Open Workshop on Enterprise Models

and Ontologies for Interoperability, Co Located with CAiSE 2004.

This paper has been referenced in this thesis but not directly included.

Page 50: Ontology for Information Systems (O4IS) Design Methodology

28 1 Introduction

9. Vandana Kabilan, Using Multi-Tier Contract Ontology to model Contract Work-

flow Models. Licentiate Thesis. Royal Institute of Technology. Stockholm 2003.

Parts of the licentiate thesis have been included in the case study I, chapter 7.

10. Vandana Kabilan, Paul Johannesson. Semantic Representation of Contract Knowl-

edge using Multi-Tier Contract Ontology, Published in the proceedings of Seman-

tic Web and Databases workshop, (SWDB 2003) Co Located with VLDB 2003.

Parts included in section 7.8.

11. Vandana Kabilan, Paul Johannesson, Dickson Rugaimukammu. An ontological

approach to Unified Contract Management. The proceedings of 13th European

Japanese Conference on Information Modeling and Knowledge Bases, held on

June 6-7th 2003,Kitakyushu, Japan. Published by IOS Press.

The paper presents the idea summarized by the case study I.

12. Vandana Kabilan, Paul Johannesson, Dickson Rugaimukammu. Business Con-

tract Obligation Monitoring through use of Multi-Tier Contract Ontology. Pro-

ceedings of Workshop on Regulatory Ontologies (Worm CoRe 2003), November

2003, Italy. Springer-Verlag publications (Lecture Notes in Computer Science).

Parts of this paper is included in section 7.9.2.

13. Moustafa Chenine, Vandana Kabilan, A Pattern for Distributed Heterogeneous

Ontologies for facilitating Application Interoperability, 3rd Open INTEROP Work-

shop On ”Enterprise Modeling and Ontologies for Interoperability” (EMOI 2006),

co-located with CAiSE 2006. June, 2006.

I am the second author. The paper is on an ontology to support interoperability

between distributed systems. This paper is not included in this thesis.

Technical Reports and Other Publications

14. Birger Andersson, Vandana Kabilan, Marianela Garca Lozano, Vahid Mojtahed,

Pernilla Svan, DCMF - Defence Conceptual Modeling Framework, Swedish De-

fence Research Agency (FOI), November, 2005,FOI-R–1754–SE.

I contributed chapter 4, 5, 7, and parts of 10.

15. Birger Andersson, Vandana Kabilan, Vahid Mojtahed, Pernilla Svan, Survey of

Related Research and Approaches, Swedish Defence Research Agency (FOI), De-

cember, 2005,FOI-R–1858–SE.

I contributed chapter 9,10,11,13 and 14.

Page 51: Ontology for Information Systems (O4IS) Design Methodology

1.14 Publications 29

16. Birger Andersson, Vandana Kabilan, Marianela Garca Lozano, Vahid Mojtahed,

Pernilla Svan, Konceptuell Modellering inom det Svenska Forsvaret - DCMF,

Swedish Defence Research Agency (FOI), 2006, ISSN 1650-1942.

I contributed to chapter 3.

17. Vandana Kabilan, Vahid Mojtahed. Introducing DCMF-O:Ontology Suite for De-

fence Conceptual Modeling. 06E-028-SIW. EURO SIW, European Simulation In-

teroperability Workshop organized by SISO-STDS,2006.

I am the first author and parts of this work has been included in section 8.6.

18. Vandana Kabilan, Vahid Mojtahed. Adapting the JC3IEDM to DCMF-O: An Expe-

rience Report. 06F-055-SIW. FALL SIW, FALL Simulation Interoperability Work-

shop organized by SISO-STDS 2006.

I am the first author and parts of this work has been included in section 8.6.

19. Constantinos Giannoulis, Vandana Kabilan. A Method for VVA Tailoring: The

REVVA Generic Process Tailoring Case Study. 07F-SIW-015. FALL SIW, FALL Sim-

ulation Interoperability Workshop, 2007.

I am the second author and the work is not included in this thesis.

Page 52: Ontology for Information Systems (O4IS) Design Methodology
Page 53: Ontology for Information Systems (O4IS) Design Methodology

v 2

Knowledge Management and Information Systems

In this chapter, we briefly summarize and review some aspects from Knowledge

Management and Information Systems. And conclude with their overlapping and

common research field – Ontologies. In chapter 1 we introduced our interest in the

design of ontologies for Information Systems. As said earlier, there are at least three

tracks of research that are of particular interest to us since they overlap each other

specifically in the design and use of ontologies. The first research focus is from the

field of Knowledge Management. AI and Knowledge Management have been using

ontologies for a long time. The second domain is that of conceptual modeling in

Information Systems. Conceptual models as knowledge representations are popular

and widely used in Information Systems. The third domain is that of the relatively

new field of research in design of ontologies for Information Systems.

To give the reader a comprehensive background of these three research domains,

we begin with the basics of what is data, information, and knowledge. How do they

differ from each other? How are ontologies the common ground between informa-

tion management systems and knowledge base systems? These are some questions

that we aim to answer through our summarization of some relevant aspects of these

three domains. We begin with knowledge management and use of ontologies in

knowledge management. In the next chapter (chapter 3) we survey the related re-

search from ontologies in Information Systems and finally in chapter 4, we summa-

rize related theories from Conceptual Modeling.

2.1 The Data-Information-Knowledge-Wisdom Model

DIKW is a proposal of the structuring of Data, Information, Knowledge and Wisdom

in an information hierarchy where each layer adds certain attributes over and above

the previous one. Data is the most basic level; Information adds context; Knowledge

adds how to use it; and Wisdom adds when to use it. Its idea was suggested by Milan

Zeleny and Russell L. Ackoff (1989).

Page 54: Ontology for Information Systems (O4IS) Design Methodology

32 2 Knowledge Management and Information Systems

As per Russell Ackoff (1989), DIKW model is summarized as :

1. Data: Is all about symbols and their use to denote some primitive and basic units

of information. Data has been defined as:

Representation of facts, concepts, or instructions in a formalized manner

suitable for communication, interpretation, or processing by humans or

by automatic means. Any representations such as characters or analog

quantities to which meaning is or might be assigned.

2. Information: Is about data that are processed to be useful; provides answers

to ‘who’, ‘what’, ‘where’, and ‘when’ questions. Information is a structured and

aggregated groups of data. Galliers (1987) defines:

“Information as that collection of data, which, when presented in a par-

ticular manner and at an appropriate time, improves the knowledge of

the person receiving it in such a way that he/she is better able to under-

take a particular activity or make a particular decision”

3. Knowledge: Is the application of data and information; answers “how” ques-

tions. Knowledge consists of specialized facts, theories, procedures, and relation-

ships between them. It is also information that has been organized and analyzed

to make it understandable and applicable to problem solving or decision making.

4. Understanding: Is the appreciation of ‘why’ any given facts occur. Realization

of what is the implication of a collected information.

5. Wisdom: Is an evaluated understanding gained over a period of time or through

experience. When understanding is utilized to gain or improve the current situ-

ation, we say that wisdom has been used.

Data refers to a statement without reference to any context,for example– ‘5’ is

just a number or data. If we complete it and say ‘5 degrees centigrade’ then we

have information, yet it is just a figure and does not convey any meaning unless we

complete the statement like – ‘the outside temperature is 5 degrees’, when it becomes

a knowledge of the climatic condition. A realization that it’s the winter season, and

its cold outside is ‘understanding’ the knowledge gained. Finally when we decide

to cloth ourselves in warm clothes before venturing outside, we are applying our

wisdom. From T D Wilson (2002):

“Knowledge is defined as what we know: knowledge involves the mental

processes of comprehension, understanding and learning that go on in the

mind and only in the mind, however much they involve interaction with the

world outside the mind, and interaction with others. Whenever we wish to

express what we know, we can only do so by uttering messages of one kind

or another - oral, written, graphic, gestural or even through ‘body language’.

Such messages do not carry ‘knowledge’, they constitute ‘information’, which

Page 55: Ontology for Information Systems (O4IS) Design Methodology

2.2 Information Systems 33

a knowing mind may assimilate, understand, comprehend and incorporate

into its own knowledge structures.”

According to Wilson, everything outside the mind that can be manipulated is

‘data’, and they are simple facts. It becomes ‘information’ when the data is embedded

in some relevant context. Folder like collections of these information is referred to

as ‘information resources’. Wilson contends that while data and information can be

managed, knowledge can never be managed. He has carried out a statistical survey

of knowledge management topic related publications in conferences and journals,

and purports that contemporary knowledge management concept is a fad and a new

coined term for information management.

2.2 Information Systems

While there is a consensus on what is information, we find a myriad definitions of

what constitutes an information system. Some of them are collected in table 2.1:

As we can see in table 2.1, we have a wide range of definitions, but they all

prescribe to the same fundamental principle, that an information system is a mech-

anism for humans to manage the organizational processes through the utilization

of IT and processing of data. As stated in section 1.1 we uphold the definition of

an information system as given by Gupta (2000) that Information Systems is both

a field of study as well as an artifact that can be used for processing, storing and

manipulating information for gaining knowledge by humans. We denote Informa-

tion Systems with the capital letters for the field and in small letters as ’information

systems’ when we refer to the artifact or physical system and components that con-

stitute an Information System.

As such, humans form the central pivotal key-pin without which information sys-

tems should cease to function. This differentiates information systems from artificial

intelligence systems, which are aimed to operate and function automatically withouthuman intervention.

Today most information systems use some form of data source as the repository

where data is archived. These are processed to provide the users with information.

But, we have had the existence of knowledge base systems for the past two or three

decades as well. Knowledge bases use knowledge resources. So, how do these two

differ?

Page 56: Ontology for Information Systems (O4IS) Design Methodology

34 2 Knowledge Management and Information Systems

Table 2.1. Definitions of Information Systems

Collected Definitions for Information Systems

A set of people, procedures and resources that collects, transforms anddisseminates information in an organization; a system that accepts dataresources as input and processes them into information products asoutput; a system that uses the resources of hardware, software and peo-ple to perform input, processing, output, storage and control activitiesthat transform data resources into information products; a purposefullydesigned system that brings data, computers, procedures, and people...– Glossary of Terms, Management Information Systems (Web Resource)An information system is the arrangement of people, data, processes,presentation of data, and information technology that supports our ev-eryday needs.– Key Terminology, Computer and Information Technology(Web Resource)Any equipment or interconnected system or subsystems of equipmentthat is used in the automatic acquisition, storage, manipulation, man-agement, movement, control, display, switching, interchange, trans-mission, or reception of data and that includes computer software,firmware, and hardware. Included are computers, word processing sys-tems, networks, or other electronic information handling systems andassociated equipment. –Information Assurance Terminology,IASO certi-fication course,School of Information Technology. (Web Resource)In Information Systems, an information system consists of three com-ponents: human, task, application system. In this view, informationis defined in terms of the three levels of semiotics. Data which canbe automatically processed by the application system corresponds tothe syntax-level. In the context of an individual who interprets thedata they become information, which correspond to the semantic-level.Information becomes knowledge when an individual knows (under-stands) and evaluates the information (e.g., for a specific task). Thiscorresponds to the pragmatic-level. – Information Systems. (Web Re-source)An information system is a set of interacting artifacts and human ac-tivities that performs one or more functions involving the handling ofdata and information, including data collection, creation, editing, pro-cessing and storage; and information selection, filtering, aggregation,presentation and use.– Clarke (1995)

2.2.1 Knowledge Base Versus Database Information Systems

The differences between KBMS(Knowledge Base Management Systems) and DBMS

(Data Base Management Systems) has been examined by John Mylapoulos (1985)

in his essay “On Knowledge Base management Systems”. He distinguishes KBMS

(whose purpose he describes is to ‘facilitate the management of large, shared knowl-

edge bases’) from DBMS on three accounts as follows:

Page 57: Ontology for Information Systems (O4IS) Design Methodology

2.2 Information Systems 35

1. First, he states that DBMS make a clear distinction between ‘generic’ knowledge

and ‘ground knowledge’. Mylapoulos explains that the abstract generic concepts

are modeled in to the database schema whereas the day to day, observations

or the specific information ‘data’ are put in to the schema by the end users.

In a KBMS, Mylapoulos says that this distinction disappears. In our opinion,

this distinction focuses more on the design approach and ‘physical’ level. On

the knowledge level, we can say that the ‘generic’ database schema models the

patterns of knowledge whereas the database holds the ‘instances’ of the same.

In other words a knowledge base could said to be a highly specialized version of

a database.

2. The second difference, according to Mylapoulos, is that DBMS are function-

oriented; they focus on end user requirements. In this context he refers to KBMS

as a ‘prototyping facility for a particular kind of software’ rather than a facility

for management of large databases. He supports his argument by saying that a

KBMS is not intended to provide user interfaces but it is possible to include in

the KBMS framework facilities for lexicon, grammar and pragmatic knowledge

as well.

3. The third difference he mentions is that once the KBMS is ‘epistemologically

adequate’ it should be possible to generate code from it. By this we interpret

that the final KB designed should be machine-readable.

2.2.2 Knowledge Bases and Knowledge Base Systems

The above theories have undergone changes in the last two decades since the book

was first written.

The Decision Support Systems Power (1995) glossary defines knowledge as:

“Knowledge refers to what one knows and understands. Knowledge is some-

times categorized as either unstructured, structured, explicit or tacit. What

we know we know is explicit knowledge. Knowledge that is unstructured and

understood, but not clearly expressed is implicit knowledge. If the knowl-

edge is organized and easy to share then it is called structured knowledge.

To convert implicit knowledge into explicit knowledge, it must be extracted

and formatted.”

Ontologies are intended to make implicit domain knowledge explicit. In that

respect, we see that ontology is a knowledge representation form. But are the two

synonymous?

An interesting compilation of different definitions for Meta-data, taxonomy, the-

saurus, ontology, and knowledge base has been given by Victor Lombardi (2003) on

the online article. He has defined an knowledge base as:

Page 58: Ontology for Information Systems (O4IS) Design Methodology

36 2 Knowledge Management and Information Systems

“An ontology populated with data.”

In the EU CORDIS (Web Resource) database, glossary the term ‘Knowledge Base’

has been defined as:

“A collection of stored facts, heuristics and models that can be used for prob-

lem solving.”

The schema and classification of a knowledge base is described by an ontology.

But an ontology with its populated instances together constitute a knowledge base.

Thus it becomes apparent that ontology is a form of knowledge base. Ontologies

play a role as a central knowledge base in a knowledge management system. We

now explore the scope of knowledge management and the roles that ontologies play

in knowledge management.

2.3 Knowledge Management

Having explored the concepts of knowledge and knowledge bases, we now turn

towards knowledge management.

“Knowledge management is a management theory which emerged in the

1990s. It seeks to understand the way in which knowledge is used and traded

within organizations and treats knowledge as self-referential and recursive.

Knowledge Management is a strategy, framework or system designed to

help organizations create, capture, analyze, apply, and reuse knowledge to

achieve competitive advantage.”

– Milton (2003)

Knowledge Management is gaining momentum due to increasing developments

in the field of e-commerce. As mentioned earlier, organizations need to re use and

harness their knowledge to increase their efficiency, performance and profitability.

In such contexts the identified needs for Information Systems (as discussed in sec-

tion 1.3) is similar to the goals of knowledge management.

Malhotra (2001) extrapolates knowledge management as:

“crucial construct in understanding how humans convert information

into thought and consequently into action.”

He goes on to say that expert systems and AI systems could benefit from this

understanding and is a relevant issue to human and machine- based knowledge

systems. Malhotra has also collected a set of varying definitions for knowledge man-

agement, some of the more interesting ones are listed below:

Page 59: Ontology for Information Systems (O4IS) Design Methodology

2.3 Knowledge Management 37

• “The process of collecting,organizing, classifying and disseminating infor-

mation throughout an organization, so as to make it purposeful for those

who need it.”– Albert (1998)

• “Knowledge Management in general tries to organize and make avail-

able important know-how, wherever, and whenever needed. This includes

processes, procedures, patents, reference works, formulas, best practices,

forecasts and fixes.”– Maglitta (1996).

Malhotra (2001) goes on the define two paradigms - Information Processing and

Sense Making for knowledge management. Information Processing, he contends, is

the data oriented processing of a problem, according to predefined algorithm and

preset solutions. He reiterates the need for Sense Making, that is defining how hu-

mans understand and process information in its different contextualities and mean-

ings to moderate their actions and in turn their performances.

Malhotra, we see thus, had begun to unravel the notion of semantics. On intro-

spection, we can see that ontologies are nothing but knowledge resources and their

domain descriptions range through all kinds of information and data. Going beyond

the capability of traditional databases, ontologies have the capacity to further ‘make

sense’ of the captured information. But, ontologies may even be placed on a higher

level, if logic and reasoning were to be supported as well, as we shall see in section

3.

Turban (1993) defines Knowledge Engineering as a process of building expert

systems that are forms of Artificial Intelligence systems. He further defines the role

of a Knowledge Engineer as –

“one who extracts knowledge from a human expert and then translates this

knowledge into a database known as the Knowledge Base which contains

all the collected knowledge related to the problem to be solved. He draws

the parallel to software system analyst role in the software engineering disci-

pline, where the specialist extracts the end users requirements and translates

them into specifications and requirements for the designer, developer or pro-

grammer to work from.”

There are five phases of Knowledge Engineering: Knowledge Acquisition, Knowl-

edge Representation, Knowledge Validation, Inference, Explanation and Justifica-

tion. The first relates to the mechanisms and approaches for collection of knowledge,

the second relates to how the gathered information is analyzed and represented, the

third relates to validation of the knowledge representation, thereafter the models

are to be explained and justified.

R But given the focus and theme of this research, that of domain knowledge

representation as ontology for use in Information Systems, we limit our review and

discussion to the Knowledge Representation phase only.

Page 60: Ontology for Information Systems (O4IS) Design Methodology

38 2 Knowledge Management and Information Systems

2.3.1 Knowledge Representation

The study of knowledge or the subject of epistemology was long established by Plato.

Aristotle developed a systematic terminology for representing knowledge. In addi-

tion he also developed Logic as a precise method for reasoning about knowledge. He

invented Syllogism as a three part pattern for representing Logical Deduction (Poste-

rior Analytics). Having discussed earlier in this chapter, the DIKW model, knowledge

and its need for management, we now focus on the key aspect vital to this research –

Knowledge Representation. In this section, we shall review the roles that Knowledge

Representation may have and focus on the ones that are relevant for this research.

2.3.2 Different Roles of Knowledge Representation

Davis, Shrobe and Szolovits (1993) describe five different roles of Knowledge Rep-

resentation in the AI field,and with that five different purposes for representing the

captured knowledge. We shall use these as criteria to evaluate our proposed USP2

Design in section 9.3. Briefly Davis et al’s proposed roles may be summarized as:

Role I: KR as a Surrogate.

The knowledge representation is a stand-in replacement model for the real world

which it aims to describe. This is essential for an artificial intelligent agent to read,

understand, and compute about. In this role, a KR would have to be as perfect as

possible, as the inferences that can be made by the artificial agent is only as good as

the KR model is to the real world. For example, if the KR model is imperfect in its

descriptions of the entities and relationships that it endeavors to capture, then any

logical inference based on these imperfect facts is likely to be imperfect as well.

Role II: KR as a set of Ontological Commitment.

In this role, Davis et al argue that, once you make choices for a set of potential

uses, then we choose to describe the parts of the world we wish to see or use,

given that we make imperfect approximations in the KR. That is, they propose that

choosing a KR is a set of ontological commitment, because by making conscious

decisions about the boundaries and aspects of the world that is relevant for that

KR, we are limiting the imperfections that can arise. Ontology is a suitable form

of KR in this role. Though there are many ontology representation languages like

KIF (Knowledge Interchange Format), F-Logic(Frame Logic) and OCML (Ontology

Conceptual Modeling Language), Davis et al hold that – “the essential information

is not in the form of that language but the content, i.e, the set of concepts offered as

a way of thinking about the world.” We shall return to this role of KR and Ontology

again, when we discuss the role of ontology in Information Systems.

Page 61: Ontology for Information Systems (O4IS) Design Methodology

2.3 Knowledge Management 39

Role III: KR as a fragmentary theory of Intelligent Reasoning.

The authors believe that this role comes about because the KR is based on an initial

conception or view of the world, based on some insight or belief on how people

reason intelligently. As they say:

“The theory is fragmentary in two distinct senses: (i) the representation typ-

ically incorporates only part of the insight or belief that motivated it, and (ii)

that insight or belief is in turn only a part of the complex and multi-faceted

phenomenon of intelligent reasoning.”

For AI and applications in AI, this is a key role for any KR, and Ontologies de-

fined within the scope of AI adhere to this role. Hence the choice for KR is usually

formal logic based languages 1 instead of frame based languages 2 as is common

in Information Systems. (Gruninger and Uschold have proposed a classification of

ontologies based on their types, as shall be discussed in section 3.4, the basis for

which may be seen in this section on KR and its roles)

Role IV: KR as a medium for Efficient Computation.

The authors contend that for any machine to use a KR, it should be able to compute

it. In this context, the authors make an interesting yet vital observation- Frames

were introduced to be able to describe stereotyped situations in real world. Con-

straints and rules associated with it could also be represented. A highly computable

KR was achieved but with limited expressive power as proposed by KR languages by

Doyle & Patil (1989). This contrasted with the earlier philosophy of epistemologi-

cal (knowledge content) value being greater than computability as put forward by

Hayes (1985). This discussion shall become relevant, when we discuss the choice of

ontology representation language in section 5.4, where one has to decide between

the trade off between expressivity versus computability.

Role V: KR as a medium of Human Expression.

The fifth and final role as put forward by Davis, Shrobe & Szolovits (1993) is that of

human communication as they aptly summarize:1 First-order logic (FOL) is a language in symbolic science, which is used by mathematicians,

philosophers, linguists, and computer scientists. FOL has sufficient expressive power andcan express almost all mathematical formalizations. It can capture rules, axioms, transfor-mation rules etc. However, they are seldom readable or comprehensible to the commonhumans, unless they are well versed in the FOL

2 The concept of Frames was first introduced by Marvin Minsky. in the 1970s. A ‘frame’ is adata structure, used for knowledge representation, much similar to the fragmentary theoryrole of KR as proposed by Davis et al. The Frame is like a concept, class or object which de-limits the boundaries in whose context the real world is to be described or conceptualized.Each frame has properties, attributes or slots which describe characteristics and featuresof the object of interest. Current W3C standard for ontology, OWL is one such frame basedlanguage. Other examples are OIL, F-Logic.

Page 62: Ontology for Information Systems (O4IS) Design Methodology

40 2 Knowledge Management and Information Systems

“knowledge representations are also the means by which we express things

about the world, the medium of expression and communication in which

we tell the machine (and perhaps one another) about the world. This role

for representations is inevitable so long as we need to tell the machine (or

other people) about the world, and so long as we do so by creating and

communicating representations. ”

As stated earlier, Information Systems aim to enable effective communication

between humans and organizations. Thus the linkage between IS and Knowledge

representations like ontology becomes evident. We shall revisit this subject when we

review the proposed uses of ontology in IS in section 3.2.

R In this research, we have focused mainly on the use of Ontology as a KR

for human expression, Ontological commitment and partly as a surrogate model for

the real world in IS. We use the above mentioned roles as principles for Knowledge

Representation and these form the evaluation criteria for our USP2 Design and the

Semantic Analysis Representation in section 9.3.

2.4 Relevance of Chapter

To recapitulate, we have explored the concepts of Information Systems and knowl-

edge base systems. We have seen that the distinction between the two is fast disap-

pearing. We have established that knowledge representations as the common factor

between the two. We have argued for the ontological conceptualization of a domain

to be a re-usable knowledge representations. Having established these basics, we

now move on to the related theory and research from the world of ontology.

Page 63: Ontology for Information Systems (O4IS) Design Methodology

v 3

Ontology and Information Systems

Ontology has its origin in philosophy and can be traced way back to Aristotle who

defined it as a description of the world as exists. Since then, we can trace its evolu-

tion in the works of Husserl, Kant, Frege and Carnap amongst others. Ontology then

became associated with logic. Philosophers describe the real world as consisting of

Ontology, Logic and Computational Models. Ontology provides the concepts, their

relationships; Logic gives the axiomatic description of their complex behavior, and

constraints whereas the computational models would impart the system dependent

perspective. In this chapter, we shall begin by reviewing the myriad definitions of

ontology, from philosophy, meandering through AI and finally ending up in Infor-

mation Systems. Then, we move forward to review some proposed categorization

of ontology within Information Systems. We summarize some accepted design cri-

teria for ontology as put forward by Gruber. Moving on, we describe some ontol-

ogy architectures. Finally, we review some selected state of the art ontology design

methodologies.

3.1 Ontology

Different researchers have given different definitions. A succinct review of the his-

tory and background of ontology has been carried out by Chira (2003). Chira has

clarified that researchers while developing ontologies employ ontology-based mean-

ings to depict their own understanding of the concept in their particular field and

for their particular needs. That is he upholds the AI perspective of an ontology that

ontology is a specification of a conceptualization. Some of them are listed below to

give us an overview of the depth and variety of definitions of ontology in philosophy,

AI, KM and Information Systems. The term ‘ontology’ has been defined in philosophy

as:

“A branch of metaphysics concerned with identifying, in the most general

terms, the kinds of things that actually exist. Thus, the ontological commit-

Page 64: Ontology for Information Systems (O4IS) Design Methodology

42 3 Ontology and Information Systems

ments of a philosophical position include both its explicit assertions and its

implicit presuppositions about the existence of entities, substances or beings

of particular kinds.”

Barry Smith (2004) defines ontology in information system as:

“An ontology is a software (or formal language) artifact designed with

specific set of uses and computational environments in mind. An ontology is

often something that is ordered by specific client in a specific context and in

relation to specific practical needs and resources.”

Smith traces the first use of the term ‘ontology’ in computer and information

science to as early as 1967, in the work of S H Mealy (1967), who distinguished

between different forms of data modeling. Mealy proposed that the data models

were representations of the real world and its ideas of how it existed in the minds

of men, and how they were represented as ‘symbols on paper or some other stor-

age medium’. Another interesting observation made by Barry Smith (2004) is that

Proceduralists believed the way to create intelligent systems was by instilling in to a

system as much knowledge how as possible, whereas, Declarativists believed that the

approach was to instill as much knowledge what as possible - in the form of knowl-

edge representations. In the realm of database modeling, procedural knowledge is

being captured via software programs and code (operational logistics, triggers and

so on) while the data structures are representations of the objects and concepts. But

to reuse and generalize the knowledge, one needs to build declarative representa-

tions of procedural knowledge as well.

Other researchers like Gruber gave one of the popular definition of an ontology

as:

“An ontology is an explicit specification of a conceptualization.”

-Gruber (1993a).

Though a vocabulary is nevertheless needed to describe the universe of dis-

course,the advantage of Gruber’s definition is that it makes the need for ontology

to be explicit – publicly available and not embedded as part of any knowledge base

systems. Also, Gruber’s definition gained further acceptance with the advent of the

Semantic Web, the definition of ontology as a conceptualization of a domain. Borst,

H. & Top (1997) have elaborated Gruber’s definition as:

“Ontologies are defined as formal specification of a shared conceptual-

ization.”

Studer, Benjamins & Fensel (1998) has combined both Gruber and Borst’s defini-

tion as:

“Ontologies are explicit formal specification of a shared conceptualiza-

tion.”

Page 65: Ontology for Information Systems (O4IS) Design Methodology

3.1 Ontology 43

Studer (1998) has explained the term as follows:

• Explicit: The type of concepts used and the constraints on their use are explicitly

defined.

• Formal: The ontology should be machine readable which includes natural lan-

guage.

• Shared: Reflects the notion that an ontology captures consensual knowledge,

that is, it is not private to some individual but accepted by a group.

• Conceptualization: “abstract model of some phenomenon in the world by hav-

ing identified the relevant concepts of that phenomenon.”

In contrast, we have a pragmatic approach from Noy & McGuinness (2001), who

have based their definition on their practical experiences of developing both formal

AI ontologies using different representation formalisms and tools as well.

“An ontology is a formal explicit description of concepts in a domain of

discourse - classes (sometimes called concepts); properties of each concept

describing features and attributes of the concept - slots(sometimes called as

roles and properties as well); and restrictions on slots - facets (sometimes

also called as role restrictions).”

Mike Uschold (1998) holds the view that:

“An ontology may take a variety of forms, but necessarily it will include

a vocabulary of terms, and some specification of their meaning. This in-

cludes definitions and an indication of how concepts are inter-related which

collectively impose a structure on the domain and constrain the possible in-

terpretations of terms. An ontology is virtually always the manifestation of

a shared understanding of a domain that is agreed between a number of

agents. Such agreement facilitates accurate and effective communication of

meaning, which in turn leads to other benefits such as inter-operability, reuse

and sharing.”

Getting back to Guarino we see that he defines an ontology as:

“An ontology is an explicit, partial account of a conceptualization.”

-Guarino & Giaretta (1995).

Guarino (1998) further explains his definition as:

“An ontology is a logical theory that constraints the intended models of a

logical language.”

He subscribes to the formal machine readable intensional description of the

domain of discourse models as ontology. His suggested terminological differentia-

tion between the philosophical branch Ontology with a capital ‘O’ and ‘ontology’ as

knowledge engineering and AI perspective with a small ‘o’, is now widely accepted.

Page 66: Ontology for Information Systems (O4IS) Design Methodology

44 3 Ontology and Information Systems

As we see from this discussion, there is no clear consensus on the definition

of an ontology in the context of Information Systems. It can range from being a

formal logical theory to abstract conceptual models. For this research we uphold the

definition of ontology to be as:

R An ontology is an explicit formal conceptualization of a shared un-

derstanding of the domain of interest including the vocabulary of terms,

semantics as well as their pragmatics.

3.2 Uses of Ontologies

Noy and McGuinness (2001) have proposed the following possible uses for an on-

tology (ontology in their perspective is from a reusable knowledge base perspective,

which consists of concepts, their attributes and their relationships):

• To share common understanding of the structure of information among people

or software agents.

• To enable reuse of domain knowledge.

• To make domain assumptions explicit.

• To separate domain knowledge from the operational knowledge.

• To analyze domain knowledge.

All the above uses support inferencing capabilities. The first one could be tar-

geted towards human understanding in which case we could use conceptual graphs,

topic maps or UML class diagrams as representation medium. The second one pre-

supposes the use of a common language for representation. For example reuse of

other ontologies defined in different formats like KIF, LOOM, or OWL needs to be

mapped or translated. The third application of ontology, to make implicit or tacit

knowledge available, has a vital application for many domains like in the medical,

legal and military domains. The fourth and fifth use as proposed by Noy & McGuin-

ness (2001) is oriented towards the architectural design and end application uses.

In addition to the above, ontology is being used as a central knowledge pool for a

variety of Information Systems applications and services like for web services, docu-

ment management systems, enterprise management systems, contract management

systems amongst others. Thus in the specific context of interoperability of Informa-

tion Systems, we may summarize the potential use of ontologies as:

Ontology can be used as a central component of interoperability of Informa-

tion Systems application at data, information, knowledge and meta level.

Ontology supports interoperability at different levels like:

Page 67: Ontology for Information Systems (O4IS) Design Methodology

3.3 Ontology – A Historical Background 45

• Interoperability at Data Level: Ontology by themselves achieve interoperabil-

ity at the lowest data level syntactic integration /schema integration by means

of mapping of ontology or translation to existing knowledge base or data base

formats.

• Interoperability at Information Level: Information level of interoperability re-

quires a set of methodologies in addition to the central ontology. Query and

search facilities like that of Xpath, Xquery, SparQL and RACER enable interoper-

ability between like-minded ontologies.

• Interoperability at Knowledge Level: Interoperability at knowledge level re-

quires the ontology to be visualized at the conceptual model level, or meta data

model level as is popularly known in Information Systems. This segregation of

specificity is similar to most modeling architectures like the MDA 1; DoDAF 2;

NAF 3 ; and the Zachman Framework (1987).

This research is focused on the knowledge level conceptualization, and thus our

interest lies in the possible use of ontologies for information to facilitate ‘knowledge

level interoperability ’ or ‘semantic interoperability’ as it is better known.

3.3 Ontology – A Historical Background

To understand the ontological foundations for Information Systems we need first

to survey the different approaches and beliefs that have been prevalent in different

scientific disciplines. We now briefly summarize some of the salient thoughts and rel-

evant literature from philosophy, AI, logic, linguistics and knowledge management.

Thereafter, we shall take a closer look at ontology design in Information Systems.

3.3.1 From Philosophy, AI and Logic

In this section we review some of the relevant literature from the philosophical on-

tology. We highlight the thoughts and views of logicians and philosophers that have

influenced this research. Origin of ontology is in philosophy and is intended to be the

study of the world as it exists. But there are different views regarding the definition

of the world and the quest of absolute versus relative truths. One such view is that

of defining ‘possible worlds’ which may be a subset of the ‘real world’. The concept

of ‘possible worlds’ was first introduced by Saul Kripke (1959) and his colleagues in

the 1950s.1 Model Driven Architecture2 The DoD Architecture Framework, Department of Defence, USA, DoD Architecture Frame-

work Version 1.0, volume 1. Definitions and Guidelines. 9 February 2004. Available on-line at http://www.defenselink.mil/nii/doc/DoDAF_v1_Volume_I.pdf Last accessedon 2006-02-01

3 The NATO C3 Architecture Framework. NATO C3 Technical Architecture web page

Page 68: Ontology for Information Systems (O4IS) Design Methodology

46 3 Ontology and Information Systems

Susan Haack (1978) has summarized that there are different approaches to the

believers of ‘possible worlds’ as:

I. The linguistic approach – as proposed by Hintikka (1962), in which possi-

ble worlds can be interpreted as set of ‘consistent sentences’ either syntactically or

semantically.

II. The conceptualist approach – like that proposed by Kripke (1976) where the

possible worlds talk about different ways in which we perceive the world.

III.The realist approach – which talks about the world as it is, wholly indepen-

dent of language and thought as proposed by DK Lewis (1973).

This research holds the view that the knowledge management discipline aims

to follow the conceptualist approach. IS designers could be classified as belonging

to the realist approach. For example they would prefer ‘language independent’ in

their context to imply ‘platform independent’ approaches such as the semantic web

development. But a closer look, reveals that ontology as we understand today, spans

across all the approaches discussed so far. It is a theory that describes concepts and

relationships that can be used to describe the world of existence. It is an artifactwhen the same is given a concrete formal representation along with the logic (that

is the grammar) subscribing to formal logic sentences. It is a model for knowledge

sharing, communication and interoperability when quantified within set parameters

and boundaries for specific targeted domain applications. For example the model

could be a graphical UML class diagram describing the semantics independent of any

language. But we can see that an underlying commonality to all these perspectives

is that they all intend to describe a world by using a set of concepts and relations

which are like the alphabets and grammar for constructing both prose, poetry and a

new language itself.

The above view has been supported by Jacquette Dale (2002) in her writings.

Dale distinguished between pure philosophical ontology and applied scientific on-

tology, which may be deemed to be similar to the discussed concepts of Ontology

(with the capital O) and ontology (in AI and Information Systems). She says, to

quote,

“..pure philosophical and applied ontology, complement one another. No

metaphysics of being can claim to be complete if it does not keep each sepa-

rate and in its proper place while providing the satisfactory answers to both

specialized sets of problems. It is as much a mistake to investigate only the

more tractable problems of applied scientific ontologyas it would be to de-

vote attention exclusively to the fundamental problems of pure philosophical

ontology to the neglect of making substantive commitments to the existence

of real entities in applied scientific ontology. We should not try to establish

a domain of existent entities that is not guided by a prior clarification of the

concept of being; but having addressed the problems of pure philosophical

Page 69: Ontology for Information Systems (O4IS) Design Methodology

3.3 Ontology – A Historical Background 47

ontology, we must then move on to fill in the details of a preferred existence

domain as a contribution to applied scientific ontology.”

R The above quotation nearly sums up the philosophy of this research.

But a deeper discussion of the quoted text is warranted. If we approach it from

the philosophical or metaphysics perspective, we see that it proposes the existence

of problems in the philosophical understanding of beings that exist in that it tends

to become too abstract or detached from reality to be of any practical use to the

proposed users of this philosophical knowledge. On the other hand, it also points

out the fallacy of trying to create models of domain knowledge without a strong

linkage and roots in the philosophical approach.

Roberto Poli (2003) distinguishes further between Husserlian formal ontol-

ogy, descriptive and formalized ontologies. He discusses the role of Logic in these

formalisms of ontology. While some philosophers have subscribed to the distinc-

tion between ontology, logic and computation models, Husserl’s Logical Investiga-

tions (1970), incorporates logic to be an essential part of formal ontology. This the-

ory has been followed by Brachman and followers of AI where Formal ontology,

includes concepts, mereology and logical axioms and theorems. However, today, in

Tim Berner Lee’s vision for the Semantic Web(2001), we see Logic as a super im-

posed layer on top of the ontology layer in his semantic web tower. From a more

knowledge representation perspective or to say ‘technological’ aspect, this has been

now interpreted as using a robust concept base using the W3C recommended Web

Ontology Language (OWL) which, interestingly uses Description Logic to model ax-

iomatic relationships between the concepts. It is still unclear as how the distinc-

tion between primitive logical restrictions on concepts and the expression of domain

‘rules’ as separate Logic layer is to be achieved. This could also be from traditional

software engineering methods and design principles.

3.3.2 From Linguistics to Information Systems

From Nirenburg and Raskin (2001), we see that:

“Ontological Semantics is a theory of meaning in Natural Language and an ap-

proach to NL (Natural Language Processing) which uses an ontology as a central

resource for extracting and representing meaning of natural language texts, reason-

ing about knowledge derived from the texts as well as generating natural language

texts based on representations of their meaning”.

They emphasize the need for philosophical support to ontology conceptualiza-

tions and put forward a list of uses for ontologies other than simply knowledge

resources as:

• To supply the language to explain the lexical meanings.

Page 70: Ontology for Information Systems (O4IS) Design Methodology

48 3 Ontology and Information Systems

• To provide the contentful building blocks of a text meaning representation.

• To provide heuristic knowledge for dynamic knowledge resources like semantic

analyzers and generators.

We agree with Nirenburg and Raskin (2001) that it is a crucial decision for the

ontology designer to choose which concepts to introduce and how to represent them.

They also recommend that a good ontology will have coverage and be reasonably

homogeneous. Coverage of ontology is determined by the nature of the applica-

tion which is similar to the purpose definition of ontology as recommended by re-

searchers like Gruninger (1995), or Noy and Hafner (Fall 1997). Nirenburg and

Raskin propose that formal ontology can help to decide how to organize the con-

cepts that must be included. In “Ontological semantics” (Nirenburg & Raskin 2004),

they propose that for an intelligent agent, the following components are relevant:

• Knowledge about the world, which is again subdivided into:

– An ontology which contains knowledge about types of things (objects, pro-

cesses, properties and intentions).

– A fact repository, an episodic memory module containing knowledge about

instances of the above types and their combinations.

• Knowledge of natural language, including for each language:

– Ecological, phonological, morphological, syntactic and prosodic constraints.

– Semantic interpretation and semantic realization rules and constraints for-

mulated as mappings between lexical units of the language and elements of

the world model.

– Pragmatics and discourse related rules that map between modes of speech

and inter-agent situations, on one hand and syntactic and lexical elements of

meaning representation language on the other hand.

• Emotional states that influence the ‘slant’ of discourse generated by an agent.

• An agenda of intentional plan for an agent.

Nirenburg and Raskin’s view on computational linguistic application capable of

supporting reasoning is as follows:

“such comprehensive systems must have knowledge about speech situations,

goal-oriented communicative actions, rules of semantic and pragmatic infer-

ence over symbolic representations of discourse meanings and knowledge of

syntactic, morphological and phonological/graphological properties of par-

ticular languages.”

3.3.3 From Knowledge Management to Information Systems

Another relevant theory that has profoundly influenced this research is that of John

Sowa. John Sowa’s (Sowa 2000) discourse on concepts in the lexicon, discusses the

Page 71: Ontology for Information Systems (O4IS) Design Methodology

3.3 Ontology – A Historical Background 49

problems and issue in lexical analysis, representation of the lexicon and its relations

to the syntactic, semantics and the world knowledge and also presents some uses

of lexicon in parsing, semantic interpretation, discourse analysis etc. Sowa defines

‘The lexicon is the bridge between a language and the knowledge represented by

that language’. Sowa further summarizes previous related research on knowledge

representation as:

• Semantics, not syntactics is the key to understand language. Traditional gram-

matical categories are manifestations of fundamental semantic categories.

• Every word is associated with a characteristic underlying semantic pattern, that

determines how it combines with other words in a sentence.

• The grammar of a language is then reduced to simplistic rules that determine

what words can occur to the left or right of a given word. The variety of sentence

patterns, is then a result of the complex interactions between simple grammar

and the underlying semantic structures.

• The meaning of the sentence is then obtained by the combination of semantic

structures of the constituting words.

• Denotation of a sentence in a possible world is computed by evaluating its mean-

ing representation in terms of a model of that world.

The above is the principle design rationale behind our proposed USP2 Design

approach (chapter 6).

For Lexical Representations Sowa (2000) proposes the use of canonical graphs,

that are graphical and easy to understand. Yet another natural language analysis

and representation in knowledge bases has been put forward by Dignum and van

de Riet (1987). The authors contend that natural language is ambiguous but yet

the best candidate to represent different kinds of knowledge uniformly. As Dignum

and van de Riet say, this problem can be mitigated by a semantic representation of

natural language as given by a linguistic theory. They use Functional Grammar (Dik

1978) for their proposed Conceptual Prototyping Language (CPL) for representing

knowledge bases. In CPL, five kinds of logic are used, namely:

• First Order Logic in the form of Predicate Logic and four modal logic.

• Alethic model logics (expressing logical necessity, physical possibility and meta-

physical possibility) for representing constraints.

• Deontic Logic used to define morality, norms and obligation like constraints that

ought to be true.

• Dynamic Logic is an extension of modal logic originally intended for reasoning

of behavior and actions in linguistics, AI, philosophy and computer systems.

• Temporal Logic for representing temporal aspects of knowledge representation.

Page 72: Ontology for Information Systems (O4IS) Design Methodology

50 3 Ontology and Information Systems

We shall see later in this thesis when we analyze different types of semantic rela-

tionships that we use the theory from deontic, dynamic and temporal logic. We use

their theory to propose declarative conceptual models that can be used as analysis

constructs in building ontologies for Information Systems.

3.3.4 What Information Systems can learn from Philosophical Ontology

Finally we believe that there is an inherent and basic similarity in ontology from

the philosophical and applied scientific approach (Information Systems design sci-

ence approach). If the philosophical ontology describes the world as it exists, then

the scientific applied ontology describes the world as it should be. This brings us to

another interesting issue of rationality, contextuality and relativity. Philosophical on-

tology intends to describe the world abstractly as it exists. This is in line with their

quest for absolute truth and objectivity. The same has been indirectly pursued in

Information Systems through ontological commitment as has been discussed by sev-

eral ontologists in the realm of AI as well as Information Systems. Conceptualization

of a domain is indeed intended to be free from subjective bias. Hence we see the pro-

posal of generic ontology, domain ontology, task ontology, and we now also see the

emergence of Meta-Ontologies. Gruber (1993a) speaks of coding biases and domain

expert biases. However, the best efforts of the domain experts can attain only partial

objectivity. Simply because the social domains we live in, are transient. Everything

that exists in reality is subject to change in some way or the other. Descriptions of

this world would thus be always in relative context of some other concept.

Different theories of truth have been proposed like the coherence theory sup-

ported by Bradley (1914) and Rescher (1973) where truth is taken to be a set of

coherence relations within the set of beliefs. On the other hand the correspondence

theory supporters like Russell (1956), Wittgenstein (1961) take the value of truth

not in relations to each other but its relation to the world, and its correspondence to

facts (evidence). Tarski (1956) proposed a semantic theory, where truth is defined

in semantic terms of its satisfaction. Susan Haack (1978) in her philosophy of logic

summarizes Tarski’s (1944) semantic theory as having two categories:

• Adequacy conditions, conditions that any acceptable definition of truth ought to

fulfill.

• A definition of truth, using a formal language.

While the philosophers of classical logic have long debated on specifying the

definitions of truth, its paradoxes and its criteria, we have seen the birth of other

logic disciplines like Modal Logic, which try to resolve some of the issues of classical

logic. Modal Logic aims to extend the classical logic by introducing natural language

like quantifiers, for ex: ‘necessarily’, ‘possibly’, ‘strictly implies’. Today we have sev-

Page 73: Ontology for Information Systems (O4IS) Design Methodology

3.3 Ontology – A Historical Background 51

eral other offshoots of Modal logic as Subjective logic, Descriptive logic and Deontic

logic to name a few.

R In the current interest of the research topic of this thesis, we shall focus

more on Descriptive and Deontic Logic. Descriptive Logic, because, web ontology

language uses DL for its formal axiomatizations. Deontic Logic because we shall

deal with business contract conceptualizations in the first case study, focusing on

the obligations, commitments and their fulfillments through performance etc.

For example, Yao-Hua Tan (1998) has used deontic logic in his analysis of di-

rected obligations for electronic contracting. Others like Milosevic (2002) have used

subjective logic. Asspassia Daskolupulu (2001) has used description logic for her

analysis of contract performance monitoring. We shall review more about this re-

lated research in chapter 7.

As discussed in this section, the concept of truth itself has been the subject of

many interesting thoughts for the philosophers. Information Systems believes in

pragmatic truth. Hence, it becomes more critical to establish the criteria for this

truth. This pragmatic truth is normally realized as business ‘rules’ in an information

systems application. For example, like ‘triggers’ and validations in databases. But to

summarize, we see that evidence, explanation or the rationale behind a phenomena

or the domain of discourse to be captured cannot be dissociated from the surround-

ings (context). Context of the concepts could be other influencing concepts (physical

or abstract) including time, as well as the person making the observation (subjective

bias).

This is not to say, that there is no knowledge or truth value in such a domain on-

tology. The observations made realistically(contextually) by the Information Systems

domain ontology engineers, can be rationalized and further abstracted (filtered) to

extract the epistemic value of the knowledge. This would theoretically either prove

or disprove the philosophical model of the same domain.

The above discussion intended to support our belief that ontology and its theory

as proposed by the philosophers is indeed put into experimental setups (domain of

discourse under given parameters) to get falsifiable observations (by virtue of the

results of the targeted uses) by the ontology engineers. The observations and expe-

riences of the ontology engineers refine the initial setup till no further clarifications

can be achieved. Hypothetically, this implies that the set of ontology concepts de-

duced inductively by the ontology engineer should be the same-as or equivalent-to

the set of concepts as predicted by the philosophers.

R To sum up, this thesis holds the view that ontology should aim to cap-

ture the essence of the domain being modeled as observed along with an explicit

representation of its implicit knowledge, beliefs and assumptions.

Within the scope of Information Systems, this thesis shall propose a methodology

and architecture for design, development of ontology for use in Information Systems

Page 74: Ontology for Information Systems (O4IS) Design Methodology

52 3 Ontology and Information Systems

domain applications. We shall illustrate the utility of the proposed methodology by

applying on two different domains (business contract and business process, military

simulations modeling) having different functionalities and requirements. Thus the

generic methodology shall illustrate the differences needed in approach, conceptual-

izations and formalizations. But, we shall also show the wisdom of reusing expertise

and knowledge gained from the formal version of philosophical ontology.

So far we have discussed in the implicit and explicit differences in perception

and definition of what is an ontology from philosophy, logic, AI and Information

Systems. We now move on to reviewing different types of ontologies, design criteria

and methodologies for ontology design in Information Systems.

3.4 Ontology Types

Uschold and Gruninger (1996) have discussed in detail the principles, methods and

characteristics of ontologies. They have classified ontologies depending upon their

formality and complexity as a continuum as belonging to the following major cate-

gories:

1. Highly Informal: Ontologies that are expressed loosely in natural language.

2. Semi- Informal: Ontologies expressed in a restricted and structure form of nat-

ural language.

3. Semi- Formal: Ontologies expressed in artificially formally defined language,

like the ontolingua version of Enterprise ontology (Uschold, King, Moralee &

Zorgios 1995).

4. Rigidly Formal: Those that are clearly defined terms with semantics, theorems

and proofs like the TOVE Enterprise Ontology (Fox 1992).

Guarino (1997) proposes a classification of ontologies under three headings, as

follows:

1. By the level of detail.

- Reference (off-line) ontologies.

- Shareable (on-line) ontologies.

2. By the level of dependence of a particular task or point of view.

- Top-level ontologies.

- Domain ontologies.

- Task ontologies.

- Application ontologies.

3. Representation ontologies.

Page 75: Ontology for Information Systems (O4IS) Design Methodology

3.5 Ontology Architectures 53

Of the above major classification groups, the second based on level of depen-

dence on the domain task or perspective is of interest to the current research. Guar-

ino’s (1997, 1998) proposal is rather an architecture for domain ontology modeling,

where the different perspectives are separated. Since this proposal has vastly influ-

enced our own methodology, we now look at Guarino’s classification in detail.

3.5 Ontology Architectures

Methodology for defining ontology includes identifying the scope and use for the

ontology. Then the domain knowledge is to be classified and concepts identified.

Ontology is defined as a set of classes arranged in a hierarchy or taxonomy, where

real world concepts are modeled as classes, their characteristics as attributes and

inter-object relationships as relationships, properties or axioms.

Guarino (1997, 1998) has defined ontologies as logical theory accounting for the

intended meaning of a formal vocabulary, i.e. its ontological commitment to a partic-

ular conceptualization of the world. He has further classified ontologies, depending

upon their generality as (figure 3.1):

Top level ontologies: Describe general concepts like time, space, matter, and event

that are independent of domain or a particular problem.

Domain Ontologies and Task Ontologies: Describe ontologies pertaining to a spe-

cific domain or task.

Application Ontologies: Describe concepts that depend upon both a domain and a

particular task, usually being specializations of both ontologies.

Fig. 3.1. Ontology Architecture proposed by Guarino

Guarino proposes a bottom-up approach in designing. He suggests to identify

the most specialized concepts needed in the application ontology, then the domain

Page 76: Ontology for Information Systems (O4IS) Design Methodology

54 3 Ontology and Information Systems

ontology and task ontology. Finally, Guarino recommends to abstract into the top

level ontology the generic concepts. In essence, his suggested approach is valid in

those cases when the ontology is to be designed from scratch. This does not take in

to consideration other previously existing ontologies or knowledge bases.

3.6 Ontology Design Principles

Gruber (1993a, 1993b) has formulated some criteria for design of formal ontologies

mostly for artificial intelligence purposes that have now been widely accepted. We

briefly quote his proposed criteria below, which are self explanatory in their simplic-

ity:

• Clarity: Ontology should be able to effectively communicate its intended mean-

ing to its users.

• Coherence: Ontology should support inferences that are consistent with its def-

initions.

• Extendibility: Ontology should be designed to anticipate the uses of shared vo-

cabulary. One should be able to define new terms based on the existing defini-

tions.

• Minimal encoding bias: According to Gruber, the conceptualization should be

specified at the knowledge level without depending upon any symbol or language

encoding.

• Minimal ontological commitment: Finally, Gruber recommends that ontology

should not restrict the domain being modeled, allowing the users the freedom to

specialize and instantiate the ontology as required.

The above criteria have now become the biblical commandments for any ontology

designer for AI and Information Systems as well. We see that these criteria define

the requirements only on the ontology artifact that is to be designed and developed.

It aims to only ensure that the ontology is correct, cohesive and true.

R These criteria do not reflect upon the intended purpose for the designed

ontology. The domain view that a designer adopts maybe different depending on the

intended use of the ontology.

We will return to this issue when we present our O4IS design methodology in

chapter 5. We now move on to our review of some selected ontology design method-

ologies available today.

3.7 Ontology Development Approaches

In computer science and software design, top-down and bottom-up are well known

strategies for planning the design and execution of any software development. The

Page 77: Ontology for Information Systems (O4IS) Design Methodology

3.7 Ontology Development Approaches 55

top-down approach emphasizes the planning and complete understanding of the

system prior to the actual developmental work. The top-down approach was initially

promoted during the 1970s by IBM researcher Harlan Mills and Nikklaus Wirth.

In a bottom-up approach the individual elements of a system are designed and

developed first before they are put together to compose a whole system. This view

became popular in the 1980s when the object oriented programming emerged. To-

day, most software projects prefer a middle-out approach, that is begin by reusing

pre-existing knowledge or code.

Fig. 3.2. Illustration for Top Down Development Approach

Figure 3.2 illustrates an example where we can use a top down approach effec-

tively, like in the case of linealogy of the animal kingdom. In the above example, we

can see an illustrative case where we start with the Family ‘Felidae’ (the cat family)

and identify its ‘sub family’, thereafter the different ‘genus’ and so on till we get to

the species of domestic cat, ocelot, lion and tiger.

On contrast, if we were to build a family tree of ancestors, then we would begin

at the ‘bottom’ that is ourselves and trace back to see – who are our parents, our

grandparents, great grandparents, great-great grandparents and so on. This is an

example for a bottom up approach.

In the middle out approach, we would start by identifying ourselves and then

building backwards to include our forefathers. At the same time, building the family

tree forwards, by including our children, grandchildren so forth.

Page 78: Ontology for Information Systems (O4IS) Design Methodology

56 3 Ontology and Information Systems

In the context of ontology design, Uschold & Gruninger (1996) put forward the

following motivation for using middle-out approach, as also illustrated in figure 3.3.

A bottom up approach results in a high level of detail being captured, which requires

a high degree of effort being invested and at the same time making it difficult to

spot ‘commonalities’ between the terms. This increases the risk of inconsistencies

and leads to re-work.

Fig. 3.3. Motivation for using Middle-Out Approach

A top down approach, on the other hand, as Uschold & Gruninger (1996) argue,

results in better control of level of detail. However, beginning at the top implies

that some arbitrary high level concepts are pre-determined, leading to less stability

in the ontology. Therefore, according to (Uschold & Gruninger 1996) a middle out

approach “strikes the right balance”. By identifying the most important concepts

first and building outwards results in higher stability, lesser re-work and less overall

effort.

We agree with the above view and hence adopt and recommend the same strat-

egy in our O4IS design methodology, as shall be introduced in chapter 5.

3.8 Ontology Design Methodologies

As stated earlier, in this section we survey some of the prominent ontology design

and development methodologies, namely:

1. Uschold and Gruninger’s Skeletal Method.

2. Gruninger and Fox Method.

3. Noy and McGuinness ’s 101 Ontology Design Methodology.

4. UPON.

5. Methontology

Page 79: Ontology for Information Systems (O4IS) Design Methodology

3.8 Ontology Design Methodologies 57

Our choice for these specific methodologies has been based on the fact that the first

two stated above are the amongst the first Information Systems oriented ontology

design methodologies, and have been successfully tested in developing enterprise

ontologies. The third is a popular guide to developing ontologies in one of today’s

most widely used open source ontology editor. The fourth methodology surveyed is

based on the RUP methodology and gives a detailed account of the activities to be

carried out similar to a software development project plan. The final methodology

is based on the first two and is also based on software development principles.

3.8.1 Uschold and Gruninger’s Skeletal Method

Uschold & Gruninger (1996) provides guidelines for ontology designing based on

their experiences in designing the Enterprise Ontology (Uschold et al. 1995) which

may be summarized as follows:

• Phase 1- Identify Purpose: Why the ontology is being built and what its in-

tended use is, and who the targeted users are.

• Phase 2- Building the ontology: In this phase the actual design of the ontology

is suggested following the given steps below:

- Ontology capture: Uschold and Gruninger suggest to (i) identify the key

concepts and relationships in the domain of interest; (ii) produce precise and

unambiguous textual descriptions of identified concepts; (iii) identify termi-

nology to name identified concepts and relationships and finally (iv) to have

a consensus on the concepts, relationships and their names.

- Coding: This phase includes explicitly representing the knowledge /concep-

tualization captured in the previous phase using some chosen formal lan-

guage. For this Uschold & Gruninger (1996) propose that the designer should

commit to the basic terms identified in the previous term, choose a formal

representation language and thereafter code the ontology.

- Integrating existing ontology: Uschold and Gruninger propose the use of

existing ontologies in the ontology capture or coding or both the processes.

• Phase 4- Evaluation: Uschold and Gruninger agree that evaluation of produced

ontology is vital and refer us to other related research done in the same domain.

• Phase 5- Documentation: Similarly, on the issue of documentation for ontology,

they refer to the documentation facilities supported by ontolingua and the KSL

ontology editors that they have used.

3.8.2 Gruninger and Fox Method

(Gruninger & Fox 1995) propose a more formal design approach as compared to

Uschold’s skeletal method. They used their methodology to design more formal and

Page 80: Ontology for Information Systems (O4IS) Design Methodology

58 3 Ontology and Information Systems

extensive ontologies like the TOVE ontology(Fox 1992). (The TOVE is a set of formal

ontologies for different aspects of the business enterprise like the Resource Ontology,

Time ontology etc).

Fig. 3.4. Gruninger and Fox Design Methodology

Figure 3.4 illustrates the steps in the proposed design methodology by (Gruninger

& Fox 1995). The various steps that they have proposed are:

1. Capture of motivating scenarios: These are the use case scenarios or problems

that arise from a given situation. In the case of ontologies, these scenarios mo-

tivate and guide the design of the ontology. Any ontology design should start

by describing one or more such motivating scenarios and the intended set of

solutions for the problems presented in the scenarios.

2. Formulation of informal competency questions: The competency questions

are based on the motivating scenarios and are visualized as expressive require-

ments that are represented as questions. The ontology must be able to represent

these questions using its terminology and characterize its answers using the ax-

ioms and definitions. These competency questions are also means to evaluate

the ontological commitment of the designed ontology. Detailed examples and

explanations of such competency questions may be referred to in the TOVE on-

tology suite(Fox 1992). For example, in the organization ontology, they have

some informal competency questions like: (i) What activities must a particular

role perform? (ii) In order to perform a particular activity, whose permission is

needed? (iii) What goals is an agent committed to achieving?

3. Specification of the terminology of the ontology within a formal language:

Once the informal competency questions have been posed then the terminology

identified must be specified using first order logic. This is equivalent to the ‘cod-

ing’ phase proposed in the Uschold and Gruninger’s method discussed earlier.

This entails first formulating an informal ontology by extracting a set of terms

based on the competency questions and the scenario which act as a basis for

Page 81: Ontology for Information Systems (O4IS) Design Methodology

3.8 Ontology Design Methodologies 59

specifying the terminology in a formal language. Thereafter, specifying the terms

in chosen formal ontology representation language to get a formal ontology.

4. Formal Competency Questions: Gruninger and Fox suggest the formulation of

formal competency questions using the terminology now defined in the ontology

designed at the end of the previous step. This is necessary, according to them, to

evaluate the ontology and claim that it is adequate. The importance and role of

competency questions is further discussed in (Gruninger & Fox 1994).

5. Specification in First-Order Logic- Axioms: Finally Gruninger and Fox propose

that the axioms specifying the definitions of concepts and their constraints must

be defined using first order logic. Gruninger and Fox state that simply defining

a set of objects alone or proposing a set of ground terms does not constitute

ontology. Axioms MUST be provided to define the semantics of these terms.

6. Completeness Theorems: Finally, they recommend the formulation of com-

pleteness theorems that define the conditions under which solutions to the com-

petency questions put forward may be deemed as satisfied.

Thus we see that Gruninger and Fox, though methodical is also strict and formal.

It requires that the information system designer be well versed with formal logic

languages. As we have discussed earlier, an information system application may not

need such high degree of formalism. For example, if the targeted use was for human

understanding, then coding the ontology in highly machine-readable first order logic

is counterproductive.

3.8.3 Noy and McGuinness Method

A practical handbook like design approach has been provided by Noy & McGuinness

(2001). However this approach is more like a user manual for a ontology to be

designed specifically using the Protege ontology editor. In simple steps they illustrate

the process of capturing the concepts, the slots and the role restrictions. But, on

analysis, we see that their basic design methodology is similar to that proposed by

the Gruninger-Fox methodology or Uschold-Gruninger Method.

Noy and McGuinness have proposed a knowledge engineering method for build-

ing ontologies. They advocate an iterative and refinement process and have pro-

posed three fundamental rules for the ontology developer to help him in design

decision process, as quoted below:

1. “There is no one correct way to model a domain. There are always viable alter-

natives.”

2. “Ontology development is an iterative process.”

3. “Concepts in the ontology should be close to objects (physical or logical) and re-

lationships in your domain of interest. They are most likely to be nouns (objects)

or verbs (relationships) in sentences that describe your domain.”

Page 82: Ontology for Information Systems (O4IS) Design Methodology

60 3 Ontology and Information Systems

They provide a step-by-step instruction for the user to design the ontology using

the Protege 4 ontology editor. They directly implement the ontology in to classes

(concepts), facets (constraints) and properties (relationships). A short summary of

the main steps listed by them is given below:

• Determine the domain and the scope of the ontology. They adopt the compe-

tency questions idea as suggested by Gruninger and Fox (1994).

• Consider reusing existing ontologies. Noy and McGuinness advocate that the

designer should look at other available ontologies even though they may be com-

mitted to some specific application or may be coded in some other knowledge

representation form. They suggest the use of other similar ontologies in Protege

which can be readily imported and modified.

• Enumerate important terms in the ontology. They begin by identifying key

concepts and terminologies relevant for the domain.

• Define the classes and the class hierarchy. In contrast to the middle-out ap-

proach proposed by Uschold & Gruninger (1996), they propose a combination of

the top down and bottom up approach. That is, they begin with some top level

concepts and a few specific concepts. Thereafter they propose to relate these.

Next, they build around the central concepts and add more middle-level con-

cepts. In Noy and McGuinness’s view none of the three approaches, top-down,

bottom-up or middle-out have any significant advantage and that the final deci-

sion depends upon the domain expertise of the developer.

• Define the properties of the classes-slots. Next Noy & McGuinness (2001)

suggest that the designers add properties (characteristics) to the identified

classes(concepts).

• Define the facets. The next step is to identify the facets of each of the properties.

For example, the cardinality restrictions, value type, allowed classes etc.

• Create instances. The final step is to populate the ontology by creating individ-

uals (instances).

As we see, Noy and McGuinness method is simple, explicit to follow for an in-

formation system designer. The only disadvantages are that it is not implementation

tool independent. Also conceptual model assumptions are implicit in the implemen-

tation. Protege is a user friendly environment, but still the ontology is not readily

communicable to non- Protege users or non-ontology experts.

4 Protege is an open source ontology editor and knowledge base framework maintained byStanford University. Currently it is 20 years old and has a growing user community of over75000. Several plug-ins are developed open source. http://protege.stanford.edu/

Page 83: Ontology for Information Systems (O4IS) Design Methodology

3.8 Ontology Design Methodologies 61

3.8.4 UPON

The fourth ontology design methodology which we review here is the UPON (Uni-

fied Process for ONtology building) proposed by A.Nicola, M Missikoff et al (2005).

Their process builds on the accepted Unified Process and uses UML. Thus this design

methodology is not unfamiliar to designers already familiar with the unified process

for designing. In figure 3.5, we see a summarized overview of the different phases in

the ontology building process. UPON makes use of domain experts and knowledge

experts in varying degrees throughout the development life cycle.

Fig. 3.5. UPON

Some of the other salient features of UPON are:

• Use Case Driven: That is, the first input is the setting up of storyboard-like

scenarios and use cases from the domain of discourse.

• Iterative: The different phase of the design methodology is followed iteratively,

starting from crude details and refining successively to get specific aspects of the

domain.

• Incremental: The ontology can grow in steps and is flexible to accommodate

new information gathered from new scenarios.

Page 84: Ontology for Information Systems (O4IS) Design Methodology

62 3 Ontology and Information Systems

The design methodology closely follows the unified process and has the following

phases:

• Inception Phase. Requirement capturing and modeling the use cases.

• Elaboration Phase. Analysis of requirements and fundamental concepts are

identified and loosely captured.

• Construction Phase. Based on the loosely identified concepts a skeleton for the

ontology may be designed. Successive iterations of the first three phases, will

lead to refinement and a more stable version of the ontology ultimately reached.

• Transition Phase. the ontology is subjected to rigorous testing, documentation

and finally released for public use.

They have proposed detailed strategies for requirement workflow, analysis workflow,

capturing and modeling phase etc in (De Nicola & Missikoff 2005).

3.8.5 METHONTOLOGY

The final design methodology that we would like to review here is that of METHON-

TOLOGY (Fernandez et al. 1997) that is used for building ontologies from scratch or

from other existing ontologies or by a process of re-engineering. Till now, the ones

we have reviewed basically deal with designing ontologies from the scratch, that is

no previous versions or knowledge base or data model exists. Also, these method-

ologies are not explicit on how the ontology can be further modified or evolved.

Several of the steps proposed by Fernandez et al. (1997) are similar to those of

Uschold & Gruninger (1996) or to Gruninger & Fox (1995). But notable difference is

their stress on the evaluation and documentation steps. METHONTOLOGY supports

an evolving ontology life cycle unlike the others that support top down, bottom up,

or middle out approaches. Figure 3.6 from Fernandez et al. (1997) summarizes the

different phases of the ontology life cycle; Each phase consists of activities that pass

through a number of states that we discuss in detail shortly.

Fernandez et al. (1997) advocate that:

• Phase 1 Planify: The designer should plan the entire development process like

the tasks, time and resource allocation etc.

• Phase 2 Specification: Just as one never starts a trip without knowing the des-

tination and purpose for the travel, the designer should never start the ontology

design and development process without establishing the purpose and scope of

the ontology. Fernandez et al. (1997) propose writing down formal or informal

questions and answers to establish the purpose and scope which is similar to

the competency questions phase as recommended by Gruninger & Fox (1994)

and Uschold & Gruninger (1996) for formal and informal competency questions

respectively.

Page 85: Ontology for Information Systems (O4IS) Design Methodology

3.8 Ontology Design Methodologies 63

Fig. 3.6. METHONTOLOGY: Constituent activities and their states

• Phase 3: Acquire existing Knowledge: They also advocate the use of existing

knowledge bases and knowledge acquisition using techniques as proposed by

Uschold & Gruninger (1996). This phase is vital if the designer has to acquire

ample knowledge about a domain. This also ensures that a degree of consensus

on the domain being captured is already in built.

• Phase 4: Conceptualize: Following knowledge acquisition, the designer needs to

conceptualize the knowledge using some conceptual knowledge modeling tech-

nique as also proposed by Gomez -Perez et al (1996). We describe their concep-

tualization method shortly.

• Phase 5: Formalize: The next step recommended can be quoted as “To trans-

form the conceptual model into a formal or semi-compatible model, you need

to formalize it using frame-oriented or description logic representation systems.”

Thus, we see that each of the ontology building methodologies that we have

reviewed so far all have different chosen representation languages.

• Phase 6: Integration: Ontologies are intended to be reuses therefore Gomez-

Perez suggest the integration of relevant ontologies as possible. Farquhar and

colleagues (1999) have identified four kind of relationships between ontologies

that have been integrated: inclusion, polymorphic refinement, circular depen-

dencies and restrictions. Other ontology mapping or integration methodologies

have been investigated by Bergamaschi et al. (1998). Semantic integration of

ontologies has been a contemporary research topic for many researchers like

Kashyap & Sheth (1998).

• Phase 7: Machine Readable: To make the ontology ‘machine-readable’ we need

to select the formal machine process able implementation language.

• Phase 8: Evaluation: Gomez-Perez, Juristo & Pazos (1995) now stress the need

to evaluate the ontology designed, so that to rule out any erroneous definitions

Page 86: Ontology for Information Systems (O4IS) Design Methodology

64 3 Ontology and Information Systems

and discrepancies in the ontology. They have proposed techniques for evaluating

ontologies.

• Phase 9: Documentation: Thereafter, they recommend that proper documenta-

tion is vital as in any software development project, not only for easy reusability,

modification, but also for configuration management and change traceability.

• Phase 10: Maintenance: Finally, they recommend that ontology once designed

and developed cannot be forgotten, it needs to be constantly maintained.

We have looked at how the METHONTOLOGY process can aid the design of

ontology building from scratch or through re-engineering from existing knowledge

bases. METHONTOLOGY builds on top of the Uschold’s skeletal method as well as

Gruninger and Fox method. It takes into account software engineering principles as

well. It has been tested on diverse domains like chemical ontology, legal ontology

(Corcho, Fernandez, Gomez-Perez & Lopez-Cima 2005) etc. But, notable for this

research is their conceptualization technique, as summarized in section 3.8.6.

3.8.6 Conceptualization in Methontology

In the conceptualization phase, Methontology recommends to “structure the domain

knowledge in a conceptual model”. Of all the methodologies surveyed so far, this is

the first one to recommend conceptual models. The activities to be carried out are

as follows:

Fig. 3.7. Intermediate conceptualizations in METHONTOLOGY

Page 87: Ontology for Information Systems (O4IS) Design Methodology

3.9 Relevance of Chapter 65

• Build a complete ‘Glossary of Terms’ (GT). The terms include nouns, verbs, con-

cepts, instances properties etc. The designer should gather all potentially useful

information about the concepts and their meanings.

• The second step is to group the gathered terms in the GT as concepts or verbs.

• For each set of closely related concepts, the designer should build a ‘Concept

Classification Tree’ is to be built following guidelines as prescribed in Gomez-

Perez, Fernandez & de Vincente (1996) and for the related verbs a verb diagram

is suggested as per the proposal of Vincente 5. Figure 3.7 illustrates an example

of the intermediate results at this stage of the conceptualization.

• A Data Dictionary should be designed that collects all the concepts and their def-

initions, meanings, attributes, instances etc; a table of instance attributes should

provide information about the attributes and its values; tables of class attributesto capture the concepts and not their instances; table of instances to capture the

instances; and attribute classification trees that graphically display attributes and

constants as per their inference sequence, the sequence of formulas to be exe-

cuted and so on.

• Similarly the set of verb diagrams include a verb dictionary- to express the mean-

ings of the verbs in a declarative manner; tables of conditions that specify a set of

conditions to be satisfied like preconditions for actions ; a table of formulas and

a table of rules for formula and rule description.

We note that Methontology introduces the role of conceptual modeling in the

design of ontologies. Conceptual modeling has been acknowledged to be an integral

part of information system design. We assume that most information system design-

ers today would be familiar with conceptual modeling in one form or the other, be

it data modeling, information modeling, mindmaps etc. There are different forms,

methods, techniques and representation languages for conceptual modeling. In the

next chapter, we review some of the relevant background of conceptual modeling

and discuss those that are of relevance to this particular research.

3.9 Relevance of Chapter

In this chapter, we began with a historical overview of ontology as investigated in

different disciplines. Thereafter, we have reviewed some of the salient features of

ontology, its design, approaches and current state of the art design methodologies

in Information Systems. As stated earlier, conceptual modeling forms the third vital

5 Vicente, A; Concepualizacion de verbos en ontologas de dominio. Tsis de Master en Inge-niera del Conocimiento. Facultad de Informatica. Universidad Politcnica de Madrid. 1997.However, this publication is not in the English language and we could not determine itscontents or applicability.

Page 88: Ontology for Information Systems (O4IS) Design Methodology

66 3 Ontology and Information Systems

research domain of interest to this research. In the following chapter, we shall review

some of the key research from conceptual modeling.

Page 89: Ontology for Information Systems (O4IS) Design Methodology

v 4

Conceptual Modeling

In the previous two chapters we have looked at two of the three main fields of related

theory and research, namely, Knowledge Management and Ontology. As stated, our

interest in capturing and representing domain knowledge is based from an epistemo-

logical perspective. Our belief is that domain knowledge can be viewed as a mental

model by an Information Systems designer or a knowledge engineer or an ontology

designer. This is one view of a possible world as proposed by Haack (1978). We

have seen the proposals of Sowa (1999, 1976) on the constitution of a knowledge

representation. Davis et al have explored the different roles a given knowledge rep-

resentation can have. Every representation language has its own coding bias. Every

targeted information system application has its own implementation specific details

embedded inside it. The epistemic domain knowledge is the nucleus of a knowledge

representation. We would like to separate this abstract mental model to be reused

in different applications, by different designers, for different purposes. This mental

model of the possible world description is what we refer to as a conceptual model.

Conceptual Modeling is, thus, the key link between complex ontological formalisms

on one hand and data-centric Information Systems on the other.

In this chapter we begin by exploring the concept of ‘conceptual models’. Then

we move on to a historical overview of different conceptualization approaches used

in Information Systems. We focus specifically at the Entity-Relationship modeling

approach since it is the foundation for the RDF Tuples conceptualization of ontol-

ogy today. We look at conceptual modeling languages, criteria and extensional and

intensional conceptualization. Next we explore the role of conceptual patterns and

their uses.

Our research revolves around conceptual models and their use as patterns.

Specifically we analyze different types of semantic relationships, hence we look at

some existing research around similar theme.

Page 90: Ontology for Information Systems (O4IS) Design Methodology

68 4 Conceptual Modeling

4.1 Conceptual Model

A conceptual model is defined as an abstract (mental) model of some part of reality.

A conceptual model describes the key concepts, their relationships. A more explana-

tory definition may be given as:

An abstract model (or conceptual model) is a theoretical construct that

represents something, with a set of variables and a set of logical and quan-

titative relationships between them. Models in this sense are constructed

to enable reasoning within an idealized logical framework about these pro-

cesses and are an important component of scientific theories.

A conceptual data model or conceptual schema as it is also known is defined as:

A conceptual schema, or conceptual data model is a map of concepts

and their relationships. This describes the semantics of an organization and

represents a series of assertions about its nature. Specifically, it describes

the things of significance to an organization (entity classes), about which

it is inclined to collect information, and characteristics of (attributes) and

associations between pairs of those things of significance (relationships).

Concept

Before we proceed further on our discussion in conceptual modeling, let us first

examine what do we mean by the term – “concept”.

A concept is an abstract idea or a mental symbol, typically associated with

a corresponding representation in language or symbology, that denotes all of

the objects in a given category or class of entities, interactions, phenomena,

or relationships between them.

Concepts are also basic elements of propositions. They convey a certain meaning.

A single concept may be expressed by n number of representations and languages.

For example, the concept of ‘dog’ can be expressed as dog in English, hund Swedish,

chien in French and so on. Thus, concepts are independent of the representation

language, because they have identical meaning.

Conceptualization is the realization or emergence of concepts.

Historical Background of Concepts and Conceptualization

John Locke, the 18th century English philosopher, put forward a theory of ‘general

idea’ that was to be created by abstracting, or removing the common characteristics

from several particular characteristics. For example the concept ‘dog’ is an abstrac-

tion of the general idea that a dog is a collection of characteristics common to a

Labrador, a Bulldog, and a Poodle.

Page 91: Ontology for Information Systems (O4IS) Design Methodology

4.2 Conceptual Modeling Methods 69

Immanuel Kant (1800) is his discussions in Logic, talks about a posteriori and a

priori concepts. The former is a general representation of non-specific thought that is

common to specific perceived objects. A priori concepts are based on understanding

of phenomenal objects and gives rise to categories. To quote Kant,

“The logical acts of the understanding by which concepts are generated as to

their form are: (1) comparison, i.e., the likening of mental images to one an-

other in relation to the unity of consciousness; (2) reflection, i.e., the going

back over different mental images, how they can be comprehended in one

consciousness; and finally (3) abstraction or the segregation of everything

else by which the mental images differ. In order to make our mental images

into concepts, one must thus be able to compare, reflect, and abstract, for

these three logical operations of the understanding are essential and general

conditions of generating any concept whatever. For example, I see a fir, a

willow, and a linden. In firstly comparing these objects, I notice that they are

different from one another in respect of trunk, branches, leaves and the like;

further, I reflect only on what they have in common, the trunk, the branches,

the leaves themselves, and abstract from their size, shape, and so forth; thus

I gain a concept of a tree.”

-Logic, chapter 6 Kant (1800)1

Kant’s quote above summarizes the essence of the current research. Its about

how we view the domain from different perspectives, how we reflect and abstract

out that we wish to communicate to others; be it human, machine or applications.

4.2 Conceptual Modeling Methods

Now when we are talking about conceptual models, we should look at different

domains where concepts are modeled, albeit in different contexts and for different

purposes:

Data Models: In computer science, data modeling is the process of creating a data

model by applying a data model theory to create a data model instance. A data

model theory is a formal data model description. In Data models, we structure

and organize data into logical, physical schemas targeted for representation and

storage in databases.

Object Relationship Modeling (ORM): Object-Relational mapping (aka O/RM,

ORM, and O/R mapping), is a programming technique for converting data be-

tween incompatible type systems in databases and Object-oriented programming

1 Immanuel Kant’s original work Logik was published in 1800, the current excerpt is fromthe translation published in 1988, translated by Robert S Hartmann and Wolfgang Schwarz

Page 92: Ontology for Information Systems (O4IS) Design Methodology

70 4 Conceptual Modeling

languages. In effect, this creates a ‘virtual object database’ which can be used

from within the programming language.

Object Role Modeling: Object-Role Modeling (ORM) (Nijssen & Halpin 1989) sim-

plifies the design process by using natural language, as well as intuitive diagrams

which can be populated with examples, and by examining the information in

terms of simple or elementary facts. By expressing the model in terms of natural

concepts, like objects and roles, it provides a conceptual approach to model-

ing. Its attribute-free approach promotes semantic stability. ORM evolved from

the Natural language Information Analysis Method (NIAM, also known as aN

Information Analysis Method) and Binary Relationship Modeling, which were

developed in Europe in the mid-1970s. Dr.Terry Halpin provided the first formal-

ization of Object-Role Modeling(Halpin 1998). Object Role Modeling (ORM) is

a method for modeling and querying an information system at the conceptual

level, and mapping between conceptual and logical (e.g. relational) levels.

Entity Relationship Modeling: As explained earlier, databases are used to store

structured data. One of the techniques for designing the afore mentioned data

models is called Entity Relationship Modeling (ERM). It has a graphical repre-

sentation and is also a type of conceptual data model. The first phase of in-

formation system design, that is requirement analysis uses ERM to describe in-

formation needs. Chen (1976) first introduced ER models in 1976, which has

since then been the foundation for many of today’s software analysis and design

methodologies. The UML modeling language traces its foundations to the ER

model proposed by Peter Chen. It is also the starting point for object oriented

design as well as the Semantic Web. Therefore, we shall review the ER modeling

as conceptual models in section.

Knowledge Representation: As we have already seen, knowledge representations

within the AI and cognitive science field have laid much emphasis on the rep-

resentation of knowledge. There are different KR languages, one of them being

graphical conceptual models as well. One such KR language, Description Logic

has been used for conceptual modeling in AI (Borgida & Brachman 2000).

Mindmap: A mind map is a diagram used to represent words, ideas, tasks or other

items linked to and arranged radially around a central key word or idea. It is

used to generate, visualize, structure and classify ideas, and as an aid in study,

organization, problem solving, and decision making. Mindmaps are useful in

brainstorming sessions to get ideas generated and put quickly on paper, using

hand drawn nodes and words. It is similar to semantic nets and topic maps.

Ontology: Ontology is an abstract model describing reality. We shall discuss more

about ontology in the forthcoming chapter.

Conceptual models are used for expressive and intuitive modeling of Information

Systems.

Page 93: Ontology for Information Systems (O4IS) Design Methodology

4.2 Conceptual Modeling Methods 71

4.2.1 ER Modeling Revisited

The basic constructs of the ER modeling technique, Entity type and Relationship type

are based on set semantics theory, and are as such close in ancestry to the basics of

ontology. Chen, Thalheim & Wong (1999) have analyzed the future of conceptual

modeling, based on its foundational strengths to be in the areas of:

• Active Modeling.

• Relationship between Natural Languages.

• Conceptual Framework for shareable information services.

• Relationships between real world and software world.

• Conceptual models as a basis for interoperability.

• Conceptual modeling as first step for application engineering.

• Global communication.

• Human Knowledge Interaction.

We do not delve deeply into their discussions in this thesis but refer the interested

reader to their paper. However, we would like to point out that several of the above

mentioned areas are, in fact, the purpose and aim for the design and use of ontology

in information system, as we have seen earlier. Thus, this strengthens our hypothesis

that:

R Conceptual modeling, especially ER models, are the key to promote the de-sign and development of ontologies in information system.

In our case studies we shall look at the use of conceptual models for:

• Human knowledge interaction / foster human understanding

• Conceptual models as basis for interoperability / ontologies as interlingua.

• Relationship between natural language and machine readable formal represen-

tation

• As a set of conceptual modeling patterns for application engineering from natural

language to ontology

Chen identifies four levels or views of a data model (figure 4.1):

• Information concerning entities and relationships that exist in our mind.

• Information structure - organization of entities and relationships.

• Access-path independent data structure. Data structures which are not involved

in search queries and indexing.

• Access-path dependent data structure. Data structures which depend on the

physical architecture of the data model.

For the current research, since we are interested in the use of conceptual model-

ing for the design and development of ontologies we shall restrict ourselves to the

discussion of the first two steps mentioned above.

Page 94: Ontology for Information Systems (O4IS) Design Methodology

72 4 Conceptual Modeling

Fig. 4.1. Human Knowledge from Different Perspectives

Chen defines:

• Entity: Entity is a thing that can be distinctly identified.

• Relationship: A relationship is an association between entities.

• Role: The role of an entity in a relationship is the function that it performs in

the relationship. For example ‘Husband’ and ‘Wife’ are roles of ‘Persons’ in the

relationship ‘Marriage’.

• Attribute, Value and Value set: Information about the entities and their relation-

ships can be obtained by observation and measurements and can be expressed

by an attribute-value pairs. Values can be classed into different value sets. There-

fore, an attribute is defined as the function that maps from an entity set or a

relationship set into a value set or a Cartesian product of the value sets.

Chen advocates separating the information about entities from information re-

garding the relationships to identify the functional dependencies between the data.

As said, the origin of the ontology modeling principles (within Information Sys-

tems context) can be traced back to the ER model. There are minor differences

mainly due to the level of abstraction as well as the context in which the conceptual

modeling is to be done, like for example:

1. Chen’s ER model was targeted at the data level, and to organize and structure

data in databases. Today, we are interested at the knowledge level and to orga-

nize and model knowledge in ontologies.

2. The relationships in the ER model, are by definition functional relationships

which associate objects. In ontology, we have more complex relationships which

may again be concepts in themselves. As defined in the conceptual modeling,

by Boman et al (1997), we have semantics, pragmatics and syntactics to be

captured as well.

Page 95: Ontology for Information Systems (O4IS) Design Methodology

4.2 Conceptual Modeling Methods 73

But nevertheless, the ER model has several advantages and is not only for ‘data

structures’ as has been summarized by Chen (1983) himself:

• ER Model contains more semantic information than the relational model. Chen

argues that a relational table following Codd’s rules prescribe neat data struc-

tures but afford little or no semantics to the relationships.

• ER model has explicit linkage between entities. ER model makes explicit implicit

relationships between entities. One of the goals of ontology modeling, is also to

make explicit implicit domain knowledge and that includes discovering hidden

semantics of relationships between concepts.

• ER model has inspired the RDF and XML language specification. The Object-

Attribute-Value tuple forms the atomic building block for the RDF graphs.

4.2.2 Conceptual Graphs

Charles Pierce (1933) laid the foundation for semiotics in the early 1900s. He also

proposed the use of iconic graphs to represent facts, concepts and relationships.

Graphs have also been used by others for knowledge representation such as seman-

tic networks (Brachman 1977), conceptual dependency graphs (Schank 1975) and

knowledge graphs (Hoede & Willems 1989). Conceptual graphs as a knowledge rep-

resentation language was introduced by John Sowa (1976). As Sowa puts it,

“Conceptual graphs are not intended as a means of storing data but as a

means of describing data and the inter-relationships.”

In conceptual graphs, concept nodes represent entities, attributes, states and

events; and relation nodes denote how the concepts are interconnected. According

to Sowa, conceptual graphs have at least three identifiable advantages:

1. Supporting direct mapping to relational databases.

2. Providing semantic basis for natural language.

3. Supporting automatic inferencing to compute relationships not explicitly men-

tioned.

At the time Sowa wrote the above mentioned paper, relational databases were

the accepted form of data storage and management. But today, given the shift to-

wards Semantic Web and expression of knowledge, we see that conceptual graphs

are more suited to describing the ontological conceptualization of our domain. Con-

ceptual graphs are therefore an intensional modeling language.(see intensional and

extensional conceptual modeling language in section 4.3). To quote Sowa again,

“the meaning of a relation is its intension and the set of all the n-tuples

stored in the database is called its extension”

Page 96: Ontology for Information Systems (O4IS) Design Methodology

74 4 Conceptual Modeling

We refer the interested reader to Sowa’s paper or his subsequent book (Sowa

1984) for a detailed discussion of the principles, formation rules, notations and us-

age of conceptual graphs. It suffices for the ongoing discussion to note that the basic

primitive in conceptual graphs is a concept. It is denoted by a box containing a sortlabel.R A conceptual graph is defined as a finite, connected, undirected, bipar-

tite graph with nodes of one type called concepts and nodes of the other type called

conceptual relations. Conceptual relations represent inter-relationships that exist be-

tween concepts and are denoted by circles with labels. They have two arrows, one

for the incoming node connection and the other for outgoing node connection.

4.3 Intensional and Extensional Conceptual Modeling

We now briefly summarize the two aspects of conceptual modeling: Intensional and

Extensional modeling.

In philosophy, intensionality is described as the distinction between denotation

and meaning. As Haack (1978) puts it – Intensionality is when substituting a concept

with co-referent concepts changes the truth value of the proposition. Extensionality,

is when the substitution leads to no change in truth value. For example:

The morning star and the evening star are terms used to refer to the same planet

Venus. A proposition like: I saw the morning star in the evening is extension-ally the same as I saw the evening star in the evening, while intensionally it

is not the same.

The distinction between the two lies in the difference between the semantics,

connotation and denotation of the linguistic representation. we shall now aim to

understand this better in the following subsection before we move further with our

discussion on the different conceptual modeling languages.

In linguistics, Semantics is the subfield that is devoted to the study of meaning,

as borne on the syntactic levels of words, phrases, sentences and sometimes larger

units of discourse, generically referred to as texts.

The term Semantics (originated from the Greek word semantikos which means

– giving signs, significant, symptomatic, from sema– sign) refers to the aspects of

meaning that are expressed in a language, code, or other form of representation.

Again there are two aspects, the descriptive or the relation that exists between a

sign or symbol and the objects that it represents, also known as denotation by some

theorists. The other is the more practical implication and use in situations, that

is the pragmatics or its connotation. Though the denotative aspect has been well

researched in formal semantic, pragmatic and semiotic traditions, the connotative

aspects are not as well developed.

Page 97: Ontology for Information Systems (O4IS) Design Methodology

4.4 Using Conceptual Modeling for Ontology Modeling 75

4.3.1 Conceptual Modeling Languages

Returning back to our ongoing discussion, Niinimaki (2004) has reviewed and clas-

sified conceptual modeling languages in to three classes:

Extensional Modeling Languages:

Like the ER model, extensionality is expressed as the descriptive terminology of the

objects, sets of objects in the domain of application. So that the semantic relation-

ships included are only those that exist between the described sets of objects.

Intensional Modeling Languages:

Like those proposed by Kangassalo (1983) based entirely on Intensional relation-

ships between concepts. The concepts are independent of the domain of application.

Bunge defines the intension of a concept as “possibly infinite set of properties and

relations contained in the concept”. Kauppi’s (1967) intensional concept theory has

been utilized in knowledge representation, especially description logics by Borgida

(1995).

Hybrid Modeling Languages:

Conceptual modeling languages that combine both extensional and Intensional fea-

tures. Description Logics as put forward by Woods (1991) is a classic example of such

a hybrid language. It has the ‘T-Box’, or the terminological axioms that are used to

express the concept names and the concept definitions and the ‘A-box’ for the asser-

tional axioms where statements regarding the Intensional features like transitivity,

symmetric and inverse relations can be expressed.

R Given our objectives to make domain knowledge explicit, we need to

declaratively express the intentional aspects of the domain.

Current standard for ontology representation, Web Ontology Language (OWL)

builds on Descriptive logic and also uses Horn Logic for the rules description. There-

fore, the machine readable representation language is a hybrid modeling language.

Conceptual modeling using ER or conceptual graphs has been the basis for the RDF

tuples. Hence, the transition from an extensional to a hybrid modeling language is

seen. This research attempts to merge the intensional aspects of the domain into the

extensional modeling language itself. Our USP2 Design approach tries to analyze and

represent the intensional aspects of the domain using an extensional representative

conceptual modeling language like UML.

4.4 Using Conceptual Modeling for Ontology Modeling

There are several advantages of using conceptual models like (based on (Halpin

1998) and (Jarrar & Meersman 2002)):

Page 98: Ontology for Information Systems (O4IS) Design Methodology

76 4 Conceptual Modeling

• Conceptual modeling is a semantically rich discipline and support quality check

at high level of abstraction.

• Conceptual modeling languages provide conceptual constructs like integrity, tax-

onomy (part of) and derivation rules. The ontological basis of such part of /

whole relationships have been investigated by Opdahl, Henderson-Sellers & Bar-

bier (2001).

• Conceptual schemas were developed to capture the semantics of the application

domain. (Wand, Storey & Weber 1999)

• Conceptual modeling languages are expressive and usually have graphical nota-

tions.

• Conceptual models are thus designed to support clarity which is a measure of

how easy it is to understand and use. Graphical models are by far easier to com-

prehend and use.

• Conceptual Models are semantically relevant. Semantic relevance requires that

only conceptually relevant details need be modeled. Any aspect irrelevant to the

meaning (e.g. implementation choices, machine efficiency) should be avoided.

This is similar to the ontological commitment principle in ontology design.

• Conceptual models can be validated. Validation mechanisms are ways in which

domain experts can check whether the model matches the application.

• It is easy to have multiple levels of abstraction hidden in a single conceptual

model. Abstraction mechanisms are ways in which unwanted details may be re-

moved from immediate consideration.

• As we have seen in our preceding discussion, conceptual modeling languages are

based on formal theory. A formal foundation ensures models are unambiguous

and executable (e.g. to automate the storage, verification, transformation and

simulation of models).

There are some issues on which conceptual models do not match the objectives

of ontology modeling but they are the limitations of the conceptual modeling lan-

guages rather than the principle of conceptual modeling itself. Jarrar & Meersman

(2002) point out aptly that conceptual models are typically intended for use dur-

ing design phases and not at run time while ontologies are intended for use at run

time in applications. The second difference that they point out is that conceptual

models are not application-independent models as are ontologies. To reconcile these

two differences, they introduce, first a conceptual markup language based on ORM

(ORM-ML) and for the second, they propose DogmaModeler as an ontology engi-

neering tool.

On the second issue of application independent development of ontology, there is

a clash between intended or expected tasks to be solved at hand (that is the purpose

for which the ontology is being developed) versus the need to keep the ontology

Page 99: Ontology for Information Systems (O4IS) Design Methodology

4.5 Conceptual Modeling Patterns 77

conceptualization independent of the same purpose. As Jarrar & Meersman (2002)

put it:

“In the problem solving research community, this issue is called the inter-

action problem, which influences the independency of the problem-solver’s

domain.”

We agree with Jarrar and Meersman that conceptual data schema and ontologies

are similar to each other and that reusing conceptual modeling techniques is advan-

tageous. Conceptual models have been accepted as semi-formal type of ontology by

Uschold & Gruninger (1996). To conclude we agree with Jarrar & Meersman (2002)

in their observation:

“.... Reusing conceptual modeling techniques for ontology engineering is

ultimately beneficial: the large set of existing conceptual modeling methods,

graphical notations, and tools can make ontologies better understandable,

and easier to adopt, construct, visualize, etc. Furthermore, legacy conceptual

schemes can be mined and/or ontologized.”

4.5 Conceptual Modeling Patterns

By now, we agree that conceptual modeling is essential for a sound design and devel-

opment of an information system. It is natural, intuitive, graphical and thus easy to

understand and develop. But foremost of all, different forms of conceptual modeling

has existed for over three decades, so most information system designers should be

familiar with one form or the other. That supports one of the premises put forward

in chapter 1– conceptual modeling is a key to encourage the adoption and use of

ontologies in information system. In the previous section, we have also seen the sim-

ilarity between conceptual modeling and ontology modeling. Conceptual modeling

is appropriate for ontology design. However, to build a consistent and clear concep-

tual model, we need not only a modeling language, but also a method, constructs

and rules on how to use these constructs, as proposed by Sowa.(see discussion in

section 3.3.3). In this section, we shall lay the foundation for another of this thesis’

premises:-

R Information system designers will find ontology designing easier ifthey are provided with a comprehensive methodology consisting of design anddevelopment guidelines, recommendations as well as set of conceptual modelingand analysis patterns.

In software engineering, we are familiar with the use of patterns. Patterns sup-

port easy reusability and standardization efforts. The Gang of Four, GOF (Gamma,

Helm, Johnson & Vlissides (1994))as they are widely known as, introduced software

Page 100: Ontology for Information Systems (O4IS) Design Methodology

78 4 Conceptual Modeling

design patterns, in 1994. The main aim is to propose a set of software design pat-

terns for object oriented programming. They have proposed a set of patterns like

Creational Pattern, Structural Pattern and Behavioral Pattern.

4.5.1 Design Patterns

A design pattern is a formal way of documenting successful solutions to problems.

The idea was first introduced by the architect Christopher Alexander (1977) in his

book “A Pattern Language: Towns, Buildings, Construction”.

Martin Fowler (1997) in his analysis patterns book has further proposed these

object oriented patterns targeting the enterprise domain. Some of the patterns

introduced by Fowler in his Analysis Patterns book are: Domain Logic Patterns,

Data Source Architectural Patterns, Object-Relational-Behavioral Patterns, Object-

Relational-Structural pattern and so on.

The aim of this section is not to review these patterns by themselves, but to

illustrate the utility and acceptability of design patterns in general as a mechanism

for easy design and development.

Cabot & Raventos (2004) have classified design patterns in to two categories:

• Conceptual modeling patterns: A conceptual modeling pattern is aimed at rep-

resenting a specific structure of knowledge encountered in different domain.

• Analysis patterns: An analysis pattern specifies a domain-dependent knowledge

required to develop an application for a specific users. Ex: patterns for electronic

market places.

Cabot and Raventos (2004) hold that Fowler’s design patterns are examples of

conceptual modeling patterns, and Fernandez & Yuan’s (2000) patterns correspond

to analysis patterns.

Geyer-Schulz and Hahsler (2002) hold the view that idea of using a structured

writing template for describing the patterns themselves ensures that the patterns

are easier to teach, learn, compare, write and use. The original structure for design

patterns is to describe context/problem/forces/solution. Geyer-Schulz and Hahsler

carry out a detailed semantical analysis for the design patterns and propose a tem-

plate for the design patterns as:

Pattern Name: A name for accessing and identifying the defined pattern.

Intent: What the pattern does and what problems it addresses. Viz, the purpose.

Motivation: A scenario that illustrates the problem and how the problem contributes

to the specified scenario.

Forces and Context: Forces and context that should be resolved by the pattern.

Solution: Describe all relevant structural and behavioral aspects of the pattern.

Consequences: How the pattern achieves its objectives and any existing trade offs.

Page 101: Ontology for Information Systems (O4IS) Design Methodology

4.5 Conceptual Modeling Patterns 79

Design and Implementation: How the pattern can be realized.

Known use: Examples of the patterns.

R In this research, we agree and adopt Cabot & Raventos’s (2004) clas-

sification of design patterns. We propose sets of design patterns at both levels as

conceptual modeling patterns and analysis patterns, as we shall see later.

The use of ontologies as analysis patterns in the requirement and domain analysis

phase of Information Systems has been supported by Uschold and Gruninger (1996),

Johannesson & Wohed (1998) as well as Geerts & McCarthy (2000). To quote Geerts

and McCarthy (2000):

“As an analysis pattern, ontologies specify the objects of interest in the

domain and the rules to assemble objects into information structures. In ad-

dition, experiences and best practices for the patterns are stored in a knowl-

edge base to be shared and reused. ”

Johannesson & Wohed (1998) also agree that design patterns promote reuse of

knowledge, thereby, reducing cost for developing Information Systems. They define

the term specification pattern for design patterns to be used in the design stage of

Information Systems. They define:

“A specification pattern consists of an application independent model of a

domain structure,.......a specification pattern describes, at an arbitrary level

of abstraction, a set of real-world objects, their inter-relationships and the

rules that govern their behavior and state.”

We propose generic domain independent models which belong to the category

of “conceptual modeling design patterns”, for example the deontic analysis model

(based on speech act theory), Event Condition Action Rule analysis model, as well

as specific domain patterns like the adoption of the ECA rule analysis specific to our

military case study domain.

We also follow a template like pattern for describing our O4IS design methodol-

ogy itself as we shall see in chapter 5. But, for now we look at some other related

work where events, roles have been conceptualized as entities in conceptual model-

ing.

Roles as Entities in Conceptual Modeling

Cabot and Raventos use the above mentioned template for describing patterns as put

forward by Geyer-Schulz and Hahsler, to describe their Roles as entity types pattern.

1. Pattern Name: Roles as entity types

2. Intent: Representation of roles that entities play through out their life span and

control of their evolution.

Page 102: Ontology for Information Systems (O4IS) Design Methodology

80 4 Conceptual Modeling

3. Motivation: Roles are useful to model the properties and behavior of entities

that evolve over time. Ex: a Person entity may play different Roles at different

times and at different contexts, sometimes a student, sometime an employee,

sometimes a Musician.

4. Forces and Context: For roles, they identify a set of features for roles like, own-

ership, dependency, diversity, multiplicity, dynamicity, control, inclusion(recursive),

identity and adoption.

5. Solution: For structural aspects of role, they identify it as an entity type and

define a relationship between a role entity type and its natural entity type by

means of a RoleOf relationship. They use UML 2.0 and OCL 2.0 to represent

their proposal and introduce << role-of>> as a stereotype.

For the dynamic part of the role modeling, they make use of OCL constraints,

for example to represent that a person can only play the role of employee if the

person is between the age of 18 and 65: context Employee inv: Self.age>= 18

and self.age <= 65

6. Consequences: Cabot and Raventos analyze the fulfillment of their proposed

solution in terms of the forces and contexts identified. They also acknowledge

that the limitation of their solution is that the role entity type is considered to

exist only between similar natural entity (person)

7. Design and Implementation: They recommend an adapted version of the Role

Object Pattern 2

8. Known Uses: Some known uses of roles from other related research in security

and workflow areas are cited.

The above “pattern” for describing roles is relevant to us in two ways. Firstly,

our realm of research focuses on domain knowledge analysis and representation in

Information Systems. As we have already seen the interaction of humans, organiza-

tions and enterprises is the subject of interest in such applications. Therefore, the

‘roles’ that different actors or entities play, is one of the fundamental concepts in

our domain. Secondly, their adopted pattern for describing and documenting their

proposal, makes it easy to understand and reuse, thereby, motivating us to follow a

similar, ‘pattern-based approach’ to describe our proposed methodology as well as

the conceptual models.

Our interest in modeling the procedural and pragmatic aspects of a domain ne-

cessitates that we are able to capture and represent the dynamical aspects of a do-

main as well, such as events, actions, causes and their effects so on.2 Proposed by Baumer, Riehle et al, The Role Object Model. PLoP 97. Technical Report

WUCS-97-34. Washington University Dept.

Page 103: Ontology for Information Systems (O4IS) Design Methodology

4.5 Conceptual Modeling Patterns 81

Events as Entities in Conceptual Modeling

Most of the conceptual modeling languages and methods do not model events as

entities in themselves. They adopt predominantly an object centric view and follow

the object oriented analysis approach. Antoni Olive (2004) has pointed out the ad-

vantages to be gained in modeling events as entity types. Events as entity types allow

us to model behavioral aspects of our domain. Even though the expression of events

as entities is not new and has been proposed since the early 80s, still behavioral

modeling has been limited to state transition diagrams, sequence or choreography

diagrams.

UML languages distinguishes four types of events:

• Call events for the invocation of operations.

• Signal events intended for asynchronous communication between objects.

• Change events for satisfaction of boolean conditions.

• Time events for satisfaction of time expressions.

But UML does not provide constructs for us to represent these at the conceptual

level as objects. Olive proposes a method for modeling events as entity types and

makes use of UML language constructs such as constraints, derivation types and

type specializations.

Olive further defines some fundamental primitives for describing events as event

types; structural and query event types, Event Characteristics, Event Constraints,

and Query Event Effects as briefly summarized below:

Structural Events: The state of a domain at some point of time is defined as the

set of instances of the relevant entity type and the relationship types that exist in the

domain at that time. The state of the domain changes if at a given instant of time, the

current state is different from the state it was at time t-1. These state changes are said

to occur through Structural Events. A structural event is said to be an elementary

change in the population of an entity or relationship type. In UML there are nine

different types of structural events identified like create object, reclassify object etc.3

Domain Event: Is a set of structural events that can be said to constitute a single

change in the given domain. Domain events are caused by actions performed in the

domain. Domain events can again be external domain event(ex order received from

buyer), temporal domain event ( passing of last date for submission of application)

or generated domain event (caused by the actions performed by the domain itself,

internal events).

Query Events: A query event is a request for information and could be external

query event when issued by an outside actor or a generated query event.3 For details see UML Superstructure 2.0, Final Adopted Specification. 2003. www.omg.org/cgi-bin/doc?ptc/2003-08-02

Page 104: Ontology for Information Systems (O4IS) Design Methodology

82 4 Conceptual Modeling

Event Characteristics: The characteristics of an event are defined by Olive as

the set of relationships in which the event participates.

Event Constraints: Describe constraints and conditions that an event must sat-

isfy in order to occur.

Query Event effects: The answer to query events are modeled and represented

as an effect operation in UML notation associated with the event UML class in Olive’s

proposal.

Domain Event effects: Similar to the query event effect, the domain event effect

is used to describe post-conditions of the result of a set of prescribed structural

events.

The above is just one effort in the realm of conceptual modeling of prescriptive

behavior, rules and dynamics. This illustrates the depth and breadth of the concep-

tual modeling paradigm. Our second case study, the DCMF Project is action-centric

and the focus of the conceptual models presented therein, revolve around the action

and events that are allowed to occur around these. Thus, our conceptual model-

ing methods proposed take in to consideration different approaches like the ones

reviewed here, namely the roles as entity types, events as entity types and so on.

4.6 Procedural and Behavior Representation Languages

We have seen the conceptual languages for representing the static concepts of a

system or a domain of interest. Dynamic aspects like behavior or processes are usu-

ally represented using graphical languages like Data Flow Diagrams (DFDs), Event-

Driven Process Chain (EPC) diagrams, UML activity diagrams, petrinets and Business

Process Modeling Notation (BPMN) to name a few. We now briefly summarize some

of these below:

• A Data Flow Diagram is a graphical representation of the “flow” of data through

an information system. It is used for visualizing the processing of data through

the proposed information system. DFDs were initially proposed by Larry Con-

stantine (1974) as a part of the Structured System Analysis and Design. A data

flow depicts processes, data stores, and external entities in a business process.

The main notations for the same may be seen in figure 4.2.

• Event-Driven Process Chain Diagrams: Event-driven Process Chain (EPC) dia-

grams were proposed by Scheer, Keller and Nuttgens 4 in the early 90s. The EPC

diagram is graphical and easy to understand and is used for depicting the control,

flow and organization of events and processes within a business process. Some

4 Keller, G., Nttgens, M., and Scheer, A.-W. (1992). Semantische Prozemodellierung auf derGrundlage ”Ereignisgesteuerter Prozeketten (EPK)” (Rep. No. 89). Saarbrcken: Universittdes Saarlandes.

Page 105: Ontology for Information Systems (O4IS) Design Methodology

4.6 Procedural and Behavior Representation Languages 83

Fig. 4.2. Basic DFD Notations

of the main components of an EPC include events, functions, organization unit,

information, control flow, information flow and logical connectors (OR, XOR and

AND) as illustrated in figure 4.3.

Fig. 4.3. Basic EPC Diagram Notations

– Events: Events are passive elements that describe the circumstances under

which a function or process works. They are represented as hexagons.

– Functions: Functions are active elements that model tasks or activities. They

describe transformations that occur from an initial state to a resulting state.

Functions are represented as rounded rectangles.

– Organization Unit: Organization unit determine the actor or roles within an

organization that are responsible for the related function. Graphically they

are represented as ellipses with a vertical line through them.

– Information, Material or Resource Objects: Objects from the real world

are represented as rectangles in an EPC diagram to denote entities that act as

input or output to functions.

– Control Flow: Control flow arrows connect events and functions or logical

connectors in a chronological sequence thus creating local dependencies.

– Logical Connectors: In EPC diagrams the logical connections between events

and functions are represented by the logical connectors, namely XOR(Branch/

Merge), OR (logical alternatives) or AND (Fork/Join) connectors.

Page 106: Ontology for Information Systems (O4IS) Design Methodology

84 4 Conceptual Modeling

• UML Activity Diagrams: UML activity diagrams are one of the five UML dia-

grams used to represent the procedural flow aspects of an enterprise. The struc-

tural diagrams that include the UML class diagram, component and deployment

diagrams are used for modeling the static aspects of a system. Behavioral di-

agrams are utilized to visualize the dynamic aspects of a system. In UML the

behavioral diagrams include use case diagrams, interaction diagrams (sequence

and collaboration diagrams), state diagrams and activity diagrams.

UML activity diagrams are similar to UML state diagrams that model the different

states an object can change through. UML activity diagram model workflows and

business processes. The entire UML activity diagram is attached to a use case

diagram or a class operation, thus connecting to the static aspects of the system.

The main components of an UML activity diagram are activity, start state, stop

state, transition, decision, synchronization, object flow and object as shown in

figure 4.4.

Fig. 4.4. Basic UML Activity Diagram Notations

EPC diagrams follow the process centric modeling approach (the main focus is

the processes that are occurring within a system) while the UML activity dia-

grams follow the object centric modeling approach (the main focus is the objects

inside a system).

• Petrinets: Petri nets are mathematical representations of discrete systems first in-

troduced by Carl Petri (1962). Petrinets consist of places, transitions and directed

arcs between them as depicted in figure 4.5. Places contain tokens. Transitions

act upon the tokens when they are fired. They consume the tokens from their

input place, complete some processing and produce a predetermined amount of

tokens in their output place.

• BPMN: Business Process Modeling Notation (White 2004) is currently a stan-

dardized modeling notation for representing business processes and workflow.

BPMN was developed by the Business Process Management Initiative (BPMI)

and is now managed by the Object Management Group (OMG). BPMN is tar-

geted towards all stake-holders from business managers to designers and hence

Page 107: Ontology for Information Systems (O4IS) Design Methodology

4.6 Procedural and Behavior Representation Languages 85

Fig. 4.5. Basic Petrinet Notations

is graphical and simple to use. The main constructs in BPMN include flow objects,

connecting objects, swimlanes and artifacts.

Fig. 4.6. Basic BPMN Notations

– Flow objects consist of events, activities and gateways.

· Events are things that happen and are represented by circles. As seen in

figure 4.6 they could be start, intermediate or end events.

Page 108: Ontology for Information Systems (O4IS) Design Methodology

86 4 Conceptual Modeling

· An activity (figure 4.6) is a rounded rectangle and is used to represent a

task, process or sub processes.

· A gateway is a diamond that represents decision points. (see figure 4.6).

– Flow objects are connected to each other using connecting objects. There are

three types of connecting objects, namely sequence flows, message flows and

association as illustrated in figure 4.6.

– Swimlanes are used to organize activities that are functionally similar into

same visual category. They are depicted using rectangles that contain the

flow objects and connecting objects.

– Artifacts allow the introduction of more detailed information like the data

that may be required in an activity, a logical grouping or annotation of texts

to explain the model better. The graphical notations are shown in figure 4.6.

We shall use some of the above representation formalisms later in this thesis

when we depict the procedural concept views.

4.7 Relevance of Chapter

In the context of this research, the above discussion is relevant, since, the formal

ontology representation language chosen is that of Web Ontology Language(OWL).

OWL, as we know, uses DL for describing the Intensional features of the ontology.

Therefore, we come to a key issue or goal that has been addressed in this thesis:

If ontology in information system is supposed to be a combination of ex-

tensional and intensional representations of concepts and their relationships

then how should an Information Systems designer design and develop the

targeted ontology?

To address this issue: we propose an unified semantic procedural pragmatic con-

ceptual design approach which builds on the well known ER Model and guides the

designer in capturing the Intensional features, implicit relationships as graphical

conceptual models in the first step, which are transformable into the formal OWL,

DL representations.

In the previous two chapters, we have seen (A) the background and theory of

Knowledge Management and Information Systems. We have discussed the need for

adopting KM principles in Information Systems. (B) We have traced the origin, his-

tory of Ontology, from philosophy, linguistics, AI and in Information Systems. We

discussed the aspects that would be relevant to ontology design and development in

Information Systems. Thereafter, we surveyed some of the contemporary ontology

design and development methodologies, architectures and approaches. The aim of

this chapter was to introduce the Information Systems designer to some of the basic

Page 109: Ontology for Information Systems (O4IS) Design Methodology

4.7 Relevance of Chapter 87

concepts prevalent to day. This chapter, dealt with the domain that overlaps both

Information Systems and Ontology, namely Conceptual Modeling. We have looked

at what are conceptual models, their utility, and the different approaches. We have

motivated the reason why conceptual models would be the ideal cross-link between

traditional ER based conceptual models and the ontological conceptualizations. We

have looked at the role that design patterns play in the conceptual modeling meth-

ods.

Page 110: Ontology for Information Systems (O4IS) Design Methodology
Page 111: Ontology for Information Systems (O4IS) Design Methodology

v 5

Ontology for Information Systems Design

Methodology

In philosophy, ontology is a description of the world ‘as-is’. In the Information Sys-

tems domain, this is synonymous with the world ‘as-it-should-be’. That is, in philos-

ophy, ontology is ‘descriptive’ semantics while, in Information Systems, ontology is

more ‘prescriptive’ (Smith 2003a). Smith et al (2004) further define ‘endurants’ as

entities that exist in full at every instance of time in which they exist. ‘Perdurants’ are

defined as entities that unfold themselves in successive temporal phases. Most enter-

prise and business process ontologies model static concepts, i.e. endurants. Dynamic

concepts, i.e. perdurants, such as change or process, need also to be conceptual-

ized in a similar way to facilitate automation of business processes. Aligned with

this, Smith (2004) emphasizes a fundamental difference in approach and design

of ontology in Information Systems, which he terms as ‘Descriptive Ontology’ and

‘Procedural Ontology’. This has been further strengthened by Roberto Poli (2003)

in distinctions of ‘descriptive’, ‘formal’ and ‘formalized’ ontologies. Though many of

the fundamental principles of ontology within Information Systems are influenced

by the philosophical origin of ontology, ontology in Information Systems symbolizes

an established cognitive knowledge. This implies that in addition to the description

of the domain concepts, the behavioral and functional aspects of the domain should

also be an integral part of the ontology. Thus, ontology for use in Information Sys-

tems differs slightly from the philosophical view of an ontology. The question then

arises– how do we design and model both the descriptive and the prescriptive as-

pects of the domain?

In this research, we address this dilemma of ontology design and modeling. In

particular, we consider conceptual modeling in the realm of Information Systems.

The fundamental objective behind conceptual modeling and that of ontology is the

same – to conceptualize the domain of interest. Following our discussion in chap-

ter 1.1.3 as well as section 4.4, we believe that conceptual modeling holds the key

to a comprehensive knowledge representation of a domain covering all the three as-

pects as all mentioned by Boman et al. (1997): (a) semantics; (b) syntactics; and (c)

Page 112: Ontology for Information Systems (O4IS) Design Methodology

90 5 Ontology for Information Systems Design Methodology

pragmatics. In section 4.3 we have reviewed different types of conceptual modeling

languages and the different aspects that they can cover. We have also seen the op-

tions available for conceptual modeling of process and behavior in section 4.6. One

such language for knowledge representation, Unified Modeling Language (UML) is

being widely used for conceptual modeling. UML class diagrams are effective for

capturing the endurants of a domain. UML activity, sequence or choreography dia-

grams are useful for capturing the perdurants. However, there still remains the issue

of modeling both the static and dynamics or behavior of a domain, in an integrated,

reusable and generic conceptual model. In this research, we shall aim to use UML as

our conceptual modeling language.

We now move on to the specific design choices an Information Systems(IS) de-

signer has to make while designing domain ontologies that capture all the three

above mentioned aspects:

i Which concepts are relevant and necessary to be included in the proposed on-

tology?

ii What is the optimum design architecture for the proposed ontology?

iii What kind of design strategy is best suited for the given domain and given pur-

poses?

iv How to be consistent in the conceptualization of similar categories of concepts?

That is, there is a need to avoid subjective bias of the designer, ensuring repeata-

bility and consistency of the design process.

v How to match the functional requirements of the targeted Information Systems

application with the goals of ontology design? How do these functional require-

ments influence the ontology design choices?

vi What is the minimum required level of knowledge formalization?

vii Which knowledge representation formalism/language to choose?

viii Once the above design decisions are taken, how should a designer actually pro-

ceed in capturing, analyzing and representing the implicit and explicit domain

knowledge?

ix What tools, methods, other knowledge sources, models may be chosen to help

in the knowledge modeling process?

The above is not an exhaustive list of problems and issues faced by the IS designer

today. This research shall aim to answer a few of the above-mentioned issues.

Several guidelines, methodologies and approaches have been proposed for: (a)

ontology design criteria; (b) ontology architecture; (c) ontology design strategy; and

(d) ontology development life cycle, as we have reviewed in the earlier chapter 3.

However, the IS designer is still faced with the problem of selecting and choosing

from the available state of the art technologies. Additionally, the IS designer may or

Page 113: Ontology for Information Systems (O4IS) Design Methodology

5 Ontology for Information Systems Design Methodology 91

may not be well versed in all the disciplines of ontological analysis (as reviewed in

chapter 3 above): lexical semantics; philosophy; AI; and linguistics.

In this regard, it is not sufficient to just outline the steps to be adopted in a design

process as has been done by many of the current ontology design methodologies.

The IS designer would need a set of additional models, constructs and methods

which can help him/her in effectively carrying out his/her design tasks. Therein, lies

the motivation and goal for our proposed Ontology for Information Systems design

methodology:-

R The Ontology for Information Systems (O4IS) design methodology de-

scribes, in detail, the design and development of domain ontologies for use in In-

formation Systems, targeting the IS designer. O4IS design methodology also puts

forward a number of recommendations for existing methods, algorithms and tools

to be used in different steps like the following:

• Proposes a novel multi-tiered architecture for logical demarcation of a domain

ontology.

• Recommends a dual conceptual representation for domain ontologies in Infor-

mation Systems.

• Puts forward a new design approach for descriptive and prescriptive domain

conceptualization in the USP2 Design (As we shall see later in chapter 6).

• Proposes a series of conceptual analysis patterns called Semantic Analysis Rela-

tionships (SARs) which are helpful aids in the analysis and conceptualization of

implicit domain knowledge.

The O4IS design methodology is the main skeleton which links and holds to-

gether all the other above-mentioned constructs, methods and models that are pro-

posed in this research. By the combination and reuse of existing research, available

techniques and innovative research, we now present the O4IS design methodology

in detail.

We begin by introducing the O4IS design methodology in section 5.2, followed

by two of our other proposed artifacts in sections 5.3 and 5.4, as shown in figure 5.1.

We shall discuss the other artifacts– the USP2 Design and SARs, etc., in the following

chapter.

Fig. 5.1. Chapter Disposition

Page 114: Ontology for Information Systems (O4IS) Design Methodology

92 5 Ontology for Information Systems Design Methodology

5.1 Requirements on O4IS Design Methodology

The current research is motivated by all the design methodologies that have been

surveyed in this research. However, we have a special inclination towards Methon-

tology as being the closest to our proposed O4IS design methodology. They have

begun with the notion of conceptualization, while we have followed that road and

completed the end result. Our ontology design methodology is driven by conceptual

modeling design principles, techniques and approaches as we shall see later. How-

ever, we advocate the use of graphical conceptual models not as an intermediary

representation but as the final ontological representation that can be translated into

other machine-readable formalisms. Methontology is also easy for novice beginners

to adopt as many of their recommendations are similar to database conceptualiza-

tion and design. However, they use mainly textual or tabular text representations.

While their idea on the verb diagram analysis is sound, we found that we could not

make much use of it since the document describing the rules for the verb diagram

was not accessible and in Spanish (to the best of our knowledge).

From Uschold and Gruninger’s skeletal method(section 3.8.1), we adopt the sim-

plicity of starting from defining scenarios. We are also motivated by the RUP oriented

UPON (section 3.8.4) in the initial knowledge acquisition phase. UPON is the only

methodology (amongst those listed in this research) which explicitly mentions the

roles of a domain expert and the Information Systems designer. We have used and

found Noy and McGuinness’s guidelines (section 3.8.3) practically useful and effi-

cient in introducing the world of ontology building to a novice, specially if the IS

designer is using the Protege ontology editor.

Though all of them suggest defining the scope and purpose for the ontology, they

do not explicitly cater to functional needs of the targeted application. That is, some

of the design choices to be made are governed by the functional requirements or the

domain specific informational needs.

R In our practical experience in several domains, we saw that not a single

one of the above mentioned ontology design methodologies was satisfactory for

meeting all the specific requirements for designing ontologies for use in targeted

Information Systems applications. In some cases, a blend of one or two was a match,

and in others more than that. This was the motivation for us to propose our own

design methodology that could cover almost all of the requirements, namely:

• Design methodology should be easy for a non-ontology expert IS designer to

follow.

• Design methodology should be adaptable to cater to different targeted applica-

tion needs.

• Design methodology should be comprehensive and should be able to capture se-

mantics, pragmatics and the dynamic behavioral aspects of the domain.

Page 115: Ontology for Information Systems (O4IS) Design Methodology

5.2 Introducing the O4IS Design Methodology 93

• Design and the subsequent ontology should make domain assumptions explicit.• Methodology should aid the designer in different identified stages by examples,

patterns, models or guidelines. So that it is clear to a designer how the design

methodology is intended to be used.

• Domain conceptualization should be reusable, shared and understandable to hu-

man users as well as processable by machines capable of supporting inferencing.

• Domain conceptualization should be free of any encoding bias, including knowl-

edge representation and the subjective bias of the designer.

5.2 Introducing the O4IS Design Methodology

Some of the common functional design requirements of an Information Systems

application may be summarized as: flexibility; reusability; easy maintenance; rapid

development life cycle; extensibility; traceability; machine readability; support evo-

lution and shared understand ability (Kabilan & Mojtahed 2006b). We now present

our proposed methodology for ontology conceptualization, design and development

targeted at IS designers with little prior expertise in ontology design and develop-

ment.

As seen in figure 5.2, our proposed Ontology for Information Systems (O4IS)

design methodology consists of ten steps or phases in the design and development

of domain ontologies as listed below:

• G1: Establish the scope of the domain.

• G2: Establish the targeted users, applications, and functional requirements.

• G3: Choose ontology architecture:- physical and logical.

• G4: Choose ontology development approach.

• G5: Choose level of ontology representation.

• G6: Choose knowledge acquisition methods and tools.

• G7: Knowledge analysis:- conceptualize the domain ontology.

• G8: Knowledge representation:- implement the domain ontology.

• G9: Evaluate, assess and verify the domain ontology.

• G10: Use, maintain and manage the domain ontology.

In addition to this design methodology, we also propose a number of artifacts to

be used in different steps, like the multi-tiered architecture for the logical structure

of domain ontologies, dual conceptual representation, semantic analysis representa-

tions and the Unified Semantic Procedural and Pragmatic Design, as shown in the

same figure 5.2. We will now go through the details of O4IS design methodology.

Thereafter, we discuss the multi-tiered architecture in section 5.3, the Dual Con-

ceptual Representation in section 5.4. The USP2 Design and the Semantic Analysis

Representations are discussed in chapter 6. We now first describe the presentation

Page 116: Ontology for Information Systems (O4IS) Design Methodology

94 5 Ontology for Information Systems Design Methodology

Fig. 5.2. The Ontology for Information Systems Design Methodology

Page 117: Ontology for Information Systems (O4IS) Design Methodology

5.2 Introducing the O4IS Design Methodology 95

format for our O4IS design methodology and thereafter we present the detailed

methodology description.

5.2.1 Template for describing the O4IS Design Methodology

As stated earlier in section 4.5.1, we follow a template-based approach similar to

those adopted by the design patterns (Gamma et al. (1994), Fowler (1997)) to de-

scribe the proposed methodology. The template for the O4IS design methodology is

as follows:

Name: Gives the step number and name for the guideline /recommendation. It

also gives the intent for that particular step.

Input: Lists and describes the necessary input information, requirements and

tools for carrying out the described step.

Output: Expected output at the end of this step. Note that all steps may be

carried out iteratively till a satisfactory output is attained.

Procedure: Describes and discusses the procedure to be followed in this partic-

ular step so that the design and development may progress from the input state to

the output state.

Illustration: A running case scenario is followed through out the proposed ten

step design methodology and intermediary step results are discussed at relevant

stages.

Under the purview of some of the individual stages, we discuss and make use

of other conceptual modeling and/or analysis patterns. Details of each such pattern

and its associated methodology are included separately in the following sections.

5.2.2 G1: Establish the scope of the domain

Just as in any software design methodology, the designer is required to establish

the scope and constraints for the domain which is to be captured in the proposed

ontology. By universe of discourse we mean the current domain(s) in which we are

interested in, that is the domain which is to be described by the proposed ontology.

It could be a single domain or a combination of domains as the targeted use may

be. Given that ontology prescribes to the open world assumption, it is important to

identify the boundary of the domain to be investigated.

Input: Domain of interest, a purpose or problem to be solved through the use of

the developed ontology.

Output: A set of requirement criteria, both functional and non functional,for the

targeted application.

Procedure: Begin by identifying the domain which the proposed ontology is to

be used in, that is the context of application. Identify the required functionalities

Page 118: Ontology for Information Systems (O4IS) Design Methodology

96 5 Ontology for Information Systems Design Methodology

of the application. Identify the main features of the domain to understand how it

relates to other domains.

Illustration: For example, if the domain of application is that of a car rental and

leasing enterprise, then we have the identified contexts as that of the customer, the

objects of interest, namely the vehicles and the price at which they are to be rented

and so forth. As seen in figure 5.3, the scope of the proposed ontology should be an

overlap of all these contexts.

Fig. 5.3. Establishing Domain Scope.

5.2.3 G2: Establish the targeted users, applications, and functional

requirements

We recommend that the designer lists the projected end uses, their requirements

and targeted users.

Input: The identified scope of the ontology and its application context, the peo-

ple who are the targeted users, domain experts from the concerned domain.

Page 119: Ontology for Information Systems (O4IS) Design Methodology

5.2 Introducing the O4IS Design Methodology 97

Fig. 5.4. Establish the Applications and Users of the Domain.

Output: A set of application purposes, scenarios for use, user specific functional

requirements. These may be described in natural language or use case diagrams.

Procedure: Identify the targeted user groups, their profiles and their usual ex-

pertise with the domain. Identify the typical usage scenarios. It is also advised to

identify the exceptions that may occur, since these would also have to be handled in

the long run.

Illustration: For example, in figure 5.4 we see the perspective of the customer

in a car rental enterprise scenario. Similarly we would have use cases for the en-

trepreneur like the vehicles and their leasing prices. The targeted users of an ontol-

ogy based application for this car rental service would be either the customer or the

entrepreneur. Note that both have different application requirements.

Page 120: Ontology for Information Systems (O4IS) Design Methodology

98 5 Ontology for Information Systems Design Methodology

5.2.4 G3: Choose ontology architecture: physical and logical

In this step we now decide on the appropriate architecture for the proposed ontology.

Input: System requirements, application environment, current ontology design

architectures, proposed multi-tiered architecture for logical architecture.

Output: Selected appropriate physical and logical ontology architecture suitable

for the particular application.

Fig. 5.5. Types of Physical Architecture for Ontology

Procedure: Choose a physical architecture from (see figure 5.5 for illustration):

(i) single ontology for a central application; (ii) multiple local ontologies for dis-

tributed applications; and (iii) a hybrid ontology for distributed application but yet

supporting interoperability. For the logical architecture design for domain ontology,

we recommend the multi-tier ontology structure as shown in figure 5.6. More details

regarding the multi-tier ontology are discussed in section 5.3.

Illustration: For our simple case scenario, we could choose to have a single on-

tology as the physical ontology architecture. However, for the logical ontology, we

choose a multi-tiered structure, where we reuse existing ontologies like the upper

OPENCYC ontology 1 where concepts like Transportation, TransportationEvent,

TransportationDevice,Vehicles, and Passenger, etc., are defined. We can even

make use of other car rental ontologies like the one defined in a demo using a car-

rental application 2. But for simplicity’s sake, we assume that we will develop our

car ontology from scratch making use of an generic upper ontology like OPENCYC or

SUMO for inspiration. We will also use a domain ontology like the Enterprise Ontol-

1 See Details at http://www.cyc.com/cycdoc/vocab/transportation-vocab.html2 See details at http://interchange.mit.edu:8080/gcms_v4/Car/index.html

Page 121: Ontology for Information Systems (O4IS) Design Methodology

5.2 Introducing the O4IS Design Methodology 99

Fig. 5.6. Multi-tiered Domain Ontology Architecture

ogy for providing us with concepts from the business aspects like hiring, renting,

and payment.

5.2.5 G4: Choose ontology development approach

In this phase, the designer begins to make decisions on how he would start his

analysis and design work of the domain ontology.

Input: Current approaches for ontology design and development. The available

choices are: (i) Top-Down approach; (ii) Bottom-Up approach; and (iii) Middle-Out

approach. A Middle-Out design approach is best suited as proposed by Gruninger &

Fox (1995) as it supports rapid, easy development and reuse of existing sources. We

have discussed further on the advantages of this approach in section 3.7.

Output: Based on convenience, scale and scope of the proposed ontology, one of

the above-mentioned three approaches is chosen.

Procedure: If the domain is new and no other ontology for the same or similar

domain exists, then we suggest that a bottom up approach is appropriate, since

one can begin by studying the individuals and generalize them to form the generic

concepts. If the domain is well understood and documented then, it is easier to start

with the top most generic concept that we wish to include in our proposed ontology.

Illustration: For example, for our car rental scenario, the most generic concept

that we are interested in is ‘customer’, then we can further specialize to identify

‘regular customers’, ‘long term special customers’, ‘private customers’, ‘international

customers’ and so on.

If we need to support interoperability with other similar car rental agencies,

then we could choose the middle out approach, where we begin by identifying the

‘customer’, but thereafter also map to existing ontologies like Enterprise ontology, to

identify ‘customer’ as an ‘actor’.

Page 122: Ontology for Information Systems (O4IS) Design Methodology

100 5 Ontology for Information Systems Design Methodology

5.2.6 G5: Choose level of ontology representation

Once we have identified the scope, and know the basic architecture and develop-

ment approach, we need to decide what representation formalism is required for

the application context at hand. For example, if the purpose is only for human un-

derstanding and communication, then a complex formal knowledge representation

is not warranted.

Input: Uschold & Gruninger (1996) have classified ontologies depending upon

their formality and complexity of knowledge representation formalism as belonging

to the following major categories: Highly informal; Semi-informal; Semi-formal; or

Rigorously Formal (see details in section 3.4) and the other input is our proposed

Dual Conceptual Representation.

Output: Selected representation level for the proposed ontology.

Fig. 5.7. Dual Conceptual Representation for Domain Ontology

Procedure: We propose to model the domain of interest in two phases as illus-

trated in figure 5.7. In the first phase we capture the domain knowledge as a series

of UML conceptual models, thereby conforming to the semi-formal ontology type.

These are useful for human understanding, promote rapid reuse amongst users, and

can be readily transformed to formal ontologies. In the second phase, these UML

conceptual models are transformed in to machine-readable formal ontology repre-

sentations using Web Ontology Language (OWL).

R This Dual Conceptual Representation of the domain, is a novel ap-

proach as compared to other contemporary ontology design methodologies, to the

Page 123: Ontology for Information Systems (O4IS) Design Methodology

5.2 Introducing the O4IS Design Methodology 101

best of our knowledge. We present the same in detail in the section 5.4. We propose

that even if the targeted application requires rigidly formal ontology implementa-

tion, the designer should always analyze and represent the domain knowledge as

conceptual models first and thereafter implement these conceptual models as for-

mal ontology.

Illustration: For our car ontology example, we would like to make a knowledge

base that we can query to retrieve meaningful information. Hence, we choose to

design a formal ontology. But at the same time, we would also like to explain and

show our conceptual model to other potential customers and business partners.

5.2.7 G6: Choose knowledge acquisition methods and tools

In this phase, the designer makes a choice regarding the process of how the domain

knowledge is to be collected.

Input: Knowledge acquisition methods for manual, semi-automatic or automatic

extraction of knowledge and information from natural language text, and web

pages, etc. Informal knowledge capture guidelines as suggested by Uschold and

Gruninger. From Uschold (1995) we also adopt the idea of investigating and cap-

turing the domain first in natural language. Or the designer may choose the sto-

ryboard sketch option as put forward in UPON (De Nicola & Missikoff 2005). Any

of these methods are suitable for the collection of information. Other automatic or

semi-automatic knowledge extraction techniques and tools may also be used. But

currently tool support is still primitive and hence we recommend that the designer

chooses an informal storyboard method of collecting information from subject mat-

ter experts, that is the domain experts, the targeted users etc. As a part of our pro-

posed Unified Semantic Procedural and Pragmatic Design for conceptualization of

domain knowledge, we also propose a set of conceptual analysis models for ana-

lyzing and capturing different domain perspectives as we shall see in section 6.5

later. These conceptual models may themselves be used as patterns for knowledge

acquisition.

Output: Based on the selected mechanism for knowledge acquisition, a set of

domain knowledge descriptions in natural language, a set of questions based on the

targeted functionalities are the expected output for this phase.

Procedure: Select appropriate design tool, design methodology from current

state of the art design methodologies and tools.

Illustration: We choose Protege Ontology Editor as our ontology design and de-

velopment tool. For the conceptual modeling, we can use any conceptual modeling

tool like Rational Rose and MS VISIO. For the design methodology, we choose to

follow the O4IS design methodology and USP2 Design, as proposed in this research.

For the actual knowledge acquisition, we assume that a natural language description

of the domain is our input. A combination of other methods may also be used.

Page 124: Ontology for Information Systems (O4IS) Design Methodology

102 5 Ontology for Information Systems Design Methodology

The outputs from all the above steps form the input to the next steps of this

design methodology. So far, we have been preparing ourselves for the actual design

and development or ‘construction’ phase.

5.2.8 G7: Knowledge analysis - conceptualize the domain ontology

Once the domain knowledge has been captured, the designer needs to choose a

mechanism for analyzing and thereafter modeling the implicit and explicit knowl-

edge retrieved. Here, we propose that the designer makes use of our Unified Se-

mantic Procedural Pragmatic Design approach, to methodically analyze and model

the semantics (concepts), and then the dynamics (procedures) and the pragmatics

(using deontic analysis models, speech act theory, or other linguistic analysis for-

malisms). The 5Ws approach- who, why, where, when, and what - is also a handy

analysis tool. Our proposed USP2 design methodology also builds on some of the fun-

damental steps introduced by the Noy guidelines, and that by Gruninger and Fox.

As we shall see in detail in the following section, we propose a detailed method-

ology for conceptualizing the domain knowledge from different perspectives:- the

semantics; the procedural; and the pragmatic. For doing this, we provide the naıve

designer with guidelines to build conceptual models of the domain by identifying

the central entities or objects of interest, their roles, and how they relate to each

other, viz semantic relationships.

Input: Output from all the previous steps discussed so far, knowledge analysis

methods and models, our proposed USP2 design methodology.

Output: A set of conceptual models following the proposed design methodology.

Procedure: The designer has to carry out the knowledge analysis and subse-

quent representation as conceptual models following our proposed USP2 design,as

presented in detail in chapter 6.

Illustration: From G7 and G8 phases we follow the USP2 design methodology

and at the end of this step we should have identified the semantic concepts and

their semantic relationships. We shall see details of this step when we discuss our

USP2 Design in the following chapter. For our running case example, we would have

concepts of ‘car’, ‘customer’, ‘rents’ and ‘hires’.

5.2.9 G8: Knowledge representation - implement the domain ontology

In this phase the designer finally implements the conceptual models as formal on-

tology.

Input: Set of conceptual models designed at the end of previous step, ontology

development environment or tool, or ontology tool to translate UML to OWL, or

transformation rules for mapping from conceptual models into any desired formal

ontology language.

Page 125: Ontology for Information Systems (O4IS) Design Methodology

5.2 Introducing the O4IS Design Methodology 103

Output: Formal ontology artifact implemented using chosen ontology editor or

equivalent tool.

Procedure: Noy & McGuinness (2001) provide a stepwise, easy to follow design

methodology for ontology developers, albeit closely adapted to the Protege ontology

editor tool. But the fundamental goals and objectives of ontology design are generic

enough to be adopted for other ontology development environments as well. It is

particularly useful in capturing the descriptive concepts and their relationships of a

domain. The last two phases of this guideline ensures repeatability and also reduces

the subjective bias of the ontology designer.

Illustration: As stated in the previous step, we shall discuss this step in detail

in the following chapter. For our car rental ontology example, we would create an

OWL project in Protege ontology editor, insert all the concepts, their characteris-

tics, relations and axioms. Some plugins support the import of XMI files from UML

class diagrams. It is expected that more tool support for automatic translation from

conceptual models in to OWL formalism will be available in the future.

5.2.10 G9: Evaluate, assess and verify the domain ontology

In this penultimate step we carry out a key role of evaluating and assessing the

designed ontology.

Input: The designed ontology, competency questions set up earlier, functional

requirements that were to be met, domain experts to verify the ontology.

Output: Designed ontology is assessed, evaluated and verified as may be re-

quired.

Procedure: We choose the competency questions phase as suggested by Gruninger

and Fox (1995), for assessing the minimum level of required information to be cap-

tured and modeled to support the level of inferencing and targeted application us-

age. Also, they help in tracking and authenticating the source and interpreted infor-

mation for verifiability and validation. As mentioned earlier, since our main aim is

in domain knowledge representation, we also adopt Davis et al.’s (1993) knowledge

representation roles as evaluation criteria to assess if our conceptualized ontology

fulfills its purposes. To verify the ontology, we regard the domain experts and the

targeted users as the final authority to verify and check if our conceptualized ab-

straction reflects the reality of the domain in question.

Illustration: We choose the competency questions for our car ontology as those

listed earlier,like what makes of car are there? What are the different leasing pack-

ages offered to a customer? What are the features for a specific model of a car?

Page 126: Ontology for Information Systems (O4IS) Design Methodology

104 5 Ontology for Information Systems Design Methodology

5.2.11 G10: Use, maintain and manage the domain ontology

Finally, the designed ontology has to be used, maintained and required modifications

made from time to time.

Input: We propose to follow parts of METHONTOLOGY for its evolving life cycle,

like its more structured goals of planning, modeling, development, documentation

and maintenance as it fits closely with the need to be flexible, adaptable, extendible

and evolving. METHONTOLOGY follows the software development life cycle closely

and emphasize on the need for maintenance, documentation and validation of the

ontology.

Output: The expected outcome is that we have an evolving ontology that can be

used, populated and updated periodically. It should be used by other applications as

well.

Procedure: It is not enough to have designed and developed the structure and

schema for the ontology, just as in the case of a good database design. Information

needs to be populated inside the designed ontology as well. Naıve users need help

and support in making use of the proposed ontology, either as a look up dictionary

or as a knowledge base. Our proposed Semantic Analysis Representations (SARs)

like the ECA rule ontology(section 6.5.6)and the DAM(section 6.5.4) are useful in

this stage as well. The SARs help the IS designers in their ontology creation role as

well as the end users to populate the designed ontology with relevant information.

We have carried out user-feedback surveys as well to assess the usefulness of our

SARs in these capacities. We discuss more on this when we present the specific case

studies themselves in section 8.9.

Maintenance of the designed ontology requires periodic housekeeping activities

on the part of the designer. New concepts may have to be added, redundant ones

removed, and existing ones modified. As stated, an ontology is a consensus model,

and it has to support flexible evolution. It should also support integration of other

existing sources, migration of data and information from older legacy systems and

data models and so forth.

Illustration: In our case scenario, we visualize that once our car ontology is de-

signed and running, we may have to extend it when a new car model with new

features arrives, or when a new car leasing mechanism or offer package is intro-

duced, or when a collaboration with another car rental agency is formed. In the last

case, we would need to interoperate with their information system.

This arena is a research topic in itself, and we do not delve deeply in to this

area,but visualize that our future research shall be guided in this direction.

The above mentioned guideline aims to help the IS designer in matching the

Information Systems specific design requirements, application functionality to on-

tology principles and methodologies from philosophy and AI. For steps G6- G8, the

Page 127: Ontology for Information Systems (O4IS) Design Methodology

5.3 Multi-tiered Domain Ontology Architecture 105

designer needs to also choose the tools and design environment from the available

state of the art. The choice depends on the type of ontology being developed. Some

of the common tools available today are Protege, Chimaera 3. We now move on to

presenting some of the other methods, models and architecture proposed in the O4IS

design methodology above. We begin with the logical architecture for the domain

ontology.

5.3 Multi-tiered Domain Ontology Architecture

A multi-layered architecture for designing the ontology is better than a single mono-

lithic structure as has been proposed by Guarino (1998), as summarized in sec-

tion 3.5. This allows faster development, easier maintenance and modification of the

ontology. Also it encourages re-usability by others for different applications. Again

this structure offers maximum flexibility in design. Again, as summarized by Wache

et al (2001), there are other approaches like the single ontology, multiple local on-

tology or hybrid ontology design architectures for the physical architectural organi-

zation of the proposed ontology. The designer may choose whichever of these three

physical architectural models that suits his application requirements. We propose

that additionally, we have a logical multiple layer design architecture for capturing

the domain ontology in a layered structure. The multi-tiered architecture is the pro-

posed input to the guideline 3: choosing the logical and physical architecture step in

our O4IS design methodology as highlighted in the figure in the margin.

We recommend a stratified logical architecture for domain ontology design based

on Guarino’s architecture called the Multi-tier Domain Ontology architecture. But

he recommends a layered ontology architecture only on the basis of ontological

content and generalisability. We extend Guarino’s proposal to include a multiple-

layered ontological structure within the domain ontology itself. We propose that we

further separate the conceptualization of a domain from generic to specific appli-

cation contexts, moving from the intensional to the extensional level as shown in

figure 5.8. At the top most generic ‘meta-level’ we would have concepts like entity,

Process, Actor which are applicable across many domains. Thereafter, we have

specific domain concepts as specializations of the above-mentioned concepts such

as Enterprise, Selling and so on. We further move on to the extensional level,

that is, defining the specific characteristics of these real world concepts as we wouldwant them to be. For example, Just-in-Time Trading is a specific individual who

is an B2B enterprise system. We would also define the trading policies like customer

discount options of Just-in-Time Trading here.

As we move from the top-most layer successively towards the lower layers, we

move from the generic to specific conceptualization of the targeted domain. We3 From Stanford University http://www.ksl.stanford.edu/software/chimaera/

Page 128: Ontology for Information Systems (O4IS) Design Methodology

106 5 Ontology for Information Systems Design Methodology

Fig. 5.8. Moving from Generic to Specific Domain Conceptualization

Fig. 5.9. Example for Multi-Tier Ontology

may adopt a top-down, middle-out or bottom-up approach for conceptualizing the

content of these multiple layers. The appropriate approach is to be decided in the

next step of the O4IS design methodology, namely guideline 4 - choosing a devel-

opment approach (section 5.2.5). We may have as many layers as required, but we

recommend at least three layers:- the top generic domain ontology, specific domain

ontology and the application or template domain ontology as seen in figure 5.9.

Some of the salient features of these three recommended layers are:

• Generic Domain Ontology: The top most layer is the generic domain ontology,

and it could even be generic across domains. We should use any of the existing

Page 129: Ontology for Information Systems (O4IS) Design Methodology

5.3 Multi-tiered Domain Ontology Architecture 107

standards or accepted domain-related ontology as the generic domain ontology.

For example, for our case scenario of a car-rental agency we could use a generic

domain ontology related to Vehicles or Transportation. If the scope of the tar-

geted domain necessitates it, then we could even add a further generic ontology

like SUMO 4 or BWW Ontology 5 or Open CYC.

• Specific Domain Ontology: The next layer, is a selected group of concepts and

terminologies specific to the chosen domain itself. In our case, our car ontology

and the related concepts of lease-rental form the specific domain ontologies. Note

that we could keep these two as separate domain ontologies or merge them as a

specific car-rental ontology. As can be seen from figure 5.9, our car ontology is a

specialization of the generic vehicle ontology, the lease-rental ontology is a spe-

cialization of the generic enterprise ontology. In this specific domain ontology,

we still do not add the application specific or the individual case information,

like the business policies of Quick Service Car rental agency, or the registration

numbers of the cars owned by Quick Service Car rental agency. The idea is to be

a specialization of generic concepts, but should still be reusable across other sim-

ilar contexts. The car ontology should be plugable with other similar car rental

applications, not only Peter’s car rental application.

• Application/Template Domain Ontology: The next layer will be more focused

to a particular local interpretation of the domain, and should be more application

oriented as well. Still specific implementation details would not be included here.

However, the business policies of Peter’s car rental agency would be modeled

here. This is the actual ontology which would be ‘connected’ and used in a web-

based application where Peter’s customers can browse, reserve, order cars for

hiring on the internet.

5.3.1 Advantages of the Multi-tier Domain Ontology Architecture

The multi-tier architecture is envisioned to provide the following advantages:

1 Portability: A structured model is easy to port, and plug and play with other

Information Systems applications. For example, another car dealer could take

only our car ontology and plug it with his existing vehicle ontology.

2 Reusability: By developing different levels of abstraction in the domain ontol-

ogy, we enhance reusability. Specific applications having specific needs and spe-

cializations will be restricted to the lower most ‘template’ or application ontol-

ogy. As we move up, towards the generic domain ontology, we increase the level

of abstraction, and hence increase reusability. A generic car ontology can be used

by another car dealer.

4 IEEE’s Suggested Upper Merged Ontology5 Bunge Wand Weber

Page 130: Ontology for Information Systems (O4IS) Design Methodology

108 5 Ontology for Information Systems Design Methodology

3 Easy to modify, update, de-bug and maintain: A modular design and devel-

opment is easy to modify and maintain as has been seen in the object oriented

design and development paradigm or the Model Driven Architecture.

4 Understandability: Since, we are promoting the use of conceptual models as

the first phase of the domain conceptualization, it goes without saying that a

logical stratification, reduces the complexity of such models. Thereby, making it

easy to read and decipher by humans.

5 Maximum flexibility: A layered structure allows flexible extensibility both in the

horizontal as well as the vertical directions. We can add more generic concepts

like time, space as defined in foundational ontologies or even more specific tem-

plates like for contractual forms and applications. We can extend horizontally,

by adding other related ontologies like say a travel ontology which can make use

of local car rental agencies.

5.4 Dual Conceptual Representation

As stated earlier, there are many different levels of conceptual representation of

ontologies ranging from informal textual representations to complex first order logic

formalisms. The choice for the suitable form of representation depends mostly on

the targeted users and the purpose for which the ontology is being developed. As

recommended in guideline 5 (section 5.2.6), we propose a dual representation of

domain concepts for the use in Information Systems as follows:

- Semi Formal Conceptual Model Representation: In the first step, we recom-

mend that we should capture and represent the domain knowledge as reusable

conceptual models. UML notation is one possible representation language for

modeling such conceptual models. We shall discuss more about UML and its role

as a conceptual modeling and ontology representation language in the following

section 5.4.1.

Formal OWL Representations: We recommend the subsequent transformation

of the conceptual models into machine readable formalisms like OWL, KIF or

any other logic language.

We agree that it may seem unnecessary or even extra work to first capture and

model the domain knowledge as conceptual models, and thereafter to redevelop

or implement as formal ontology. It may sound simpler to follow existing design

methodologies and straightaway implement the formal ontology. But, we would like

to reflect back to the key issues addressed in section 1.4, namely:

-• The use of ontology in Information Systems has to be promoted and made easy.

• We need to give explicit guidance to the IS designer in the design and use of

afore-mentioned domain ontologies.

Page 131: Ontology for Information Systems (O4IS) Design Methodology

5.4 Dual Conceptual Representation 109

• Information Systems are often reused and should facilitate easy extensibility, in-

teroperability with other Information Systems.

Given the above objectives, we hold the view that:

• Conceptual models are graphical and easy to understand and interpret amongst

the human IS designers.

• Most IS designers are familiar with entity relationship models and/or object-

oriented modeling, hence the slight shift towards ontological conceptualization

as proposed by our USP2 Design, is much easier to accomplish.

• Having captured domain knowledge as conceptual models, it is feasible to trans-

form the same into different ‘implementation’ representations like OWL, KIF or

FOL as may be required by the specific Information Systems application. Hence,

reusability is enhanced.

• Ontology based interoperability of Information Systems is one of today’s key

areas where ontologies are proposed to be used. In such contexts as well, an

intermediary conceptual model facilitates the interpretation and modification for

interoperability.

• Furthermore, the transformation from UML class diagram (conceptual models)

to formal ontology (OWL) has been the subject of discussion in works of Crane-

field (2001), Baclawski, Kokar, Kogut, Hart, Smith, Holmes, Letkowski & Aron-

son (2001), and Kabilan & Johannesson (2004). Also, we would like to point out

that current OMG standardization efforts like the Ontology Definition Metamodel

(ODM) supports the transformation of these conceptual models into formal lan-

guage.

We discuss more on the specific suitability of UML as conceptual modeling lan-

guage in the following section 5.4.1.

As we shall see in our case studies, if the targeted application does not warrant a

need for formal ontology, then our conceptual models are sufficient as semi-formal

ontologies. If our targeted application calls for reasoning and other logical expla-

nations, then, of course we transform our conceptual models into formal ontology

representations. In most cases, it should be feasible to have at least a semi-automatic

transformation from the conceptual models into formal ontology. Another advantage

is that it is possible for us to translate the same conceptual model into different for-

mal ontology languages as well.

And just as Sowa suggests, we propose that conceptual models, built using our

perspective-based design, will be able to include the expressive power of natural

language (lexical structures) in precise, unambiguous, and easy to understand con-

ceptual models. We may also utilize other lexical or logical analysis methods to

capture other aspects and pragmatics as well. The idea would then be to first build

or reuse if existing, other conceptual models, meta-models or ontologies as the ‘se-

Page 132: Ontology for Information Systems (O4IS) Design Methodology

110 5 Ontology for Information Systems Design Methodology

mantic building blocks’. Natural language, though expressive is not computable (i.e,

machine understandable). Conceptual models are a choice in between, they have

high degrees of expressivity and also support computability indirectly, since they

can be translated into computable ontology representations. In the following sec-

tion we look at one such conceptual modeling language, UML and its suitability for

the ontological conceptualization.

5.4.1 UML for Conceptual Modeling and Ontology Representation

We have discussed the advantages and suitability of UML as a conceptual modeling

language in a former publication (Kabilan & Johannesson 2004). UML has a large

number of users in the Information Systems domain due to its graphical, easy to

understand features. In contrast the domain of ontology experts is quite small and

it is not practical to expect the vast majority of non-ontology experts to learn new

ontology languages in order to translate or model new knowledge bases. UML con-

ceptual models are not only easy to understand and reuse but they also support easy

interoperability and/or integration with other ontologies.

Two of the main issues of knowledge representation are interoperability and

reusability. The key to resolve both issues is ‘semantics’ that is modeling and captur-

ing the meanings rather than representing knowledge in syntax and specifications.

We propose the use of UML class diagrams for representing the conceptual models.

We refer to UML class diagrams as UML conceptual models throughout this paper.

The advantages of UML as an ontology modeling language have been proposed by

Cranefield & Purvis (1999) and Baclawski et al (2001) as:

• It has a growing user audience in the software domain for object-modeling lan-

guages and other information systems design.

• The graphical notation for UML is easy to comprehend and use and is suitable

for human-to-human knowledge transfer. It has been designed for use and com-

munication between humans for software design purposes.

• UML can be extended to suit the need of ontology definitions.

• Object Constraint Language allows expression of rules and constraints. Crane-

field (2001) has proposed mappings to transform UML ontology models in to

RDF and to generate Java classes from UML using XSLT 6.

UML by itself is weak on the descriptive semantics part. It uses as many as twelve

different diagrams to capture different aspects of semantics. Other disadvantages or

weakness of UML have been investigated by other researches like for example the

use of referentially redundant modeling constructs has been discussed by Opdahl &

6 http://www.w3.org/TR/xslt

Page 133: Ontology for Information Systems (O4IS) Design Methodology

5.4 Dual Conceptual Representation 111

Henderson-Sellers (2005). The most commonly used notation is that of UML class di-

agrams for modeling the static descriptive concepts (terminologies) of an ontology.

Additional constraints maybe captured through the use of OCL(Object Constraint

Language). As we see with the ODM (Ontology Definition Metamodel) (2006) ef-

forts, the use of metamodels has been introduced to increase the semantic capability

of UML class diagrams. As yet, the dynamic and organizational aspects captured by

UML activity diagrams, state charts,and synchronization diagrams, have not been

utilized or mapped to equivalent ontological transformations.

R To overcome this issue, we have made use of UML class diagram

(conceptual model) as the representation template to capture the other as-

pects as well. We have proposed a set of conceptual models for specific be-

havioral, procedural or pragmatic aspects of domain knowledge, as we shall

see in section 6.5. By this, we are able to capture the dynamic, procedural

aspects in the UML class diagram notation to a certain extent.

Baclawski (2001) has compared the advantages and disadvantages of UML as

an ontology modeling language over other ontology language specifications like

RDFS 7, and DAML 8. The UML conceptual models may also form the base for rigidly

formal ontology definition formats like KIF(Knowledge Interchange Format).

With that we come to the end of this chapter. We shall continue our discussion on

the suitability of UML as a conceptual modeling language throughout this thesis. We

now present our conceptualization design methodology for capturing the semantics,

procedural and pragmatics of a domain in the next chapter.

7 Resource Description Framework Schema. http://www.w3.org/TR/rdf-schema/8 Darpa Agent Markup Language, the original language which has been adopted in the OWL

specification. http://www.daml.org/

Page 134: Ontology for Information Systems (O4IS) Design Methodology
Page 135: Ontology for Information Systems (O4IS) Design Methodology

v 6

Unified Semantic Procedural Pragmatic Design

Most enterprise and business process ontologies model static concepts, i.e. en-

durants. Dynamic concepts, i.e. perdurants, such as change or process, need to be

conceptualized in a way to enable modeling of automated business processes. En-

terprise Ontology project (Uschold et al. 1995) and Guarino’s approach (1998) have

addressed the issue of capturing the procedural aspects of the domain. They advo-

cate a separate activity ontology (Enterprise Ontology) or task ontology (Guarino’s

ontology architecture).

Guarino’s proposal of task ontology or the MIT process handbook ontology 1, or

the Activity ontology of the TOVE ontology suite, each manages to represent the

concepts behind these procedural domain knowledge. However, the design method-

ologies themselves are not explicit on how a designer should analyze a domain and

how the IS designer should choose which particular aspect of a task is to be a con-

cept, which business constraint is to be modeled as an axiom, what is to be expressed

a rule, what is to be a concept characteristic and so on. As discussed earlier, every

domain has many perspectives including the semantics, dynamic procedural aspects

as well as intended meaning or pragmatics. We need to conceptualize all these as

descriptive ontology. We motivate the need for a coherent semantic, procedural and

pragmatic analysis by considering an illustrative example, consider a business sce-

nario:

In a fast food burger restaurant, it is customary that the customer views the

menu, makes his choice, goes and places his order, pays for it, receives his food.

Identifying the main domain concepts in this business scenario is simple: cus-tomer, fast food restaurant, salesperson, food, money, order, menu. But we also see

that there are more business activity-oriented concepts like, the customer places or-der, salesperson issues bill, customer pays bill, salesperson delivers food, customer eatsfood. Each of these ‘actions’ may consist of several actions in themselves. That is,

1 The MIT Process Handbook is a project to develop extensive library of business processconcepts and currently defines over 5000 business activities. It can be browsed online athttp://process.mit.edu/Default.asp

Page 136: Ontology for Information Systems (O4IS) Design Methodology

114 6 Unified Semantic Procedural Pragmatic Design

they are what we know as business processes. For example, delivering food could

include prepare food, package the food, add cutlery, add condiments.The MIT process handbook ontology describes a series of such common business

activities and processes like make, sell, and produce, etc. In fact, they follow the

SCOR models 2. But, how do we model the other aspects like that the customer

places order first and then pays and then gets food so on ? This ‘sequencing’ of

events is normally represented using notations like UML activity diagram, Event

Process Chain diagrams, petrinets, Business Process Modeling Notation or any other

such business process or workflow modeling language (see summary in section 4.6).

It is also possible to capture the constraints, like that The customer shall be served hisfood within 15 minutes or else the restaurant returns the money.

Or say, that the customer can pay by credit card only if the amount to be paid ismore than 10 euros.

The issue at hand is,

How do we express the semantic, procedural and pragmatic aspects de-

scriptively in an ontology?

R Our answer to the above question is the Unified Semantic Procedural Prag-

matic Design that is a methodology which instructs Information Systems designers

to visualize, conceptualize and represent the domain knowledge from the above

mentioned perspectives. The USP2 Design also puts forward and makes use of a set

of Semantic Analysis Representations that are conceptual analysis patterns for the

Information Systems designer to use in the analysis of the different domain aspects

and to model them in the design phase of the domain ontology. The same may also

be used as analysis patterns and tools by the end user while populating or using the

designed ontology. The USP2 Design methodology may be used by any IS designer

on its own or as a sub methodology included in the overall O4IS design methodol-

ogy as is the case in this research. The USP2 Design does make use of the design

decisions made in the O4IS design methodology from G1 to G5. The USP2 Design

covers the G6 to G8 steps in the O4IS design methodology, namely that of knowl-

edge analysis, conceptualization and representation. As such, this is one of the key

contributions of this research.

Figure 6.1 illustrates the structure for this chapter. We begin with an overview

of the USP2 design in section 6.2. Then, we summarize the related theory for the

USP2 Design in section 6.3 and section 6.4. After having introduced the reader to

the background, we present our Semantic Analysis Representations (SARs) for se-

mantic analysis of different perspectives. These patterns and models are used as

inputs for the analysis to be done in the USP2 Design. Finally we present each of the2 The Supply-Chain Operations Reference-model (SCOR) is a process reference model that

has been developed and endorsed by the Supply-Chain Council as the cross-industry stan-dard diagnostic tool for supply-chain management.http://www.supply-chain.org

Page 137: Ontology for Information Systems (O4IS) Design Methodology

6.1 Semantics, Procedures and Pragmatics 115

semantic, procedural and pragmatic concept view along with detailed guidelines for

conceptualizing each of them in section 6.6, section 6.7 and section 6.8 respectively.

Fig. 6.1. Disposition of Chapter: USP2 Design

6.1 Semantics, Procedures and Pragmatics

Analyzing and representing behavior and procedures in Information Systems is not

uncommon. Procedures, behaviors and pragmatics have been addressed in Infor-

mation Systems using different data modeling (Data flow diagrams, event process

chains, UML activity diagrams) or process modeling languages, as also briefly re-

viewed in section 4.6. Additionally, Weirenga and Meyer (1993) have provided a

concise survey and review of deontic logic based applications in computer science.

Grosof (1999) in his RuleML work points out that the traditional method of mod-

eling business is a procedural where we capture the rules and policies as data level

validations and pre-conditions and post conditions for user actions and triggers. He

advocates a change in rationale for conceptualizing the behavioral and procedural

aspects as a logical axiom and rule not on data level but on the semantic object level.

Colomb (2002) proposes the use of conceptual models to represent the endurants,

and suggests that behavior and procedural aspects (what we call as perdurants in

ontology modeling) are captured using use case scenarios, collaboration diagrams,

activity diagrams and state-chart diagrams in UML conceptual modeling. However,

this design/ modeling approach:

• Does not provide a coherent visualization of the entire domain of interest that is,

each of the diagrams provides a partial information and we need to go through all

the diagrams to get the whole picture. It does not support easy communicability,

sharing between human users.

• Does not help in making implicit information explicit, like the causal reasons or

effects behind the occurrence of the perdurants, or factors producing effects in

the current domain of interest but whose origin may itself be outside the current

scope of the domain. For example, how would we represent that the customer

orders food because he is hungry? How should we model that food being served

Page 138: Ontology for Information Systems (O4IS) Design Methodology

116 6 Unified Semantic Procedural Pragmatic Design

cold is ‘unsatisfactory’ to the customer? What about the implicit understanding

that the food should have been prepared in hygienic environment?

• As yet there is little or no research on mapping/translating other UML diagrams

except class diagrams in to machine readable OWL.

Some possible alternatives to this issue of capturing, analyzing and representing

the procedural and pragmatic aspects of the domain could be:

1 The W3C recommendation would be to model some of the business constraints

as rules using the Semantic Web Rule Language (SWRL).

2 We could also use the new OMG proposal for Semantic Business Vocabulary and

Rule Ontology (SBVR)(OMG & Group 2006) 3.

3 The OWL-S Process Ontology 4 is another promising candidate for analyzing and

representing behavior as ontology concepts.

4 Grosof et al.’s (1999) work on RuleML, his continuing work on business contracts

in SweetDeal (Grosof & Poon 2003).

5 Related research in the field of deontic logic and other logical description of

rules, procedures, including those analyzing and capturing the specifics of busi-

ness obligations. We review some of them in the first case study related with the

business contract domain, in section 7.2.

We derive inspiration from the above mentioned related research, specifically the

OWL-S Process Ontology. To use any of their proposed techniques, languages, we

believe, that a methodology is needed which will help the IS designer in choosing

which of these techniques is best suited and which aspects of the domain can be best

modeled using them.

R In this research, we argue that an ontological modeling of a domain

should not only list the static concepts (endurants) and their relationships, but also

the perdurants as a basis for conceptual modeling of the domain. To capture and

represent the domain knowledge,we propose a structured, perspective based ap-

proach, Unified Semantic Procedural Pragmatic (USP2) Design. The USP2 Design

recommends an IS designer to analyze the domain from different perspectives for

extracting the semantics; the procedural behaviors, and implicit pragmatics. There-

after the analyzed information is expressed them as explicit conceptual models.

3 This specification defines the vocabulary and rules for documenting the semantics of busi-ness vocabulary, business facts, and business rules; as well as an XMI schema for the in-terchange of business vocabularies and business rules among organizations and betweensoftware tools.

4 W3C recommended Web Ontology Language for Services. Consists of a set of ontologies in-cluding Service Ontology, Process Ontology, Profile Ontology, Grounding Ontology, LogicalExpression Constructs, List Constructs, Actor Ontology and Profile additional parameters.Detailed description may be referred to at http://www.w3.org/Submission/2004/07/

Page 139: Ontology for Information Systems (O4IS) Design Methodology

6.2 Introducing the USP2 Design 117

6.2 Introducing the USP2 Design

We propose that we analyze the same domain from different perspectives to get

the semantic concepts(vocabulary), the procedural dynamics(behavior, rules, con-

straints), and the pragmatics (how, why, reason, cause-effect) of the domain. For

each of the perspectives, we discuss the available approaches and techniques for

carrying out the analysis. We also present a set of conceptual models (Semantic

Analysis Representations, introduced in section 6.5) that may be used as patterns

for aiding the analysis process. For example, we propose the ECA Rule Ontology as a

pattern for analyzing the business operative rules using the Event Condition Action

paradigm.

Most of the domain knowledge is usually available as natural language descrip-

tions. The goals of natural language understanding and semantic conceptualizations

of domain knowledge representations, as investigated by Sukkarieh (2001), are sim-

ilar to those of ontology design goals and objectives in Information Systems as men-

tioned earlier. Yet, there exists a gap in design methodology how this extraction

of explicit and implicit knowledge from natural language can be represented and

modeled as conceptual models.

Conceptual models as knowledge representation models are generally graphical

and easy to understand. So for this research, we restrict ourselves to the context of

natural language (English language) interpretation to knowledge representation as

conceptual models.

Fig. 6.2. Unified Semantic Procedural Pragmatic Perspectives

Page 140: Ontology for Information Systems (O4IS) Design Methodology

118 6 Unified Semantic Procedural Pragmatic Design

We propose that a designer should ‘view’ the natural language descriptions of

the domain under consideration from different perspectives (objectives) and model

each of them separately as a conceptual model. Finally, these can be combined to

form a single formal (machine readable) knowledge representations. The proposed

views are, as illustrated in figure 6.3:

• The Semantic Concept View describes the knowledge (declarative knowledge)

about the world and its fact repository. In the example illustrated in figure 6.2,

we have a customer ordering a burger meal at a fast food restaurant. Examples

of semantic concepts involved in this scenario are burger, money, pay, and order.

• The Procedural Concept View describes the knowledge (procedural knowledge)

about the emotional states, intentions, plans and rules. In figure 6.2, illustrative

examples of procedures could be the ordering of food, the cooking of the burger,

food being delivered and the customer paying for food and so on. As we see, they

utilize the semantic concepts.

• The Pragmatic Concept View describes the knowledge about the implied inten-

tions, modalities of obligations and pragmatics of action. Again in figure 6.2 we

see that there are inherent business policies at work, say for example, customer

satisfaction is guaranteed and so if the food is not satisfactory, the restaurant

promises to refund the money.

R The USP2 Design endeavors to aid in the analysis of natural language

and model them as reusable knowledge representations (conceptual models). As

discussed in chapter 4 earlier, these form analysis patterns in themselves, as they

guide a designer in analyzing a given domain from a certain perspective. In addition

we also propose a set of patterns for the analysis of relationships between concepts

called Semantic Analysis Relationships (SARs) that are conceptual modeling pat-

terns following the suggestion from Cabot & Raventos (2004) as discussed earlier

in section 4.5.1. Currently we propose the following categories for the SARs (to be

discussed in section 6.5):

i Structural relationships.

ii Functional relationships.

iii Temporal relationships.

iv Prescriptive relationships

v Deontic relationships.

R The aim of this perspective based design approach is to help the non-

ontology expert, information system designer to methodically review the domain

under consideration to extract, analyze and represent the concepts and their mean-

ing (semantics), their intentions (pragmatics) and plan of action (procedural knowl-

edge). Just as Sowa (1999) suggests, we propose that conceptual models (built using

Page 141: Ontology for Information Systems (O4IS) Design Methodology

6.3 Verb Phrase Ontology 119

our perspective based design) shall be able to include the expressive power of nat-

ural language (lexical structures) in precise, unambiguous, and easy to understand

conceptualizations. The final set of conceptual models obtained as a result of the

USP2 Design need not be separate individual perspectives, but a composite view,

where the analysis of each perspective is added on to the concepts from the other

views. Figure 6.3 illustrates the idea more clearly. As seen in the Venn diagram the

semantic concept view forms the universal set of domain vocabulary, where the Pro-

cedural and Pragmatic concept views are subsets describing specific aspects of the

domain.

Fig. 6.3. Semantics-Procedures-Pragmatics Domain

But before we present the USP2 Design, we summarize some related work that

has been adopted in our research, namely Storey & Purao’s (2004) the verb phrase

ontology (section 6.3) and Vanderveken & MacQueen’s (1990) semantic analysis of

performative verbs (section 6.4).

6.3 Verb Phrase Ontology

Veda Storey and Sandeep Purao have proposed a verb phrase ontology for classifying

the semantic relationships that can exist between entities in the real world. Their

objective is to:

Propose an ontology for understanding the semantics of relationship verb phrases

by mapping verb phrases to various categories that capture different interpretations.

Their verb phrase ontology has three classification levels as shown in figure 6.4,

namely:

Page 142: Ontology for Information Systems (O4IS) Design Methodology

120 6 Unified Semantic Procedural Pragmatic Design

Fig. 6.4. Semantic Relationships: Classification Levels

• Fundamental categories: These represent the natural division that can be seen

in the real world. There are three basic types of fundamental categories: sta-

tus, change of status and interaction. We summarize these separately below in

section.

• Local (internal) categories: This category takes into account the specific nature

of the entities surrounding the verb phrase. Storey and Purao classify entities in

to three possible types: actor, action and artifact. Actors are entities capable

of performing actions. Action represent the performance of the acts specified.

Artifacts are inanimate objects that are not capable of independent action. In

the local context, the primitives from the fundamental categories are constrained

into groups of valid combinations.

• Global(external) categories: The third level is used to capture the external

domain in the context of which the verb phrase is used. For example, let us

consider the verb opens in the context of a room. Student opens door has a

different meaning than in the context of a banking domain, where Customer

opens account. In the first example, the domain is mapped to the primitive

manipulates. In the second example, the domain is mapped to is-owner-of.

They begin by identifying some fundamental categories for relationships: status;

change in states; and interaction.

Page 143: Ontology for Information Systems (O4IS) Design Methodology

6.3 Verb Phrase Ontology 121

Fig. 6.5. Status primitives from Verb Phrase Ontology

• Status: They define Status to be the orientation of one entity towards another

entity, e.g. A <is-owner-of> B. As seen in figure 6.5, some of the primitives they

have put together from their literature survey and extended include structural,

influential, temporal, spatial and attitudinal.

• Change of status: change of one entity with respect to another: A <becomes

-owner-of> B. (this is particularly relevant for us since we wish to identify dy-

namic or changing states and relationships.

• Interaction: describes the communication between entities that does not result

in a change of state, like in the case of messaging,A <sends- message-to> B.

Detailed classification can be seen in figure 6.6.

Status describes an enduring relationship between two entities which does not

undergo any change in time. Change of status describe transient relationships where

the relationship between two entities undergoes a change into another kind of re-

lationship. Interactions are used to describe notable effects or results of some rela-

tionship being changed or processed.

R We agree with the classification levels as proposed by Storey and Purao.

We adapt their verb ontology by (i) re-grouping the primitives under a different

perspectives, and (ii) specifying the local context for their fundamental categories.

We hold the view that the local context that we have specified is still generic

across different domains, some of them being action-oriented and some entity-

Page 144: Ontology for Information Systems (O4IS) Design Methodology

122 6 Unified Semantic Procedural Pragmatic Design

Fig. 6.6. Interaction primitives from Verb Phrase Ontology

oriented. We have regrouped the fundamental categories with respect to our three

perspectives: semantics, procedures and pragmatics. We use these as a set of analy-

sis patterns for the conceptual modeling of the domain. We shall discuss more about

Storey & Purao’s (2004) work when we present our guidelines for the USP2 Design.

Storey has mainly used this semantic relationships and ontological foundations to

propose an improved database design. We make use for her ideas to facilitate the

semantic analysis for ontology modeling.

6.4 Performative Verb Ontology

As we shall see later, performative verbs are said to belong to five fundamental

categories, namely, assertives, commisives, directives, declaratives and expressives.

Vanderveken has carried out a semantic analysis of about 200 odd English perfor-

mative verbs, and we have based our performative verb ontology primarily on his

work.

The basic semantic pattern is of the type Actor <Performative Verb Primitive

> Actor, The Entity 1 actor is termed as ‘Speaker’ or ‘Performer’,and the entity2 ac-

tor is termed as ‘Hearer’ or the ‘Target’ in the context of the pragmatic analysis that

we are currently doing. Some illustrative examples are listed in table 6.1.

As we shall discuss in section 6.5.4, the speech act theory analyzes the intentions,

beliefs of the actors involved in any social communication. This provides us the con-

textual domain which is to be analyzed and represented in the pragmatic concept

view. As stated earlier, the Pragmatic Concept View and the analysis for the contex-

tual interpretations is necessary, only if the targeted application for the proposed

ontology demands it.

Page 145: Ontology for Information Systems (O4IS) Design Methodology

6.4 Performative Verb Ontology 123

Table 6.1. Examples of Performative Verbs

Performative Verb Type ExampleAssertive The seller notifies the buyer that his ship-

ment is ready.Commissive The student promised to complete his as-

signments by the end of the week.Directive The government has asked all citizens to

file their income tax returns by May.Declarative The judge granted pardon to the defen-

dant.Expressive Peter congratulated John on his new

chairmanship.

In this section, we now introduce the Performative Verb Ontology as a pattern

or analysis tool for the Information Systems designer to use for extracting these

pragmatic aspects from the domain of interest.

The fundamentals of speech acts was laid by Austin (1962) who proposed that

semantics of uttered words was more than the literary meaning of the words them-

selves. A constative or locutionary act involves the utterance’s proposition or its

propositional content. However, one has to go beyond the propositional content

of the utterance when one wishes to see the language -action perspective that is

performatively. A term used in relation to the performative, is the illocutionary

act, where one uses an utterance to perform a speech act. An illocutionary

act also has an effect on the hearer. Austin calls this effect the perlocutionary act.The

intended illocutionary force of the imperative ‘Send me 3 dozen bananas by Friday’,

for example, is implicit, as what the speaker has in mind by saying it is not specifi-

cally indicated. The implicit nature of the contract clause given above may be inter-

preted based on the paralinguistic or kinesic cues given by the speaker, and on the

power or status relationship between the speaker and hearer, as either a command

or a request. In order for the speaker to make the illocutionary force explicit, he or

she has to indicate the speech act involved by adding the performative verb before

the clause.

Our work adopts and extends Vanderveken & MacQueen’s (1990) work on the se-

mantic analysis of English performative verbs. Vanderveken sets out to understand

the correspondence and distinctions of the speech act verbs with their performa-

tive uses, their illocutionary force and the directed use of these speech acts. The

basic model followed for the speech act verb is of the form Speaker <speech act

verb> Hearer. Vanderveken aims to understand the paradigmatic central illocution-

ary meaning of the speech act verbs, henceforth referred to as Performative Verbs in

this thesis. He has put forward an in-depth study, and semantic (taxonomy) classifi-

cation of over 200 English performative verbs.

Page 146: Ontology for Information Systems (O4IS) Design Methodology

124 6 Unified Semantic Procedural Pragmatic Design

John Searle (1969) in his taxonomy of speech acts proposes a set of illocutionary

points and Vanderveken has carried out his semantic analysis of English performative

verbs under the same classification:

• Assertives: Represent how things are in the world. Examples from Vanderveken’s

analysis: Assert, Reassert, Negate, Deny, Correct, Claim, Declare, Hypothesize,

Criticize, Complain, Notify, Inform, Predict.

• Commissives: Commit oneself to carrying out a future action in the world.Examples

from Vanderveken’s analysis: Commit, Pledge, Undertake, Engage, Promise,

Threaten, Vow, Assure, Reject, Refuse, Offer, Counter-Offer, Dedicate.

• Declaratives: Perform an action in the world by saying that the one is doing

it. Examples from Vanderveken’s analysis: Declare, Renounce, Grant, Sentence,

Cancel, Convene, Sanction, Disapprove, Repudiate, Licence, Vote, Nominate,

Sustain, Install, Open.

• Directives: Try and get someone else to act(perform) in the world. Examples

from Vanderveken’s analysis: Direct, Request, Ask, Question, Inquire, Interro-

gate, Discourage, Appeal, Petition, Claim, Order, Prescribe, Enjoin, Endure, Au-

thorize, Propose, Warn, Allow, Permit, Commission, Command, Advise, Suggest.

• Expressives: Express attitudes concerning supposedly existing facts in the world.

Examples from Vanderveken’s analysis: Approve, Compliment, Praise, Laud,

Complain, Boast, Rejoice, Cheer, Blame, Congratulate, Thank, Condole.

In his work, Vanderveken has analyzed around 70 assertives, 32 commissives, 56

directives, 85 declaratives and 28 expressives. Of course, some performative verbs

belong to more than one fundamental classification depending upon its performa-

tive use. We have compiled his work as an ontology using Prot’ege ontology edi-

tor. This facilitates easy reuse for the designer who can to use this as a look up or

reference model. Further more, in addition to recreating Vanderveken’s proposed

classification, we have semantically enriched the Performative Verb Ontology with

WORDNET as a linguistic resource. Therefore, the performative verbs have been de-

fined with the English word sense and at the same time, we have also semantically

enriched the Performative Verb Ontology by mapping to other synonym verbs,which

were not initially included in Vanderveken’s work.

Figure 6.7 depicts the semantic tree extract for part of our implementation of the

Performative Verb Ontology in Protege.

Page 147: Ontology for Information Systems (O4IS) Design Methodology

Fig.

6.7.

Perf

orm

ativ

eVe

rbO

ntol

ogy

Page 148: Ontology for Information Systems (O4IS) Design Methodology

126 6 Unified Semantic Procedural Pragmatic Design

6.5 Semantic Analysis Representations: Discovering SemanticRelationships

In this section, we now present the set of semantic analysis patterns for relation-

ship analysis that aim to make explicit domain knowledge. These are visualized as

sets of conceptual models or semantic patterns which should enable an information

system designer in making consistent design and modeling choices. The aim is that

by using such conceptual modeling patterns(as proposed by Cabot and discussed in

section 4.5.1) we have the following advantages:

(a) It becomes easier for an IS designer to design and conceptualize the domain.

(b) it reduces the subjective bias that each designer may have, thereby producing

consistent conceptualizations.

R Our proposed conceptual modeling patterns that we collectively call the

Semantic Analysis Representations, primarily aim at classifying, discovering and

establishing the different types of relationships, interactions, dependencies that exist

between the concepts (entities) of a given domain of interest. Some of our concep-

tual analysis models are represented using tabular text, some as UML conceptual

models, and some as OWL ontology. At present, we have proposed the following set

of SARs:

• Structural Relationships: Relationships between entities that may exist between

actors, roles or artifacts (following Storey’s definition) that define the taxonomi-

cal, or physical or constructive relationship.

• Functional Relationships: Relationships that semantically describe the func-

tional associations like cause-effect relationships.

• Temporal Relationships: Relationships between actions that describe the tem-

poral logical sequence for execution or enactment.

• Deontic Relationships: Relationships that describe social acts and the intentions

of the actors in a social world. It also included the speech act based deontic

relationships that are implicit in such social behavior context.

• Prescriptive Relationships: Relationships that are dynamic, behavior oriented

and often are normative declarations. Also includes constructs for rules.

Of the above, the first two are based on Storey and Purao’s work. The third ex-

tends their basic temporal relationships with linear temporal logic constructs, the

fourth is our proposal to capture the domain deontic using Deontic Analysis Model

and the fifth is our proposal to capture prescriptive behavior using Event Condition

Action logic. The first three semantic relationships mentioned above are formulated

as tabular patterns for the Information Systems designer to look-up and use as ap-

propriate in the described Semantic Concept View or Procedural Concept View as

we shall see later. The last two, namely, the deontic relationship and the prescriptive

Page 149: Ontology for Information Systems (O4IS) Design Methodology

6.5 Semantic Analysis Representations: Discovering Semantic Relationships 127

relationship are visualized as UML conceptual models and in addition to being help-

ful analysis models, they can also be used as knowledge storage formalisms, as we

shall see later in our case studies.

6.5.1 Structural Relationships

R In table 6.2 we propose for the context of ontology modeling, the valid

combinations of entities to be related by the status primitives. The general pattern

is <entity1 -verb- entity2> where entity1 and entity2 may be actors, objects or

attributes, as shown in table6.2:

Table 6.2. Structural Relationship Patterns

No. Entity1 Entity2 Valid Status Primitives Example

1 Object Object is-part-of Car < has > Body2 Object Attribute is-part-of Car < has > Color3 Object Object is-instance-of Video Tape < is-a-copy-of >

Movie4 Attribute Attribute is-instance-of Red < is-instance-of > Color5 Actor Actor is-member-of Player < is-member-of > Ice

Hockey Team6 Object Object is-version-of Draft < is-version-of > Thesis

6.5.2 Functional Relationships

R We propose a set of valid functional relationship patterns based on Storey

and Purao’s work as shown in table6.3. Functional relationships are of the generic

pattern Actor/Object–verb– Actor/Object/Action.

R We have restricted the allowable combinations for the entities to be re-

lated by the primitives of Interaction, Status fundamental primitives. Of the valid

set of combinations, we have a set of valid primitives for associating action –verb–

action functionally as seen in table 6.4. These are useful to identify the procedural

sequencing of actions based not on their temporal order but on the logical order and

preconditions.

Page 150: Ontology for Information Systems (O4IS) Design Methodology

128 6 Unified Semantic Procedural Pragmatic Design

Table 6.3. Functional Relationship Patterns

No. Entity1 Entity2 Valid Primitives Example

Interaction CategorySub Category: Not Causing Change1 Actor Object View Status Analyst <analyses> Requirements2 Actor Object Select Customer<selects> Car3 Actor Actor Communicate Buyer<talks-to> Seller4 Object Object Communicate Modem < negotiates-with> Telephone Line5 Actor Object Perform Buyer <accepts> GoodsSub Category: Performance6 Actor Action Perform Buyer< does> Buying7 Actor Object Operates Pilot <flies> Aircraft8 Actor Actor Serve Salesperson < serves > CustomerSub Category:Causing Change9 Actor Object Manipulate Examiner <grades> Exams10 Actor Object Transmit Bank <remits> Money11 Actor Object Receive Buyer <receives> ShipmentStatus CategorySubcategory: Temporal12 Action Action Follow/Precede Car Rental <follows> Car Booking13 Action Action Requires Construction <requires> ApprovalSubcategory: Spatial14 Object Object is-next-to Finland < is-neighbor-to > Sweden

Table 6.4. Action-Action Functional Relationships

Action1-Relationship-Action2

Explanation

is a sub action of action 2 is carried out as a sub task of action 1in order that action 1 is to be done in order that action 2 may be per-

formedis an alternative to Action1 may substitute action2in response that action 1 is carried out in response to action 2is a prerequisite for action1 must be completed as planned before the com-

mencement of action 2is a template for action 1 is an example for action2 to conform to.is the cause for action 1 is the cause for action 2uses as a reference Constitutes relationships between plans, orders or requests

Page 151: Ontology for Information Systems (O4IS) Design Methodology

6.5 Semantic Analysis Representations: Discovering Semantic Relationships 129

6.5.3 Temporal Relationships

Based on the linear temporal logic theory, we have a set of possible semantic patterns

for associating any two actions as shown in the figure 6.8. As we can see we have two

sets, one for an closed time intervals and another for open time interval (figure 6.9).

If A and B are two events or actions, then for closed time intervals, we can have

the following possible temporal relationships as in figure 6.8.

If A and B are two events or actions, then for open time intervals as in figure 6.9.

Page 152: Ontology for Information Systems (O4IS) Design Methodology

130 6 Unified Semantic Procedural Pragmatic Design

(a) A starts and ends after B (b) A ends after B

(c) A starts and ends after B (d) A ends after B

(e) A starts and ends beforeB

(f) B starts and ends before A

(g) A starts after Bstarts and ends when Bends

(h) A starts after B starts andends when B ends

(i) A starts when B startsand ends after B ends

(j) A starts when Bstarts and ends be-fore B ends

(k) A starts before B starts andends after B ends

(l) A starts after B starts andends before B ends

(m) A starts whenB starts and endswhen B ends

(n) A starts before B startsand ends before B ends

Fig. 6.8. Temporal Relationships for Closed Intervals

Page 153: Ontology for Information Systems (O4IS) Design Methodology

6.5 Semantic Analysis Representations: Discovering Semantic Relationships 131

(a) A starts before B starts (nostatement about endings)

(b) A starts after B starts (nostatement about endings)

(c) A starts before B ends (nostatement about A ending or Bstarting)

(d) A ends after B starts (no state-ment about A starting or B ending)

(e) A ends before B ends (no state-ment about starting)

(f) A ends after B ends(no statement aboutstarting)

(g) A ends before B starts (nostatement about A starting or Bending)

(h) A starts after B ends (nothing aboutA ending or B starting)

Fig. 6.9. Temporal Relationships for Open Intervals

6.5.4 Deontic Analysis Model: Deontic Relationships

Jones and Sergot (1992b) have proposed that at the appropriate level of abstrac-

tions – law, computer systems and other organizational structure may be viewed as

instances of normative systems. They define ‘norms’ as prescriptive descriptions of

how agents ought to behave and specify their permitted behavior and rights. They

go on to argue that deontic logic needs to be considered whenever it is necessary

to make explicit, and to reason about, the distinction between ideality and actual-

ity. Since deontic logic has its origin in the study of law and its ethics, there have

been a number of researches carried out in the field of applying deontic logic to

the legal knowledge representation, as has been surveyed by Sergot (1990). Jones

and Sergot (1992a) have also proposed a methodology for legal representation us-

ing deontic logic. We do not delve deeply into the formal deontic logic analysis or

formalizations as that are not mandatory for building conceptual models, since the

targeted purpose is that of an Information Systems application where a formal de-

ontic logic expression may not be needed. Also, IS designers, who are the targeted

users for the proposed design methodology and Deontic Analysis Model, are not

Page 154: Ontology for Information Systems (O4IS) Design Methodology

132 6 Unified Semantic Procedural Pragmatic Design

required to be formal logicians. So, we restrict ourselves to the deontic analysis of

natural language prescriptions with the objective of knowledge representation as

conceptual models.

The root of our DAM is the Act concept, since we are interested in the world of

human actions and behavior. Actions are carried out due to some purpose, in some

context by some actor (in our case humans, could be individuals or enterprises). Act

could be carried out by an actor for himself, as a Solitary Act or as in most cases,

as a Social Act. Social Acts are those actions carried out by actors as a result of

interaction between different actors for some given purpose. Each Social Act aims

to create a Deontic Proposition which is the linguistic expressed communication

or statement which proposes the nature, mode, intentionality to fulfill of the act.

A Deontic Proposition has a type of assertion, Deontic Assertion, which in-

dicates the nature of the proposition being made. The exhaustive lists of basic De-

ontic Assertions are Obligation, Permission, Prohibition and Rights. Other as-

sertions like request, desire, and guarantee may all be subsumed in to these basic

Deontic Assertions. Deontic Propositions have a core meaning which is usually rep-

resented by a verb that is the act, for example, to pay, to send, to receive, and to ac-

knowledge. Our proposed DAM is populated with a list of performative verbs based

on the work of Vanderveken (1990). Though Vanderveken has based his proposal on

the speech act theory, we see that the interpretation of the performatives is similar to

the deontic verb interpretation as proposed by Bucciarelli and Johnson-Laird (2005).

We map our Performative Verb Ontology to the DAM when we implement the same

in Protege ontology editor.

The degree of intention to fulfill the said deontic proposition is expressed through

the use of modal verbs in language. We represent this notion as Deontic Modality

in our DAM. We discuss Deontic Modality in details in section 6.5.4. The deontic

assertions themselves have possible sets of deontic modality associated with each of

them. Deontic Propositions are performed by through Acts.

Acts maybe business activities, or communicative activities, but they may use,

produce or somehow affect changes in other entities like Resource. In a business

trade domain, the purpose of carrying out business activities would be to gain

some value in their resources, like exchanging goods for money. Social Acts create

Social Relations, and Deontic Proposition is one kind of Social Relation.

Other examples may be of institutional propositions like marriages. Acts create a

certain State of Affairs that is defined as a change in the world of discourse due

to the act being performed. An example could be, I pay you 100 euros, (which is the

Deontic proposition) and as a result of the Act (pay) the State of Affairs now

becomes that (1) I am poorer by 100 euros (2) You are richer by 100 euros. State of af-

fairs may themselves be Deontic Propositions, or a change in the state of a particular

deontic proposition. In other words, we see that the state of affairs sets up precondi-

Page 155: Ontology for Information Systems (O4IS) Design Methodology

6.5 Semantic Analysis Representations: Discovering Semantic Relationships 133

-

Fig.

6.10

.Deo

ntic

Ana

lysi

sM

odel

Page 156: Ontology for Information Systems (O4IS) Design Methodology

134 6 Unified Semantic Procedural Pragmatic Design

tions for other deontic propositions to be created, after the first deontic proposition

has been created by a social act. Also, we can visualize that deontic propositions

may result as a post condition of actions.

Deontic Proposition may be abstractly classified as being basic, nested (complex)

or conditional deontic propositions. (Not depicted in figure 6.10). The simplest case

or the basic Deontic Proposition is when there is a single intention of action

is communicated. A complex Deontic Proposition results when a primary deon-

tic proposition creates or implies a secondary (nested) deontic proposition and so

on. A conditional Deontic Proposition consists of at least two individual basic

deontic propositions, wherein one of them is a predecessor and the effect of that

necessitates the second deontic proposition to be created. Thus we model this no-

tion of deontic propositions being created, fulfilled, and conditional, etc., as deontic

states.

Deontic Modality

Modality in linguistics may be of different types like epistemic modality, circum-

stantial modality, deontic modality, teleological modality, and bouletic modality

(Fintel 2006). We restrict ourselves only to the scope of deontic modality in this

current paper.

We analyze only the central modal verbs of can, may, will, shall, must;

could, might, would, should. Other modal verbs may be interpreted to be one

of the above basic modal verbs. These can be said to have the following meanings as

per Palmer (1990) in his book on Modality and English Modals - (i) Epistemic Possi-

bility (may), (ii) Epistemic Necessity (must), (iii) Epistemic W/S (will); (iv) Deontic

Possibility (may, can), (v) Deontic Necessity (must), (vi) Deontic W/S (shall); (vii)

Dynamic Possibility (can), (viii) Dynamic W/S (will).

We adopt and include the deontic modal classification of possibility, necessity and

probability in our proposed DAM as deontic possibility, deontic necessity, deontic

probability. Ninan (2005) has analyzed the difference between must and shall is

that, must implies a necessity, whose denial would have repercussions. A shall

on the other hand is a little weaker, since it indicates that the promised choice is

probably the best alternative of some other promises. ‘I shall pay you’ implies that

may be I have a choice of not paying you but, I still undertake the promise to pay

you. ‘I must pay you’ implies that whether I like it or not, I am obligated to pay you.

We propose that the imperative nature of the deontic proposition is made explicit

using the modal verbs like must, shall, should, can, may in front of the expected act.

For instance, a command - ‘You must send me 3 dozen bananas by Friday’, may

become a request by ‘Please send me 3 dozen bananas by Friday’ or a query ‘Could

you send me 3 dozen bananas by Friday?’ and so on.

Page 157: Ontology for Information Systems (O4IS) Design Methodology

6.5 Semantic Analysis Representations: Discovering Semantic Relationships 135

Types of Deontic Propositions

We now take up some simple illustrative examples to show how the DAM may be

used, first as an aid to help extract the hidden knowledge and then to express it as

semantics. The proposed DAM is targeted at knowledge engineers and designers who

intend to model the domain ontology. We assume that a natural language description

of the domain is available, and that our DAM will aid the knowledge engineer in

parsing, interpreting and extracting the deontics. The natural way to do so is to

use the DAM as one would use a conceptual modeling pattern that not only defines

and describes the deontic concepts, but also provides the associations. The DAM

also provides a list of defined ‘instances’ for deontic modality, deontic assertions,

and acts. We also recommend that an additional input of linguistic thesaurus or the

WORDNET (Web Resource) ontology may enable this process to be semi-automatic.

As said before, we have three possible combinations for Deontic propositions:

basic, nested, and conditional. We now provide an illustrative example for each of

them.

Basic Deontic Proposition

We now demonstrate the use of the proposed DAM to analyze simple descriptions

like - Peter must pay John 100 Euros. This is the basic deontic proposition which has

the deontic core meaning to be to pay that is represented by act in the conceptual

model. We see that the deontic modality is of that of necessity that indicates that it is

an obligation. The execution of the act ‘to pay’ results in the state of affairs that Peter

need not pay money to John,or simply we could interpret that Peter has fulfilled his

social relation.

6.5.5 Nested or Complex Deontic Proposition

Deontic propositions may also be complex, which is composed of a number of basic

deontic propositions, but they are all linked together by virtue of their pragmatics.

We could analyze this ‘chain’ of deontic propositions by analyzing each individual

deontic propositions and establishing their pre- and post-conditions of state of af-

fairs. In figure 6.12, we see an example of one such nested deontic proposition. The

deontic proposition is ‘John must allow Peter to leave early’. The social act in this

case is the intention that permission for Peter to leave must be created.

That is, John has to act in a certain way so that Peter is, thereafter, enabled to

leave early. Here we see that on part of John, we have an obligation that he must act

to create the permission for Peter to leave. As a result, either Peter is allowed to leave

or he is not allowed to leave. If Peter is allowed to leave, this creates the secondary or

nested deontic proposition that Peter may leave early. This is a permission indicating

that Peter has a choice to leave early or not.

Page 158: Ontology for Information Systems (O4IS) Design Methodology

136 6 Unified Semantic Procedural Pragmatic Design

Conditional Deontic Proposition

In this example, the basic deontic proposition, ‘If Peter breaks the glass, he must pay

for it’ is interpreted as a prohibition which carries with it the deontic necessity con-

dition for fulfilment. Here the proposer is implicit, and could be a person, institution

who owns the glass. The social act concerned is that the glass should not be broken.

Peter is the person who is forbidden to break the glass. We analyze the possibility

that if the glass is broken, then there are two possible states of affairs that could

result: (a) the glass is intact, in which case there is no further proposition (b) the

glass is broken, in which case, a conditional deontic proposition is now set up, that

is Peter must pay fine. We may proceed to analyze this proposition further similar to

the previous example for basic deontic propositions.

The above mentioned examples indicate the possible use for DAM. We can apply

the same to any chosen domain of discourse like health care, military modeling and

simulations or business contracts. We shall see some illustrative uses of the proposed

DAM in our two case studies later on.

Page 159: Ontology for Information Systems (O4IS) Design Methodology

Fig.

6.11

.Bas

icD

eont

icPr

opos

itio

n

Page 160: Ontology for Information Systems (O4IS) Design Methodology

138 6 Unified Semantic Procedural Pragmatic Design

-

Fig.6.12.Nested

Deontic

Proposition

Page 161: Ontology for Information Systems (O4IS) Design Methodology

6.5 Semantic Analysis Representations: Discovering Semantic Relationships 139

-

Fig.

6.13

.Con

diti

onal

Deo

ntic

Prop

osit

ion

Page 162: Ontology for Information Systems (O4IS) Design Methodology

140 6 Unified Semantic Procedural Pragmatic Design

6.5.6 ECA Rule Ontology: Prescriptive Relationships

The use of ontologies as knowledge repositories for facilitating semantic web appli-

cations is widely accepted. As with any other application, the need for supporting

constraints, policies, rules is self evident. Event-Condition-Action rules are an in-

tuitive choice for the same as has been proposed by Papamarkos, Poulovassilis &

Wood (2003). Other alternatives like the proposed Semantic Web Rule Language 5

(SWRL) were also considered, but in view of our second objective, that is to provide

an easy to use guideline for the naıve user,we chose to adopt the simple ECA rule

approach. An ECA rule has a general syntax of:

On EVENT if CONDITION then DO Actions.

We build our ECA Rule ontology on the same principle as seen in figure 6.14.

The event concept specifies the occurrence of any triggers, situations, orders, or in-

cidents. The condition concept specifies the other requirements like state of affairs,

current situation contexts, preconditions, post conditions of other actions and so

forth. The idea is that on the occurrence of an event, a pre determined condition

needs to be evaluated. And if the condition is evaluated to be true then the pre-

scribed action is allowed. Action in the ECA rule ontology indicates not only phys-

ical activities, but could also be used for delegation of authority and rights. The

above information is sufficient, from a data level software engineering perspective.

However, from the domain knowledge perspective we need to capture further im-

plicit knowledge like what caused the event? Who was responsible for the event?

Who is affected by the event? What are the consequences? The answers to the above

questions form the context for the decision to be made: whether the described rule

is to be executed or not. Therefore, we now extend the concepts of event with re-

lationships to the Five Ws (Carey, Kleiner, Hieb & Brown 2001) analysis approach:

who, what, why, where and when.

For example, a business rule in the fast food restaurant that the customer shall

be refunded his/her money incase the food is delivered later than 15 minutes can

be modeled using our ECA rule ontology as shown in figure 6.15. The ECA rule

ontology could be used as a pattern to analyze the rules and conditions for any ac-

tion or process oriented domain. We have used it for,modeling rules of engagement

in our Defence Conceptual Modeling Framework Case study, as shall be discussed

later. But, it could be as easily used for analyzing business policies and rules in an

enterprise system. The ECA rule ontology may be used as a template and domain

specific ‘specializations’ may be inferred to restrict the valid combinations allowable

for each of the concepts identified above. For example, for the military case study

project DCMF context, an actor or (who) was mapped to the local domain ontol-

ogy for that case study, namely the DCMF-O. Details can be seen in chapter 8. This

5 http://www.w3.org/Submission/SWRL/

Page 163: Ontology for Information Systems (O4IS) Design Methodology

6.5 Semantic Analysis Representations: Discovering Semantic Relationships 141-

Fig.

6.14

.EC

AR

ule

Ont

olog

y

Page 164: Ontology for Information Systems (O4IS) Design Methodology

142 6 Unified Semantic Procedural Pragmatic Design

-

Fig.6.15.ECA

Rule

Ontology:A

nIllustrative

Example

Page 165: Ontology for Information Systems (O4IS) Design Methodology

6.6 Semantic Concept View 143

mapping helped users in rapidly using the ECA rule ontology as an analysis tool to

extract information from their domain. We carried out some user studies and survey

for the same results of which have been discussed in Kabilan & Svan (2007).

The Five Ws approach

The Five Ws is a concept used in journalism for structuring a story of something.

The principle is that a complete report must answer the five interrogative words:

Who, What, When, Why and Where. Sometimes an H is added representing How. All

these questions should be answered with necessary facts in order to get a complete

report and the full story of something that has happened. This structure is common

in news style and news reports but has also been used for police investigations.

The same Five Ws approach has been introduced and used for military operations

analysis as seen in works of Turnitsa, Kovvuri, Tolk, DeMasi, Dobbs & Sudnikovich

(2004)and Carey et al. (2001).

We shall details of the use of the ECA rule ontology in our case study for the

military operations modeling domain in section 8.7.1.

6.6 Semantic Concept View

After having presented the different conceptual analysis patterns in the previous

sections, we now begin the detailed discission of the USP2 Design. We discuss the

Semantic Concept View in this section.

The Semantic Concept View(SCV) would give us the vocabulary which describes

the domain. It is analogous to the the thesaurus of any language. As reviewed ear-

lier, the semantic vocabulary forms a fundamental component of ontology. Thus the

identification of concepts, their descriptive characteristics constitute the Semantic

Concept View. A detailed discussion of design choices to be made in the process of

designing an ontology for information has been discussed in the Ontology for Infor-

mation Systems (O4IS) design methodology in chapter 5. We could also capture the

‘static’ concepts of the domain, both explicit and implicit, following current ontology

design guidelines such as that of Uschold & Gruninger (1996) or METHONTOLOGY

(Fernandez et al. 1997) or Noy & McGuinness (2001). These domain concepts are

modeled as concepts in UML class diagram. Relationships between these concepts

are drawn as UML associations. The associations capture the semantic relationship

as well as the structural composition. For this phase, we adopt the basics of Chen’s

(1976) ER model approach as discussed earlier. We also follow and adapt Storey &

Purao’s (2004) verb phrase ontology for classifying relationships.

R We identify the concepts and their relationships; concepts may

be physical objects, abstract processes, emotions, state of affairs and so on.

Page 166: Ontology for Information Systems (O4IS) Design Methodology

144 6 Unified Semantic Procedural Pragmatic Design

The process of analyzing and modeling the semantic concepts is actually a sub

phase under the main O4IS design methodology for ontology design, and pertains

to the actual modeling of the domain ontology. So the input prior to applying the

USP2 Design would include: (i) Identifying the purpose, targeted audience, domain

of interest, scope of the domain, functional and non-functional requirement analy-

sis; (ii) Deciding on architecture for the targeted ontology (single-tier or multi-tier)

conceptual/logical architecture and the physical architecture (single-multiple-hybrid

physical); and (iii) Selecting existing ontology/KB/data models, reference ontolo-

gies, meta ontologies. This is essentially G7 Knowledge Analysis and G8 Knowledge

Modeling steps in the overall O4IS design methodology.

The knowledge analysis and knowledge modeling is to be an iterative process

till the designer is satisfied that information satisfying the targeted application has

been captured and modeled. One of the first decision that is to be made is the level

or granularity of representation. This is to some extent guided by the purpose of

application as well.

R In case the purpose is only for illustrative purposes, for making domain

knowledge explicit, for humans only, then only the Semantic Concept View (SCV)

is sufficient. If the domain under investigation has more behavioral aspects, that is,

it is more ‘action centric’ rather than ‘object centric’; obviously the description of

the same cannot be covered totally by only the SCV. The Procedural Concept View

is to be analyzed and represented as well. If the domain has normative issues like

obligations, and regulations, etc., which are to be a part of the ontology as well, then

we suggest that the Pragmatic Concept View is to be analyzed and represented.

In all cases, the semantic concept view analysis is mandatory. The other two or a

combination or the two are optional and depend on the nature of the domain being

studied as well as the purpose.

6.6.1 Design Guidelines for the Semantic Concept View

To describe the method on how to model the semantics, we once again follow a pat-

tern as:

Name: Name of the design step.

Input: Required input for this step to be carried out.

Procedure: Instructions, guidelines on how to proceed.

Illustration/Discussion: Illustrative examples, discussion and comments are in-

cluded.

Output: Describes the expected output or end result of this step.

Step 1 Identify the key concepts within the identified domain.

Input: Our identified domain of interest from the O4IS, G1 phase.

Page 167: Ontology for Information Systems (O4IS) Design Methodology

6.6 Semantic Concept View 145

Procedure:: For this step, the requirement analysis workflow loop from UPON

would be useful. It gives a detailed description of how a glossary of terms, then

concepts identified and taxonomy is built. As an aid, it would be advice able to set up

some competency questions for the domain analysis, as a cross check. The answers

to these questions will help in identifying the central concepts. Further questions

based on these concepts will identify other related concepts. One should iterate till

sufficient concepts and their characteristics have been identified.

Illustration: For example, let us assume that our domain of interest is that of,

say, cars. Then, the key concepts would be, entities or objects like cars, buses, SUV,

car owner, customer and so on. Following our discussion on semantics, we then

have to identify and extract the concepts, their definitions, delimitations, and their

characteristics. Note that characteristics of entities could themselves be represented

as concepts in the ontology.

Most of the concepts are usually the subject or object of a natural language sentence.

Their relationships or characteristics are often denoted through the verbs, adjectives

or adverbs.

For example, some competency questions for our cars domain would be:

Q. What are cars?

Q. What different cars are there?

Q. How can we describe them?

Q. How can we differentiate between cars?

Q. What can we use cars for?

Most identified concepts end up as classes in ontology, their individual charac-

teristics as properties or facets or slots as they may be referred to in different

tools/methods. The relations between concepts end up as associations, object

property relationships (OWL).

Output: A set of concepts, characteristics. At the moment, we have only a set

of identified concepts, their definitions, some properties and possible relationships.

This could very well be a natural language list, or a unordered set of data,at best a

taxonomy or a glossary.

Step 2 Generalize/ specialize the concepts.

Input: Output from pervious step, design choice made in G4 of the O4IS,

Standard upper ontologies like SUMO or Bunge-Wand-Weber ontology (Wand &

Weber 1990) (optional).

Procedure: The concepts identified in the previous step would be similar, could

be synonyms, homonyms, could be a part of some of concept, and could be a kind

of some other concept, and so on.

Page 168: Ontology for Information Systems (O4IS) Design Methodology

146 6 Unified Semantic Procedural Pragmatic Design

The next task is to build a lattice of concepts, where each layer on top is a gen-

eralization of a concept in the layer below. We have summarized the pros and cons

of three strategies for this process, a top down, bottom up or middle out approach

in section 3.7. We now explicate these with our suggestions for this design step. The

designer needs to choose any one of the alternatives. It is possible to begin with

one approach and to switch to any another approach as the development proceeds.

As per our O4IS design methodology, the design choice of top down, bottom up or

middle out should have been made in G4 (section 5.2.5), but if not, the designer

needs to do it now for the execution of this step.

Illustration/Discussion: We now illustrate the possible analysis via each of the

three strategies discussed for our running case example:

Top Down approach

In the top down approach, we begin with the most generic concept that we would

like to have in the ontology and successively include specializations below it. We

decide the top most generalization, based on our domain and scope. In most cases,

for this approach, we begin by adopting some previously established ontology or

published standard ontologies. Upper Generic ontologies like IEEE’s SUMO or Bunge

Wand Weber ontology or Open CyC are all possible choices. If, your domain relates

to business enterprises, then you could use TOVE(Fox 1992) or Enterprise ontology

as the starting point. If your domain is related to health care or medicine, you would

use Open GALEN or UMLS or SNOMED clinical terms ontologies as a starting point.

For our car scenario, if we take SUMO as a starting point, we would begin with

“entity– physical object–....– vehicle” branch. As we can see, we probably would

have to drill down several branches till we get the entities that we are interested

in. We do not necessarily need all the information regarding entities and physical

objects in general.

Bottom-Up Approach

In the bottom-up approach, we begin by identifying the individuals who define our

domain. For example, for our domain of a car rental company, we begin by iden-

tifying each of the cars that belong to the company, we observe their registration

number, color, year of manufacture, model, make and so on. These, as we see, are

specific characteristics for each individual. Thereafter, following the ER conceptual-

ization approach (see details in section 4.2.1), we group individuals having similar

characteristics as a type. That means, we identify a concept ‘Car’ having the charac-

teristics ‘Make’, ‘Model’, ‘Year’, ‘Color’ and so on. This is called generalization, and

the approach we have just taken is the bottom up approach. We can further group

concepts having similar characteristics in to another ‘generic’ concept. For example,

Page 169: Ontology for Information Systems (O4IS) Design Methodology

6.6 Semantic Concept View 147

‘Car’, ‘Bike’, ‘Bus’ are all ‘Motorized Vehicles’. A ‘Push cart’, ‘Bicycle’ is ‘Non-Motorized

Vehicles’. They are all examples of ‘Vehicles’.

Middle-Out Approach

The last approach to be discussed here is a combination of the previous two ap-

proaches. In the top down, we have the disadvantage that we need to know before

hand the top most generic concept that we should have in your domain ontology.

Another disadvantage is that we do not know how deep our ontology is likely to be,

as we would have to ‘specialize’ till we get to the individuals that we are targeting.

For example, if our domain is the Car leasing company, then it would not be suffi-

cient to identify only ‘car’, ‘bus’ and ‘bike’. We still need to identify the individual

‘cars’ and ‘buses’ that the leasing company owns.

Similarly, the bottom-up approach, has its own disadvantages. It is more tedious

and time consuming. We need to identify all individuals, study their characteristics

and then generalize to get a concept. This approach is ideal, when we have a number

of empirical case objects available for study and when we do not have any prior

knowledge of the domain that we are studying.

The optimum approach, is then the middle out approach, as recommended by

Uschold & Gruninger (1996) (See section 3.8.1). We too recommend this approach

as a first alternative for an Information Systems designer.

In this Middle-out approach, we make use of previously gained and established

knowledge. This could be from other literature, experience reports, technical re-

ports, data models, and obviously other ontologies. Like in the top down approach,

one should identify and collect the related ontologies to the domain that you are

studying. In the above case example, we could study the SUMO ontology. We may

not need the entire SUMO but only the relevant tree of information starting from

the concept ‘Vehicle’.

Having this prior information as a point of reference, we begin by looking up

concepts from the reference ontology and the individuals belonging to our domain.

Thus, we identify the concepts of ‘car’, ‘bus’, ‘motor boat’ and so on. Thereafter, its

easier and faster to identify and capture the information of all individuals belonging

to the identified concepts.

Output: We can represent the concepts identified so far as: (i) a document list in

natural language; (ii) Object or concepts using any conceptual modeling notation;

Typically all identified concepts will be classes or objects in UML class diagram or

object diagram respectively. The characteristics of the identified concept would be

UML Class attributes; and (iii) Semantic Nets, topic maps are other representation

forms that one could consider.

Page 170: Ontology for Information Systems (O4IS) Design Methodology

148 6 Unified Semantic Procedural Pragmatic Design

Step 3 Classify and organize the structure.

Input: Identified list of entities from previous step, Storey and Purao’s Verb

Phrase Ontology, our recommendations on identifying structural relationships (in-

troduced below in table 6.2).

Procedure: In the previous step, we have listed and identified the concepts per-

taining to the domain of interest. Now, we build the network of relationships be-

tween them. We adopt and follow Storey and Purao’s proposed verb phrase ontology

as the basic classification structure as summarize in section 6.3.

The first and foremost of them would be the Hierarchical structure. This associa-

tion describes the vertical generalization-specialization relationship. In other words,

we first associate the IS-A (structural, or a ‘kind of’) semantic relationships between

the concepts, to get taxonomy of the identified concepts.

We refer to the status category of the verb phrase ontology as our reference set of

patterns for identifying the structural relationships. For example, we would associate

Car IS A Motorized Vehicle, Motorized Vehicle IS A Vehicle.

Here, we have a slight difference from the typical object modeling philosophy

or the UML entity class modeling convention. Since, we are modeling concepts for

ontology, we need to visualize and model the concepts and their characteristics care-

fully. In ontology we have object properties and data type properties. Data type prop-

erties are the basic characteristics of a concept which cannot be further subdivided

or analyzed. For example, an Invoice has order date which is of the data type ‘Date’.

This, we would model as property of the concept ‘Invoice’ itself.

The object properties are concepts in themselves. That is, they can have other

features and properties themselves. For example, a ‘Category’ of a ‘Car’ could be

‘Sedan’,‘Family Combi’, ‘All Wheel Drive’, ‘Minivan’ and so on. Each of these cate-

gories themselves can be described through a set of features. (For simplicity, in our

case scenario we are assuming that sedans cannot be all wheel drives)

So, how would we model these relationships conceptually using ontology model-

ing principles? Again, we refer to the verb phrase ontology and the other primitives

of the structural sub category of status as summarized by Storey and Purao. Follow-

ing their suggestions on specifying context specific relationships, we have narrowed

down their list of structural status primitives to present a set of ‘structural relation-

ship patterns’.

Illustration/Discussion: We model semantic relationships between the concepts

as seen in figure 6.16. Car has a Color. MyCar is red and Tom’s Car is Blue. We asso-

ciate a relationship between the concept Car and the concept Color, has color. We

name the structural primitive is-part-of to have a semantic name as has color.

We also see that the colors red, yellow and blue have been modeled as individuals

who are structurally related as is-instance-of with car. Similarly we have mod-

Page 171: Ontology for Information Systems (O4IS) Design Methodology

6.6 Semantic Concept View 149

eled that car body is-part-of a car, and that sedan, SUV, minivan are all kinds

of car body.

R Note that we use here the structural relationship ‘is-a’ and not ‘is-

instance-of’. We use ‘is-a’ for the kind of or type of generalization and not for the

‘instance-of’ relationship. We note that an ‘is-a’ relationship from an ontology per-

spective is not identical with the same concept as represented by the entity rela-

tionship diagramming convention. In UML class diagram, a generalization (is-a) is

represented by an arrow with unfilled head. It implies that all concepts (class) below

a given concept are ‘subclasses’ of the parent class. In ontology, we must remember

that we support multiple inheritance, and so a particular concept may inherit from

more than one parent class. So strictly speaking, an is-a relationship from the ontol-

ogy perspective is not always and only a ‘sub class’.

In a conceptual representation we have as in figure 6.16, car and color are

concepts (classes) shown in the ovals, the relationships are shown as lines, and the

name on the lines depicts the name of the relationship. The individuals are modeled

as ‘objects’ or literals in the rectangular boxes. Here we have followed the RDF graph

notation for describing tuples.

Sedans, SUVs and minivans are different car body types.

Fig. 6.16. Identifying Concepts and Structures

Let us now add some more concepts to our car scenario analysis. MyCar is a sedan

while Tom’s car is an SUV (or an All Wheel Drive). Peter has a mini Van. We can

see the slight extensions to our conceptual model in figure 6.17. We have modeled

the relationship between MyCar and the car body type sedan as an instance-of

structural relationship.

Page 172: Ontology for Information Systems (O4IS) Design Methodology

150 6 Unified Semantic Procedural Pragmatic Design

Fig. 6.17. Extending Concepts

The level of analysis and granularity desired, as discussed earlier in Guideline G5

(see section 5.2.6), is decided by (a) the scope of the domain to be studied, (b) the

targeted purpose for the ontology. If all that we needed to know was what kind of car

that Tom, Peter or I had, then the level of conceptualization as shown in figure 6.16

and figure 6.17 would suffice. However, if one needed to know more about my car

or Tom’s car, then our modified set of competency questions would be:

• what are the features of a sedan?

• what differences does an SUV have from a sedan?

• How many people can travel in a mini van?

Then the above conceptualization is not enough. Then, we need to dig deeper

and specialize the concepts further.

In figure 6.18, we have identified some characteristics of Sedan, SUV(Sports Util-

ity Vehicle) and Minivan, which could answer our competency questions. Some ad-

ditional input for these concepts are described after survey from the domain as:

• An SUV is an terrain vehicle with the comfort of a personal car.

• An SUV has a five door Combi body.

• An SUV can seat either five or seven people.

• It has a four wheel drive, that is you can steer and control both the back and

front wheels.

• It has a powerful engine, usually more than an ordinary car

Similarly we can analyze for other models of the cars as well.

We generalize to introduce concepts called seating capacity and steering

control. Are they to be made characteristics of the concept Body or characteristics

Page 173: Ontology for Information Systems (O4IS) Design Methodology

6.6 Semantic Concept View 151

Fig. 6.18. Extending the Structural Relationships

of the concept Car? This is a modeling issue. In conceptual modeling there are no

absolutely right or wrong way of modeling the real world. Some may choose to

model seating capacity as a datatype property of the concept car, of the type

integer. Others may choose to model it as a feature of the car body concept. We

can resolve this dilemma, if we ask ourselves – Is the specialization feature seating

capacity and steering control a distinguishing feature of the concept car body

or the concept car? It is the body types that are distinguished from each other by a

series of features, two of which are the seating capacity and steering control. Another

example would be number of doors and so on. (The Car Body is the structural part

of the Car.)

R We recommend that the concept should be grouped by similarity, their

properties associated with the nearest concept node where it can distinguish be-

tween concepts. In the figure 6.19 we have now modeled the seating capacity and

steering control as ‘properties’ of the car body. Since, we have inheritance of proper-

ties, and as we have already established that a sedan is a body, seating capacity

and steer control are properties of a sedan as well. But we still now have to put

in the condition that a sedan can seat maximum 5 people and that it can only be a

two-wheel drive steering control. Such constraints are known as axioms in ontology.

Therefore, the next step for us is to build in axioms in our ontology.

Page 174: Ontology for Information Systems (O4IS) Design Methodology

152 6 Unified Semantic Procedural Pragmatic Design

Fig. 6.19. Adding Semantic Relations

Output: At the end of this step, we should have iteratively discovered more con-

cepts as sub concepts or related concepts. We first have the hierarchical (structural)

taxonomy and that ‘grows’ as we add more and more related concepts. At the fi-

nal iteration, we should have a semantic net of concepts, as we have seen in our

example above. The representation formalization should be any graphical language

like RDF graphs, conceptual graphs, topic maps, semantic nets, ORM (Object Role

Models), UML class diagrams. For the last two formalizations, we recommend that

the designer should follow the ODM standard for facilitating mapping to OWL later

on.

Step 4 Define the Characteristics and Features. (Properties and Facets).

Input: The conceptual model from the previous step, Noy and McGuinness’s 101

ontology design guidelines.

Procedure: Once we have identified and formed the structural hierarchy of con-

cepts, we need to add the characteristics and integrity constraints for the same. For

this, we recommend the Noy & McGuinness (2001) guidelines as a thumb rule for

identifying the different features of the individual concepts and the constraints on

them including cardinality restrictions and so on. The characteristics of a concept

are simple properties which cannot be further subdivided or it is not required for the

level of abstraction chosen.

Page 175: Ontology for Information Systems (O4IS) Design Methodology

6.6 Semantic Concept View 153

For example, a Purchase Order can have a property for the order date and date-

sent that are ‘atomic’ features and can easily be identified as being a ‘date’ data type.

More complex characteristics like the office address of the car rental company would

be defined as an ‘object property’. The ‘address’ concept in this case having several

other ‘atomic’ characteristics as ‘street-number’, ‘postal code’, ‘city’, ‘telephone’ and

so on. In this step, we also recommend that we add preliminary definitions for the

identified concept. Later, when we implement our ontology, we can annotate with

WORDNET for precise definitions, synonyms and other linguistic enrichments.

Illustration/Discussion: We do not discuss in detail the process of identifying

‘properties’ of concepts herein. A commonly asked question is how does one decide

if an identified concept should be an OWL class, or OWL data type property or OWL

object type property.

R If a concept has only one dimension or characteristic which can be de-

fined in existing types like integer, array, time, enumerated list and so on, then we

should model it as a OWL data type property. If a concept in itself has other char-

acteristics and can be used in several other contexts,then we recommend that it be

modeled as an object property.

In this case, Seating Capacity can be described only as the number of persons

that can sit at a time in a particular body type of a car. A coupe can seat only two

people, a sedan five people, SUV five to seven people and so on. Hence, we choose

to model Seating Capacity as OWL data type property of the type Integer.

Though the car body is a property of the Car, we choose to model it as a class

concept. The body has several associated characteristics like steering control,

number of doors, seating capacity and so on. In our scenario, a car would have

registration number, engine chassis number, insurance policy number and

so on. Car Body Types could have properties like manufacturer, patent number,

horse power, safety criteria specification and so on.

Output: We have a conceptual model where concepts and their characteristics

are noted. We could use an ER diagram notation like UML for the same purpose.

Step 5 Define the axioms. (Integrity constraints).

Input: The conceptual models from the previous step.

Procedure: We should now try to identify the constraints on the concepts and

describe them in natural language first. These shall then be expressed as OCL or

CL (if following the ODM specification) for UML class diagrams, and finally as DL

(Description Logic) axioms in OWL ( if OWL is the chosen knowledge representation

formalization for the ontology). The design objective is to make explicit all such

domain constraints explicit in one form or the other. If our targeted purpose was

only to chart the domain knowledge for human understanding then the conceptual

models at the end of this step are the final artifact desired. The final step is the

Page 176: Ontology for Information Systems (O4IS) Design Methodology

154 6 Unified Semantic Procedural Pragmatic Design

translation of the conceptual models into formal ontology representation. For our

Car example, we have some constraints like:

1 A sedan has only four doors.

2 A sedan can be steered by only the front wheels.

3 A sedan can seat maximum five people.

4 A SUV has five doors.

5 A SUV can seat either five or seven people.

6 A SUV has a four wheel drive.

7 A minivan has five doors.

8 A minivan seats nine people.

9 A minivan can be steered by the front wheels only.

10 A Car can have only one body.

11 A Car can have only one color

12 .......

Some of the constraints can be represented using the cardinality options in an

UML class diagram or the equivalent maxCardinality restrictions in DL for OWL.

For example, the last two constraints listed above can be modeled as cardinality

restrictions in UML as figure. In OWL, we can use the owl:FunctionalProperty with

the owl:ObjectProperty to define if the cardinality is to be one or more. If, we wish

that a specified concept can have a cardinality between 2 and any other number, we

can then use the minCardinality and maxCardinality restrictions.

For modeling the axiom that a sedan can seat only five people. We define a

restriction on the seating capacity property of a sedan. We set the ‘has Value’ option

to 5. We also restrict the steering control to a two wheel drive. It is not necessary that

one has to write the DL axioms themselves, as the tool for ontology implementation

would support and help in the process. Note that though we have referred to the

OWL language equivalents for explaining the constraints, it is not necessary to use

OWL as a specific language for representation at this stage.

Output: An output at this stage would be at least a natural language description

of what are the constraints that define the relationships between the concepts. If we

are using UML for the conceptual model representation then we recommend the use

of OCL or CL following the ODM specification to record the constraints.

Step 6: Implement the Ontology.

Input: Conceptual model from the end of step 5, an ontology editor and devel-

opment environment like Protege.

Procedure: In this step, we now start building our ontology. If the selected tool

for ontology development supports import of UML models or XMI files, then one

may directly import the UML class diagrams.

Page 177: Ontology for Information Systems (O4IS) Design Methodology

6.6 Semantic Concept View 155

If the tool support is not available, then we would have to create the ontology

manually using the mapping conventions and the conceptualization features dis-

cussed so far. For this research, we use Protege Ontology editor. We do not discuss

the steps for creating the classes, properties, and DL axioms in OWL here. We refer

the interested reader to the tutorials for adding these in Protege Ontology editor

from CODIP project and the Noy and McGuinness guidelines.

Protege ontology editor has a number of useful plugins as we shall see during

our case studies later. Here, we would like to introduce the OntoLing plugin 6, which

interfaces the WORDNET as a linguistic knowledge resource to Protege OWL editor.

R Once we have some of the identified concepts input, following the same

middle out approach, we recommend that we search on the class names in the lin-

guistic resource, and choose to enrich you class concepts with word sense definitions

that match your domain closest. Using the same selected word sense, ontoLing also

generates sub concepts for the selected concept. We can semantically enrich our on-

tology by associating the synonyms, hyponyms and glossary terms as well. We can

also map to other existing ontologies using the Prompt plug-in available in Protege.

Illustration/Discussion:

A partial screenshot of our implementation with the linguistic enrichment as

described above looks like in figure 6.20.

Output: The output at the end of this step is the implemented ontology in the

chosen ontology language using the chosen tools.

Step 7 Populate the ontology. Define the Individuals.

Input: Ontology implemented in chosen ontology editor, documented list of iden-

tified individuals of interest.

Procedure: As we have discussed earlier, a knowledge base constitutes of both

the conceptual schema as well as the individual facts that are captured in it. Hence,

once we have designed the ontology ‘conceptual schema’, we need to populate it

with individuals from our domain. That is, we need to create ‘instances’ of the classes

that we just created.

This is also a means of evaluating our design. Any design flaws or erroneous

assumptions made in the conceptualizations will emerge now. If you cannot define

your individuals accurately in the ontology,if you find that there are information

that cannot be input in to your designed ontology, if there are missing information

or relationships, then you need to go back and iterate through the previous steps to

enrich the conceptual model further.

6 The OntoLing Tab is a Protege plug-in that allows for Linguistic Enrichment of Ontologies.Available at http://ai-nlp.info.uniroma2.it/software/OntoLing/

Page 178: Ontology for Information Systems (O4IS) Design Methodology

156 6 Unified Semantic Procedural Pragmatic Design

Fig. 6.20. Ontology Implementation in Protege Ontology Editor

R We propose that all concepts that we initially discovered to have the

structural relationship as instance-of in the first step, should be modeled as individ-

uals.

Illustration/Discussion: We populate our car ontology by creating MyCar, Tom’s

Car, Peter’s Car as instances. We also create the colors red, yellow, blue as instances

of the concept color.

Output: We now have our proposed domain ontology.

R With this we come to the end of our Semantic Concept View description.

In this section we have introduced our proposal for identifying structural relation-

ships between concepts. The SCV as we have seen so far is explicit in establishing the

vocabulary in use for a particular context or domain of interest. In the next section,

we shall enrich our SCV with procedural aspects, that is how concepts react to each

other,or what are the cause-effect of certain actions.

6.7 Procedural Concept View

As discussed previously, the behavioral aspects or the dynamic (perdurant) char-

acteristics or the exchanges between different concepts need to be identified and

captured. The Procedural Concept View (PCV) would analyze and give us how the

semantic vocabulary could be associated with each other. This is analogous to the

Page 179: Ontology for Information Systems (O4IS) Design Methodology

6.7 Procedural Concept View 157

grammar and rules that a language should follow. Again we refer to Storey and Pu-

rao’s verb phrase classification, and we make use of their interaction category and

the temporal, spatial primitives of the status category of semantic relationships be-

tween entities. A Procedural Concept View describes the intended course of action,

intentional plan, and can relate between the embedded knowledge derived from the

domain analysis and the intended purpose. This includes mappings to a behavior

ontology, functional models or task, process ontology, as well as additional stereo-

typed associations for representing sequences (structure), pre-conditions and post

conditions.

One such aspect would be the business rules that govern the business actions. A

business rule of the type - “If an event A occurs and condition B is satisfied then doaction C” maybe analyzed and captured using the ECA approach. We have proposed

ECA rule ontology as a pattern for analyzing and representing the same. Details

of the proposed ECA Rule Ontology may be read in section 6.5.6. Linear Temporal

Logic constructs may be used for analyzing the ordering of events in time. We shall

see an illustration of this in one of our case studies. We have used BPMN as another

representation language for describing contract compliant business processes in an-

other of our case studies. A correlation between the semantic concepts identified as

‘objects’ in the Semantic Concept View and the ‘flow’ diagram (Activity, Process, and

Sequential Flows) in Procedural Concept View (using BPMN) has been discussed in

Kabilan(2005).

6.7.1 Design Guidelines for the Procedural Concept View

Step 1: Discovering the central actions.

Input: The Semantic Concept View, Performative verb ontology based on Van-

derveken’s classification.

Procedure: For the procedural concept view analysis the domain must be ac-

tion oriented. That is the scope should have some characteristics that are dynamic,

changing, temporally and spatially displaced. Typical example would be processes,

activities, rules of a game, etc. In short anything that describes how a particular

sequence of activities may be connected to each other or how they may occur.

Every such domain will have the fundamental concept of an Action, or a process

in addition to the fundamentals of Actor, Object, and Attribute as seen in the SCV.

The action concept will be related to the other identified concepts from the SCV. Ac-

tions or processes are almost always identified by the ‘verbs’ in any natural language

representation. The Oxford English Dictionary defines a verb as:

A verb is a word that denotes what a person or thing does, and can describe:

• an action, e.g. run, hit.

Page 180: Ontology for Information Systems (O4IS) Design Methodology

158 6 Unified Semantic Procedural Pragmatic Design

• an event, e.g. rain, happen.

• a state, e.g. be, have, seem.

• a change, e.g. become, grow.

Vanderveken has compiled a categorization of performative verbs (action verbs)

in English language based on the Speech Act theory, that may be referred to as an

aid to identify the ‘action’ in the domain of interest.

Illustration: In our running example of the car rental scenario, we can identify

that the basic actions involved are ‘leasing’, ‘payment’ and ‘returning’ of the car. The

actors involved are the customer, the car owner and maybe the car rental owner if

the car owner is different from the car rental owner.

Output: The output at this stage can be listed as a textual description of the

different actions and identified actors and their roles. The identified actions may be

optionally included in to the original Semantic Concept View designed at the end of

the previous step. Figure 6.21 illustrates two identified actions leasing and payment

added to the original SCV model from the previous step.

Fig. 6.21. Procedural Concept View: Car Rental Illustration

Page 181: Ontology for Information Systems (O4IS) Design Methodology

6.7 Procedural Concept View 159

Step 2: Identify the functional relationships betweenentity-action-object.(Object/Actor-Action functional relationship)

Input: Identified list of actions, Chen’s ER model approach, proposed functional

relationships (6.3).

Procedure: In this step we establish how the action concept will be functionally

related to the other main concepts of the domain. We concur with Storey’s identi-

fication of an entity, action and an artifact(object); an entity is any agent capable

of carrying out the identified action, while an artifact cannot independently do so.

An artifact may be the cause or used by the actor (entity) in order to carry out the

action. After having identified the performative actions in the previous step, we now

need to identify the entities and objects that are relevant to the identified action.

Thereafter, we establish the nature of functional relationship between them. We use

Chen’s basic ER model (section 4.2.1) to help us identify the entities, actors, roles

involved in the domain.

R We recommend the use of the functional relationships patterns (6.3) as a

look-up to establish the semantic relationships.

Illustration: For example, in our example of a car rental enterprise, so far in

the Semantic Concept View(SCV), we identified types of car, the car leaser (actor)

amongst others. The action perspective of this scenario are ‘the leasing’, ‘the pay-

ment’, and ‘the return of the car’.

The questions we now need to ask to discover the functional relationships are:

Who can do the ‘leasing’?

How is it done?

What can be leased?

Who can do the payment?

What are the payment methods ?

And so on.

Thus, we discover that the leasing action is related to the car rental owner, as the

actor who can do the leasing and the customer is the ‘leasee’. The customer makes

the ‘payment’. The leasing can be done via an agreement and exchange.

The functional relationships identified is integrated in to the conceptual model

obtained from the SCV. Figure 6.22 shows the functional relationship of the example.

For simplicity we have removed some of the semantic concepts from the SCV for the

car rental scenario.

Output: A SCV modified with entity-action-object functional relationships.

Step 3:Identify Action-Action Functional relationship.

Input: The modified SCV from previous step, Functional action-action relation-

ship patterns (table 6.4).

Page 182: Ontology for Information Systems (O4IS) Design Methodology

160 6 Unified Semantic Procedural Pragmatic Design

Fig. 6.22. Procedural Concept View: Extended Car Rental Scenario

Procedure: It is possible that identified actions or processes are related seman-

tically to each other. For example, an action A can occur because action B has hap-

pened or Action A is a part of Action B. We have summarized a set of semantic

patterns for relating actions in table 6.4.

Illustration: In our running example, we have identified that ‘leasing’, ‘payment’

and ‘return of the car’ to be three actions. Payment is-a-sub-action of Leasing.

Return of the car is a pre-requisite-for payment.

Output: Again the identified relationships may either be kept in a text tabular

form or added on to the conceptual model.

Step 4: Identify Action-Action Temporal relationship.

Input: The SCV, the identified actions from step 1, action-action temporal rela-

tionships from figure 6.8.

Procedure: In addition to discovering how the activities are related to each other,

to the entities responsible for performing the activities and so on, we also need to

identify the temporal sequence in which they can occur. Like for example A occurs

after B, A starts before but ends after B and so on.

Illustration: In our example, Leasing starts before and ends after payment

is completed. Car return starts after Leasing starts and ends before the end of

Leasing.

Output: We add the identified relationships to our tabular list of relationships or

directly to our conceptual model.

Page 183: Ontology for Information Systems (O4IS) Design Methodology

6.8 Pragmatic Concept View 161

Step 5: Identify Action - dependencies and Conditions. Using Event Condition Logic.

Input: The combined list of actions and their functional relations, temporal re-

lations. ECA rule ontology for prescriptive relationships.

Procedure: Similar to the previous two steps, in this step we discover the depen-

dencies like pre-conditions, post conditions, causes- and desired effects associated

with actions.

For this, we base our pattern ECA rule model on the Event Condition Action

paradigm. Details of the ECA model is discussed in section 6.5.6.

Illustration: If the car is returned later than agreed then the customer has to pay

extra payment as penalty.

Output: The Procedural Concept View as a Conceptual graph or UML conceptual

model.

R At the end of the Procedural Concept View, we would have a conceptual

model for the domain. As we shall see in our case study, we can further extend the

Procedural Concept View to get more business process model like visualizations. We

propose a detailed methodology called Contract Workflow Methodology to deduce

such procedural views from the Semantic conceptual models in section 7.12.3. We

shall also suggested workflow like patterns for deciphering the same using BPMN in

section 7.12.5.

6.8 Pragmatic Concept View

The Pragmatic Concept View of a domain is related with practical issues like how

should the business process be executed, how should a cup of tea be boiled? It

differs from the Procedural Concept View as the former deals more with implicit

nuances and underlying linguistic structures and the latter is still limited to human-

prescribed set of rules, constraints and procedures. The Pragmatic Concept View

(PrCV) provides the context and relevance for the semantic and procedural anal-

ysis done in the previous two views. To give an example, a recipe for making tea

would be a procedure. But for making John’s special tea, one needs the pragmatic

concept view as well. Pragmatics cover a wide range of topics from linguistics, de-

ontic, functional grammar analysis and so forth. The idea behind this research is to

put forward patterns representing some of the prevalent theories that may be eas-

ily used by the Information Systems designer in carrying out the analysis. For this

purpose, we propose a Deontic Analysis Model (based on deontic logic) as a pattern

for analyzing the nature, extent (modalities) of obligations between actors involved

in any domain. For the pragmatic analysis, we choose the deontic of a situation as

one possible aspect to analyze. Specifically, we are interested in the analyzing the

deontic modalities of the domain and its subsequent implications on the semantics.

Page 184: Ontology for Information Systems (O4IS) Design Methodology

162 6 Unified Semantic Procedural Pragmatic Design

For example:-

(a) Pass the salt.

(b) Please pass the salt.

Example (a) is an order while example (b) is a request. The modalities of the

statement are what differentiate the semantics of (a) from (b). When the objective

of domain knowledge capture is to make these conceptualizations, it is assumed that

they will be used in some specific applications for a specific purpose. The conceptu-

alizations themselves are intended to be generic and application independent. Say,

we are now interested in an intelligent agent where these statements are processed

and actions are to be carried out, that necessitates that the difference between an

order and a request is understood by the agent.

Details of the DAM is presented in section 6.5.4.

Again from Storey and Purao’s work, we have a list of semantic patterns to help

identify the pragmatic relationship between entities as listed in table 6.5.

Table 6.5. Pragmatic Relationships from Storey’s Verb Phrase Ontology

Primitive ExampleA wants to be B intent Customer<wants to own> ProductA attempts to becomeowner of B

attempt Customer <orders> Product

A becomes B transition Customer <receives> ProductStatus Primitive: Customer <owns> ProductA dislikes being B intent Customer <wants to sell> ProductA attempts to give up B attempt Customer <offers> ProductA gives up ownership ofB

transition Customer <sells> Product

In the table 6.5 we see that Storey and Purao have proposed a change of status

occurring as a life cycle in the status primitives defined. We have illustrated the case

for one such primitive ‘is-owner-of’,similarly the same change of status primitives

are applicable for other status primitives as well. In the table 6.5, ‘A’ and ‘B’ stand for

any of the status primitives identified by Storey and Purao.

This helps us resolve the pragmatics for the Actor-Object relationships, we still

have to classify the shades of implicit understanding associated with per formative

actions, or speech acts as we know them. For this purpose, we make use of the

speech act theory and propose a Deontic Analysis Model (see details in section 6.10)

as a pattern for analyzing specifically the modalities of an Actor-perform-Action rela-

tionship, for example, the implicit meaning behind Actor <shall perform> action,

Actor <must perform> action, Actor <could perform> action.

The pragmatic concept view encompasses the nuances that language could build

in using the above mentioned semantics and procedural view. We also restrict our-

Page 185: Ontology for Information Systems (O4IS) Design Methodology

6.8 Pragmatic Concept View 163

selves currently to interpretation of prescriptive norms like social rules, legal obli-

gations and normative constraints. For example, using the same English words, and

following the grammar rules, different authors may compose different connotations.

The ‘Big Apple’ refers not to a physically big apple fruit but to the city New York. The

statements: (i) “You must taste this cake”; and (ii)“You could taste this cake” differs

in their pragmatic implication that in the first case (i), the listener has no option but

to taste the cake in a normative world where we interpret this as an order. While

in the second case (ii), the listener has a choice whether he would like to taste the

cake, we interpret this as an permission or offer.

As stated earlier, we are interested in the analysis and representation of domain

pragmatics for human understanding in the context of Information Systems. But we

also need to capture the context in which a series of events or actions are taking

place, because identifying a single event and analyzing it for the actor-action-object

relationship would not provide us with the entire scenario. Intentions, beliefs and

the force behind these acts is also a key domain concept. For example, to capture the

intentional belief or the change of status primitives, we need to delve more deeply

into the mind-set of the actor who is performing or intends to perform the action

as well as the actor who is intended to be the beneficiary of the aforementioned

act. Therefore, we further complement the Actor <communicates/intents> Actor

set of patterns by taking help from Vanderveken. Vanderveken has extended Searle’s

speech act theory (Searle 1969) and analyzed the English language for performative

verbs from the perspective of the actor initiating the performative verb (speech act

verb as it is called) and the actor who is the intended listener, recipient or target of

the ‘perform’ primitive. (See details in section 6.4.)

The Pragmatic Concept View is an optional design choice that the Information

Systems designer has to follow only if the targeted application so requires it.

6.8.1 Design Guidelines for the Pragmatic Concept View

The basic approach and process to be followed for the pragmatic concept view design

is similar to the ones followed for the Semantic Concept View and the Procedural

Concept View. Hence, we do not describe the method in detail but list the main

highlights below:

Step 1: Use Performative Verbs Ontology to discover the intent behind the action.

Input: The SCV, Performative Verb Ontology.

Procedure: To further understand the intent or thinking behind the actor doing

the action and the intended (targeted) actor,we suggest that the designer use the

performative verbs ontology based on Vanderveken’s semantic analysis work. We use

the performative verb ontology to identify the performance implied in the situation

Page 186: Ontology for Information Systems (O4IS) Design Methodology

164 6 Unified Semantic Procedural Pragmatic Design

and to determine the nature of the intended action, if it is declarative, assertive,

commissive, expressive or directive. Identify the English verbs and the modal verbs,

use the performative verb ontology as a look up to match the type of performative

verb. This step helps in discovering the deontic, or other pragmatic aspects to be

modeled in the next steps.

Illustration: In our car scenario, we have the customer who wishes to hire a car,

which is an expressive. The car rental agency who advertises to rent out cars, which

is a commissive. The customer who orders a car to be booked, which is a directive.

The car rental agency guarantees the safety of the rented car, which is a declarative.

Output: Identified actions, their nature and type of performative verbs.

Step 2: Use Verb Phrase Ontology extracts to analyze the pragmatic relations.

Input: The analyzed Semantic Concept View, and the SARs, the output from step

1 with the identified performative actions.

Procedure: Analyze the pragmatic relations between actors and objects follow-

ing the set of relationship patterns as illustrated in the table 6.5.

Illustration: In our running example, we have identified the actors customer,

lease rental owner. We have identified basic actions like hiring, payment, return of

car earlier. Applying the SARs, we first have the structural relationships between the

entities in the SCV. We apply the Pragmatic relationships to see that the customer de-

sires to hire a car preferably blue. But in the event of the said car being unavailable,

the customer hires another alternative car. Thereafter, he returns the hired car.

Output: The SCV is enriched with the identified performative actions and their

action functional and temporal relationships to each other and the identified actors

as per the proposed SARs.

Step 3: Use Deontic Analysis Model to analyze the deontic aspects.

Input: The SCV and the DAM model.

Procedure: If the domain of interest has deontics involved like in the business

domain where one actor is allowed or prohibited from doing certain actions, or in

the medical domain where doctors are ethically obliged to take certain procedures

etc, then we recommend that the designer make use of our Deontic Analysis Model

as well to further complement and capture the modalities of these performative

actions.

Illustration: In our case scenario, we have the basic deontic proposition that

the car rental agency offers to lease out cars against a pre-determined payment. A

customer who hires a car is thus obliged to pay for the rented period. There are

nested deontic propositions involved as well. For example, the car rental agency

is obliged that he provides a car in conformance to the stated conditions and in

Page 187: Ontology for Information Systems (O4IS) Design Methodology

6.8 Pragmatic Concept View 165

good working order. Likewise, the customer is obliged to return the car in the same

condition as received and within the agreed time frame.

Output: A conceptual model using the DAM as a template representing the iden-

tified deontic propositions, social acts, expected performance, and obligation, etc.

Figure 6.23 illustrates an example of the pragmatic concepts for the car rental

scenario.

Fig. 6.23. Pragmatic Concept View Car Rental Illustration

R In this chapter, we have presented (i) Our proposed sets of Semantic

Analysis Representations that include semantic relationships for structural, tempo-

ral, functional, deontic and prescriptive relations; (ii) Overview and design rationale

for the USP2 Design; (iii) Detailed design guidelines for the Information Systems de-

signer to analyze and conceptualize the semantics, procedures and pragmatics of the

domain.

In the next two chapters, we shall see how the proposed O4IS methodology and

the USP2 Design have been put to use in different case studies.

Page 188: Ontology for Information Systems (O4IS) Design Methodology
Page 189: Ontology for Information Systems (O4IS) Design Methodology

v 7

Case Study I: The Business Contract Knowledge

Management Project

In the previous chapters we introduced our design methodology for building ontolo-

gies. Now, we move on to the next topic of interest in this thesis, namely how do wedevelop and use ontologies for Information Systems?. We have carried out exercises in

conceptualization of domain knowledge in various fields, and we choose to describe

two case studies herein.

The first case study relates to the world of business contracts. And the targeted

use of the proposed contract ontology is for the contract execution, compliance

checking with business workflows, integrating/mapping to existing business pro-

cesses, exception handling, and performance monitoring, etc. The rest of this chap-

ter is structured as shown in figure 7.1. We discuss the role of our proposed O4IS

design methodology and the USP2 Design in section 7.7. In section 7.1 we describe

the background and context for the business contract knowledge management case

study. We summarize some of the salient related research in section 7.4. We intro-

duce and describe the proposed Multi-Tier Contract Ontology and all its components

in section 7.8. The Procedural Concept View for this case study is a specialization

of the general design guidelines proposed in the previous chapter. We propose a

Contract Workflow Model as a Procedural Concept View suited for extracting the

procedural aspects implied in a business contract. We put forward this methodology

for deducing Contract Workflow Model (CWM) in section 7.12.1. We conclude this

chapter with a discussion of the results obtained in this case study (section 7.14).

Fig. 7.1. Case Study I: Disposition

Page 190: Ontology for Information Systems (O4IS) Design Methodology

168 7 Case Study I: The Business Contract Knowledge Management Project

Most of the work done in this case study has been covered in Kabilan (2003),

and also published in (Kabilan & Johannesson 2003, Kabilan, Johannesson &

Rugaimukammu 2003, Kabilan & Johannesson 2004, Kabilan 2005, Kabilan, Zdravkovic

& Johannesson 2005). In the objective of keeping this thesis concise we present only

an overview of the work done in this case study. We refer the interested reader to

the papers mentioned above for details. We will review the work done in this case

study only with reference to the O4IS design methodology, the semantics design and

the uses that the proposed ontologies has been put to.

7.1 Case Study I Background

Ever since humanity started trading, business trade relationships have been forged

and carried out. With subsequent developments in the realm of information technol-

ogy, especially the Internet, the horizon and scope of business trading has increased.

E-commerce standardization efforts aim to bring the small and medium scale en-

trepreneurs at par with established corporate players. A key issue facing the Small

and Medium scale Entrepreneur (SME) beginners, is the need to be competitive yet

efficient, reliable yet fast to grow. A global pool of re-usable knowledge resources

paves the way for promoting such trade relationships. One such knowledge appli-

cation domain is in the realm of legal business contracts. Open, available contract

knowledge should help the business entities in understanding their contractual obli-

gations and their expected fulfilment business behavior.

Business legal contracts are testaments to the business trade relationship estab-

lished. The business contract is like a blueprint for expected business processes and

activities to fulfil the agreed trade relationship. Legal jurisdiction governs and sanc-

tifies the terms and conditions as expressed in a business contract. Hence, the need

to integrate the contractual terms and conditions into the regular business process

workflow is apparent. A profitable and efficient business workflow should conform

or adhere as closely as possible to the expected behavior pattern of the contrac-

tual obligations. That is, ideally a business process should be modeled based on the

agreed contractual terms and conditions. However, understanding and interpreting

the contractual terms and conditions (as expressed in legalese) is not an easy task

for the business entrepreneur or the Information Systems designer. Each of the users

of the same legal business contract has a different purpose for interpreting the con-

tractual terms.

Focusing on legal business contracts alone, we see that the same contract can be

viewed from three different perspectives as: (also illustrated in figure 7.2).

• Information Technology, Information System and Software Agent.

• Legal jurisdiction, regulations and government policy.

Page 191: Ontology for Information Systems (O4IS) Design Methodology

7.1 Case Study I Background 169

Fig. 7.2. Three Perspectives of Business Contract Domain

• Business process, commercial trade practice.

The need for translation, understanding and interoperability between the three

perspectives of the contract is much needed. Starting from the legal language used

in a legal business contract an interpretation to a more easily understandable hu-

man language and hence forth to machine-understandable language is needed. To

understand the nature of the research problem, we present a closer look at the three

perspectives of the legal business contract below:

Information Technology, Information system, Software Agent.

One of the foremost requirements of any information management system is co-

herency and precise clarity, which should enable anyone to understand the purpose,

meaning and implication of any such information system. The same applies to the

field of contract management.

Contract management software tools available today mostly adopt a document

centric view of a contract, which is processing a contract as a physical or elec-

tronic document containing text and data. Some researchers like Karlapalem, Dani

& Radha (2001) have modeled the contract terms and obligations as choreography

of processes thereby promoting a process centric view of a contract. The approach

is valid and sound, however certain aspects like the semantics or implied implica-

tions of a contract are not successfully handled. The third legal centric view adopted

by the legal domain experts interprets implicit and explicit aspects of a contract.

However it is at times complicated for the non-legal contract user to understand.

None of the three prevalent approaches for handling contract management alone

are sufficient enough or are clear, precise enough to be of much use to the diverse

users of contractual information. There is a need for a more coherent and integrated

Page 192: Ontology for Information Systems (O4IS) Design Methodology

170 7 Case Study I: The Business Contract Knowledge Management Project

approach to model and represent contractual information. Recent efforts like that of

the Semantic Web, which aims at making the Internet machine-readable and search-

able source of information, could be one such approach for contract information

management.

In this case study, we propose a methodology for contract information model-

ing, representation and interpretation using an approach that is a combination of

the document centric, process centric approach methodologies and the legal cen-

tric perspective of the contract. This research views legal business contracts as legal

instruments containing not only meta-data information but also is a choreography

of processes which are executed through business performances. For this purpose,

we draw upon the O4IS design methodology to model the core business contract re-

lated ontology suite. We also make use of the USP2 Design for analyzing the different

perspectives of the business contract domain, as we shall discuss shortly.

Legal Jurisdiction, Regulation, and Government Policy

Contracts are first and foremost legal instruments. They testify the nature and terms

agreed between contracting parties. Hence, each contract is primarily bound to the

jurisdiction and regulatory law under which it is signed. This legal centric view of

a contract cannot be ignored in any contract management methodology. There are

efforts ongoing to standardize the regulations on a global basis. Within the European

Union, the EC Directives 98 1 have been adopted to facilitate e-commerce. Other

organizations like the International Chamber of Commerce have been instrumental

in recommending standard models for contract delivery terms (INCOTERMS), etc.

Other international collaborative organizations like the United Nations have adopted

model contract law (UNCITRAL (United Nations Commission on International TradeAnd Law n.d.) model law for contracts), or standard product codes like the UNSPSC

(United Nations Standard Products and Service Codes Web Resource) or CPV 2.

However, law governing trade and commerce may vary from nation to nation.

Thus, any business contract that is negotiated must take in to account prevalent lo-

cal regulations. Within the framework of Information Systems, this implies a need for

a translation from technical legalese in to more human or business oriented trans-

lation and thereafter machine understandable format representation of the same

contractual terms.1 EC Directives 1998, available online at http://europa.eu.int/comm/enterprise/

newapproach/standardization/harmstds/reflist.html (accessed last on 12-11-2003)2 Common Procurement Vocabulary: The CPV establishes a single classification system

for public procurement aimed at standardizing the references used by contracting au-thorities and entities to describe the subject of procurement contracts. established bythe EU SIMAP organization. Details see http://simap.europa.eu/nomen_cod_cpv_what/

3bc3a032-f9c6-e162-18d2cd794dfeb113_en.html

Page 193: Ontology for Information Systems (O4IS) Design Methodology

7.2 Research Issues in Business Contract Knowledge Management 171

Business Process, Commercial Trade Practice and Concept

Every organization has its own in-house business policies and practices. They have

certain code and recommended strategies for customer relationship management or

their enterprise resource planning or even standard contract terms and conditions.

Sometimes, an organization may be flexible and have differential terms with various

customers. However, the business workflow would in all probability be the same for

all. But, if an organization wishes to maximize its efficiency and profitability then

either they should agree to terms that are conforming to their regular workflow

pattern or they should be able to adjust their business process flow to be compliant

to the contract terms. In other words, business process management cannot remain

isolated from business contract management. Legal business contracts govern the

business process and the business process influences the actual contract formation.

Thus the process centric view of a contract is further strengthened by the business

and commercial practice domain.

As seen above, the three identified perspectives of the same contract cater to

different objectives and needs. At present the boundaries between these identified

perspectives are not cohesive and interaction between the perspectives is not easily

feasible.

7.2 Research Issues in Business Contract KnowledgeManagement

Contract knowledge management is a crucial issue in the enterprise management

perspective. However, the various approaches deal with the contract in one or more

defined perspectives. An integrated, coherent approach for contract knowledge man-

agement is needed. Specifically, legal contract knowledge is isolated from business

process knowledge in current information system approaches. Shared common un-

derstanding integrating the three perspectives of the contract domain is missing.

1 A research problem, focused in this case study, is to bridge the chasm between

legal contracts, business process with respect to current information system re-

quirements. The identified gap needs to be filled in a coherent and meaningful

manner that fosters easy shared understanding for both humans and machines.

Shared understanding needs to be fostered in a flexible, extensible, simple and

reusable form.

2 A secondary problem is that business processes or workflows are designed and

executed independently of the contractual expectations. Contracts outline the

expected business behavior from the parties involved. Contracts have binding

Page 194: Ontology for Information Systems (O4IS) Design Methodology

172 7 Case Study I: The Business Contract Knowledge Management Project

obligations that are to be executed through the performance of business pro-

cesses. Thus contracts need to be monitored and at the same time they should

govern the design of the actual business workflow.

3 A third problem is that these contracts are seldom aligned with the internal pro-

cesses and the way each enterprise actually executes these promised contracts.

4 Another problem is that with business contracts, there are always some associ-

ated business risks which if not assessed and countered properly could result in

unpleasant situations for the concerned enterprises.

7.3 Objectives for Case Study I

This research aims to solve the problems identified in section 7.2 through the fol-

lowing objectives:

• To foster reusable shared contract understanding: A contract knowledge mod-

eling approach using current information system methodologies is proposed

which would represent an integrated view of business and legal domain. This

contract knowledge base would bridge the gap between contracts and business

workflows. The proposed contract knowledge model would target human under-

standing as the primary users. The same should also be machine-understandable

and searchable to promote automated processes like contract monitoring, per-

formance monitoring, and contract drafting, etc.

- A Multi Tier Contract Ontology framework is proposed to capture the con-

ceptual models of various contracts followed by their translations to machine

understandable formats. This MTCO framework follows the multi-tier archi-

tecture proposed in the O4IS design methodology. Parts of this work has

been published in (Kabilan & Johannesson 2003, Kabilan et al. 2003, Kabilan

2003).

- Conceptual models for representing contract knowledge from legal domain

are presented with a focus on business contract types. The conceptual models

for a typical business sale of goods scenario are presented using the proposed

Multi Tier Contract Ontology (MTCO) framework. The conceptual models fol-

low the Dual Representation as proposed in the O4IS, that is UML conceptual

models and OWL formal representations. The conceptual models capture the

semantics following the semantic concept view in the USP2 design.

• To propose business contracts compliant business workflow. A simple, easy-

to-understand interpretation of the contractual terms and conditions and their

relation to business processes or workflow is also proposed. This phase is an

illustration of the procedural concept view of a contract domain.

Page 195: Ontology for Information Systems (O4IS) Design Methodology

7.4 Related Research for Business Contracts 173

- We propose a methodology for deducing Contract Workflow Model based on

the contract knowledge represented in the MTCO. Contract Workflow Model

(CWM) is intended to be a rough outline for recommended business work-

flow process that would be compliant to the stated contractual terms and

conditions. Exemplified detailed methodology is described in (Kabilan 2003).

Details of contract workflow model patterns are discussed in (Kabilan 2005).

• To align the proposed contract compliant workflow models with the existing

internal business process models. In collaboration with another ongoing re-

search, this author has contributed towards the alignment of business contracts

with internal business process models. Ongoing work in this context, involves

exception handling of processes based on contractual clauses. Details regarding

this work is not included in this thesis, but may be referred to in (Zdravkovic &

Kabilan 2005b) and (Kabilan et al. 2005).

• To propose a mechanism for tracking and measuring contract obligation life

cycle: An analysis and representation of the implicit states through which the

contract obligations pass through, is proposed as obligatation states. The obli-

gation state classification in itself is an illustration of the pragmatics (deontic)

aspects of the business contract being described in the semantics of an ontology.

Parts of this work has been introduced in (Kabilan et al. 2003).

- A detailed analysis, categorization of contractual obligations on a generic

level is included as a part of the conceptual models. This thesis identifies a

set of obligation states that are abstract states through which any obligation

passes through during the contract obligation fulfilment process.

• To propose a method for business contract risk assessment. This author has

been part of an IST project INTEROP, wherein, she has worked in a joint research

with Weigand, in proposing a methodology and an ontology for business contract

risk assessment as shall be discussed later. Details of this work is not included in

this thesis but the interested reader is referred to the paper (Kabilan & Weigand

2006).

7.4 Related Research for Business Contracts

The main fields of related research work from which guidance and inspiration has

been drawn may be grouped as:

Contract Management:

Since the research problem and goals deal primarily with contract execution analy-

sis, related work in the realm of electronic contracting as well as traditional contract

management form a primary basis for this research.

Page 196: Ontology for Information Systems (O4IS) Design Methodology

174 7 Case Study I: The Business Contract Knowledge Management Project

Knowledge Management:

In order to foster shared and reusable understanding, we need to model, capture and

reuse the contract knowledge efficiently. In this context this research has adopted

proposed theories from other related research works in the field of knowledge man-

agement.

Workflow Management:

As stated earlier, the contract defines a set of terms and conditions, which are to

be carried out by the parties agreeing to the contract. This research defines a legal

business contract to be a legal description of a set of objects (including obligations,

prohibitions and rights) that are to be fulfilled by execution of corresponding busi-

ness behavior on the part of the parties. The proposed CWM methodology derives

inspiration from workflow and process flow design methodologies.

Ontologies:

Contract knowledge is proposed to be modeled and represented using Ontology for

knowledge representation. As we have already reviewed the Knowledge Manage-

ment and Ontologies in our chapter 2 and chapter 3 respectively, we summarize

only the background and related research from the other two domains here.

7.5 Contract Management

Contracting encompasses several stages namely conception where parties identify

each other, negotiation where offers and counter offers are made, contract estab-

lishments which leads to signing and finally workflow execution accompanied by

monitoring and fulfilments, as summarized by Angelov (2001). An adapted version

also showing the contract knowledge management life-cycle may be seen in fig-

ure 7.3.

This research focuses on the workflow execution phase of contract knowledge

management methodology. We believe that a contract instance is executed through

a series of workflow like processes in tandem with business process flows. There

are different approaches that have been adopted to analyze, model and represent

contracts and their relationship to business workflows. We summarize some of them

in the following sections.

7.5.1 Document Centric Approach

Electronic contracting projects like that of COSMOS have proposed architecture and

framework for the automated contracting process. Griffel (1998) has described the

Page 197: Ontology for Information Systems (O4IS) Design Methodology

7.5 Contract Management 175

Fig. 7.3. Lifecycle of a Business Contract

technical foundation for the COSMOS project as based on CORBA and the Business

Object Model. They present the Contract Object Model to identify the main compo-

nent classes of their object model. The COSMOS project identifies who, what, how,

legal parts of any contract. The fundamental concepts are similar to the ones pro-

posed in the MTCO. However, in the legal part the approach taken in COSMOS has

veered towards a textual document centric analysis. The actual contract has been

modeled as a composition of legal paragraphs containing clauses. The primary objec-

tive of COSMOS has been to facilitate electronic contracting through all the phases

from negotiation using service brokers, contract drafting using component-based

contracts. They have used PAMELA (Petri-net based Activity Management Execution

Language) to model the contract execution flow model. This research proposes the

use of UML (Unified Modeling Language) as knowledge representation language

and predominantly focuses on contract execution monitoring and workflow deduc-

tion using EPC (Event Process Chains).

7.5.2 Process Centric Approach using Deontic Logic

While COSMOS has taken a document centric view of the contract, Yao-Hua Tan

(2000, 1998, 2002) has dealt in detail with directed obligations, permissions in-

volved in trade contracts from a legal and an action (process) centric view. He has

used deontic logic to model the notions of permission, rights and obligations. He

aims to resolve ambiguity in interpretations of trade relationships by building for-

mal models for the obligations involved. He has viewed obligations as relationships

between two agents. He also introduces the concept of bearer and the counter-party

agents who are the two roles of the parties involved in the trade contract. He has

Page 198: Ontology for Information Systems (O4IS) Design Methodology

176 7 Case Study I: The Business Contract Knowledge Management Project

modeled several instances of legal obligations and permissions and their legal impli-

cations. However, we find that he has not considered the business domain aspect of a

legal contract. The relationship between an obligation and its corresponding perfor-

mance or non-performance has not been taken in to account in the obligation model.

Also, the remedial option for obligation non-fulfilment has been assumed to be that

of only legal action, which is not always true in the business domain. Tan has also

demonstrated the use of event semantics to model contracts and then used prolog to

implement the model. Thus, though we agree with Yao-Hua Tan’s fundamental the-

ories regarding obligations, their types and nature, we differ in our methodology of

modeling and monitoring the obligations. We propose a human oriented approach

for contract obligation monitoring. Business is always carried out between human

counterparts. Business decisions and strategies, however rigid, are always subject to

flexibility and change. Thus automated and rigid contract enforcement and moni-

toring is not a practical solution.

7.5.3 Normative Approach using Subjective and Deontic Logic

In another electronic contracting research, A Daskalopulu (1997)has analyzed con-

tracts for the purpose of establishing contract performance monitoring in (Daskalopulu

& Maibaum 2001, Daskalopulu 2002). She has also promoted the legal centric view

to a contract. Her work has been focused around automated contract enforcement

and monitoring. She has identified the main issues for contract performance moni-

toring as (an excerpt from (Daskalopulu & Maibaum 2001)):

• To establish what each party is obliged or permitted or prohibited to do at a given

point of time.

• To determine whether each party complies with the behavior stipulated in the

agreement

• When a party deviates from prescribed behavior, to determine what the remedial

mechanisms that are applicable, that might return the business exchange to a

normal course.

The objectives for establishing the proposed Contract Workflow Model (CWM)

in this thesis are similar to those stated above. Daskalopulu also holds the view that

software agent aided electronic contract enforcement and performance monitoring

is too restrictive for realistic commercial purposes. Thus she proposes a framework

for an artificial controller who forms an opinion based on evidence-based reasoning.

In this aspect, Daskalopulu uses Subjective Logic to support her proposal. She has

used UML state diagram for representing contractual transactions.

R We have drawn inferences and guidance from this and other works of

Daskalopulu in our ongoing research methodology. We propose a similar obligation

Page 199: Ontology for Information Systems (O4IS) Design Methodology

7.5 Contract Management 177

state classification and a transformation in response to the performance of busi-

ness activities. However, our methodology differs in the manner the research goal is

achieved. She has used subjective logic to model obligations and we propose the use

of contract ontology (reusable knowledge base) and simple CWM to obtain a similar

result.

Gangemi, Pisanelli & Steve (2001) have presented a formal ontological frame-

work for representing normative representations specially in the banking sector.

Weirenga and Meyer (1993) have provided a concise survey and review of deon-

tic logic based applications in computer science. Amongst them, Jones and Ser-

got (1992b) have proposed that at the appropriate level of abstractions – law, com-

puter systems and other organizational structure may be viewed as instances of nor-

mative systems. They define ‘norms’ as prescriptive descriptions of how agents ought

to behave, and specify their permitted behavior and rights. They go on to argue that

deontic logic needs to be considered whenever it is is necessary to make explicit,and

to reason about, the distinction between ideality and actuality. Since deontic logic

has its origin in the study of law and its ethics, there has been a number of research

carried out in the field of applying deontic logic to the legal knowledge represen-

tation, as has been surveyed by Sergot (1990). Jones & Sergot (1992a) have also

proposed a methodology for legal representation using deontic logic.

7.5.4 Standardization Approach using Courteous Logic Programs

Moving on we find efforts in the current trend for adopting XML as standard busi-

ness language for information system. Grosof (1999) has proposed Courteous Logic

Programs as a declarative approach to model the business rules and policies as ex-

pressed in contracts. Grosof has further presented a XML based rule representation

language RuleML and has also used it with ontologies to produce SweetDeal (Grosof

& Poon 2003), an approach to aid automated creation, evaluation, negotiation and

execution of contracts. He has viewed contracts as specification for processes thereby

conforming to the process centric view. Business practice (rules and policies) play

a major role in his approach for handling contracts. He has dealt with two of the

domains, business and information technology, but has not ventured in to the legal

aspects of contract. There exist possibilities of integrating other contract ontologies

like our proposed MTCO to the system as proposed by Grosof. Thus, the business

rule and policies as expressed by RuleML may be interfaced with the MTCO to be

able to support the various phases of the contract life cycle (figure 7.3).

7.5.5 Communicative Approach using FLBC

On business process and contract process views, we also find Heuvel and Weigand (2000),

who have presented integrated enterprise architecture to integrate contracts with

Page 200: Ontology for Information Systems (O4IS) Design Methodology

178 7 Case Study I: The Business Contract Knowledge Management Project

business workflow and business objects. They have visualized contracts as the bind-

ing glue to cross-organizational business workflows. Contracts are scenarios de-

noting sequences of transactions. They introduce a business contract specification

language (XLBC) to link to CDL (Component Definition Language) specification of

business object based workflows systems. They have based their contract specifi-

cation language on the Formal Language for Business Communication (FLBC) to

specify contracts between enterprises. FLBC catered to EDI standards, and XLBC is

an adapted XML version. XLBC architecture is a layered structure from speech acts

as an elementary block to workflows and finally contracts, as seen in the figure 7.4

from Heuvel & Weigand (2000).

Fig. 7.4. Multi-leveled Communication Patterns

Contracting using XML based approaches also includes efforts of Goodchild (2000)

who analyzes the fundamental concepts for a business contract and models the con-

tract using UML and XML. However, he has viewed the contract as a document and

has placed emphasis on the physical characterization of a contract contents.

7.5.6 Enterprise Systems Approach

Milosevic and team have formulated another business domain and contract inte-

gration approach. They propose a framework called Business Contract Architecture

(Milosevic, Josang, Patton & Dimitrakos 2002). Milosevic (2002) defines a contract

as:

“Contract is an agreement governing part of the collective behavior of a set

of objects it specifies obligations, permissions, and prohibitions of the objects

involved, all of which are regarded as constraints on the objects behavior in

relation to other object.”

In the same paper Genetic Software Engineering method for behavior trees has

been used to identify and model components, states, events, decision and constraints

Page 201: Ontology for Information Systems (O4IS) Design Methodology

7.5 Contract Management 179

along with causal, logical and temporal dependencies. In Business Contract Archi-

tecture, automation of contract activities like drafting, negotiation, monitoring and

enforcement has been considered through the use of software agents. Various tools

have been designed to handle each aspect. The Contract Form Editor tool is designed

to draft contracts and is predominantly a document centric approach to view con-

tracts as textual documents. A Contract Repository is proposed to store all contract

instances and a Contract Notary is aimed to monitor and track negotiations. Finally,

a Contract Monitor is visualized to monitor the contract execution and monitor per-

formance.

As stated earlier, we hold the view that such rigid enforcement agents cannot sim-

ulate the necessary and practical commercial aspects when the human counterparts

rather than artificial agents plan decisions and strategies. However, this research

does agree with Milosevic on the central role played by obligations, permissions and

prohibitions in the context of contractual execution monitoring.

7.5.7 Workflow Management Approach

Workflow management tools are now being used to support and control business

managerial responsibilities. W.M.P van der Aalst has proposed a Petri Net-based

approach for modeling workflows in (Aalst 1994, Aalst 1998) as well as formalized

the use of event driven process chains for workflow modeling in (Aalst 1999). Our

patterns for contract workflow models using BPMN have been based on his workflow

patterns work.

Karlapalem et al. (2001) has proposed a framework for modeling electronic con-

tracts using a workflow approach. They have used traditional Entity Relationship

(ER-R) data model to represent a contract. They present workflow models for task

activity model and mapped their contract ER EC model to a workflow specification

as:

• Parties from a contract are mapped to agent types and roles in a workflow.

• Activities from the contract to workflows are mapped to activities in workflows.

• Contracts themselves are mapped to events that occur in the workflow.

• Clauses of a contract are mapped to conditions that need to be satisfied in a

workflow.

• Exceptional handling clauses in a contract are mapped to additional activities in

a workflow.

• Payments and contracts instances are mapped to physical documents and addi-

tional input output events in a workflow.

We see that Karlapalam has adopted a document centric analysis of a contract

and mapped them to workflow approach methodology. The proposed methodology

Page 202: Ontology for Information Systems (O4IS) Design Methodology

180 7 Case Study I: The Business Contract Knowledge Management Project

for CWM has been based on above-mentioned workflow-based approaches. How-

ever, the proposed CWM builds on the reusable shared knowledge base, Multi Tiered

Contract Ontology.

7.6 Multi Tiered Contract Ontology

We support Daskalopulu & Sergot (1997) in their identification of the following roles

of the contractual provisions:

1 Contracts define terms.

2 Contracts prescribe certain behavior for the parties, under set conditions for a

certain period of time.

3 They specify procedure that needs to be followed. For example, the delivery

terms inform the buyer regarding the time limit by which he has to inform the

seller regarding his transporter, or any change in venue for the delivery, or de-

livery date.

4 The contracts contain formulae that are used to calculate various parameters, for

example, the cost adjustments to price or quantity depending upon fluctuation

of currency, changing duties, and tax.

We support and uphold a definition of a business contract as:

R A contract is an organized collection of concepts, obligations, per-missions, entitlements, etc. A contract has also been viewed as a collection ofprotocols that specify its operational aspects (how the business exchange is to becarried out in reality) or simply parameters (the parties, product, price, deliveryquantity, delivery date).

Our proposed MTCO is a combination of all the above mentioned aspects. A lay-

ered structure provides the scope for defining individual ontology for specific types

yet coherently integrating under one unified framework. The MTCO consists of a set

of structured conceptual models represented using UML. From the preceding dis-

cussion in our proposed O4IS design methodology (chapter 5), we have established

that conceptual models are an abstract form of ontology representation. Thus for the

rest of this thesis, all references to the contract ontology layers refer to conceptual

models. We now discuss how our O4IS design methodology has been used in this

case study.

7.7 Using O4IS Design Methodology and USP2 Design

Above we have seen the issues in business contract management and different ap-

proaches to process the information. Our objectives (as stated in section 7.3 have

Page 203: Ontology for Information Systems (O4IS) Design Methodology

7.7 Using O4IS Design Methodology and USP2 Design 181

been to: (i) Foster shared common understanding between the different groups of

human users of the business contract and (ii) Help in planning, and integration of

business contracts with existing business workflows, monitoring the fulfillment of

contracts (iii) Understanding the obligations and their violations as stated in the

contract, their possible consequences, remedial options available. Keeping in mind

these objectives and requirements of the targeted applications, we design our pro-

posed contract ontology following the O4IS design methodology as described below:

• G1: Establish the scope of domain. The domain is that of business contract

knowledge management. As illustrated in figure 7.2, this is an overlap of enter-

prise modeling, knowledge management and Information Systems and finally the

legal system that governs and specifies contracts. In this research, however the

process of establishing and negotiating a contract (e-contracting) is not within

the scope. Our research is focused on the post-signature, and actual execution

phase of the contract life cycle (figure 7.3).

• G2: Establish the targeted users, applications, and functional requirements.

The primary targeted users are humans: business managers, decision makers,

business process modelers, who need to either execute the contract, make de-

cisions regarding possible contract non-compliance, re-design existing internal

business process models in accordance with the contract and so on. As such the

functional requirements is that the ontology should be clear, precise and consis-

tent. It should be comprehensible to the non-information system experts as well.

It should be reusable, shared across different organizations, and systems, etc.

• G3: Choose ontology architecture: physical and logical. The physical archi-

tecture chosen is that of a single local ontology for the moment. This is abstract

research and hence we have not tested it in real time applications where a dis-

tributed architecture may be needed. The logical architecture followed is the

multi tier architecture proposed by the O4IS design methodology.

• G4: Choose ontology development approach. We adopt a middle out ap-

proach. We begin our study and analysis from specific contract models and there-

after, study the governing rules, laws and models like the UNCITRAL that are

generic across many types of contracts.

• G5: Choose level of ontology representation. As our primary targeted users are

humans we have mainly used conceptual models as our representation language.

We have adopted ODM specification for OWL formalization, and implemented

them as stereotypes in UML meta model. Therefore, our conceptual models are

conforming to ODM recommendations and can be translated in to OWL. In this

case study, we have not carried out extensive implementation in OWL formaliza-

tions.

• G6: Choose knowledge acquisition methods and tools. This case study was

the first iteration for this O4IS design methodology and hence we have not used

Page 204: Ontology for Information Systems (O4IS) Design Methodology

182 7 Case Study I: The Business Contract Knowledge Management Project

any specific knowledge acquisition tools. Our work has been based on extensive

literature study and study of other contract related research. We have also had

input from lawyers in the initial stages of knowledge gathering. After gaining suf-

ficient domain knowledge we have carried out the analysis and conceptualization

following an iterative method of abstraction and specification.

• G7: Knowledge analysis- Conceptualize the domain ontology. As stated, our

main interest in this case study was to make domain assumptions explicit and

to analyze the fulfillment or state changes of contractual obligations. Hence, our

main work has been on the Semantic Concept View extraction. We have analyzed

the deontic aspects of the contract, namely the obligations and proposed a set of

obligation states. This is the pragmatic concept view which has been declaratively

included into the semantic concept view itself. The Procedural Concept View in

this case study needs to make explicit the expected behavior of two parties in-

volved in a contract execution. This is similar to modeling a dialog between two

actors, whose responses can be expected but not predicted. Therefore, we pro-

pose a domain specific methodology called the Contract Workflow Methodology

to deduce the contract compliant business workflow model.

• G8: Knowledge representation: Implement the domain ontology. The Seman-

tic and Pragmatic Concept View are represented using UML conceptual models.

The Procedural Concept View following the CWM methodology has been repre-

sented using EPC diagrams as well as BPMN. We have further proposed CWM-

BPMN patterns to ease the analysis and design part for information system de-

signers.

• G9: Evaluate, assess and verify the domain ontology. The evaluation and as-

sessment for this case study has been done following the design science research

methodology. The actual ontologies have only a theoretical assessment. In future

projects we hope to be able to implement in real applications to verify the ac-

curacy of the models. However, the conceptual models being based on standard

contract documents and recommendations are correct to the best of our knowl-

edge. Having said that this author is not a legal expert and thus there could be

subjective errors due to misinterpretation.

• G10: Use, maintain and manage the domain ontology. So far we have worked

through two iterations of the development for the proposed MTCO. We refined

the structure of the ontology based on the feedback and review we got after

the dissemination of research through scientific communication. We have also

semantically enriched the second version of the ontology, now implemented in

Protege by annotation with Wordnet.

After the overview of how we have applied the proposed O4IS design methodol-

ogy and the USP2 Design, we now describe the proposed ontology.

Page 205: Ontology for Information Systems (O4IS) Design Methodology

7.8 Multi Tier Contract Ontology: Semantic Concept View 183

7.8 Multi Tier Contract Ontology: Semantic Concept View

The MTCO is envisioned to consist of the following layers (illustrated in figure 7.5

below):

Fig. 7.5. Multi Tiered Contract Ontology

• Upper Level Core Contract Ontology: Represents a general composition of a

contract, which may be applicable across most of the prevalent types of con-

tracts. The concepts defined here may be considered to be atomic blocks based

on which all other contract types may be defined. Fundamental concepts like

role, consideration, and obligation are defined here.

• Specific Domain Level Contract Ontology: Contract type specific collection of

several contract type ontologies. Each ontology represents a specific contract

type, such as Property Lease Rental, Employment Contract, and Sale of Goods,

etc. Each contract type inherits all fundamental features of the upper layer and

thus specializes on the knowledge particular to that contract domain.

• Template Level Contract Ontology: Consists of a collection of templates such as

definitions for contract models, such as the International Chamber of Commerces

contract model for International Sale of Goods.

The Upper Level Core Contract Ontology defines all the required and necessary

components of a business contract in order to be legally valid. For electronic con-

tracts, we would have additional concepts like digital signatures, public key encryp-

tion, security and archiving issues. This Upper Level Core Contract Ontology should

capture all the common concepts under one umbrella. The objective is to define

fundamental concepts like actor, role, and consideration in a generic manner that

Page 206: Ontology for Information Systems (O4IS) Design Methodology

184 7 Case Study I: The Business Contract Knowledge Management Project

would be applicable to any business contract, keeping in mind that the scope of our

research problem as limited to the realm of business contracts.

The second, Specific Domain Level Contract Ontology relates to specific contract

types. Some examples of business contract types include purchase of good, services,

hire and lease rental contracts, employment contracts, business trade partnership

contract, and real estate property, etc. Each of the contract types may be designed

and represented as an individual ontology. Each of the specific contract type ontology

would define the major concepts particular to that contract type and would special-

ize and extend the definitions inherited from the Upper Level Core Contract Ontol-

ogy. As an illustration, we propose a specific contract type ontology specification for

Buy-Sell of commercial goods. In this respect, we draw conclusions and guidance

from various internationally adopted legal directives like UNCISG (Nations 1980),

UNIDROIT (UNIDROIT principles of International Commercial Contract, 1994 1994)

principles for commercial transactions, and UNCITRAL (United Nations Commissionon International Trade And Law n.d.) model contract law, etc. The research has been

focused specially on the obligations and the expected fulfilment through the execu-

tion of performance events. This has been done in order to facilitate easy integration

and understanding of the required business process workflow to comply with the

contract terms.

The third layer, Template Level Ontology is visualized as a group of pre-defined

contract models that could be readily instantiated. These incorporate standard rec-

ommended contract forms like that of ICC’s 3 contract model form for International

Sale of Perishable Commercial Goods (books 2002), or standard forms for sale of

used vehicles. Each pertains to the same contract type but yet differ in specific infor-

mation details contained within them. Each of the template contract ontology would

essentially inherit from specific contract type ontology. In this level the concepts are

further narrowed down and specialized even to the level of defining Meta-data spec-

ifications and constraints.

This framework allows the MTCO to be flexible, extensible and coherent. It can

be easily extended horizontally and further layers are also possible. Moreover, users

of the ontology can extract and use parts of the ontology as required for their domain

of applicability. MTCO is a hierarchy of ontologies moving from the general to the

specific and then down to precise Meta-data definitions.

7.9 Upper Level Core Contract Ontology

In this section, we present the Upper Level Core Contract Ontology in detail. We start

with an illustrative case scenario to help identify the principal concepts involved.

3 International Chamber of Commerce, http://www.iccwbo.org/

Page 207: Ontology for Information Systems (O4IS) Design Methodology

7.9 Upper Level Core Contract Ontology 185

There after we present a detailed conceptual model for this layer. A discussion on

the major concepts follows the conceptual model.

7.9.1 Basic Concepts

For sake of simplicity and ease of understanding we present the high level concepts

in figure 7.6, followed by detailed conceptual models as extracts in the following

figures, figure 7.7 to figure 7.12. Note that they together comprise the Upper Level

Core Contract Ontology . The current versions of the conceptual model are targeted

for human to human knowledge transfer and understanding. Hence details and con-

straints for machine querying and understanding are not included at present. We

Fig. 7.6. Upper Level Core Contract Ontology: Overview

explain the main concepts identified in figure 7.6 with the help of a hypothetical

case scenario where a person (seller) promises to sell cars to another person (buyer)in return for some amount of money. A promise is a statement of commitment or

obligation to fulfil some act or perform certain deeds. When a promise is made with

the legal intent to back it up in any court, it becomes a legal obligation or commit-

ment.

Cars are the object or consideration of the Promise: a consideration is any mate-

rial or abstract benefit or thing of value for the exchange of which two parties agree

to enter in to a contract. It could also be simply a promise to fix a leaky roof or a

promise not to do something. ‘Selling’ becomes the performance, which fulfils the

above promise. The promise to sell is an obligation which is realized only when the

Page 208: Ontology for Information Systems (O4IS) Design Methodology

186 7 Case Study I: The Business Contract Knowledge Management Project

actual business act of giving the cars in return for the money is performed. An obli-gation must have a Claimant or a Beneficiary of the obligation, that is one who

receives the consideration or is the recipient for whom the promised act is being

performed or carried out (called the obligation owner). The buyer who buys the cars

and pays money for it is the Receiver of the obligation to sell.

The contract outlines the terms and conditions under which the promised per-

formance shall occur.

As seen in figure 7.7 we have other concepts like obligations, prohibitions, rights,warranties. In a normal situation, a contract is executed as planned and agreed. In

case the expected performance does not occur within the expected time frame or

occurs in an unsatisfactory manner or is delayed due to forces beyond the control

of the promisor, then the primary obligation goes in to a state of ‘Unfulfilment’.

The occurrence of the non-performance event activates certain pre-agreed rights on

behalf of the promisee. In this case, the buyer may have the right to seek remedy in

the form of some interest or penalty, or may choose to terminate in accordance with

the agreement. But the buyer may also choose not to do anything and could settle

the issue by mutual agreement. However, irrespective of whichever course of action

the buyer chooses, the seller (the promisor of the primary obligation) is bound to

accept the choice and is now bound in a reconciliatory promise to fulfil the remedy

requested. This secondary or reconciliatory promise may also include the fulfillments

of the initial primary promise to sell.

We have seen a simple case scenario where the actors have defined responsibil-

ities or roles; agree to perform certain acts as per agreed terms and conditions in

a mutually satisfying and acceptable manner. We further see that the contractual

terms and conditions bind the actors to various obligations which maybe legal, ethi-

cal, business or a combination of any of the types. Obligations may give rise to other

obligations and rights. Actors are also empowered by certain other rights or may be

bound by other prohibitions too. Rights too may give rise to new obligations. There is

a complex interplay in between obligations, their performance or non-performance,

probable secondary rights and obligations.

R This implicit as well as explicit knowledge embedded in a business con-

tract is the focus for the Upper Level Core Contract Ontology. The Upper Level Core

Contract Ontology is not a mere catalogue of identified concepts, classes or defini-

tions. But it emphasizes on the implicit and tacit understanding of fundamental con-

tractual concepts like obligations, performance and non-performance. The deontics

involved in this social domain is analysed and represented through obligation state

models. This is crucial from the business process integration perspective since one

needs to be aware of the implications of contractual obligations and repercussions

while making business related strategic decisions and choices.

Page 209: Ontology for Information Systems (O4IS) Design Methodology

7.9 Upper Level Core Contract Ontology 187

Fig.

7.7.

Upp

erLe

velC

ore

Con

trac

tO

ntol

ogy:

Ade

taile

dSe

man

tic

Con

cept

View

Page 210: Ontology for Information Systems (O4IS) Design Methodology

188 7 Case Study I: The Business Contract Knowledge Management Project

For a detailed description of the above mentioned concepts we refer the reader

to (Kabilan 2003). In the following section, discuss our analysis of obligations, obli-

gation types and obligation states.

7.9.2 Contract Obligation Analysis: Pragmatic Concepts Analyzed

Obligations or Commitments (as they are also known as) are not only legal bind-

ings but also are also business, moral and ethical related too. A business contract is

drawn up with the primary objective of clearly defining the obligations that all the

parties to the contract undertake to perform. Along with that they also agree upon

the method or manner in which the promised performance is supposed to occur. It

is to be noted that the business contract lays out the boundaries and parameters for

the expected behavior, which should govern the actual business execution. In other

words, a contract compliant business workflow execution should be modeled based

on the agreed upon contractual behavior pattern. This is the fundamental assump-

tion on which this thesis builds. Therefore, we analyze the concepts of obligations

and their related performance more closely than other concepts illustrated above. A

clear understanding of what an obligation implies and what is necessary to fulfil the

obligation is paramount from the business process modeling perspective.

As mentioned earlier, obligations may be categorized in to different types. An

individual obligation may belong to more than one category. The following obliga-

tion categories or obligation types are based on the nature of obligation fulfilment

required or on the nature of implications of the obligations. Obligations have been

the subject of discussion for several other researchers.

7.9.3 Obligation Types

As proposed by others like Ronald Lee (1988), Yao-Hua Tan (1998) and Daskalop-

ulu (1997), we acknowledge that the statements in a legal contract are either infor-

mative or declarative (also called as performative statements by some). Informative

statements pertain to the description of the actors, the subject of the contract, ju-

risdiction and other pertinent information. Declarative or performative statements

are statements of intentions or conditions, whose execution undergoes state trans-

formations. This thesis focuses on these declarative statements that are in fact a

statement of intent and describe the choreography of expected behavior from the

parties involved. Declarative statements include rights and prohibitions in addition

to obligations. A brief recap of the concepts of obligations, rights and prohibitions

as described in the preceding section:

• Obligations: Obligations are mandatory. They have an Obligee and an obligor.

Obligee has to be mandatory executed the obligation condition once and only

once in every single execution of the contract.

Page 211: Ontology for Information Systems (O4IS) Design Methodology

7.9 Upper Level Core Contract Ontology 189

• Permissions/Rights: Permissions or Rights have only a rights Owner. The exe-

cution of a right is of an optional nature or it may be conditional depending on

the execution of some other obligation.

• Prohibitions: Prohibitions are statements of whatever actions should not be ex-

ecuted or whatever actions may be unacceptable to either or both parties.

These declarative statements are bound to their performative actions or non-

performative actions for their fulfillment.

Fig. 7.8. Performance Event Types

As seen from figure 7.8, performance event types may be of business acts, legal

acts or moral acts. In cases it may even be a combination of one or more of the

performance event types. Every obligation is fulfilled by the related performance

event.

For ease of understanding, we identify the obligations to be of business, legal

or moral obligation type. However, all obligations are legally binding in any case.

This obligation type classification is more abstract and intended for the purpose of

understanding than for any other legal or business purpose.

We describe the basic obligation types as shown in figure 7.9 as below:

• Business Obligation Type: We state that business obligation type require some

related business activity or process to occur for the obligation to be fulfilled. For

example, in case of the obligation to deliver, the seller must initiate the business

process of procuring or manufacturing the product to be delivered, etc. Business

obligations can be further sub grouped as being monetary business obligations

or non-monetary business obligations. Certain business activities are essentially

‘economic acts’ as defined by REA ontology (Geerts & McCarthy 2000). That is,

Page 212: Ontology for Information Systems (O4IS) Design Methodology

190 7 Case Study I: The Business Contract Knowledge Management Project

Fig. 7.9. Business Contract Obligation Types

there is a certain monetary value attached to the event fulfillment. Others like

the act of informing the seller of the chosen carrier or the required packaging

can be classified as non-monetary business obligation.

• Legal Obligation Type: Legal obligation may be fulfilled by some legal acts like

signing the contract or sending an acknowledgement receipt, or notification of

delivery, etc. Understandably these are in any case performance acts and could

be a part of normal business acts.

• Moral Obligation Type: Moral obligation may be based on common business

trade customs or understanding like aiding the other party in customs clearance

or advising of local practices etc.

The above grouping schema for obligations aids us to further analyze the precise

nature and relationships between obligations and performances. This is a crucial

step in our analysis as this forms the base for the transformation of the contractual

semantics from objects to contractual process flows.

Based on the nature of their fulfilment execution, we propose a categorization of

obligations in to the following abstract categories, for ease of grouping and under-

standing, refer figure 7.9:

• Primary obligation: Has to be fulfilled whenever the contract is to be executed

and is the principal objective behind the agreement itself. Like the obligation of

a seller to deliver goods in conformity to the contract or that of a buyer to accept

and pay for goods as ordered.

• Reciprocal obligation: Could be a primary obligation in itself, but is also the

obligation expected to be fulfilled by the counter party in response to the execu-

tion of the primary obligation. E.g. the buyer’s obligation to pay is reciprocal to

Page 213: Ontology for Information Systems (O4IS) Design Methodology

7.9 Upper Level Core Contract Ontology 191

the seller’s obligation to deliver and vice versa. Also the buyer’s obligation to pay

is a primary obligation for the buyer.

• Conditional obligation: Does not need to be activated under the normal course

of events. Most remedial rights and obligations come in this category, like the

buyer’s right to seek compensation for failed delivery, binds the seller to deliver

the goods at his added cost.

• Secondary obligation: Gets activated as a part of some other obligation. Like

the sellers obligation to package goods suitable for transportation could be said

to be sub unit of his primary obligation to deliver.

In the next section we move on to the life cycle of an obligation and the phases

or states through which any obligation may pass through. Our analysis of obligation

state changes is similar to the state change semantic relationships that Storey (2004)

has proposed.

7.9.4 Business Contract Obligation States

At the time of signing the business contract all the agreed upon obligations become

legally valid and binding. From a legal perspective the contract obligations are acti-

vated and they remain active through out the contract period, viz, the duration from

and till which the contract is deemed to be valid. However, from the business and

contract execution perspective, once the contract is signed, we assume the plan to be

set in motion, but the actual execution is subject to the business process execution

and has to be synchronized with the business process flow. Hence, we propose an

analysis and states of the obligation life cycle in tandem with the business process

activity state transitions and executions. An obligation may be said to pass through

some abstract ‘Obligation States’ in response to some business activity or related

business state change events. The identification of these obligation states and their

relation to business process or workflow allows us to identify points of integration

between business contracts and existing business process workflow. Another advan-

tage of the obligation state classification is that it is now possible to monitor and

track the contractual obligations as they are being executed. This in turn enables us

to also monitor the overall contract compliance and business performance efficiency.

An overview of the proposed obligation states can be seen in (figure 7.10 and

figure 7.11) and they are summarized below:

• Inactive: Every obligation can be said to be in an ‘inactive’ state once the contract

has been signed but contract execution is yet to be started. The obligation will

remain in ‘inactive’ state in between cycles of contract execution also.

• Active: An obligation may be said to be ‘active’ when the triggering performance

event has been issued. For example, once the buyer sends the Purchase Order to

the seller and he receives it, then the seller’s obligation to deliver is triggered.

Page 214: Ontology for Information Systems (O4IS) Design Methodology

192 7 Case Study I: The Business Contract Knowledge Management Project

Fig. 7.10. Business Contract Obligation States: Overview

• Pending: When fulfilment activity from performer’s side has been accomplished

but the acceptance from the other party is still awaited. When the seller has

dispatched the goods from his warehouse, and is waiting for the third party car-

rier to deliver the goods to the buyer. Alternatively, an obligation may remain in

the pending state, till the all the necessary fulfilment criteria are satisfied. The

buyer may have received the goods but may have rejected the goods as being

unsatisfactory.

• Fulfilled: When the performance conditions are satisfied within the stipulated

performance conditions. Once the buyer inspects the goods and accepts the de-

livery.

• Terminated/Cancelled: If the activation of the obligation is terminated or can-

celed by the Obligee, mutually, or legal authority.

Such executions of obligation in different scenarios are modeled to form a basis

for the classification of obligation and their fulfilment options. The identification

and demarcation of these obligation states is the key to monitoring and tracking

the execution of the contract. When the seller and the buyer sign a contract, all

obligations are stated but they are inactive (refer figure 7.11) and on the occurrence

of the performance event ‘receive order’ the state moves into the next obligation

state.

In figure 7.12 we see an illustration of a typical lifecycle of a seller’s obligation to

deliver. When the buyer sends an actual order for the goods to be delivered and the

seller acknowledges the order receipt, the seller’s obligation to deliver is activated.

Page 215: Ontology for Information Systems (O4IS) Design Methodology

7.9 Upper Level Core Contract Ontology 193

-

Fig.

7.11

.Bus

ines

sC

ontr

act

Obl

igat

ion

Stat

es:D

etai

l

Page 216: Ontology for Information Systems (O4IS) Design Methodology

194 7 Case Study I: The Business Contract Knowledge Management Project

When the seller dispatches the goods for delivery, the obligation may move in to

a state of being triggered. Once the delivery is accepted as being satisfactory or

within the acceptable tolerance level the obligation to deliver can be accepted as

fulfilled. This activates the buyer’s obligation to pay. In case of non-performance, like

delay or unsatisfactory delivery or failure, the obligation goes in to a state of being

pending. There are several recourses possible hereon. The buyer’s rights to remedy

are activated and may choose enforcement options. The buyer may opt for a penalty

and accept delivery at a later date, or he may choose to accept the delivery without

any further penalty or he may choose to terminate that order or the contract itself. In

case the buyer seeks some compensation, it will activate the reconciliatory obligation

on the seller’s behalf and that obligation goes through its life cycle. Provided the

penalty compensation is successfully fulfilled, and then the initial pending obligation

will get fulfilled. In the worst scenario, when the order or the contract is terminated,

the obligation itself is terminated.

Such executions of obligation in different scenarios are modeled to form a basis

for the classification of obligation and their fulfilment options.

The identification and demarcation of these obligation states is the key to moni-

toring and tracking the execution of the contract. When the seller and the buyer sign

a contract, all obligations are stated but they are inactive (refer figure 7.12).

R We see that here we are dealing with the contractual domain pragmatics.

Our analysis of contract obligation through its various state changes is similar to

Storey’s analysis of state-changes as discussed earlier. Thus, our proposed contract

obligation state models are, in themselves, a conceptual modeling pattern, for the

business contract domain.

Page 217: Ontology for Information Systems (O4IS) Design Methodology

Fig.

7.12

.Typ

ical

Con

trac

tO

blig

atio

nLi

feC

ycle

Page 218: Ontology for Information Systems (O4IS) Design Methodology

196 7 Case Study I: The Business Contract Knowledge Management Project

7.10 Specific Domain Level Contract Ontology

The second layer in our proposed MTCO, is a collection of contract types. The fo-

cus in this research has been primarily on business contract types. Business contract

types cover a wide range of applicability, usage and legal contractual obligation

types like sales contract, service contract, bill of sale, transfer of technology, pro-

curement, licensing. We also propose to map to other existing ontologies like prod-

uct catalogues (UNSPSC (United Nations Standard Products and Service Codes Web

Resource), payment terms (standard payment methods), and delivery terms (ex IN-

COTERMS), which can be applicable across diverse contract types. Specific Domain

Level Contract ontology provides information for users trying to understand the obli-

gations, rights and their fulfilments conditions and exceptions particular to that spe-

cific contract type. Each contract type is an extension or restriction of the upper level

core contract ontology to a specified domain. We present conceptual models for sale

of goods contract in this thesis.

In a sale of goods contract, (see figure 7.13) the principle role players are com-

monly called as seller and buyer. The role domain is restricted to that of selling

and buying. Either the seller or the buyer may initiate the contracting process and

thus may be the proposer or the acceptor. The consideration (refer figure 7.13)

is usually some real world entity or goods (both perishable, non perishable), but

generally of a quantifiable and measurable entity. The business transaction involved

is that of an exchange of resources of value in between the two business partners. So

the main performance events are that of delivery (non monetary) and payment

(monetary).

A seller would necessarily have to bind himself to a promise to deliver as per

the agreed delivery terms. Now delivery terms may refer to standards like IN-

COTERMS or may simply define the agreed conditions. The delivery conditions may

be interpreted as business practice constraints in the business process view.

Similarly, the buyer has to commit to pay for the goods received as per the

payment terms agreed. Its possible to include recommended payment standards as

the Unified customs and Practice for Documentary Credits as modeled by Lee (1988,

1998) within this sales of good domain ontology.

In figure 7.13, some sample business activities have been included as shaded con-

cepts to explain the expected performance events more explicitly. Typically a legal

business contract may or may not include such explicit references. But an indicative

inference may always be included.

For example, obligation to pay is unfulfilled if there is an occurrence of late

payment, partial payment on behalf of the buyer. Another example as illustrated in

the figure 7.13 is that the seller has a conditional obligation which is activated

when the buyer invokes his right to cancel. In this case, the seller’s conditional

Page 219: Ontology for Information Systems (O4IS) Design Methodology

7.10 Specific Domain Level Contract Ontology 197

-

Fig.

7.13

.Ext

ract

from

Sale

ofG

oods

Con

trac

tsh

owin

gex

pand

edvi

ewfo

rB

uyer

’sO

blig

atio

nto

Pay

Page 220: Ontology for Information Systems (O4IS) Design Methodology

198 7 Case Study I: The Business Contract Knowledge Management Project

obligation is fulfilled when he accepts the cancelation and performs the actions of

cancel shipment and/or cancel delivery as the case may be. It is to be noted that

the above is only an extract from the entire analysis of ICC’s sale of goods contract

model.

Similarly, delivery terms are also negotiated and expressed in a contract. The

delivery terms include details regarding the time, venue and choice of place of deliv-

ery. Standard delivery terms like International Chamber of Commerce’s INCOTERMS

(Ramberg 1999) can be used to describe the delivery terms. We see that such terms

and conditions, either explicitly or implicitly, defines some legal or business com-

mitments on the part of the parties concerned. These commitments that bind a

role player, like the buyer or the seller, to perform certain acts are called as

obligations. The primary obligations of a buyer are obligation to pay and an

obligation to accept goods as inferred from INCOTERMS. On the other hand,

a seller is bound by the obligation to deliver and an obligation to accept

payment as his primary obligation. Obligations need to be fullfilledBy the ex-

ecution of expected performance. Say for example, a seller’s obligation to deliver

could be accepted as fulfilled only if he carries out the business activities that can be

termed as a delivery.

The actual performance of delivery would probably be comprised of several other

business activities, which have been shown as shaded concepts in figure 7.14. Such

information, presented in the conceptual models of the sale of goods specific do-

main ontology, forms a useful contribution towards generating the CWMs for the

business entities. It also helps in business process integration by identifying and ex-

posing shared business activities as possible points of business interoperability and

interfaces.

In the extract shown (figure 7.14), we see that the seller’s obligation to

deliver is fulfilled by delivery. In reality, it is quite possible that execution of a

promised event is not always successful. A contract generally provides alternatives

for handling such exceptions and unacceptable non-performances (See details in

figure 7.15). For example, the obligation to deliver may be UnfullfilledBy if the

delivery is late or delivery is not affected or the delivery is made, but the goods

do not conform to the specification as described by the goods specification. In such

cases, the buyer gets the right to seek redress for the failed performance. The buyer

may be presented with one or more enforcement options, whereby he could make a

choice from the available options, like choosing to have the order canceled or sim-

ply imposing a penalty or opting for a re-delivery of the goods or even having the

contract it terminated. The buyer’s choice then binds the defaulter, the seller to a rec-

onciliatory obligation to fulfil the chosen form of remedy. The seller has a secondary

obligation to package the goods he delivers.

Page 221: Ontology for Information Systems (O4IS) Design Methodology

7.10 Specific Domain Level Contract Ontology 199

-

Fig.

7.14

.Ext

ract

from

aSe

ller’s

Obl

igat

ion

toD

eliv

eran

dit

sFu

llfillm

ent/

Unf

ullfi

llmen

t

Page 222: Ontology for Information Systems (O4IS) Design Methodology

200 7 Case Study I: The Business Contract Knowledge Management Project-

Fig.7.15.Obligation

toD

eliverand

Related

Rights

Page 223: Ontology for Information Systems (O4IS) Design Methodology

7.11 Template Level Contract Ontology 201

R A detailed analysis has been done for each kind of obligation, rights, or

prohibitions that can be included in a typical sale of goods contract. Thus a wide

range of possible scenarios involved in a commercial business transaction is cov-

ered. This forms an essential knowledge base for the business decision, and strategic

planning also.

Awareness of possible consequences of non-performance or non-compliance to

a contract terms could influence the business process management to a great ex-

tent. Contract compliance and performance monitoring have been a crucial concern

for most business managements. MTCO is visualized to contribute towards busi-

ness knowledge management, improving efficiency and performance. On a wider

horizon, the proposed ontology framework is visualized as a global network of in-

tegrated knowledge resources, exploiting the vast potential of the Semantic Web to

its utmost. An analysis and models for the INCOTERMS is included in the appendix

A.4.

7.11 Template Level Contract Ontology

The third and final layer is a conceptual model of standard contract models and is

application oriented. The templates provided here are intended to act as a guide

to understand the contract templates while drafting contracts. The template layer

ontologies further narrow down the scope and range of each contract type, finally

arriving at a specific domain and interest specialized contract form. Say for example,

a Sale of Automobile Contract template (figure 7.16) requires the consideration, the

Motor Vehicle, to define specific characteristics such as make, year of manufacture,

vehicle registration number, and engine chassis number.

Another nearly similar contract template could be of sale of boats (figure 7.17).

The major difference is the specification of the consideration. There are some vari-

ations in the nature and scope of the obligations involved. The template ontologies

being so specialized have little or no reusability outside their specified range of use.

R So far we have seen how we have captured the implicit and explicit

vocabulary of the contracts in the Semantic Concept View. It is to be noted that with

our obligation state analysis we have actually captured part of the implicit domain

pragmatics as part of our declarative Semantic Concept View.

In the next section, we see the Procedural Concept View for our contract case

study. As said, here instead of UML class diagrams as the final representation we

have opted for other workflow notations like Event Process Chain diagrams and

BPMN (Business Process Modeling Notation). BPMN can be translated in to exe-

cutable (machine readable) BPEL (Business Process Execution Language).

Page 224: Ontology for Information Systems (O4IS) Design Methodology

202 7 Case Study I: The Business Contract Knowledge Management Project

Fig. 7.16. Sample Template Level Contract Ontology Model for Sale of Motor Vehicle

Fig. 7.17. Sample Template Level Contract Ontology Model for Sale of Boats

Page 225: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 203

7.12 Deducing Contract Workflow Model: The ProceduralConcept View

A typical business sale contract between two different business organizations con-

tains data important to the business process transactions like delivery date or ship-

ping address or payment currency. The data put together, provide information re-

garding the procedures to be followed for delivery or payment. Information regard-

ing expected delivery procedure and the possible repercussions of deviations provide

the business enterprise with knowledge of their contractual obligations, and the ex-

pected fulfillment patterns. This in turn influences the business management to take

appropriate steps in the actual execution of the business process so as to comply

with their obligations. The performance of the business process provides the data

(like actual delivery date, or actual shipment date or payment received date), which

is used to compare and monitor the compliance of the executed performance with

the stipulated information or contractual obligations.

The MTCO models explicit, declarative and strategic knowledge contained within

a contract. Interdependencies and relationships between the components of a con-

tract are represented. The three-tier contract ontology is a stratified presentation

of information, moving from the most generic upper level core contract ontology

domain to the specific domain level contract ontology domain and further down

to implementation specific template level contract ontology. The MTCO has been

presented by us in section 7.6.

The procedural knowledge and strategic knowledge is presented through the

choreography of obligations and performance events in the contract, is then modeled

as a set of Contract Workflow Models (CWM). In section 7.9.3 and 7.10, we have

presented a detailed discussion on our analysis of the obligations and a classification

of the different obligation states has been presented. The actual business workflow

should be as close and similar to the deduced CWM to be compliant with the contract

conditions.

7.12.1 Contract Workflow Model

Increasing use of ontological engineering in the realm of business process engineer-

ing has been supported by Deborah McGuinness (2000) who identifies the goals

for ontological development and proposes guidelines for a centralized knowledge

base to capture semantics from domain, standard terms and vocabularies. Howard

Smith (2003b) states,

“Agent based system rely upon ontologies to provide a map or blue print of

the space each agent navigates through communication and interoperation

with other agents.”

Page 226: Ontology for Information Systems (O4IS) Design Methodology

204 7 Case Study I: The Business Contract Knowledge Management Project

Howard Smith also emphasizes on the need for software engineering, business pro-

cess re engineering and ontological engineering integration.

We model obligation states to capture the information relevant to that obligation

as the fulfillment is being executed. Relationship between obligations, obligation

states and performance events forms the foundation for the proposed CWM method-

ology. We visualize a contract as containing prescriptive directions for the execution

of business activities or tasks that will in turn fulfill the obligations expressed in the

contract.

We now propose a methodology for deriving the Contract Workflow Model

(CWM) from any given business contract instance, using a contract ontology knowl-

edge base, the Multi-Tier Contract Ontology (MTCO). We follow the same pattern-

based description adopted in this research to describe the CWM methodology as

stepwise guidelines for any user aiming to derive the CWM from their signed con-

tract. The user makes use of the available MTCO as a reference to help him easily

understand and pinpoint the obligations and the expected performance for fulfilling

the legal obligations. The CWM is the first step in ensuring interoperability between

enterprises. This paper makes use of BPMN (White 2004) for representing the CWM.

We have presented a set of BPMN patterns for common CWM in (Kabilan 2005), we

include some of those patterns to exemplify our work in section 7.12.5. Thus, the

CWM may be translated into executable BPEL4WS or mapped to other business

process specifications like BPSS(Business Process Specification Schema). Hence, the

identification of the common points for communication, activating performance

events and the chorography of obligation fulfillment, is a fundamental step towards

affecting full interoperability.

We define a CWM as:

R A partial choreography of performance events for each of the partiesconcerned as deduced from the perspective of the governing business contractand is an indicative model for the contract compliant business process model.

Following this, below we outline the procedure for obtaining a CWM from a

contract:

- The contract document is analyzed to extract the data contained in it.

- The extracted data are compared and matched to the specified meta-data con-

cepts as established in the Multi Tier Contract Ontology. The two steps are re-

peated iteratively to obtain all the concepts and their instances in the contract.

- From the identified contract type ontology, the common obligations and their

performances, defined or suggested, are considered. Added to the specific infor-

mation from the contract instance, the list of all stipulated obligations and the

required or inferred performance events is obtained.

Page 227: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 205

7.12.2 CWM Methodology

We now discuss the CWM methodology in detail. The Information Systems designer

needs to have as input, the agreed contract, any details of the existing business

process model (optional), the proposed MTCO as a lexicon. We first give an overview

of the different phases and thereafter elaborate with the help of a typical business

contract example.

• Phase 1: Contract Type Identification: The first phase enables the user to iden-

tify the contract type to which the particular contract instance belongs. This is

done by guiding the user to identify the principal components from the upper

level core contract ontology and then moving on to match the specifics to spe-

cific domain level contract ontology.

• Phase 2: Contract Instance Meta-data Extraction: Once the user identifies the

specific contract type to which the contract belongs to, he identifies all the ma-

jor object components of the contract type with respect to the contract instance

given. This leads to the identification of pertinent Meta-data and information

available in the contract instance. At the end of phase 2 the user should be able

to draw an object diagram for his contract if so desired but not absolutely nec-

essary. It would suffice for the novice user to come up with the list of identified

objects and Meta-data.

• Phase 3: Obligation, Performance Events Identification: Identify the process

oriented obligations, performance events, non-performance events, rights objects

from the identified list of objects/Meta-data.

• Phase 4: Obligation, Performance, Non-Performance Inter-relationships and

Conditions: Identify the conditions, pre conditions and binding relationships be-

tween each of the identified obligations, rights, performances and non-performances.

Also identify the different obligation types, the various obligation states through

which each obligation may pass through and their related performance event or

right as the case maybe. Finally, to arrange the identified obligation states and

the performance events in a time ordered sequence list.

• Phase 5: Mapping to existing Business Process Workflows: In case, a business

process or business workflow is available, a semantic mapping between the con-

tractual performance events and the available business process flow is executed.

• Phase 6: Logical sequencing of Contract Workflow: In this phase, the user

is guided to sketch a rough activity-state flow chart to help him visualize the

expected choreography of contract obligation execution workflow. The user may

use any notation for sketching the activity flow diagram. The performance events

which respond to or change each of the obligations to the fulfilled state, are the

identified points for business process interoperability. UML activity -state dia-

Page 228: Ontology for Information Systems (O4IS) Design Methodology

206 7 Case Study I: The Business Contract Knowledge Management Project

grams or any other notations like EPC (event driven process chain) notation may

be used. In this paper, event driven process chain (EPC) notation has been used.

• Phase 7: Deducing the final Contract Workflow Model: Now, the user, takes

only the performance events in the sequence in which they occur along with

the obligations from each of the two individual diagrams for the obligation-

performance event (from the previous phase). Using BPMN notations, the user

is required to represent the performance events as tasks, and the individual

obligation-performance diagram as two business processes, using swimlanes. In

case of secondary obligation, all the related activities may be modeled as sub

processes using the BPMN. A detailed discussion on the mapping to the BPMN is

discussed in the section 7.12.5.

However, the user may use any notation for sketching the final CWM as dis-

cussed in the last phase. We present two possible representations, namely BPMN and

EPC diagrams. The objective is to emphasize that the conceptualization of domain

knowledge is independent of the representation language chosen, as we have dis-

cussed continuously in this research. The proposed CWM methodology holds good

irrespective of the representation language. All that is required is a mapping be-

tween the representation language syntax (notations) and the concepts identified in

the CWM.

We now take up the Event Driven Process Chain diagrams (EPC) as representa-

tion language, we discuss BPMN in the next section. The EPC makes use of logical

connectors AND, OR and XOR to channel the flow of event execution. Performance

events are represented by events and obligation state transitions are represented

by functions in the Event-Driven Process Chain diagram. If required the user may

also transform the deduced CWM in to formal Petri-nets. Aalst has proposed formal

methodology for transforming EPC notations to formal Petri-nets in (Aalst 1994).

7.12.3 Detailed CWM Methodology

Once again, we follow a pattern for describing each phase as:

Name: The phase number and descriptive name for the phase is included.

Input: Expected input sources and material is listed.

Output: Expected output at the end of the described phase.

Tips: In case there are some additional recommendations and tips for the designer.

Process: Describes in a series of steps, what the designer has actually got to do.

Step: Procedure to be followed at each step

Note,that the name of the phase is included below as the subsection heading itself.

Page 229: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 207

Phase 1: Contract Type Identification

Input: Contract Document, MTCO.

Output:Contract document, identified shared domain ontology or template ontol-

ogy.

Process:

Step 1: Go through the contract to identify the contract type, like sale of commer-

cial goods, lease rental, non disclosure agreement, and service level agreement.

Tips: In most cases the contract type would be explicitly stated as part of the head-

ing or covering information. It is necessary to have the legal intent and scope stated

explicitly in a contract.

Step 2:

• Search and compare with available template ontology to see if the contract is

based on any pre-defined form.

• If not, then the user should be able to locate the shared domain ontology specific

to the contract type, like Sale of Goods Ontology for buy-sell contract type.

• If no contract type ontology is found, then the user has to make use of the Upper

Level Core Contract Ontology to identify all the concepts, as described in Phase

2 below.

Tips and Discussion: If the contract is based on template ontology, then all the user

has to do is to extract the actual data information for each of the Meta-data compo-

nents as stated in the template ontology.

• If it is based on a shared ontology, then the user still gets to identify the actual

information. Roles, obligations and performances stated in the shared ontology

would necessarily be there in the contract instance. Like from the Buy-Sell con-

tract model ontology, he gets the main concepts like that the primary role players

are the seller and the buyer. Their primary obligation is to deliver goods and pay

respectively. Other attributes and associations indicated present the user with a

set of information, which he needs to search for in his current instance of the

contract.

Additionally, he has to check for the contract specific performance conditions

and statements, as the parties may have agreed upon some other conditions over

and above the recommended minimum conditions. The user can use the Upper

Level Core Contract Ontology to further enhance his basic understanding of the

contract concepts and iterate till he can identify the entire stated obligation, per-

formance, rights and other conditions.

• If no shared ontology can be found, then the user has to start from the fundamen-

tal understanding of a contract as expressed in the Upper Level Core Contract

Page 230: Ontology for Information Systems (O4IS) Design Methodology

208 7 Case Study I: The Business Contract Knowledge Management Project

Ontology. The Upper Level Core Contract Ontology shall have all the mandatory,

recommended, and standard concepts for any legal business contract. Using that

as a guide to interpret the contract, a user will be able to move towards the

shared and template ontology subsequently.

Phase 2 is described with respect to a user starting from the Upper Level Core

Contract ontology. The section is equally applicable to users starting from shared or

template ontology, but they may have to work a little less to identify all the data and

information.

Phase 2: Contract Instance Meta-data Extraction

Input: Contract Instance Document (paper or electronic), identified Specific Domain

Level Contract Ontology from MTCO, USP2 Design Guidelines.

Output: Identified Meta-data list/ Object Diagram.

Process: This phase is the semantic concept view as described in the USP2 Design.

Here we identify the main concepts of the particular contract. We refer to the Specific

Domain Level Contract Ontology as the conceptual pattern identifying the generic

concepts to be looked for. The objective of this phase is to search and retrieve the

information in the given contract instance.

Since the Specific Domain Level Contract Ontology itself has been designed fol-

lowing the USP2 Design, its sufficient, if the designer uses that itself as the semantic

concept view pattern to analyze and extract information. But of course, the designer

may make use of the detailed guidelines of the USP2 Design to identify the concepts,

discover the relationships between them and so forth. However, for simplicity sake,

we use the Specific Domain Level Contract Ontology as the conceptual pattern and

proceed further.

In this phase the designer needs to go through the contract and identify the

following concepts as described in the steps below. All of them need not be found

in all contract instances. But these are the recommended concepts to be included in

a contract, to ensure it is legally valid and binding. Also all the concepts described

below MAY NOT appear in the same order in a contract. The user is advised to go

through the entire contract to identify the specified concepts.

Step 1:

1 Go through the contract terms and identify who are the parties to the contract.

(Concept identification step in the SCV)

2 Identify what roles they undertake to perform within the scope of the current

contract being examined. (Semantic Relationships discovery, specially the actor-

action, actor-object, concept-attribute type relationships).

3 Also extract the identification information given for each of the parties, like ad-

dress, and certification number, etc.(Meta-data identification).

Page 231: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 209

Tips: Usually, they are organizations or a person between whom the agreement is

made is clearly stated and defined in the opening paragraphs it. It is a legal re-

quirement that every contract MUST have clear identification of the ‘actors’ of the

contract. The actors may have certain responsibilities to carry out in the context of

the contract, ‘roles’. Say an organization may be buying goods from another, when it

is generally termed as the ‘buyer’. The same organization may be selling to customers

in another context, where it could be the ‘seller’. Thus, we have ‘actors’ playing a de-

fined ‘role’ in a contract. Further descriptions and characteristics of an actor, or role

can be seen in the conceptual model for the upper layer, and specific characteristics

for a buy sell contract can be seen in the shared layer of Multi Tier Contract.

Step 2: Identify the period or duration within which the said contract is valid.

Tips: In some cases, only the contract valid from date or the date of signing may be

explicit. In that case you will have to infer, the valid till date, by reading through the

contract. If it is a framework contract, it may be specified that the period of contract

is to be decided mutually.

Step 3:

1 Identify the primary purpose for which the contract is being signed called the

‘object for consideration’ in legal terms.

2 Identify specific descriptions and/or specifications for the stated ‘consideration’.

Step 4: Identify the promises or guarantees made by each of the parties.

Step 5: Identify the required performance which are expected to fulfil the promises.

Step 6: Identify the rights and liabilities listed for each of the parties.

Step 7: Identify the legal jurisdiction under which the contract is valid.

Tips: In international commerce, it is important to state which law and/or jurisdic-

tion the contract is valid. That would determine the court of law where all disputes

would be tried and adjudicated. In e-contracts, further specific details regarding se-

curity, storage and other issues as discussed in the EC Directives’98 (EC Directives1998 n.d.) would also need to be identified.

Step 8: In case of e-contracts for e-commerce, identify technical specifications for

messaging, and routing, etc.

Tips: E-contract specifications as laid down by the EC Directives and other legal

jurisdictions are being analyzed and carried out by various other research teams and

organizations. For example, the Trading Partner Agreement of ebXML (OASIS 2002)

deals exclusively with all technical parameters to be agreed for an electronic busi-

ness. Detailed discussion of those parameters is not included within the current

scope of this thesis.

Step 9: Represent the entire identified objects and their data on an object UML dia-

gram.

Tips: This step is optional for those users not familiar with UML conceptual model-

Page 232: Ontology for Information Systems (O4IS) Design Methodology

210 7 Case Study I: The Business Contract Knowledge Management Project

ing. It is sufficient to have identified the concepts and extracted the data in a simple

list as well.

Phase 3: Obligation, prohibitions, rights, performance event identification

Input: Basic Meta-data identified from contract instance in Phase 1 and 2.

Output: List of obligations, their types and their actors/roles, the related perfor-

mance required to fulfil the identified obligations. Similar lists for included rights,

prohibitions may also be drawn up following the same strategy.

Process:

Step 1:

• Identify the main obligation(s) which each of the party promises to fulfil (from

phase 2 we get basic idea)

• Identify the required performance, which would fulfil the stated obligations.

• See if any pre conditions, qualifying conditions or dependencies on the perfor-

mance events are stated. Here, we may also use the temporal semantic relations

(figure 6.9) as a basis.

• See if any time-frame for performance execution is stated either explicitly or

implicitly.

• See if any place or location or point has been stated for the performance to occur.

Tips:: In case of commercial sale of goods, the seller promises to deliver the goods,

then he is bound to the actual execution of performing all those actions, which would

allow him to ‘deliver the goods’. That could even include the seller ordering his raw

materials from his supplier.

The seller may delegate the execution of the business events to other third parties

unless otherwise stated in the contract. But in most cases, delegation of the perfor-

mance does not imply delegation of the obligation. For example, say the seller hires

transporters to deliver the goods to the buyer, and the transporters fail to deliver the

goods, it would still be the seller’s responsibility to deliver, which would have failed.

Generally, all performances are time bound. A seller, on receipt of a purchase

order from the buyer, would necessarily have to deliver the ordered goods within a

certain number of days or before a certain specific date. Such conditions are usually

stated clearly on the contract. The time aspect is crucial in determining many of the

distinction between a performance and a non-performance.

Step 2: Identify the Unconditional Rights, like right to inspect, and right to cancel,

etc. Identify the Remedial rights or Conditional Rights, like Right to Penalty, and

Liability for risk transfer, etc. Tips: Guarantees, warranty periods, rights to inspect

the goods are some examples of rights, which a buyer may enjoy under a typical

commercial contract. Legal contracts should have explicit statements regarding the

Page 233: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 211

process of dispute resolution and remedial actions for cases when one or both of the

parties are dissatisfied with the performance execution. A breach of contract clause

may be included to cover all possible scenarios, which constitute a non-performance

or a contract violation.

Step 3: Identify for each obligation, who is the owner and who is the ownee. Simi-

larly also identify the rights owner and ownee as well as the prohibitions owner and

ownee.

Step 4: Identify for each obligation, the obligation type from the MTCO. Traverse

the associations to get the related reciprocal, conditional, reconciliatory or secondary

obligation.

Step 5:

• Look up the main performance events needed to fulfil each obligation, as identi-

fied in the previous phase, from the MTCO.

• Look up the performance events that are prohibited under the list of prohibitions.

• Look up the possible options for the identified rights.

Step 6: Look up the non-performance events that are stated to cause unacceptable

conditions or unfulfillment of obligations.

Tips: Generally the violations of obligations are tied to the activation of related

rights. Therefore an occurrence of non-performance would activate the associated

right that in turn may activate reconciliatory obligations and so on. Thus this step

is vital to identify and establish the inter-relationships between obligations, prohibi-

tions and rights.

Phase 4: Obligation, Performance, and Non-Performance Inter-relationship

Identification:

Input: List of obligations, list of rights, List of prohibitions, list of related perfor-

mance events and other identified inter-relationships identified in previous phases.

Output: Time ordered list of obligations, the obligation states through which each

individual obligation passes in response to the performance events.

Process:

Step 1:

1 The user has now to order the obligations. The ordering of the obligations is

recommended on the nature of the obligation, that is the primary obligation

should be the first to begin with, followed by the included secondary obligations,

thereafter the reconciliatory obligations. Group the obligations by the obligation-

ownee.

2 List all the rights of individual parties at the end. However they need not be

ordered sequentially since some of their execution need not be compulsory or

no time ordered choreography might be interpreted.

Page 234: Ontology for Information Systems (O4IS) Design Methodology

212 7 Case Study I: The Business Contract Knowledge Management Project

3 List any Prohibitions too, if stated.

Step 2: Separate the list of performance events ordered by the role player expected

to perform the activity.

Tips: Each list would ultimately lead to the business activity workflow as per the

contract requirement for each of the organization involved.

Step 3: Now order the activities sequentially in the order (with respect to time) they

should be executed.

Step 4: Note down any pre conditions or rules or policies, which need to be checked

or enforced for any of the listed activities.

Step 5: Identify the obligation states through which each identified obligation will

pass through.

Step 6: Identify which performance event is related to individual obligation state

change for the listed obligations.

Step 7:

• From step 1, the user should have separate list of obligations for each of the role

players involved.

• From step 3 and 4, the user will also have a separate list of performance events.

• From step 5 and 6 the user now has a broken up detailed list of individual obliga-

tion states and their related performance events. Keep the same sequential time

order the user is now required to merge the list of obligations with the detailed

obligation state detail.

• Thereafter, the user is to insert the time ordered performance events into the

now merged list of obligations for the same role player. A similar process for the

other role player will give the user another time ordered sequence of obligations

and performance events.

• Now the user is to place both the flowchart like time ordered contract obligations

and performance event lists for both role players side by side. The user should

be able to see the points of interaction between the two lists. The user has to

simply link the points of interaction. Any pre conditions or policies are to be

superimposed to get the binding conditions.

Tips: They are usually the obligation state changing performance events initiated

by the beneficiary of the activating obligation. For example, for obligation to deliver

state change from ‘triggered’ to ‘fulfilled’ for a seller is initiated by the performance

event of acceptance of delivery by the buyer. Also, pre-conditions like delivery ac-

ceptance notification must be done within 7 days of delivery should be written on

the inter-connecting link.

Page 235: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 213

Phase 5: Optional mapping to existing Business Process Workflows

Input: Deduced list of performance events and activities from the contract from

phase 3, business process workflow model of the organization to which the contract

is to be mapped. This phase is an optional phase to be carried out in tandem with

the phase 4 described above. The existing business process flow will provide precise

identified business activities to be included in lieu of the performance events list.

User may step over this optional phase directly to phase 6 if no such input business

process flow is available.

Output: Merged and mapped business process event list, with identified points of

tracking obligations.

Process:

Step 1:If a business process workflow or ontology describing the regular internal

business workflow is available, then the user may now try to map the inferred list of

performance events to the list of activities in the business workflow. Similar terms

may indicate the same event.

Step 2: The internal business workflow model would enable the user to break up

some of the more abstract or major performance events, like ‘packaging’ in to more

practical sub processes and events like ‘get material’, ‘get dimensions’, ‘pack goods’,

and ‘mark the goods’ etc. The identified common events between the obligation

state changes related performance events list and the business process events, like

for example, ‘acknowledge receipt of order’ are the common points of integration be-

tween the contractual workflow and the workflow of the business organization. On

the other hand a similar, ‘send order’ from the buyer’s list would be the counterpart

of this mapping of business and contract workflow integration. Since the identified

points of integration in effect change the state of the obligation, they are useful in

monitoring and tracking the commitment fulfilment process.

Phase 6: Contract Workflow Sequencing

Input: Time Ordered list of obligation, obligation states, and the related perfor-

mance events (or business events in business process workflows) from phase 4 (or

from phase 5 if mapping has been done).

Output: CWM using chosen representation language be it Event-Driven Process

Chain notations or BPMN or Petrinets, for the flow of contractual obligation ful-

filment.

Process:

Step1:The user first represents the list of time ordered obligation states and their

performance events from Phase 4 (or phase 5) in a graphical form using the event-

driven process chain notations as discussed earlier (chapter 4.1). Obligations are

mapped to functions and performance events to events.

Page 236: Ontology for Information Systems (O4IS) Design Methodology

214 7 Case Study I: The Business Contract Knowledge Management Project

Step 2: The user connects the events and functions with arcs and logical connec-

tors. The logical connector to be used OR, XOR or AND is to be decided by the user

following the agreed statement in the contract. A choice of OR is usually the case

when the obligation owner is given an option of choosing one or more than one

alternatives for obligation fulfilment. Example, when the buyer may choose to have

his remedy for unsatisfactory delivery as a ‘penalty payment’ and ‘a redelivery of

goods’. A XOR connector is used whenever the obligation state transformation can

occur by the function of any of several alternative performances. A sample contract

example using the EPC notations can be seen in our appendix A.3, figure A.6.

Tips: Remember, in the event-driven process chain notation, the functions represent

obligation states, the events the performance event required to change the state of

the obligation.

We have also used BPMN to model the contract workflow model, as we shall

discuss shortly.The BPMN is an expressive, graphical process modeling notation, easy

understandable by process modelers. In (Kabilan 2005), we have defined the core

mapping patterns between the concepts of the CWM and the BPMN:

- The performance event to the BPMN sub-process.

The obligation states to the BPMN events.

-- The choreography of performance events to the BPMN sequence flow.

- The simultaneous processing of two or more performance events to the BPMN

AND gateway.

- The exclusive processing of performance events to the BPMN XOR gateway.

7.12.4 Using BPMN to model CWMs

In this section, we now motivate our choice of BPMN as the formal representation

language for CWM. We use CWM-BPMN to further map to internal business process

models,as discussed in section 7.13.1.

The choice of BPMN as the formalization language was based on the several

features of BPMN. We discuss the advantages and disadvantages of BPMN below:

• BPMN is more expressive than other similar languages like UML activity diagrams,

UML Sequence Diagrams, formal colored Petri nets. It is especially suitable for

the contract -business process domain, as it gives us the flexibility to capture the

domain specific semantics involved. BPMN uses two levels of information rep-

resentation. On the first level, the graphical notations are simple to understand.

On the second level, each BPMN construct defines a set of attributes that can be

used to convey a richer specification. In case of CWM, we have used user-defined

attributes to model the specific characteristics like individual ObligationState of

Page 237: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 215

each Obligation. In this regard, we found the expressive capacity of BPMN to be

advantageous over others like UML activity diagrams.

• BPMN is graphical in nature. Thus affords easy understandability to both busi-

ness process modelers, as well as domain experts including lawyers, information

system experts and business management and decision makers. At the same time,

the set of non-graphical attributes render BPMN as a powerful notation to map

to Business Process execution languages.

• BPMN is appropriate to model abstract high-level ‘black box’ processes, collabora-

tion patterns and sequence diagrams, all in one single Business Process Diagram

(BPD).

• BPMN allows the different parties to have different perspectives of the entire

BPMN diagram. The CWM expressed as a high-level abstraction gives all par-

ties involved an idea of how each role player would act and their overview of

the process execution. At the same time, low-level business process details may

be encapsulated within the same abstract high level CWM. Each role may have

a different view of the entire CWM. For example, the buyer needs to know that

his counterpart, the seller would ‘make goods’ in response to his ‘send PO’ task.

But the buyer does not see exactly how the seller ‘makes his goods’. Whereas, the

seller should be able to drill down to see his internal business activities which

may include, ‘get supplies from the supplier’, ‘order extra workers to assemble

the goods’ and ‘pay for supplies’.

• BPMN can be mapped to a number of low-level specification languages (machine

executable) like BPEL4WS, RosettaNet, ebXML and BPSS. Thus, the graphical

CWM can be made operational.

• The graphical elements of BPMN can be extended to adapt for domain specific

purposes. Though BPMN restricts addition of new core elements, it allows the

modeler to add user-defined attributes, change format and layout specification

(except a few reserved ‘keywords’ like layout specifications). For example: the

three types of events, start, intermediate and end event defined can be defined

to have different internal markers to specify additional information. Some basic

types like Message, Rule, Link, Compensation, Error and Timer have already been

pre-defined. Additional markers may be specified for each Obligation State. In

this current document, we have used the existing markers of timer and message

to denote the different obligation states.

7.12.5 CWM-BPMN Transformation Patterns

The CWM patterns are based on the application of the Workflow Patterns as pro-

posed in (van der Aalst, ter Hofstede, Kiepuszewski & Barros 2000b, van der Aalst,

ter Hofstede, Kiepuszewski & Barros 2000a). The other theoretical background is

Page 238: Ontology for Information Systems (O4IS) Design Methodology

216 7 Case Study I: The Business Contract Knowledge Management Project

the BPMN specification. The basic patterns as suggested by Van der Aalst et al. have

been restricted or specialized for the contract and business process domain and pro-

posed as the contract workflow CWM-BPMN patterns. The workflow patterns are

useful for the business process modeler to analyze and interpret which case scenario

fits the contract instance best.

The main inputs to the business process modeler (also an IS designer) are the

contract knowledge base, MTCO, the actual contract instance, the set of CWM-BPMN

transformation patterns and optionally the existing internal business process model.

It need not be a machine-executable business process model, but simply a source of

information regarding the usual manner in which similar business activities are exe-

cuted by the concerned business enterprise. The objective is to use business process

or activity terminology so as to identify the performance events in the CWM as close

as possible to the ones currently in practice within the enterprise.

We use the same typical business contract scenario discussed in the previous

sections to illustrate our CWM-BPMN patterns. When no previous process models

exist then the CWM itself is the high level business process model. The CWM de-

duced from the contract instance and the MTCO may use concepts or terms from

related ontologies like the enterprise ontology, business process management ontol-

ogy. In which case, the natural language interpretation of the performance events

is replaced by precise business activities or process names. In case there is a pre-

existing internal business process model then the task of the process modeler is to

compare the deduced CWM and the pre-existing business process models to check

for contract compliance. The CWM provides the boundary conditions within which

the existing business process model can be allowed to vary and yet be compliant to

the contract. In case the existing process model violates the CWM then the business

enterprise runs the risk of contract violation. When no business process models exist

then the process modeler needs to formalize the high level CWM in to an executable

business process model. The CWM-BPMN patterns provided below are an aid in this

direction.

Pattern 1: Contract -Business Process

Description: The activities of each partner are modeled as a sequence of pro-

cesses or a workflow within one swim lane each in a single pool. In case, a detailed

level of modeling showing all sub processes is required, then multiple swim lanes

for each partner /actor/role may be used. Care has then to be taken while modeling

the inter enterprise communication through the use of messages. It is thus recom-

mended that two different levels of abstraction are maintained for clarity and easy

understanding.

Examples: The performance activities as identified to the seller are modeled as a

sequence of business processes in a single swim lane, whose name is represented as

Page 239: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 217

the role or actor from the contract. Similarly another Lane is attributed to the buyer,

one to the carrier and so on. The entire CWM consists of this set of inter related

swim lanes and is equivalent to a pool in a Business Process Diagram (BPD). In the

sample CWM given in figure 7.18, we see that the interaction between the Buyer

and the Seller are represented as separate swim lanes.

BPMN mapping: Swim lane, Pool

Page 240: Ontology for Information Systems (O4IS) Design Methodology

Fig.7.18.ASam

pleC

ontractW

orkflowM

odelusingB

PMN

Page 241: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 219

Pattern 2: Performance Events

Description: The performance events and non-performance events from the

MTCO are mapped to Activity, Process or Sub-Process in BPMN. The choice of ac-

tivity, process or sub process depends upon the level of abstraction used. Usually at

the CWM, only partial information may be available, so a modeler can infer only

processes or sub processes. Activity may be identified at the time of detailed low-

level internal business process model description or when mapping to pre-existing

process models.

Examples: In the case scenario illustrated in figure 7.18, examples of Performance

Events associated with the buyer are Send PO, Inspect Goods, and Send Cancelation.

Similarly those of the seller are VerifyOrder, Make Goods, and Package goods. In

this example, we see that send PO is an identified task, hence modeled as a BPMN Ac-

tivity, whereas, Verify Order involves internal order verification process and thus

modeled as a BPMN collapsed Process. It has been used as a black box to hold the

internal workings of the seller.

BPMN Mapping: Activity, Process, and Sub Process.

Pattern 3: Obligation State Changes

Description: The contract- business processes between the two parties have cer-

tain obligations that are required to be fulfilled by the execution of related activities.

The activities themselves are represented using activity or process or sub process.

The obligations are modeled as events in BPMN. The initiation or triggering of these

sequences of activities is represented by a start event. The start of a cycle of contract

execution may be triggered by some external activity like the other party sending

a purchase order. This dependence on other external factors for the start (trigger-

ing) of the contract obligation fulfillment is represented by message start event. The

same performer may trigger sub processes within the CWM only on completion of

other processes/activities.

But it may also be that the counter party expects certain response or activity.

Thus, this dependence of external factors should be modeled as intermediate mes-

sage event. In case there is a certain predetermined time out period, then we should

model the condition as a timer. In case, when some internal business policy or rule

triggers a process, use rule start/intermediate event. The process modeler may make

use of the other attributes of the event types to capture specific aspects of the obliga-

tions (from the MTCO) like the obligation state name, obligation type, the obligation

owner, obligation ownee (the performer,or the role for the swim lane would be the

obligation ownee).

Examples: The arrival of a purchase order from a Buyer initiates the primary

obligation of the seller to deliver goods. Since the entire process is triggered by

Page 242: Ontology for Information Systems (O4IS) Design Methodology

220 7 Case Study I: The Business Contract Knowledge Management Project

buyer’s activity, we model the input as a Message Start. Alternatively, the business

process modeler may choose to connect the Message Flow directly to the responding

business process or activity on the seller’s workflow, in which case he MUST note

the obligation state changes on the message expression attribute. Figure 7.19 takes

a closer look at the above-mentioned scenario.

BPMN Mapping: Start event, intermediate event, and end event.

Fig. 7.19. Pattern 3: Contract Obligation State Changes

Pattern 4: Performance Events Sequences

Description: Choreography of activities/ processes is represented as a sequence.

The time line in which they need to be executed orders the performance events

identified for each partner. The general flow of events is depicted by BPMN sequence

flows. The type of sequence flow used depends on the nature of decision to be made

(gateways) and controlling conditions to be expressed.

Examples: The seller on receipt of an order is obliged to send an acceptance

or acknowledgement to the buyer. Inactivity implies acceptance. But to do so, he

MUST verify the order, maybe check the status of the buyer (buyer’s credit history),

and maybe be the seller needs to check his production schedule to see if he can meet

the deadlines, or maybe he has to check with his supplier for availability of supplies.

BPMN Mapping: Sequence flow.

Pattern 5: Simultaneous Processing

Description: An AND gateway is used to describe simultaneous processing of

several sub tasks or processes in parallel. An AND gateway is also used to synchro-

nize other activities.

Page 243: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 221

Fig. 7.20. Pattern 4 and Pattern 5: Contract Performance Event Sequences and SimultaneousProcessing

Examples: The seller makes goods at the same time he also arranges for car-

rier, and procures packaging material. The seller would wait for all the three paral-

lel processes to be finished before he notifies buyer that the goods are ready. (See

figure 7.20, this is an expanded version of the Verify Order sub process shown in

figure 7.19).

BPMN Mapping: AND Gateway.

Pattern 6:Communication between the Parties (Performers)

Description: The time ordered sequence of the activities or performance events

is segregated in to performer-wise groups. The communication between the two

groups (swim lanes or pools) is represented using Message Flow connectors. Mes-

sage flow may also be used to represent the performer and the performance owner

(for whom a task is being carried out).

Examples: The buyer sends an order to his seller. In the swim lane for the buyer,

this is represented as ‘send order’ process. From the MTCO, we can deduce that the

beneficiary of this performance event if the seller. Thus the communication between

the two is modeled using a message flow. (Source is the send Order process in the

buyer’s process diagram the target is the seller’s process.) If the corresponding event

or obligation is not identified then the message flow shall connect to the seller’s

swim lane boundary else to the appropriate message or obligation state event type.

In the above case, the receipt of the order changes the ObligationtoDeliver state

from Inactive to Active for the seller. Thus the target of the message flow is an

obligation state (message type) start event.

BPMN Mapping: Message flow.

Page 244: Ontology for Information Systems (O4IS) Design Methodology

222 7 Case Study I: The Business Contract Knowledge Management Project

Pattern 7: Exclusive Processing

Description: An XOR gateway is used to describe situations when the actor has

to choose ONE from a set of available options. A default gateway option may be

indicated. A conditional outflow may also be modeled using the conditionExpression

attribute of the out going sequence flow.

The choice may be made based in data available in the Business process diagram,

and then the XOR gateway may be of type Data-based Gateway. If the choice is made

on the occurrence of certain event or trigger from the other party (intermediate

event in the current business process) then an event-based XOR maybe used.

Examples: The buyer is entitled to cancel his order within 7 days from the date

on which the seller receives his order. So in case, he sends his cancelation,then the

seller is faced with a decision to make:

• If the cancelation came within 7 days from the order date, then the seller has

to accept the cancelation unconditionally. This is the default outgoing sequence

flow condition Expression is set to a string expression of ’cancel-date<= (order−date + 7).

• If the cancelation is received after 7 days; the seller may reject the cancelation.

That is the buyer owes the seller entire payment for the ordered goods irrespec-

tive of whether the buyer takes the delivery or not.

• The cancelation is received after 7 days and the seller has started to make goods.

But the seller may choose to accept the cancelation with a penalty fee applied.

• If the cancelation came after 7 days, but the seller has not yet begun production

or for some internal reasons has not acted on the order, then he may choose to

accept the cancelation, though he was entitled to reject the cancelation

As seen above, this scenario may be modeled as an event-based gateway with

conditional expressions associated with the sequence flows. Alternatively, the situa-

tion may be broken down in to a series of gateways to handle all the aspects defined

above. The final choice rests with the business process modeler.

BPMN Mapping: Event based Gateway

Pattern 8: Remedial Options Choice

Description: In case of deviations, one of the business partners usually has a

number of remedial options (rights, permissions) available to him. It may be possible

that one or more of the available options may be chosen. The choice is quiet complex

and is dependent not only on the data within the CWM but also is influenced by

management policy, and legal jurisdiction etc. The scenarios should be modeled as

a complex decision, signifying human intervention.

Page 245: Ontology for Information Systems (O4IS) Design Methodology

7.12 Deducing Contract Workflow Model: The Procedural Concept View 223

Fig. 7.21. Pattern 7: Exclusive Processing

Examples: The goods delivered to the Buyer are not of acceptable quality or

according to the specification agreed upon in the contract. The Buyer may have the

option to:

• Reject the entire delivery.

• Reject the defected goods only and accept the rest.

• Seek replacement for the rejected goods.

• Seek compensation due to inconvenience cased by this non conformance be

obliged to deliver the ordered goods to someone else, so this deviation from

the seller makes the buyer default on his other obligations.

• Based on previous history with the seller, the buyer may choose to do not to

anything but send a warning. In this scenario, the buyer may choose one or more

of the above options. His choice would be a complex decision. (See figure 7.22)

BPMN Mapping: COMPLEX Decision Gateway.

In the next section, we shall see how such contract workflows can be used for

facilitating interoperability between enterprise systems. The work on the alignment

of contract to business processes and exception handling process patterns is the

result of a collaborated research between the author and Jelena Zdravkovic.

Page 246: Ontology for Information Systems (O4IS) Design Methodology

224 7 Case Study I: The Business Contract Knowledge Management Project

Fig. 7.22. Pattern 8: Remedial Options

7.13 Uses of MTCO and CWM

Now we shall look at some illustrative uses of our proposed MTCO and the CWM

in the following sections. As said earlier, we shall restrict ourselves to the overview

of these applications in this thesis. The proposed uses for decision support, inter-

operability of enterprise systems and management of contract knowledge are some

examples of how an ontology for Information Systems may be used. Thus, our sec-

ond goal of exemplifying how ontologies may be used in Information Systems is

fulfilled.

7.13.1 Alignment of Contract to Business Process Models

The deduced Contract Workflow Models should be aligned to the actual business

process models. There may be a business process that the enterprise may be follow-

ing, or there may be none. In the later case, the deduced CWM becomes the internal

business process model that the enterprise should adopt. In the first case, there is a

need for aligning the existing business process models with the contract compliant

model. Also, in reality a given enterprise has business relationships with more than

one other business entities, therefore, there would be more than one contract that

is valid. It is impractical that an enterprise will modify its existing business process

to each of the new contracts agreed to. More realistically, the enterprises will enter

in to contractual agreements that are closest to their internal business processes, to

begin with. Otherwise, they will map their existing internal processes, in such a way

that the contractual agreement is not violated. Therefore, the need for alignment of

the deduced CWM to Business Process Models, is established.

Zdravkovic & Kabilan (2005a) have proposed a conceptual framework for busi-

ness process models using BPMN as a representation language. We define a set of

Page 247: Ontology for Information Systems (O4IS) Design Methodology

7.13 Uses of MTCO and CWM 225

rules for compliance between CWM and business processes for each of the above

mentioned aspects. We do not go into details of those rules here in this thesis but

refer the interested reader to our publication. Zdravkovic also puts forward a mech-

anism for assessment of business processes to assess if they are complaint to the

contract or not.

7.13.2 Contract Execution Monitoring

The proposed MTCO and the Contract Workflow Model has been assessed in another

research work by Chen (2006). Chen has analyzed a typical contractual agreement

for transportation services between carrier and shipper using the prescribed MTCO

as a base. Chen follows the guidelines discussed in previous sections and puts for-

ward a conceptual model for a transportation service agreement. He further follows

the CWM methodology to analyze the agreement compliant process model. Chen,

thereafter, extends his analysis for several business case scenarios, and uses process

mining framework and tool PRoM, proposed by Van der Aalst to simulate the possi-

ble execution scenarios. Chen’s work lays the foundations for a conformance check-

ing of intended and actual contract execution. The interested reader is referred to

Chen’s work for further reading and explanations.

For the current thesis, the above mentioned research is valuable in the following

contexts:

• The utility of MTCO as a contract knowledge base is ascertained.

• The design guidelines for deducing the contract compliant workflow model is

also validated.

• We note that our proposed CWM methodology is representation language in-

dependent, since we ourselves have only exemplified using EPC diagrams and

BPMN, Chen has used Petri nets to model his contract compliant workflow mod-

els.

7.13.3 Exception handling of Process Patterns: Analyzing Prescriptive

Behavior

Once signed, a contract is to be realized by an executable business process model.

As we explained in the previous section, a contract specifies possible obligation vio-

lations and how they are to be resolved. A business process must have capability to

realize contractual violations by realizing chosen remedial procedures.

A problem is that business process models typically specify only the ‘successful’

flow of events. Protocols for exceptional flows are usually not designed, due to two

main problems: (i) Exception flows cannot be anticipated, (ii) Specification of too

many exceptional flows greatly increase complexity of a process and decrease its

readability and maintainability.

Page 248: Ontology for Information Systems (O4IS) Design Methodology

226 7 Case Study I: The Business Contract Knowledge Management Project

However, one of the main considerations in design of effective processes is sup-

porting broad exceptions originating from contractual violations. In order to enable

handling of undesired contract occurrences by business processes, to solve the first

outlined problem, it is necessary to systematically anticipate possible exceptions, and

to select appropriate exception handling procedures. For solving the second problem,

we propose defining every exception procedure (i.e. exception handler according to

the MIT Process Handbook) in the form of a process pattern. Every pattern defines a

self-standing process template intended to be executed when a particular exception

occur.

In a typical business trade contract, a seller agrees to ‘sell’ something of value or

interest to the ‘Buyer’ who in turn agrees to ‘pay’. They agree on what the acceptable

conditions for satisfaction are, as also some contingency plans and options on how

they will resolve their differences, in case the transaction does not go according

to agreement. There are explicit statements as well as implicit understandings and

best practices embedded in a physical contract. There are obviously elements of

procedural aspects.

The expected Performance Event for fulfilling the obligation to deliver is that of

‘Delivery of Goods’. This performance is deemed to be violated that is UnfullfilledBy

an occurrence of a Non-Performance Event under a set of circumstances like (a) the

delivery is late (Late Delivery) (b) the delivery is on time but the goods are not as

per the specification (Goods Unsatisfactory) (c) the seller does not deliver any goods

at all (Failure To Deliver). Each of these contract violations may be resolved via a

number of options as identified by the Conditional Rights, like for example:

• Right To Seek Re-Delivery: the Buyer may choose to seek replacement of the

faulty goods, in the case of ‘Goods Unsatisfactory’.

• Right To Penalty: Buyer may impose a monetary fine for late delivery or unsat-

isfactory delivery.

• Right To Cancel: The Buyer may cancel the specific order instance.

• Right to Terminate: In extreme cases, the Buyer may opt to terminate all trading

relationships that is cancel the contract in itself.

A combination of these rights is also possible, like the Buyer may choose to opt

for re-delivery AND a penalty. We model ‘constraint’ like conditions that are de-

scribed in the contract, using Object Constraint Language in the conceptual models.

Syntactically these may be represented using Common Language (as recommended

by the ODM) or even Semantic Web Rule Language. An example of such a constraint

may be given as follows:

If a delivery made by the Seller is late or not can be determined by exam-

ining the DeliveryTerms to see the agreed DeliveryTerms.Period (say 7

days for example) Then, assuming that every single contract execution, will

Page 249: Ontology for Information Systems (O4IS) Design Methodology

7.13 Uses of MTCO and CWM 227

have an order date and /or an expected delivery date(Order.OrderDate).

It is implicit that the actual delivery date for that particular order should

be within the agreed upon delivery period. So, if the actual delivery date

(DeliveryofGoods.DateAndTimeOfDelivery) is more than agreed upon de-

livery date then it is a case of Late Delivery, which activates the conditional

rights of the Buyer as described earlier (each conditional right has a set of

states just like the obligation states of inactive, active, triggered, fulfilled)

This enabling condition(s) can be represented in OCL(s) as:

Example 1:

IF DeliveryofGoods.DateAndTimeOfDelivery

> Order.OrderDate + DeliveryTerms.Period THEN LateDelivery = True

Example 2:

IF Late Delivery= TRUE THEN ConditionalRight = TRUE

In our ongoing work in this context, Zdravkovic and Kabilan are focusing on the

modeling of exception handling patterns for resolving aforementioned contractual

violation related exceptions. Each pattern addresses a specific violation and pro-

poses a solution on how that exception is to be resolved and by whom. These pat-

terns themselves are expressed as ontological conceptual models named Exception

Handling Process Pattern (EHPP) Ontology.

Next, we shall see yet another application of the MTCO with pragmatic aspects

associated with it. For example, the risks associated with a contract and its execution.

Some typical risk related questions maybe: who bears the risk, in the situation of

unforeseen event or accident taking place? How is the risk to be controlled? How

can the damage be limited? How can such contractual risks be averted?

We discuss these issues in our next section on risk assessment of business con-

tracts. The work on business contract risk assessment is a part of a collaborated joint

research between this author and Hans Weigand of Tilburg University.

7.13.4 Business Contract Risk Assessment

Business organizations conducted business transactions for centuries. With the elec-

tronic revolution the mechanism for establishing these business and trade relation-

ships have changed drastically. Interoperable systems have become indispensable for

supporting transaction execution. In the near future, they are expected to play in-

creasingly a supporting role in the establishment of the relationship as well. One of

the supporting roles could be the establishment of trust. There are many factors that

govern the formation of business relationships - like business compatibility, value or

service profitability, and business policies, and amongst these also trust. The question

of trust arises when a business enterprise decides to enter in a trading relationship

with other business enterprises, especially in cases when the proposed partner is as

Page 250: Ontology for Information Systems (O4IS) Design Methodology

228 7 Case Study I: The Business Contract Knowledge Management Project

yet an unknown candidate. The purpose of establishing legal contracts is manifold:

to comply to the governing judiciary and regulatory frameworks, to make explicit all

obligations and expected fulfilling activities, to formulate mechanisms for dispute

resolution and remedial options in case of non fulfilment of promised activities and

to divide the costs, liabilities for damages and risks involved in a pro-active man-

ner. E-contracting facilitates business entities to offer and negotiate these business

contracts electronically without even having physically seen each other. Hence, the

need for assessing and evaluating the pros and cons of a contract offer from different

perspectives is paramount.

In the (Kabilan & Weigand 2006) we propose a method to systematically ana-

lyze and make explicit the risks associated with a business contract. We present an

overview in this section.

There are numerous risk assessment methods and models available in the ar-

eas of auditing, investment analysis, and critical mission design, among others. The

methodology that we propose here is a combination of existing methods tuned to the

contract drafting and contract assessment. Like the CORAS 4 project, our approach

is model-based, but we focus on e-commerce transactions and contracts rather than

IT-critical systems.

The proposed business contract risk assessment method contains the following

main steps as discussed by us in (Kabilan & Weigand 2006):

Assumed Inputs: The contract draft proposed, business model or value model

for the enterprise carrying out the contract assessment, reference contract, business

and risk ontology wherever available and risk mitigation and control patterns like

that proposed by Karteseva, Tan & Gordijn (2004).

1 Identification of primary obligations. The underlying assumption for starting

here is that we regard non-fulfilment of obligations (by either party) to be the

main risk in interoperable systems.

2 Scenario modeling. From the primary obligations, the risk events can be de-

rived as being the non-performance of an obligation. The risk events usually do

have a temporal sequence. With scenario modeling, these partial orderings are

presented.

3 Global risk assessment. Using the Event Tree method, identify the risks for each

possible scenario (combination of risk events). The risk is expressed in the form

of a probability estimate and a utility loss estimate. An aggregate risk can be

computed over all the possible scenarios.

4 The EU-funded CORAS project (IST-2000-25031) developed a tool-supported methodol-ogy for model-based risk analysis of security-critical systems. The project was initiatedin January 2001 and successfully completed in September 2003. For more details referhttp://coras.sourceforge.net/

Page 251: Ontology for Information Systems (O4IS) Design Methodology

7.14 Case Study I: Discussion of Results 229

4 Detailed risk analysis. The risk of a scenario may be broken down using a

Fault Tree Analysis that analyzes the causes of non-fulfilment. These will be

different for different situations, but some general analysis format can be used

as a heuristic. In addition to this backward looking analysis method, a forward-

looking Event Tree method can be applied.

5 Risk mitigation. The risk assessment is typically followed by risk mitigation. In

this phase, preventive and compensating risk measures are considered. The ef-

fects of these measures should be assessed again by extending the Event Tree

and then repeating step 3-5. Examples of risk measures are down payments, a

letter of credit procedure, trust dependencies and sanctions. In a rational deci-

sion process, multiple alternatives are generated and compared before the best

one is chosen.

Based on the above methodology, we propose a set of business contract risk miti-

gation patterns that are themselves conceptual modeling patterns like the DAM and

ECA rule ontology. We also proposed a Business Contract Risk Ontology to be used

as an input for the business contract risk assessment methodology and the selection

of the appropriate business contract risk mitigation pattern. Details of the business

contract risk ontology may be seen in (Kabilan, Johannesson, Ruohomaa, Moen,

Herrmann, Ahlfeldt & Weigand 2007). Work on the risk mitigation patterns is still

ongoing and we shall publish the results later.

7.14 Case Study I: Discussion of Results

We do not delve deeply in to this area, as the purpose of this thesis is on the con-

ceptual modeling of domain knowledge, which we have been doing by illustrating

how we apply our proposed O4IS in the business contract area to extract different

aspects of the domain. In addition to the semantics of the business contract, we have

seen the procedural concept view modeled as the contract workflow model. We have

seen the utility of making such aspects explicit in different situations, namely: (a)

For supporting inter-enterprise co-operation and interoperability; (b) For ensuring

contract compliance, and (c) For exception handling of business processes.

In this case study, we have analyzed and discussed some of the salient features

and problems faced in the integration of contract management with business process

management. We have analyzed the contractual domain in depth and proposed a

framework for integrating all the three visualized perspectives of a contract through

the use of MTCO. Starting from a contract instance the case study has proposed a

methodology for arriving at the CWM. The proposed MTCO and the CWM method-

ology build on several theories (section 7.5, including the proposed Ontology for

Information Systems Design Methodology. We have also seen the multifold use of

Page 252: Ontology for Information Systems (O4IS) Design Methodology

230 7 Case Study I: The Business Contract Knowledge Management Project

the USP2 design for analyzing the different perspectives of the domain. Given that

the primary objective for this case study was making implicit contract semantics ex-

plicit for the purpose of managing a contract compliant business process, we have

not fully utilized the pragmatic concept view of the USP2 Design. The Procedural

Concept View, presented in this case study is deduced via the contract workflow

methodology, which in turn is based on the USP2 Design. The CWM methodology is,

thus, a domain specific methodology for analyzing and bringing forth the Procedural

Concept View.

We conclude that a shared understanding is the key to solve the existing prob-

lems in the field of contract management. As proposed, ontology is useful as an

interpreter or translator between the legal language, business language and the In-

formation Systems language. Based on a common knowledge base, almost all phases

of contract life cycle may be modeled and managed. However, this research has fo-

cused only on the contract execution phase. The approach methodology is to be

extended to cover other phases of contracting from drafting to signing. This re-

search has tried to reuse and integrate several related research methodologies and

approaches. Proof-of-Concept implementations have demonstrated the practicality

and usability of the proposed MTCO conceptual models in the practical Information

Systems domain.

7.14.1 Summary of Case Study Contributions

Given below is a brief summary of the original contributions of this research that

aim to achieve the main research goals and objectives of this thesis as stated earlier

in the beginning of this chapter.

• To fulfil the objective of fostering shared, re usable understanding of le-

gal business contracts: this case study research has proposed a framework for

capturing and modeling the relevant contractual knowledge and information in

a Multi-Tier Contract Ontology (MTCO). The framework has been further been

populated with conceptual models for the generic business contract (Upper Level

Core Contract Ontology), a typical sale of goods contract and other related terms

(Specific Domain Level Contract Ontology) and models for Template Level Ontol-

ogy. Emphasis has been laid on the analysis of obligations, their types, nature and

relationship to expected performance. This is a significant aspect of this research,

which makes monitoring of contract fulfilment feasible.

• In the goal of bridging the gap between business process management and

contract management: This research has proposed the use of MTCO as an inter-

preter for translation between the legal, business and information system domain

languages. Thus the common shared, knowledge base, MTCO is the bridge based

on which the gap between business process management and contract manage-

Page 253: Ontology for Information Systems (O4IS) Design Methodology

7.14 Case Study I: Discussion of Results 231

ment is visualized. To achieve this, this research has proposed a methodology,

CWM, which aids in not only monitoring the contract execution but also helps in

designing contract compliant business workflows. Continuing work in this regard

is aimed to further narrow down the existing gap.

Some of the key artifacts that are novel contributions from this case study in-

clude:

• MTCO: The Multi- Tier Contract ontology along with all its analyzed models for

the sale of goods, and Incoterms is a major contribution.

• Obligation State Analysis: The analysis and classification of contract obligation

types and the pragmatic states that each obligation passes through is unique con-

tribution. The utility of the obligation state analysis in performance monitoring,

business contract risk assessment has been put forward.

• CWM: The contract workflow model as a Procedural Concept View and the

methodology to deduce it is useful in a number of situations. Firstly to make

the implicit domain knowledge explicit. Secondly to offer a clear picture to hu-

man interpreters who are not familiar with legal terminologies. Thirdly, to align,

plan and integrate the contract compliant process model into the internal busi-

ness process model. Fourthly, to match and assess how far the actual execution

of the contract followed the agreed plan. As we shall see later in the other case

study, the CWM methodology can be generalized and applied in other domains

as well. We apply the same philosophy and deduce the Procedural Concept View

for the military operations doamin.

• Business Contract Risk Assessment Method and Business Contract Risk On-

tology: A methodology based on our MTCO and obligation state analysis for

business contract risk assessment has been proposed. Business contract risk on-

tology for the same has also been proposed though not included in this thesis.

Details may be referred to in (Kabilan et al. 2007).

• Exception Handling Process Patterns: This research is still ongoing and the

purpose is to put forward a series of patterns for exception handling situations

based on the agreed upon contractual terms.

Page 254: Ontology for Information Systems (O4IS) Design Methodology
Page 255: Ontology for Information Systems (O4IS) Design Methodology

v 8

Case Study II: The Defence Conceptual Modeling

Framework Project

In this chapter we present the second of the two case studies where the theories

discussed earlier have been put to use. The experiences have been the feedback

necessary to evaluate and refine our proposed methodologies. Given the scope and

depth of the case study to be discussed in this chapter, we begin by presenting an

overview of the contents and structure of this chapter, as illustrated in figure 8.1.

Fig. 8.1. Case Study II- Chapter Disposition

We shall begin by a description for the case study, thereafter a short back-

ground for the military modeling and simulations domain, focusing on military op-

erations(section 8.1). We discuss the role that ontologies have to play in the context

of this case study (section 8.4). We present the overview of the proposed ontology

(section 8.6). We do not go deep into the ontology and its descriptions. We restrict

our discussion to the method applied, namely the O4IS design methodology and the

USP2 Design in this particular case study(section 8.5). In this case study we give

illustrative examples of how we have used the Semantic Analysis Relationships as

patterns for analysis in section 8.7. We conclude by an overview of some of the

targeted application in which the proposed ontologies are intended to be used (sec-

tion 8.8). Given the scope and limitations of this thesis, we do not describe in detail

the ontologies, their applications. Interested readers may read more about them in

other publications like (Mojtahed, Garcia, Kabilan, Andersson & Svan 2005) and

(Kabilan & Mojtahed 2006b).

Page 256: Ontology for Information Systems (O4IS) Design Methodology

234 8 Case Study II: The Defence Conceptual Modeling Framework Project

8.1 Case Study II Background

One of the main objectives for military modeling and simulation has been to sup-

port effective training programs through virtual simulations of military operations.

One of the many components needed to realize are re-usable Mission Space Models

(MSMs). MSMs are conceptual models describing the real world abstractions captur-

ing not only the static semantics but also the dynamics, behavioral patterns and the

pragmatics of each military action involved. The Swedish Defense Research Agency

(FOI, www.foi.se), which goes under the Ministry of Defense, conducts research in

the field of methods and technologies for Modeling and Simulation, as well as par-

ticipating in activities concerning development of compound and complex computer

models.

DCMF has its origin in an American concept called Conceptual Models of the

Mission Space (CMMS), which was introduced by US DoD in their Modeling and

Simulation Master Plan 1 in 1995 to address the same problem. The CMMS concept,

which was presented as an important component in this vision, was according to

DMSO an essential requirement for interoperability and reusability of knowledge in

the military domain. For unknown reasons the CMMS concept was never completed

and the activities in it seemed to end around 2001. However, FOI found the concept

interesting and has, since 2002, conducted research on the concept to explore its

potential.

FOI has been involved in the knowledge extraction, representation and modeling

design, development of knowledge components including a reusable ontology called

the Defence Conceptual Modeling Framework-Ontology (DCMF-O).

DCMF is a framework for making conceptual descriptions and models of mili-

tary operations. It consists of tools for their development and reusability, as well as

standards for acquisition, representation, modeling, integration, management and

preservation of knowledge. The Mission Space Models (MSMs) which are kernel to

both the original CMMS and the current DCMF are simulation and implementation-

independent functional descriptions. These functional descriptions are related to

real world processes, entities, environmental factors, and associated relationships

and interactions constituting a particular set of missions, operations or tasks. DCMF

is also a framework for the development of models and it captures the characteristics

of objects in a domain given by a scenario, such as their features, interactions and

behavior. The models, or rather Mission Space Models (MSM’s) strive to be generic

and applicable to as many scenarios as possible without any loss of critical knowl-

edge. The DCMF Framework consists of:

1 DMSO. DMSO 1995 Master Plan. 1995. http://www.dmso.mil/briefs/msdocs/policy/msmp.pdf. Last accessed 2001-10-05

Page 257: Ontology for Information Systems (O4IS) Design Methodology

8.2 Functional Requirements of the DCMF Project 235

• The DCMF Process: The overall process to be followed for the capture, analysis,

modeling and use of military knowledge to formulate the MSMs.

• The DCMF Ontology Suite: The knowledge base to be used as a look up dic-

tionary, as a source of information, as analysis patterns as well as to facilitate

semantic interoperability between other command and control military Informa-

tion Systems.

• The Knowledge Meta Meta Model as a pattern for specific military operative

knowledge representation.

• Applications and Tools for applying the DCMF process.

Since military missions are based on activities, the conceptual models must be

action centric and not object centric like most other domain ontologies. The concep-

tual models must not only show the structure and order of the military actions but

also their cause, conditions and effects, in short, the pragmatics of the actions are to

be captured along with their semantics and context.

8.1.1 DCMF Project Goals

The DCMF project was launched in 2003 with the following goals:

• To produce a disciplined procedure by which the simulation developer is system-

atically informed about the real world problem to be synthesized.

• To deploy a set of information standards the simulation subject matter expert

(SME) employs to communicate with the Military Operations SME.

• To provide a real world military operations basis for simulation specific analysis,

design, and implementation.

8.1.2 DCMF Project Objectives

Thus the overall objectives for the DCMF project is to capture authorized knowl-

edge of military operations; manage, model and structure the obtained knowledge

in an unambiguous way; preserve and maintain the structured knowledge for future

use and reuse. And the premier aim of doing so is enabling semantic and substan-

tive interoperability of the future simulation models built on these descriptions. The

DCMF project consists of several components ranging over architectural, knowledge

components, analytical tools, compositional and retrieval mechanisms, and interop-

erability standards. One of the central components is the DCMF Process.

8.2 Functional Requirements of the DCMF Project

Based on the overall objectives and goals for the DCMF project, we can list some of

the main functional requirements and design criteria for the proposed ontological

knowledge base as follows:

Page 258: Ontology for Information Systems (O4IS) Design Methodology

236 8 Case Study II: The Defence Conceptual Modeling Framework Project

Handle unstructured information as input sources: The DCMF aims to capture

and model domain knowledge related to military operations from a variety of

sources. Sometimes, it could be Subject Matter Experts and deep interviews. It

could be based on field reports sent in by military organizations. It could be

other intelligence systems or Information Systems; it could be a video clipping

or news coverage. Thus, the first level of domain interaction is basically a set of

scenarios. These scenarios need to be examined and we treat them as the raw,

unstructured data input to our DCMF Process.

Flexibility and Adaptability: Flexibility and adaptability are required since the

ontology should evolve based on the analysis of individual military operations

scenarios. And not every scenario has a common thread running through them,

so the concepts extracted from each may differ, may be incomplete, sometimes

supplementary concepts may be available from another scenario and so on. The

important issue is that the current ‘evolving’ ontology itself acts as a benchmark

or lexicon to compare and start the knowledge extraction process from each new

scenario. Thus, the ontology needs to provide input to the scenario analysis in

one hand, and on the other hand, also needs to grow (take in) new information.

Reuse (Based on) existing knowledge base and information: A lot of existing

information pertaining to military operations or related fields has already been

captured and modeled in different formats. Existing knowledge bases and on-

tologies should be reused and integrated. Several military operations related

knowledge have also been standardized, such as the MIP’s JC3IEDM (Joint Com-

mand Control and Communications Information Exchange Data Model).

Interoperability: We should be able to interoperate/integrate with other Military

modeling and simulation applications. The Simulation Models build on the con-

ceptual models, which in turn are based on the proposed ontological knowledge

base. Therefore, the simulation models and the DCMF-O should be able to in-

teroperate with each other not only at simple data exchange level, but also at

higher conceptual, strategic and tactical level.

Rapid and Easy Development: It should be a fast and easy methodology, since

most of the designers and analysts would not be ontology experts. Formal as

well as Informal Representation: The proposed DCMF-O is aimed to be used by

different target users. On one hand, it should be meaningful and give valuable

input to high level decision makers and commanders in their strategic planning

of operations. On the other hand, the Military Simulations designer and devel-

oper should get enough detailed information, to enable him to implement the

same MSM directly in to a simulation model. Thus, there is a need for the DCMF-

O to be represented as informal easy to understand UML class diagrams as well

as formal machine readable, OWL representations.

Page 259: Ontology for Information Systems (O4IS) Design Methodology

8.3 The DCMF Process 237

Credibility, Authenticity to be verifiable, validated: Given the nature of this

domain, the requirement for the DCMF-O to be credible, authentic is self-

evidentiary. Thus, the DCMF-O concepts should also model the degree of credi-

bility, authenticity of source etc. In short, the ontology should be readily verifi-

able and validated.

Action Centric Model: Unlike other domains for ontology building, which are

‘object-oriented’ or centered around the concept of ‘objects’ and things that re-

volve around them,the military operations domain is action-centric. That is, the

central concept of interest to us is the action or activity that is occurring. The

supporting concepts answer questions like – why is this action happening? Who

is doing it? What is needed to counteract this?

Static and Dynamic Aspects: This requirement is related to the one above, action

centric. Any military operation scenario involves objects which have some con-

stant attributes, for example, a jeep has always four wheels; and there are some

dynamic variables, for example, the rifle could be currently loaded with only two

cartridges. While this temporal distinction of characteristics is not that vital for

object centric modeling approaches, the same assumes important dimensions in

this case where action-centric modeling is required.

Consistency: Each military scenario could be analyzed by different subject matter

experts as well as different ontology experts. However, the end result should be

the same no matter who performs this transformation process. In other words,

the ontology should be so designed along with required mapping rules and

guidelines that the analyzed output, MSM derived should always be consistent

as well as repeatable.

8.3 The DCMF Process

As per the stated goals and objectives above, the DCMF Process aims to distill knowl-

edge from the military domain and structure it according to a given purpose, model

and represent it in some reusable knowledge. To achieve this, we have analyzed

several state of the art knowledge extraction, analysis, representation and modeling

tools, methods and techniques. In the ongoing DCMF Project, we have found that

no single tool, development methodology or technique meets all our functional re-

quirements or the goals. Hence, we have made a blend of methods and tools suited

to our specific military modeling and simulation domain. The underlying foundation

is what we call the ‘DCMF Process’ by which one can iteratively process raw unstruc-

tured data or information and obtain structured knowledge as the final product. In

this section, we briefly summarize the DCMF Process that has been presented in this

DCMF Project. We refer the interested reader to a series of technical reports and arti-

cles published describing the same in detail (Mojtahed et al. 2005). It is to be noted

Page 260: Ontology for Information Systems (O4IS) Design Methodology

238 8 Case Study II: The Defence Conceptual Modeling Framework Project

that the author of this thesis has not been the main contributor of the DCMF Process

to be described below, but it has been summarized here for providing the readers

with relevant background information to the DCMF- Ontology section, where the

author has been active.

There are four main phases in the DCMF Process that follow from the knowledge

collection to the ultimate users who make use of the proposed conceptual models.

The four phases adopt the traditional knowledge management life cycle, viz:

• Knowledge Acquisition (KA): The first phase, KA has two main objectives. First,

to put forward a set of requirements for the expected output, for a specific pur-

pose. Secondly, the KA aims to collect the relevant information and data from

different heterogeneous sources.

• Knowledge Representation (KR): In this second phase, we begin to analyze the

information collected and to process it as per the required output format.

• Knowledge Modeling (KM): In this third phase, the knowledge analyzed and

collected from individual scenario incidents, is generalized to obtain a generic

knowledge model that could be reused in situations describing similar scenarios.

• Knowledge Use(KU): Finally, the generated knowledge components, as they are

now called, are put to use in targeted applications.

Each of these above mentioned phase consists of a number of sub-phases which

may be iterated. Each of them make use of certain inputs, methods, tools and there

are intermediary outputs available as well. We also identify different roles of the

people involved in this DCMF Process.

8.4 Role of Ontology in DCMF

As stated by Mojtahed et al. (2005), we uphold the meaning of an ontology in the

context of DCMF as:

An ontology is an explicit formal conceptualization of a shared understand-

ing of the domain of interest including the vocabulary of terms, semantics as

well as their pragmatics.

Note that we have included and stressed on two additional aspects, namely se-

mantics of vocabulary as well as pragmatics. By semantics, we mean that the in-

tended meaning of the text or natural language being analyzed should be taken

in to consideration. By Pragmatics we mean that the implicit intent, context of the

domain should also be made explicit. For example, the commanders belief or the

enemy’s intent and motives should also be made apparent.

We have used ontologies in the DCMF context as a knowledge base and concep-

tual analysis patterns.

Page 261: Ontology for Information Systems (O4IS) Design Methodology

8.5 Using the O4IS Design Methodology and USP2 Design 239

• As a look up lexicon and guide for the na ıve designer in the analysis and model-

ing phases.

• As a knowledge base for storing, retrieving knowledge in the representation and

use phases.

As a knowledge base, the DCMF-O requires to support inferencing and other ad-

vanced information retrieval.

Some examples for targeted applications of such ontologies are:

• To organize military operative knowledge in conceptual spaces.

• To support automated or semi automated tools for maintenance and knowledge

discovery in different simulation based applications.

• To support inferencing aided applications like expert systems, decision support

systems, situation awareness for military operations planning and control.

8.5 Using the O4IS Design Methodology and USP2 Design

Keeping in mind the DCMF requirements,we began our research with an extensive

literature study and analysis of current state of the art design methodologies in On-

tology. Some of them have been reviewed and summarized in 3.8. Though many

methodologies and approached for the design and development of ontologies have

been proposed we find many practical hurdles in applying any one of them construc-

tively to suit the DCMF Project needs. As discussed by Kabilan & Mojtahed (2006b),

we summarize some of the key issues as:

• One issue has been that ontologies are proposed to be domain independent

generic conceptualizations of the world as it is. Therefore most of the ontology

design methodologies proposed are generic and intended mostly for knowledge

capture and representation of the domain under consideration, starting from

scratch. Though these methodologies are all based on the experiences of the re-

searchers from the ontology building exercise in particular domains, they have

hesitated from involving any domain specific design constraints or functional re-

quirements in their design methodology.

• Another issue is that ontology is usually designed to capture and model the static

concepts and their established relationships. However, a military simulation con-

ceptualization needs that the procedural aspects or the state of affairs for plan-

ning a course of action be also captured and modeled cohesively with the intrinsic

domain knowledge.

• A third issue is that no existing ontology design and development methodol-

ogy addresses the need for semantic interoperability between ontologies even at

design time. That is, we contend that we need to consider at design time, the

Page 262: Ontology for Information Systems (O4IS) Design Methodology

240 8 Case Study II: The Defence Conceptual Modeling Framework Project

requirements of the targeted application like flexibility, extensibility, reusability,

traceability as well as interoperability with other military applications.

The above stated issues have been some of the motivating guidelines for our

O4IS design methodology as we have seen earlier. We believe in re-use and sharing

of knowledge and methods, so we have proposed a blend of existing design method-

ologies to suit our project needs and goals.

As we have seen the DCMF Process is visualized to consist of four main phases. In

the Knowledge Acquisition phase, the DCMF goal is to produce a set of requirements,

a purpose and identify sources of information, targeted users as well as experts who

will be the source of information. These are similar to what we have described in

our ten step design methodology, guidelines 1 and 2, namely to establish the scope

of the domain and the establish the targeted users, functional requirements, etc.

The difference is that the DCMF process explores and establishes the scope of

the entire targeted military modeling and simulation context, and will establish the

functional requirements as per the entire targeted application; While in our design

guideline, we aim to establish the context and purpose pertinent for the design and

development of our ontology. Following our O4IS design methodology, the following

design choices were made:

• G1: Establish the scope of the domain. The scope is that of military operations,

specifically focusing on the actions and events, how they are to be countered,

what resources are needed, who is responsible for the operations and so on. The

limitation is that we do not (at the moment) concern ourselves with technical

details or, details regarding other organizational, aspects of the military scenar-

ios.

• G2: Establish the targeted users, applications, and functional requirements.

The DCMF project has a number of targeted users and applications. On the top

level, it targets commanders and decision makers who need to plan and execute

military operations. On another level, it targets military simulation modelers who

need to have the conceptual models to be incorporated in to military simulations.

On yet another level, the DCMF project targets other similar military modeling

and simulation applications that need to interoperate.

• G3: Choose ontology architecture: physical and logical. Currently the project

is still in research phase and most of the ontologies are only proof of concepts.

Hence, for the moment we have chosen a single ontology architecture as the

physical ontology architecture. However, in the future, when we have other ap-

plications and ontologies to interoperate, we may migrate to a hybrid ontology

architecture, where we would have a common ontology at the center and each

application would have their local contextual ontology.

Page 263: Ontology for Information Systems (O4IS) Design Methodology

8.5 Using the O4IS Design Methodology and USP2 Design 241

• G4: Choose ontology development approach. As suggested in our O4IS design

methodology, we choose the middle out design approach. Since, we base our

domain ontology on an existing data mode, the middle out approach is further

motivated.

• G5: Choose level of ontology representation. As we have identified in G2, we

have a wide range of targeted users and different application purposes. Hence,

we have followed the Dual Conceptualization Representation as recommended

in the O4IS design methodology. Our first set of ontology models are represented

using UML conceptual models. Thereafter, we formalize them using OWL for

supporting the machine-to-machine interoperability.

• G6: Choose knowledge acquisition methods and tools. In the DCMF project

different forms of knowledge acquisition techniques and tools have been evalu-

ated. Currently, we are supporting only manual knowledge extraction and map-

ping using our proposed Semantic Analysis Representation. But, our ongoing

work in this project also focuses on semi-automatic support for knowledge ex-

traction.

• G7: Knowledge analysis- Conceptualize the domain ontology. We conceptu-

alize the domain ontologies following the USP2 Design and the SARs. We also

follow the recommended dual conceptual representation and therefore our first

artifacts are UML conceptual models.

• G8: Knowledge representation:- Implement the domain ontology. We have

implemented all the ontology using Protege Ontology editor.

• G9: Evaluate, assess and verify the domain ontology. The military domain has

different standards and methods for verification, validation and accredition of

the conceptual models. Our long term plan is to adhere to those recommenda-

tions and strategies. Currently, we assess the conceptual models and ontologies

with the domain experts only.

• G10: Use, maintain and manage the domain ontology. As we shall see later,

we have begin work on proof of concept demonstrations of applications that

use the proposed ontologies. On the issue of maintenance and management of

ontologies, we have not yet reached that phase.

As we see one of the main components in the DCMF process is the DCMF-

Ontology suite. And we shall see how we have used our proposed design method-

ology while designing this DCMF-O. In order to do this, we begin by examining the

role that ontology has to play in the context of the DCMF Project.

Page 264: Ontology for Information Systems (O4IS) Design Methodology

242 8 Case Study II: The Defence Conceptual Modeling Framework Project

8.6 Defence Conceptual Modeling Framework- Ontology Suite

In the following sections we shall see the different ontologies that we have proposed

for different contexts, namely the DCMF-O as a set of ontologies for describing the

military domain concepts that adopts our proposed multi-tiered ontology architec-

ture as discussed in the O4IS earlier. The structure is as shown in figure 8.2.

Fig. 8.2. Defence Conceptual Modeling Framework-Ontology Suite

DCMF-O comprises of three vertically aligned layers of ontologies:

• Upper Ontology Layer: Suggested Upper Merged Ontology (SUMO) from IEEE

has been used as the top level generic conceptual layer. This layer has been used

to tie down the do-main oriented concepts into more abstract real world concepts

like entity, time, space, etc.

• Middle Ontology Layer: The middle layer is intended to provide specialized

domain concepts from the military operations and modeling domain. However,

we have chosen to adopt the established standard JC3IEDM data model as a basis

for the middle level.

• Domain Ontology Layer: Finally, we have a bottom layer of specific and focused

scenario/application ontologies like the Swedish Defence Organization ontology,

weapons of mass destruction ontology, terrorist ontology and vessels etc.

For the current research, we do not focus on this set of template ontologies. We

review the Upper and Middle ontology in the following two sections.

8.6.1 SUMO as the Upper Ontology

SUMO is an upper ontology that has been proposed as a starter document for the

SUO WG (Standard Upper Ontology Working Group), an IEEE-sanctioned working

group of people from the fields of engineering, philosophy, and information science.

The SUO WG is developing a standard, i.e., the Standard Upper Ontology that will

Page 265: Ontology for Information Systems (O4IS) Design Methodology

8.6 Defence Conceptual Modeling Framework- Ontology Suite 243

specify an upper ontology to support computer applications in areas such as data

interoperability, information search and retrieval, automated inference and natural

language processing. According to Niles & Pease (2001), it is estimated that SUO

will eventually contain between 1000 and 2500 terms and roughly ten definitional

statements for each term.

As mentioned above, SUMO has been a starter document and it is still in the de-

velopment phase. The most recent proposed version is 1.72, proposed in December

2004. SUMO is designed to be relatively small so that assertions and concepts will

be easy to understand and apply. Currently, the ontology consists of approximately

4,000 assertions (including over 800 rules) and 1,000 concepts. The knowledge rep-

resentation language for the SUMO is the SUO-KIF (Knowledge Interchange Format)

which is a predicate logic. The ontology can be browsed online, and source files for

all of the versions of the ontology can be downloaded from IEEE’s website 2.

The structure of SUMO’s top level concepts is illustrated in figure 8.3. The root

node of the SUMO is ‘Entity’, and this concept subsumes ‘Physical’ and ‘Abstract’.

The former category includes everything that has a position in space and time, and

the latter category includes everything else. Physical entities are further divided into

‘Object’ and ‘Process’.

Fig. 8.3. The Top Level Concepts in SUMO

Other general topics covered in the SUMO include: structural concepts such as

instance and subclass; general types of objects and processes; abstractions including

set theory, attributes, and relations; numbers and measures; temporal concepts, such

as duration; parts and wholes; basic semiotic relations; agency and intentionality.

2 http://www.ontologyportal.org/

Page 266: Ontology for Information Systems (O4IS) Design Methodology

244 8 Case Study II: The Defence Conceptual Modeling Framework Project

In addition to the SUMO core upper ontology, SUMO is also associated to a Mid-

level Ontology 3 and a set of domain ontologies. These domain ontologies include:

• Communications.

• Countries and Regions.

• Distributed computing.

• Economy.

• Finance.

• Engineering components.

• Geography.

• Government.

• Military.

• Transportation.

• World Airports.

8.6.2 JC3IEDM as the Middle Military Domain Ontology

The main source of information and the basis for the ontology design and devel-

opment is the MIP (Multilateral Interoperability Programme) 4 proposed standard

JC3IEDM (Joint Command Control Communication Information Exchange Data

Model) 5. The MIP aims to provide an assured capability for interoperability of infor-

mation to support joint military operations. Interoperability is not envisioned merely

at a data level but also at strategic, operational and tactical level to allow proper

planning and functioning of joint operations. As this objective of the MIP is well in

line with the goals of the DCMF project, the proposed JC3IEDM was also found to

be appropriate standard to base our ontological knowledge base representation.

The purpose of the JC3IEDM, listed as an extract from the specification states:

• A description of the common data in the JC3IEDM that contains the relevant

data, abstracted in a well structured normalized way that unambiguously reflects

their semantic meaning.3 MILO ontology also written in KIF. Is available online at http://sigmakee.cvs.

sourceforge.net/*checkout*/sigmakee/KBs/Mid-level-ontology.kif4 The Multilateral Interoperability Programme (MIP), Home page: www.mip-site.org last

accessed on 2006-03-03 was established by the Project Managers of the Army Commandand Control Information Systems (C2IS) of Canada, France, Germany, Italy, the UnitedKingdom and the United States of America in April in 1998 in Calgary, Canada. The aimof the MIP is to achieve international interoperability of Command and Control Informa-tion Systems (C2IS) at all levels from corps to battalion or lowest appropriate level inorder to support multinational (including NATO) combined and joint operations and theadvancement of digitization in the international area. The MIP solution enables C2IS toC2IS information exchange and allows users to decide what information is exchanged, towhom it flows and when.

5 Homepage of MIP. http://www.mip-site.org/MIP_Specifications/Baseline_3.0/

JC3IEDM-Joint_C3_Information_Exchange_Data_Model/Accessed: 2006-03-03

Page 267: Ontology for Information Systems (O4IS) Design Methodology

8.6 Defence Conceptual Modeling Framework- Ontology Suite 245

• A base document that can be used as a reference for future amendments to the

model.

• A core upon which nations can base their own modeling efforts of chosen areas

and onto which specialized area models can be attached or “hung”.

• A basic document that nations can use to present and validate functional data

model views with their own specialist organizations.

• A specification of the physical schema required for database implementation.

The specification document along with its several annexes is well over 1000

pages long. The specification is technically well documented, with detailed explana-

tions, models and notes on each component of the data model. It would be tedious

to list all of its salient features here. Therefore, we list a few of the main concepts

and refer the interested reader to the main JC3IEDM specification document.

There are three models that are presented in the JC3IEDM namely the concep-

tual, logical and physical:

1 The Conceptual Data Model represents the high level view of the information

in terms of generalized concepts such as actions, organizations, material, per-

sonnel, features, facilities, locations and the like. This model is of interest to

senior commanders wishing to verify the scope of the information structure.

2 The Logical Data Model represents all of the information and is based upon

breaking down the high level concepts into specific information that is regu-

larly used. For example, a tank is an armored fighting vehicle that is a piece of

materiel. This breakdown follows human reasoning patterns and allows com-

mand and control systems to generalize by recognizing, for instance, that tanks

are equipment. A logical data model specifies the way data is structured with an

entity-attribute-relationship diagram and supporting documentation. This model

should be of interest to staff officers to ensure that the operational information

content is complete.

3 The Physical Data Model provides the detailed specifications that are neces-

sary to generate a physical schema that defines the structure of a database. It

is of primary concern to C2IS system developers building JC3IEDM-compliant

systems.

Understanding the JC3IEDM

The JC3IEDM has been setup to fulfil the following requirements:

1 There is a need to describe objects of military significance. Objects of interest

refer to physical things like units, equipment, materiel, personnel. Also non-

physical concepts like location, co-ordination points.

2 Individual objects need to be differentiated from a particular are type of objects.

Also there should be a way to identify groups of individual objects.

Page 268: Ontology for Information Systems (O4IS) Design Methodology

246 8 Case Study II: The Defence Conceptual Modeling Framework Project

3 Objects should be identified by sufficient characteristics as is required for com-

mand and control tasks.

4 There should be means to display operational status and situations as repre-

sented by facts of the objects.

5 There should be means to record and maintain historical log records of objects

and other dynamic information as information packages.

6 There should be means to record activities of the objects.

From the perspective of the DCMF project, we had similar requirements as recapitu-

lated below:

• To describe a MSM, one needs the same concepts of Objects or Entities of inter-

ests around which the operation is focused.

• Each entity has both static characteristics as well as dynamic properties, as is

represented by the situation concepts in the generic hub.

• The central focus in an MSM is around activities, or Actions as proposed in the

generic hub as well.

• There is a need to co-relate pieces of information, to provide the context and

other vital information, a group of information packages is required as well.

Fig. 8.4. Main Concepts of DCMF-O: Adapted JC3IEDM

Basic concept in data specification is an entity, i.e. any distinguishable person,

place, thing, event or concept about which information is to be kept. Properties

or characteristics of an entity are referred to as attributes. The entire structure is

generated from 15 independent entities that is, entities whose identification does

not depend on any other entity. We explain the principal concepts given in figure 8.4

above by explaining their intended use or the purpose for defining them. We leave

Page 269: Ontology for Information Systems (O4IS) Design Methodology

8.6 Defence Conceptual Modeling Framework- Ontology Suite 247

the interested reader to refer to the JC3IEDM specification for a precise technical

explanation.

Objects have been defined as belonging to a particular type Object-Type or as

an individual Object-Item. Object Types are generally static and persistent, whereas

individual Object Items are dynamic and most likely to change over time. For exam-

ple a characteristic of gun like calibre, main track width, and load class etc are

attributes of Object-Type whereas, actual fuel contained, ammunition left, current

operational status of a tank are characteristics of Object Item. Both Object-Type

and Object-Item are further classified in to extensive hierarchies. We chose to im-

plement all the second level of classification. Further on, we chose to model only

relevant categories and sub categories. The rest are left for future work. Our current

proof of concept implementation supports over 1500 concepts from the JC3IEDM.

An object must have the capability to perform a function or to achieve an end.

Thus, a description of capability is needed to give meaning to the value of objects

in the sphere of operations. It should be possible to assign a location to any item

in the sphere of operations. In addition, various geometric shapes need to be rep-

resented in order to allow commanders to plan, direct, and monitor operations.

Examples include boundaries, corridors, restricted areas, minefield and any other

control measures needed by commanders and their staffs.

Several aspects of status of items need to be maintained. The model must permit

a description of the composition of a type object in terms of other type objects. Such

concepts include tables of organizations, equipment, or personnel.

The model must reflect information about what is held, owned or possessed in

terms of types by a specific object item. (Situations - establishments, holding, associ-

ation etc) There is a need to record relationships between pairs of items. Key among

these is the specification of unit task organizations and orders of battle. The model

must support the specification of current, past, and future role of objects as part of

plans, orders and events.

The same data structure should be used to record information for all objects,

regardless of their hostility status. Provision must be made for the identification of

sources of information, the effective and reporting times and an indication of the

validity of the data.

So far, the description of the basic concepts matches with the expected concep-

tual model for military operations domain. And as previously stated the JC3IEDM

has been developed through a consensus of several nations, part of the MIP. Thereby,

the validity of these primary concepts is self-established.

However, being a data model the JC3IEDM has some limitations on being used as

an ontology as-is. We have discussed some of the limitations of JC3EIDM in (Kabilan

& Mojtahed 2006a). One of our ongoing tasks is the migration of data models into

ontologies, the methods, approaches and pros-cons.

Page 270: Ontology for Information Systems (O4IS) Design Methodology

248 8 Case Study II: The Defence Conceptual Modeling Framework Project

With this we conclude the overview of the proposed DCMF-O. In the next sec-

tions, we shall look at some of the scenarios that we analyzed using the DCMF-

Process and the DCMF-O. Without going too deep into the analysis, we shall look at

the use of ontologies and some results.

8.7 Customizing Semantic Analysis Representations for MilitaryScenarios

We begin applying our USP2 Design analysis by identifying the entities and concepts

of the given scenario. We describe the scenarios in natural language text from video

clippings, interviews with domain experts etc. We use the the ER model to identify

the events, actions and the resources. The resources in this particular domain are

artifacts or objects.

Having identified the main actors, and objects, we next apply our Performative

verb ontology (section 6.4), to identify the specific performance that is occurring.

We use this later in our procedural and pragmatic analysis of the scenario. The per-

formative action identified gives us the nature of the action:- if its assertive, commis-

sive, directive, declarative or expressive. Based on this we can analyze further with

our ECA rule ontology or the Deontic Analysis Model. ECA Rule ontology is useful

for situations where the actions are directives. Deontic Analysis Model are useful for

modeling commander’s intent, expected outcomes, as well as orders. Hence it could

be for expressives, declaratives or directives.

Once we have identified the entities and grouped them into actors, actions, and

artifacts, we are ready to begin the semantic relationships analysis as suggested by

step 3 in our Semantic Concept View. As we have discussed in section 6.3, we have

adopted Storey’s classification of semantic relationships at different levels. In section

we have proposed a set of semantic relationship patterns for the local context of

Storey & Purao’s (2004) classification. In this case study, we have further specialized

these relationships for the specific military domain as described below:

• Prescriptive Relationships: We have proposed the ECA rule ontology as a con-

ceptual design pattern for capturing the prescriptive and normative behavior of

a domain. In this case study, we apply them to specific rules of engagement that

are prescriptive norms for the expected behavior of military operations. More

like doctrines for code of conduct. To help the domain experts in analyzing the

individual Rule of engagements, we have further mapped the DCMF-O concepts

to the proposed ECA rule model. In section we present these ‘global context’ for

the ECA rule prescriptive relationships. We also present a discussion of the user

evaluations done in this context. Thus, the proposed ECA rule ontology has been

used as analysis patterns as well.

Page 271: Ontology for Information Systems (O4IS) Design Methodology

8.7 Customizing Semantic Analysis Representations for Military Scenarios 249

• Structural Relationships: In structural relationships, we have seen the asso-

ciations between <entity-verb-entity>, <entity-verb-action> or <action-verb-

action> type of relationships. Based on the military domain, we have identified

specific verb associations that have specific connotation in the military domain.

• Functional relations: We have identified and proposed some patterns for func-

tional relationship identification in section 6.5.2.

• Temporal relations: The temporal relationships (section 6.5.3) presented earlier

have also been used in this case study without any further need for domain

specific mappings.

• Deontic Relationships: We have been able to apply the proposed DAM (sec-

tion 6.5.4) without the need for any further domain specific specializations.

Hence, we now only discuss the global contexts defined for the Prescriptive and

structural relationships.

8.7.1 Global Context ECA Rule - Prescriptive Relationships

We have earlier proposed a set of conceptual analysis models for analyzing and

capturing the semantics of different kinds of relationships. One of them being pre-

scriptive behavior in the form of ECA Rule Ontology.(refer section 6.5.6). Following

Storey and Purao’s classification levels (figure 6.4), we now specialize the proposed

ECA rule ontology by mapping to military domain concepts. We map the concepts

from our DCMF-O to the ‘what’, ‘why’, ‘where’, ‘when’ associations identified in the

‘event’ and‘action’ concept of the ECA rule ontology.

In the military domain, an event is usually an unplanned activity and is perpe-

trated by enemy forces. Similarly, we extend the action concept. For the condition

concept, we include aspects of preconditions, post conditions, dependencies etc.

The Rule of Engagement is a prescription of expected and allowed military be-

havior in the case of described events happening. To further aid for Military domain

expert users in their analysis work, we mapped the ECA Rule Ontology to a military

operations ontology, Defence Conceptual Modeling Framework Ontology ((Kabilan

& Mojtahed 2006b)). For example figure 8.5 shows the mapping of ’who’ concept to

DCMFO concepts. Similarly figures from 8.6 to 8.8 show the other mappings. In

our proof of concept demonstration, this is provided as a lexical help for the user

making the analysis and subsequent knowledge representation.

The case study analysis provides the assessment and evaluation done on the ECA

rule ontology as well.

Page 272: Ontology for Information Systems (O4IS) Design Methodology

250 8 Case Study II: The Defence Conceptual Modeling Framework Project

Fig. 8.5. Example of mapping 5Ws and the DCMFO

Fig. 8.6. 5Ws-What mapped to DCMFO

Fig. 8.7. 5Ws-Why mapped to DCMFO

Page 273: Ontology for Information Systems (O4IS) Design Methodology

8.7 Customizing Semantic Analysis Representations for Military Scenarios 251

Fig. 8.8. 5Ws-When mapped to DCMFO

8.7.2 Military Behavior Analysis- ECA Rule Ontology

Military activities are regulated by different rules and guiding procedures. One of

those are Rules of Engagement (ROE) which are directives designated to regulate

situations and limitations for when force may be used. ROE reflect political and

diplomatic constraints and should be set at high general level. A ROE defines the

constraints for a certain military activity, what is forbidden and what is allowed for

the specific activity during certain circumstances. Examples of such activities are

use of force, detention of civilians, use of land mines, use of warning shots, and

prevention of crimes.

The aim of using ROE is threefold. The political aim is to guarantee that military

operations are implemented to support the policy of the political management. The

military aim is to guide commanders to solve conflicts. Finally the legal aim of ROE is

to guarantee that military operations are implemented within the limits of national,

international and human rights.

The ROEs used in this case study has been taken from a fictitious scenario used

for experiments and exercise in the Swedish Defence Forces. The scenario contains a

multinational operation with the end state goal to implement a signed Peace Agree-

ment in an area with many years of ethnical and religious conflicts. A collection of

ROEs taken from this scenario have been used for our analysis and case study.

Page 274: Ontology for Information Systems (O4IS) Design Methodology

Fig.8.9.Illustrationofa

Rule

ofEngagement

analyzedusing

ECA

Rule

Ontology

Page 275: Ontology for Information Systems (O4IS) Design Methodology

8.7 Customizing Semantic Analysis Representations for Military Scenarios 253

The ROE was used as input information to the phase Knowledge Representation

in the DCMF process and analyzed with the method Five Ws. In previous work,

we used the Five Ws to analyze a sequential scenario giving the result that it is

feasible but much of the context was lost (Mojtahed et al. 2005). This time we were

interested in analyzing rules with Five Ws but also to retain the contextuality after

the analysis and representation process.

Table 8.1. Sample Rules of Engagements

ROE 1: The use of minimum force to prevent any attempts by persons toprevent the BFOR from discharging its duties is permitted.ROE 2: The use of minimum force to defend friendly forces and personswith designated special status against hostile action is permitted.ROE 5a:The use of minimum force to prevent the taking possession of ordestruction of property with designated special status is permitted. ROE5b:Individual service personnel are to be informed when they are protect-ing specific property on this basis.

The selected ROEs were analyzed with Five Ws in order to study feasibility of

analyzing rules with this method and how to keep the context after analysis. The

result showed that it is feasible to analyze ROE with Five Ws but it is not really sat-

isfying since there is a loss in information and context which affects the reusability.

If too much context is lost during the process it is difficult to reuse the analyzed

information. One way of dealing with this is to fill in the gaps with information and

have a Subject Matter Expert verifying the extended information. Table 8.2 shows

an extract from our analysis with only the 5Ws.

Table 8.2. Extract of Rules analyzed with only 5Ws

No. WHO WHAT WHERE WHEN WHYA1 BFOR

LandForce

Is permitted touse minimumforce

Joint OperationsArea (JOA) inBogaland

During imple-mentation ofUNSCR’s 2377,2427, 2450 andBogaland PeaceAgreement

To prevent anyattempts by per-sons to preventthe BFOR dis-charging its du-ties

Five Ws is useful on a conceptual level to get a quick categorization and un-

derstanding of an event. Using the Five Ws as a support for categorizing an event

is feasible since it can contain the most important aspects of that event. The Five

Ws analysis approach is a good start though but needs to be complemented with

Page 276: Ontology for Information Systems (O4IS) Design Methodology

254 8 Case Study II: The Defence Conceptual Modeling Framework Project

rules. Now, we apply the proposed ECA rule ontology along with its mapppings to

the 5Ws and military concepts (DCMFO). The same rules were analyzed as shown

in table 8.3.

Table 8.3. Extract of Rules analyzed with ECA Rule Ontology

ROE1 Event Condition ActionA1 Attempts to dis-

charge of dutiesBFOR preventedfrom discharg-ing normalduty

use of minimum force

WHO Hostile forces (doesit) BFOR is affected

– BFOR does it Hostile Forces areaffected

WHAT BFOR is obstructed – Use of Minimum Force to Preventor Defend

WHEN Within peace keep-ing period

– Within peace keeping period

WHERE Bogaland – BogalandWHY Terrorism in Boga-

land– Peace keeping in Bogaland

As can be seen from the above, the information aggregated in table 8.3 has ex-

pressed more of the implicit knowledge than the 5Ws. The analyzed information

was then captured and represented as an ontology using our ECA rule ontology. We

have implemented the ECA Rule Ontology using the Web Ontology Language (OWL)

and using the Protege Ontology Editor (see figure 8.10). Furthermore, we have se-

mantically enriched our ontology by mapping to a linguistic resource like Wordnet

as also used earlier in section 6.4 and seen now in figure 8.11.

Page 277: Ontology for Information Systems (O4IS) Design Methodology

Fig.

8.10

.EC

AR

ule

Ont

olog

yim

plem

ente

din

Prot

ege

Page 278: Ontology for Information Systems (O4IS) Design Methodology

256 8 Case Study II: The Defence Conceptual Modeling Framework Project

Fig.8.11.IllustrationofEC

AR

uleO

ntologyenriched

with

WO

RD

NET

Page 279: Ontology for Information Systems (O4IS) Design Methodology

8.7 Customizing Semantic Analysis Representations for Military Scenarios 257

8.7.3 Global Context: Structural Relationships

We follow Storey & Purao’s (2004) proposal for the abstraction levels for semantic

relationships. According to them, the third level– the Global Context describes the

semantic relationships specific to the domain in which the relationship is used. We

specify some such global contexts for our military operations domain. Again, we

draw support from the JC3IEDM as our input model. Based on domain values and

specifications provided, we have been able to extrapolate sets of valid semantic verb

relationships for this domain.

The structural relationships between two entities as identified earlier can now be

grouped in to three different possibilities:

• Actor-Actor Structural Relationships: From the DCMF-O we have identified

actors as organization or person. The actor-actor structural semantics describe

the possible relationships that two actors or role players can have. Some of the

possible semantic relationship patterns are listed in table 8.4.

• Actor-Action Structural Relationships: In the military domain actions and

events are the central concepts. Each action or event must have some actor or

role responsible for it, controlling it, executing it and so on. Some of these type

of semantic relationships have been identified in table 8.5.

• Actor/Artifact - Actor/Artifact Structural Relationships: The third type of

structural relationships refer to possible associations between actors and material

artifacts. As discussed earlier, actors are those capable of performing an action

independently and artifacts are those that are used, produced, consumed in an

action. They may also be locations and geographical features or political bound-

aries where the action is said to occur. Some examples of possible relationships

is shown in table 8.6.

Page 280: Ontology for Information Systems (O4IS) Design Methodology

258 8 Case Study II: The Defence Conceptual Modeling Framework Project

Table 8.4. Actor/Role-verb-Actor/role Structural Relationships

Entity1 Entity2 Relationship ExplanationOrganization Organization has assigned Organization1 has assigned re-

sources, personnel and task overto organization 2

Organization Organization has captured Organization1 has capturedforcefully organisation2

Organization Organization has detached organization 1 has a part of itselfas organization 2 separated fromthe main organization at someother location

Person Organization has full command of the military authority and re-sponsibility of a superior officerfrom within the military orga-nization who has full commandand control over given organiza-tion.

Organization Organization plays-the-role-of Organization 1 plays the role oforganization 2.

Person /Role Person /Role has operational com-mand of

the authority granted to a com-mander to assign missions ortasks to sub-ordinate comman-ders, to deploy units, to reassignforces and to retain or delegateoperational and/or tactical con-trol as may be deemed necessary.

Person /Role Person /Role has operational con-trol of

role has operational control ofthe authority delegated to a com-mander so that the commandermay accomplish specific missionsor tasks which are usually lim-ited by function, time or location;to deploy units concerned, and toretain or assign tactical control ofthese units. It does not includeauthority to assign separate em-ployment of the components ofthe units concerned.

Organization Units has attached temporary placement of units inan organization

Page 281: Ontology for Information Systems (O4IS) Design Methodology

Table 8.5. Actor/Role-verb-Action Structural Relationships

Entity1 Entity2 Relationship ExplanationOrganization action approves Organization authorizes actionOrganization action controls specified organization is in

charge of the direction, co-ordination, execution of aspecified action

Organization action Initiates starts the planning or executionof the action

Organization action is-coordinating-agent-for

organization is responsible forcoordinating the action whentwo or more resources are in-volved.

Organization action is-interested-in the specific organization takes aninterest in the specified action

Organization action is-liaison-for denotes the organization thatacts as the liaison for the speci-fied action

Organization action is-point-of-contact-for

denotes the organization that isto be contacted in connectionwith the specified action

Organization action plans the organization that performsthe detailing of the specified ac-tion

Organization action observed the organization that has wit-nessed the execution of the spec-ified action

Organization action requests the specific organization that in-dicates requests for a specific ac-tion.

Page 282: Ontology for Information Systems (O4IS) Design Methodology

260 8 Case Study II: The Defence Conceptual Modeling Framework Project

Table 8.6. Entity-verb-Entity Structural Relationships

Entity1 Entity2 Relationship ExplanationOrganization Facility administers organization is responsible for

the administration of the facilityPerson Person augments person 1 extends the capability of

person 2 in his tasks.Organization Materiel consumes organization expends the object

materielMateriel Materiel contains Ex.The bag contains the paper.Organization Facility coordinates-the-use-

ofthe organization arranges thescheduling of the facility

Person /Or-ganization/Facility

Person /Organi-zation /Facility

employs Entity1 is the the temporary orpermanent user of entity2. ex:The university employs teachers.

Person Person exploits Person 1 takes advantage of per-son 2.

Organization Person has-as-a-member ex:The student union has asmembers students

Control Fea-ture

Control Feature intersects ex: 5th Cross stress intersectswith the Highway E14.

Organization/Person

Materiel installs ex:System Administrator installsnew security software.

Facility MeteorologicalFeature

is affected by ex: Our Stockholm Headquartersis affected by hailstorms.

Person Person is-aunt-of a family relationship betweentwo persons, where person 1 is afemale, and is the sister of per-son2’s parents.

Facility /Or-ganization/person

materiel is-authorized-to indicates formal entitlement.ex:The Police are authorized touse speed cameras.

Organization/person

Organization/person

is-captor-of ex: Terrorists are captor of theBeslan School.

Page 283: Ontology for Information Systems (O4IS) Design Methodology

8.8 Case Scenarios 261

8.8 Case Scenarios

So far, we have discussed how we have used the O4IS design methodology in the

DCMF. We now look at some of the military operations scenarios that we have

applied our proposed ontologies to over the last three years. We present only the

overview of them below. With each iteration our O4IS design methodology has been

successfully tested and refined following our experiences. We are constantly analyz-

ing new scenarios in the ongoing project.

8.8.1 Scenario 1: The Kosovo Arms Smuggling Scenario

The chosen scenario simulation takes place in Kosovo in May 2002. A Swedish patrol

from the Swedish peace keeping force discovers a looted weapons depot and report

this into the information system. An intelligence officer in Sweden receives the re-

port and starts a further investigation. Information from different sources leads to

the estimate that the missing weapons might be smuggled to Sweden by organized

criminals. Cooperation between different military and civil organizations to acquire

information leads to the confiscation of the weapons in the harbour of Gothenburg

in Sweden. The detailed specifics of the scenario are to be captured and modeled as

part of a re usable ontology and thereafter also visualized as a series of procedure

like components called the Mission Space Models.

Figure 8.12 depicts the scenario as an use case. A textual description of the se-

quence of events was transcribed to be the input for our scenario analysis. An extract

of the text is illustrated in table 8.7.

Table 8.7. Extract from Kosovo Scenario

A Swedish patrol from a battalion in Kosovo finds weapons in the forestnear a village called Janjevo.The finding is reported in the battalion’s intelligence report and thisis tele-faxed in encrypted code to Stockholm. The information aboutthe finding is received by command central at MUST and the report isregistered in the System.The information about the found weapons is made available for thedepartment of international intelligence (MUST International Depart-ment).

Using the Semantic Concept View, we identified the main concepts ( individu-

als) of interest in our given text. We used our proposed DCMF-O as our reference

and conceptual model and the 5Ws as knowledge extraction method. We found that

we had incomplete information in many cases and we had to revert back to our

Page 284: Ontology for Information Systems (O4IS) Design Methodology

262 8 Case Study II: The Defence Conceptual Modeling Framework Project

Fig. 8.12. MUST Kosovo Arms Smuggling Scenario

Page 285: Ontology for Information Systems (O4IS) Design Methodology

8.8 Case Scenarios 263

subject matter experts (domain experts) for iterative knowledge acquisition. At the

end, we had identified the concepts in our scenario to terms used in our DCMF-O.

An illustrative extract is shown in table 8.8:

Table 8.8. Semantic Analysis Extract for Kosovo Scenario

Comp. Ques. Natural Language Text Concepts identified inDCMF-O

Who Patrol from Swedish con-tingent KS05

Patrol: Military TypeOrganization(undergovt type object-type:Unit-Type: has Affiliationobject type relation toSwedish Contingent:Object-Item-Group.Swedish: affiliation

What Patrolling Patrolling: action-taskpurpose:WHY AOI:Location

When From 1st may to 31stMay 2002,

Reporting-Data: time

Why To secure the AOI(Areaof Interest)

Action-Objective, Con-text

Where AOI somewhere inKosovo

AOI: specification detailAOI is both a Location aswell as a CONTROL FEA-TURE: may even be a subtype of control -featurelike ROUTE etc

After the mapping, we implemented the same in our DCMF-O in Protege. Thus,

our ontology also acts as the knowledge base to store all analyzed scenarios.

Following our Procedural Concept View analysis and using the BPMN-CWM

patterns as proposed earlier (for the other case study), we derived the procedural

sequence of actions that occurred in our Kosovo case scenario. The Procedural Con-

cept View for this scenario may be seen in figure 8.13.

As we can see, we were able to apply the USP2 Design as a knowledge analysis

method as well. We used our DAM (Deontic Analysis Model) to get the Pragmatic

Concept View as illustrated in figure 8.14.

Our experiences at the end of this scenario revealed that:

• Our DCMF-O designed using the O4IS design methodology was correct to the

most part. We identified missing links in the ontology. Some of these were due to

Page 286: Ontology for Information Systems (O4IS) Design Methodology

264 8 Case Study II: The Defence Conceptual Modeling Framework Project

inherent gaps in the original JC3IEDM data model itself. For the next iteration,

we planned to extend and modify the DCMF-O further.

• Our USP2 Design approach was useful not only in the design phase of DCMF-O

but also in the use and subsequent population of the ontology.

• Though we had proposed the CWM-BPMN patterns originally for the contract do-

main, we found that with little modifications (mappings of the domain concept

only) we were able to use them to deduce the procedural view of the military

operations as well. This emphasizes that our proposed CWM methodology (Pro-

cedural Concept View) can be re-used in different domains.

Page 287: Ontology for Information Systems (O4IS) Design Methodology

Fig.

8.13

.Pro

cedu

ralC

once

ptVi

ew:u

sing

CW

M

Page 288: Ontology for Information Systems (O4IS) Design Methodology

266 8 Case Study II: The Defence Conceptual Modeling Framework Project

Fig.8.14.Pragmatic

Concept

View:using

DA

M

Page 289: Ontology for Information Systems (O4IS) Design Methodology

8.8 Case Scenarios 267

8.8.2 Scenario 2: The Viking Shield Example: Lord Barkan Hostage Simulation

The Lord Barkan Case Scenario has been adapted from the Viking Shield scenario.

These scenarios are originally meant for military training and exercise purposes. The

whole scenario is visualized as taking place in a fictitious country called Bogaland,

which is geographically supposed to lie in parts of Gotland. The background for

the international peace keeping operation is ethnic conflicts between two fictitious

groups of local civilians. There are two rival ethnic groups both having access to

paramilitary forces, economic support etc. They engage in drug and arms smuggling

as well. One of them is headed by a local warlord called Lord Barkan.

A joint peace keeping force is set in place to resolve the conflict amicably. A

number of documents including some rules of engagement are available. Once again

based on the video clippings and other background documents, a textual document

was prepared as the base for the scenario analysis. An extract of the same is shown

in table 8.9:

Table 8.9. Extract from Lord Barkan Hostage Scenario

Warlord Barkan and paramilitary group Gute Rams has taken 2 BFORsoldiers as hostage. The hostage managed to escape during local fes-tivities (Lucia) when the guards were drunk. They escaped from thebuilding were they were held and was later picked up by a police pa-trol and taken to hospital. Considering the circumstances they are in agood condition and will most probably be able to return to their fami-lies for Christmas.Mr Barkan Mida Warlord on Gotland does not have completely sup-port from the people on Gotland. Opposition leader Aron Aronssonis interviewed. He knows where Barkan is keeping his supplies andhostage since it is a ‘small island’. If Aronsson is assured security sup-port from BFOR he will give some information regarding Mr Barkan’swhereabouts.

For this case scenario, we used the Semantic relationships as described earlier to

help us identify and match the concepts to our DCMF-O. We identify the main con-

cepts, thereafter establish the functional and temporal relationships between identi-

fied actions.

After having extracted the Semantic Concept View, we carry out the procedural

and pragmatic analysis. We use the ECA Rule Ontology as our reference to analyze

what is being done, who is doing it, what are the conditions under which this action

or event has occurred. A visualization of this process can be seen in our DCMF tool

demonstration as shown in figure 8.17.

Page 290: Ontology for Information Systems (O4IS) Design Methodology

Fig. 8.15. Lord Barkan Hostage Scenario

Page 291: Ontology for Information Systems (O4IS) Design Methodology

8.8 Case Scenarios 269

Fig.

8.16

.Lor

dB

arka

nH

osta

geSc

enar

io:F

unct

iona

lRel

atio

ns

Page 292: Ontology for Information Systems (O4IS) Design Methodology

270 8 Case Study II: The Defence Conceptual Modeling Framework Project

Fig.8.17.LordB

arkanH

ostageScenario:Prescriptive

Behavior

Analysis

Page 293: Ontology for Information Systems (O4IS) Design Methodology

8.8 Case Scenarios 271

Fig.

8.18

.Lor

dB

arka

nH

osta

geSc

enar

io:S

cena

rio

View

er

Page 294: Ontology for Information Systems (O4IS) Design Methodology

272 8 Case Study II: The Defence Conceptual Modeling Framework Project

8.8.3 Scenario 3: The Moscow Theater Hostage Crisis

This case scenario is based on the real terrorist hostage situation that occurred in

October 2003 at a theater in Moscow. 40 armed Chechen rebels took control of a

theater during a performance and took 850 hostages. The actual sequence of events

is described in figure 8.19. The gunmen were led by one Movsar Barayev who threat-

ened to execute all hostages if his demands were not met. A videotaped statement

was released and for three days there was a stand-off during which negotiations and

reconnaissance mission was carried out by the Russian authorities. Several perform-

ers who were backstage at the time the coop took place managed to escape through

some rear windows. They provided the military personnel with the first intelligence

report about the number of hostages, the number of gun men, their weapons etc.

Some hostages were executed who tried to escape. A couple of relatives who tried

to enter the building from outside were also killed. Further intelligence reports were

obtained from mobile phone calls from the hostages themselves. The rebels released

few children and a sick man with a heart condition. Following three days of the

seige, the Russian special forces carried out a covert military operation and stormed

the theater. Though much of the actual events are not public, the outcome was that

all terrorists were killed. Some of the hostages also died due to the nerve gas used.

This scenario has been the most complex scenario that we have analyzed so

far. The volume of information to be processed has been substantial. The scenario

provided us with ample opportunity to test the extent and depth that our DCMF-

ontology suite could successfully capture. Some missing concepts or their character-

istics were also identified and the DCMF-O suitably refined.

The scenario also gave us a huge number of action tasks and events happening

in the same time space. We could also test our functional and temporal relationships

between actions. Due to lack of space we do not discuss in detail our results here.

One observation was that in the eventuality of long and complex scenarios, the

visualization of the procedural aspect became tedious if we were to use only the

graphical visualization of the OWL ontology itself. At the same time, our targeted

end users, namely the military domain experts, felt that the decision makers do

not need to see all the captured information at the same time. This led us to work

on focusing on the visualization of only the action execution in a scenario. A related

work designed and developed a tool called the Scenario Viewer (section 8.8.4) which

can present the activities in a UML activity diagram.

Page 295: Ontology for Information Systems (O4IS) Design Methodology

8.8 Case Scenarios 273

Fig. 8.19. Moscow Theater Hostage Scenario: Military Operation

Page 296: Ontology for Information Systems (O4IS) Design Methodology

274 8 Case Study II: The Defence Conceptual Modeling Framework Project

8.8.4 Scenario Viewer- application for Knowledge Use

We have seen that DCMF-O in our Protege implementation can be used for stor-

ing the scenario information. However, the graphical visualization facilities with the

current Protege implementation is not user friendly. For example, a commander may

wish to view only the sequence of actions and events taking place. A UML activity

diagram would suffice for this purpose without the need for irrelevant other informa-

tion being displayed. Hence, a context sensitive information retrieval was necessary.

A tool for such visualization has been developed as part of the DCMF project by

Johan Persson (2007). We do not discuss the particular details of this work but refer

the reader to the publication. The Scenario Viewer can connect to different domain

ontologies and also makes use of some process based ontology for interoperability

between the domain ontology and the application.

The Scenario Viewer currently supports the option of visualization as UML ac-

tivity diagram only. It is possible that in future we may build support for other

formalizations like BPMN (Business Process Modeling Notation) etc. The UML ac-

tivity diagram is automatically generated from the stored knowledge. Each activity

or task on the UML activity diagram can be clicked on to view details of that action.

Composite actions or sub processes may be clicked open to see further details. Sam-

ple screen-shots of the Scenario Viewer has been seen above in our case scenario

examples.

8.9 Case Study Results and Evaluations

Our proposed ontologies, the DCMF-O and the ECA Rule Ontology need to be as-

sessed on different levels:

1 The formalization and ontological foundations: if they fulfill all the requirements

of formal ontologies.

2 If DCMF-O and the conceptual analysis models proposed, like the ECA rule on-

tology fulfill the specific requirements of the DCMF project.

3 Practical applications, ease of use and utility from the end user’s perspective: Is

the proposed set of ontologies as a knowledge base and a lexicon simple enough

for non ontology experts to use in their analysis and simulation of scenario work?

For (1) and (2) we have carried out our assessment based on the theoretical foun-

dations as discussed in chapter 3. The specific requirements from DCMF have been

discussed in (Kabilan, De Nicola, Missikoff & Mojtahed 2006). Since our concep-

tualizations and design methodology (O4IS design methodology and USP2 Design)

are based on current state of the art methods and guidelines, we assess that our

proposed ontology models are stable. Since the implementations are only proof of

Page 297: Ontology for Information Systems (O4IS) Design Methodology

8.9 Case Study Results and Evaluations 275

concepts, we have not populated these ontologies with a large number of individu-

als(instances). Therefore, they cannot be termed as fully functional knowledge bases

as they are of today. But, they can be easily filled in with these instances to create

the required reusable knowledge base.

On the (3) issue mentioned above, we have conducted a user perspective study

on the ECA Rule Ontology. A selected group of Subject Matter Experts (domain ex-

perts) from the Swedish Defence Research Agency were chosen and they were given

a task to analyze some rules from the Rules of Engagement document. The test group

had knowledge of the military domain and experience of categorizing information.

They were asked to categorize a couple rules using the simple 5 Ws method and later

with the ECA rule ontology.Thereafter they were required to input these as individu-

als in our implemented ECA Rule Ontology in the Protege ontology editor. After the

domain experts accomplished the analysis and categorization,they were required to

provide assessment and feedback on the following issues/ questions:

1 Ease of analyzing the ROE using Five Ws (on a scale 1-5).

2 Ease of analyzing the ROE using ECA rule ontology (on a scale 1-5).

3 What information do you think can be analyzed with Five Ws?

4 What information do you think could be analyzed with ECA Rule Ontology?

5 Have you used Protege before? If yes, how would you rate that the ECA Rule

Ontology, for analyzing ROE, has improved (on a scale 1-5), the following crite-

ria:

• Usability

• Ease

• Utility

For the first question, ease of analyzing with Five Ws, there was a mean answer

of 3 (max= 4 and min=2). Analyzing with ECA rule ontology was considered to

be easier with an average of 3.6 (max= 5 and min = 2). The domain experts felt

that analyzing with only 5Ws was not satisfactory since contextual and implicit in-

formation was lost. Specifically in the case of Rules of Engagement, the rules do not

explicitly predefine a ‘when’ or ‘where’ the rule may be applied. It depends on the

situation and context.

The assessment group answered that they would use the Five Ws to analyze

information which described ‘sequences of events’, ‘scenarios already occurred in a

certain order and a certain place’.

On the question when to use the ECA Rule Ontology the test group had the view

that the ECA rule ontology could be used in cases like description of rules which are

not bound to time or location, instructions and general directives and so on. Hence,

our basic intention to capture and model prescriptive behavior was fulfilled.

Page 298: Ontology for Information Systems (O4IS) Design Methodology

276 8 Case Study II: The Defence Conceptual Modeling Framework Project

The entire test group had seen or used the Protege ontology editor prior to our

interview.They rated an average of 4 on the questions regarding the actual ECA Rule

Ontology implementation and interface built in Protege.(on the account of usabil-

ity (mean=3.8, max=5, min=3), utility (mean=4.0, max= 5, min=4) and ease

(mean= 4.2, max= 5, min=3)).

The users felt that the main advantages with the ECA Rule Ontology are:-

• Their analysis from natural language to knowledge representation became easier,

since they had a help from the ontology and previous ‘instances’ to look up.

• they could do the analysis from natural language to ontology consistently. That

is,even though all the users in our target group were non-ontology experts, and

they all independently carried out the exercises, they all came up with similar

results.

• Since most of them were familiar with 5Ws analysis, the ECA which used 5Ws as

well, was easy to comprehend and adopt

However, the users also felt that the ECA Rule Ontology was not covering all

the semantics of conditions and all possible relationships to event and action.

We consider this to be an useful input and hope to improve our model in the next

iteration.

With that we come to the end of this case study discussion. It is to be noted that

this is an ongoing project and is estimated to continue for another three years or so.

That implies that we would be iterating through the ontology design, building and

use. We have not described the domain or the analysis done in as much detail as for

the first case with business contracts. However, our overview and results displayed

are indicative of the use of O4IS design methodology and USP2 Design. We have

also demonstrated the utility of our Semantic Analysis Representations as reference

patterns to be used by end users of targeted applications as well as the Information

Systems designers.

To wrap up this chapter we list some of the salient contributions of this case

study so far:

• The DCMF-O has put forward a reusable knowledge source.

• Our analysis and transformation of the JC3IEDM in to an ontology is now a part

of an ongoing NATO task group that, among other things, shall also look at how

different projects are adapting the JC3IEDM in to an ontology.

• The analyzed scenarios and the ontology resource is to be implemented in appli-

cations that are underway.

Page 299: Ontology for Information Systems (O4IS) Design Methodology

v 9

Discussion of Results

In this chapter, we now review and assess the results produced in this research. We

shall carry out our evaluation and discussion at two levels. At the first level, we

review and assess the main artifacts produced in this research, namely the O4IS

design methodology, the USP2 Design and Semantic Analysis Representations. We

have already assessed the individual artifacts and contributions of the case studies

in the respective chapters. At the second level, we evaluate our research itself based

on the design science research guidelines.

9.1 Assessing the O4IS Design Methodology

In chapter 3, we have reviewed some of the current ontology building method-

ologies, namely: Uschold’s Skeletal Methodology; Gruninger and Fox’s Methodol-

ogy; Methontology; Noy and McGuinness’ 101 Methodology; and UPON methodol-

ogy. There exist several other ontology creation methodologies like: the DILIGENT

methodology (Tempich, Pinto, Staab & Sure 2004); OTK methodology (Fensel, van

Harmelen, Klein & Akkermans 2000); etc. A survey of some other relevant ontology-

building methodologies has been carried out by Cristani & Cuel (2007).

In this section, we shall compare our proposed O4IS design methodology with

our surveyed ontology design methodologies (chapter 3), and highlight the advan-

tages O4IS design methodology has over the others.

9.1.1 Surveyed Ontology Methodologies: A Recap

Some of the current state of the art ontology building methodologies, including

those proposed by: Uschold & Gruninger (1996); Gruninger & Fox (1995); Noy &

McGuinness (2001); Fernandez et al. (1997); and De Nicola & Missikoff (2005) have

been surveyed in chapter 3.

We briefly recap the discussion on the different proposed methodologies for cap-

turing the domain semantics:

Page 300: Ontology for Information Systems (O4IS) Design Methodology

278 9 Discussion of Results

• Uschold’s Skeletal Method: Uschold & Gruninger (1996) proposes a skeletal

methodology that consists of four steps for the development of an ontology tar-

geting the enterprise domain (Uschold et al. 1995). The methodology proposes:

1 Identifying the purpose which is important in order to establish the goal and

aim of the intended ontology.

2 Build the ontology by capturing the knowledge, code this knowledge and

integrate existing ontologies available.

3 Evaluate this ontology.

4 Document the ontology.

• The Noy and McGuinness Method: The Noy & McGuinness (2001) guidelines

suggest to build an ontology by performing seven main activities:

1 Identification of the domain and scope of the ontology.

2 Reuse of existing ontologies.

3 Enumeration of important terms in the ontology.

4 Definition of classes and class hierarchy.

5 Definition of properties of classes (slots).

6 Definition of facets of the slots.

7 Creation of instances.

• The Gruninger and Fox Method (1995) is based on building a logical model

that will be specified into an ontology. This is done by:

1 Establishing motivating scenarios that the ontology would serve.

2 Informal competency questions are formulated based on these scenarios that

were established.

3 The specification of the terminology of the ontology in a formal language,

this is based on the terms extracted from the previous steps.

4 The process then continues but this time with the formal competency ques-

tions.

5 From the results of the formal competency questions the specification of ax-

ioms and the definition of the terms are formalized.

• METHONTOLOGY: A complete ontology development process is proposed by

Fernandez et al. (1997). The process is composed by the following phases: speci-

fication; conceptualization; formalization; integration; implementation; and main-

tenance. Its life cycle is based on evolving prototypes and specific techniques pe-

culiar to each activity. Other activities, like control, quality assurance, knowledge

acquisition, integration, evaluation and documentation are carried out simulta-

neously with the ontology development activities.

• UPON: UPON (De Nicola & Missikoff 2005) is a methodology based on the Ratio-

nal Unified Process. In UPON there are cycles, phases, iterations and workflows.

Each cycle consists of four phases (inception, elaboration, construction and tran-

sition) and results in the release of a new version of the ontology.

Page 301: Ontology for Information Systems (O4IS) Design Methodology

9.1 Assessing the O4IS Design Methodology 279

The Uschold and Gruninger’s skeletal method is a simple development outline,

but it does not specify explicitly how an IS designer is to actually carry out the de-

sign and development of the ontology. METHONTOLOGY on the other hand, is more

familiar to the IS designer, since the phases of the proposed ontology development

life cycle is similar to software engineering and development life cycle. Noy and

McGuinness have provided an easy to use, simple, tutorial-like guidelines for ontol-

ogy design and development. Though, their guidelines target the ontology develop-

ment on Protege Ontology editor, most of their proposed steps are generic enough to

be adopted independent of any tool. UPON, aims to make the best of both worlds by

combining Rational Unified Process design process with explicit specification of how

the ontology-engineering process should be done. They also elucidate on the roles

of a domain knowledge expert and the developer (ontology expert) in the ontology

development life cycle.

9.1.2 Requirements Revisited

As stated in section 5.1, we had identified a set of requirements that our proposed

ontology design methodology should meet. In this section we revisit those require-

ments to assess how far we have fulfilled those requirements. We shall compare the

functional requirements met by O4IS design methodology with the other surveyed

design methodologies in section 9.2.3.

• Easy to follow for IS designers: Our proposed O4IS design methodology follows

a template based documentation to provide the guidelines for the entire design

process. We also reuse existing software design methodologies as well as known

paradigms. This should make the O4IS design methodology easy to follow by an

IS designer.

• Adaptable for different targeted applications: Our recommendations in the

different stages of the O4IS design take into consideration the functional re-

quirements of targeted applications. Our proposed Dual Conceptual Representa-

tion and recommendation for level of knowledge representation are examples of

such contributions.

• Comprehensive to capture the semantics and pragmatics of the domain: We

have proposed a methodology for conceptualizing the semantics, procedural and

pragmatic aspects of the domain in our proposed USP2 Design.

• Explicit domain assumptions: The USP2 Design should aid the IS designer in

making domain assumptions explicit. The guidelines for deriving the Semantic

Concept View, Procedural Concept View and the Pragmatic Concept View help

the designer to analyze and represent the semantic and pragmatic aspects of the

domain. The set of Semantic Analysis Representations are also reusable patterns

that: aid the designer in the conceptualization; make explicit specific pragmatics,

Page 302: Ontology for Information Systems (O4IS) Design Methodology

280 9 Discussion of Results

dynamic or procedural aspects of social domains; and build on and make use of

existing literature and research.

• Clear guidelines for the design process: Both the O4IS design methodology

and the USP2 Design are presented in simple template-based steps with ample

illustrative examples. Furthermore, we have demonstrated the use of the design

methodology in two different case studies.

• Reusable, shared and understandable domain ontology for both humans

and machines: We have proposed a logical architecture for domain ontology (as

discussed in section 5.3.1) that makes the domain ontology flexible, and easy

to reuse. The Dual Conceptual Representation makes it understandable for both

humans and machines.

• Objective designing of ontology: We hope to reduce the subjective bias of the

IS designer by making the steps in the design process granular. Also, the use of

conceptual analysis patterns as put forward by our Semantic Analysis Represen-

tations, reduce the differences in conceptualizations.

Though we have targeted the IS designer as our end user for the O4IS design

methodology, it is equally applicable and usable by other ontology designers for

other domains as well.

9.2 Advantages of O4IS Design Methodology

After reviewing the salient features of O4IS design methodology we now discuss

some of the key advantages that O4IS design methodology has to offer.

9.2.1 O4IS Design Methodology useful in all ontology building situations

Existing ontology design methodologies belong to one of the following criteria, de-

pending upon the starting point from where they are built:

• From scratch.

• From existing ontologies.

• From a corpus of information sources only, without the involvement of subject

matter experts.

• A combination of the last two approaches.

All five of our surveyed ontology design methodologies describe in detail the

process of building ontologies from scratch. Methontology proposes alternatives to

build from existing ontologies or evolving ontologies as they call it. They empha-

size on the growth and extension of existing ontologies, but it is unclear how other

external ontologies are to be reused in the building of a targeted ontology. Noy

and McGuinness propose the reuse of existing ontologies in their ontology-building

Page 303: Ontology for Information Systems (O4IS) Design Methodology

9.2 Advantages of O4IS Design Methodology 281

methodology. Our proposed O4IS design methodology can be used in a combination

of any of the above mentioned situations. The only exception is that the O4IS design

methodology cannot be solely used to build an ontology without any input from

domain experts.

9.2.2 O4IS Design methodology proposes Dual Conceptual Representation

Blazquez et al (1998) and Gomez-Perez (2001) have observed some of the problems

faced by ontology designers:

• There is a subjective bias in the ontology, as the visualization of a domain is

dependent on the designer. There can never be an absolute model of a given

domain.

• Conceptual models are implicit in the implementation codes, that is the designers

develop the ontology directly in the chosen language of implementation be it

OWL, KIF, or any other Logic programs.

• The above problem also leads to violation of one of Gruber’s (1993a) design

criteria, namely ‘minimum encoding bias’.

• Ontology developers find it difficult to understand implemented ontologies of

other developers.

Our O4IS design methodology solves, or at least reduces, most of the above-

mentioned issues. O4IS is the only design methodology (to the best of our knowl-

edge) that actively proposes a Dual Conceptual Representation. We have emphasized

on the role of conceptual modeling in the design of ontology. Conceptual models as

the intermediary output serve many purposes, like:

• Domain assumptions are made explicit in the conceptual models. Nothing is hid-

den in the implementation code.

• Conceptual models are mostly graphical in nature, hence easily understood even

by non-information system users, domain experts, and decision makers. They are

easily interpreted by other IS designers as well.

• Conceptual models are implementation language independent. We can trans-

form the same UML conceptual model into different ontology representation lan-

guages. Hence, we reduce the coding bias. Efforts like the ODM aim to facilitate

this transformation. Tool support for the same is also under trial.

• The conceptual models themselves act as analysis patterns for designers to use

in the ontology building.

9.2.3 O4IS Design Methodology considers functional requirements of

application purpose

Almost all the ontology design methodologies advocate the design of ontology for

a given purpose. Ontologies for Information Systems use definitely need to be de-

Page 304: Ontology for Information Systems (O4IS) Design Methodology

282 9 Discussion of Results

veloped with the targeted use in mind. At the same time, they need to be reusable

across applications. These two requirements are in contrast to each other. Uschold

and Gruninger’s skeletal method proposes an informal question list to determine the

scope and purpose of the ontology, whereas Gruninger and Fox propose a formal

set of competency questions. These are helpful in establishing the content of the

ontology being developed. But, for successful use in an information system applica-

tion, the ontology must also fulfill some other functional requirements, just like any

other knowledge or data resource. These functional requirements depend partially

on the domain and partially on the intended use, like flexibility, traceability, verifia-

bility as seen in our second case study(section 8.2). Table 9.1 lists some functional

requirements and assesses if they are met by O4IS and the other design methodolo-

gies. In the table, ‘S’ stands for ‘Supports’, ‘PS’ stands for ‘Partly Supported’, and ‘ND’

stands for ‘Not Described’. The last entry means that we could not judge if the design

methodology supported or was not based on the literature that we surveyed. As we

can see, O4IS supports all the listed functional requirements. There may be other

requirements which may not be addressed, but to the best of our knowledge and

in the different domains that we have applied O4IS design methodology, we have

found the results to be satisfactory.

Page 305: Ontology for Information Systems (O4IS) Design Methodology

Tabl

e9.

1.C

ompa

riso

nof

Ont

olog

yD

evel

opm

ent

Met

hodo

logi

es

Fun

ctio

nal

Req

uir

emen

tsO

4IS

Usc

hold

and

Kin

gG

run

inge

ran

dFo

xM

ETH

ON

TO

LOG

YN

oyan

dM

cGu

inn

ess

UPO

N

Han

dle

unst

ruct

ured

info

rma-

tion

asin

put

sour

ces

SS/

NS

ND

ND

ND

S

Flex

ibili

tyan

dA

dapt

abili

tyS

ND

ND

PSN

SS

Reu

se(B

ased

on)

exis

ting

know

ledg

eba

sean

din

form

atio

nS

SS

SS

S

Inte

rope

rabi

lity

SN

DN

DN

DN

DS

Rap

idan

dea

syde

velo

pmen

tS

PSPS

SS

SFo

rmal

Rep

rese

ntat

ion

SS

SS

SS

Info

rmal

Rep

rese

ntat

ion

SS

SM

aybe

NS

SC

redi

bilit

y,A

uthe

ntic

ity

tobe

veri

fiabl

e,va

lidat

edS

ND

ND

SN

DS

Use

asa

look

upfo

ran

alys

is,

atth

esa

me

tim

eth

eon

tolo

gysh

ould

grow

SS

ND

ND

ND

S

Lege

nd:S

=Su

ppor

ted,

NS=

Not

Supp

orte

d,N

D=

Not

Des

crib

ed,P

S=Pa

rtly

Supp

orte

d.

Page 306: Ontology for Information Systems (O4IS) Design Methodology

284 9 Discussion of Results

9.3 Evaluating USP2 Design and the Semantic AnalysisRepresentations

We evaluate the USP2 Design and the Semantic Analysis Representations proposed

in this research following knowledge representation roles as proposed by Davis et al.

(1993) and summarized earlier in section 2.3.2 as:

1 A knowledge representation is a surrogate. A computational model is a sub-

stitute for some real- world concept which may be an object or some character-

istics of an object or a process that occurs in time. Sowa (2000) explains that a

declarative approach is based on constraints or axioms that define the precon-

ditions and post conditions and transformations that may occur for each event

in the model. For our chosen knowledge representation both the UML concep-

tual models and the formal OWL implementations fulfill this criterion. The same

conceptual models are used to model the behavior, as well as the underlying

semantics.

2 A knowledge representation is a set of ontological commitments. Following

Quine’s (1964) criterion and definition of ontology as a study of existence, the

characteristics of the concepts or properties or slots as they are known popu-

larly define the ontological commitment of the designer. This criteria overlaps

with the design criteria put forward by Gruber (1993a) as well. We follow the

OWL modeling recommendations for the OWL translations as well as our con-

ceptual models are based on the theoretical background as discussed in chap-

ter 4. Though a certain amount of subjective bias cannot be avoided, we have

tried to adhere to Gruber’s criteria for ontology modeling.

3 A knowledge representation is a fragmentary theory of intelligent reason-

ing. To support reasoning, the knowledge representation must also describe the

behavior and interactions between the ‘things’ that make the model. Our pro-

posed USP2 Design approach fulfills this criterion. We have analyzed and put

forward different semantic relationships, namely, structural, prescriptive, tem-

poral, functional and deontic. Our perspective based conceptualization can be

used both at design time and later during the use of ontology as well.

4 A knowledge representation is a medium for efficient computation. The

model must be computable by machines. As stated earlier, UML conceptual mod-

els are translatable to machine- readable OWL. Also, by adopting the ODM rec-

ommendations, we have aimed to ensure uniformity and completeness of the

UML conceptual models. So, we not only gain the expressiveness and simplicity

of graphical UML but also the formal computability of OWL.

5 A knowledge representation is a medium for human expression. A good

knowledge representation should facilitate easy communication between knowl-

edge engineers and domain experts who are not AI experts. We believe that this

Page 307: Ontology for Information Systems (O4IS) Design Methodology

9.4 Summary of Results 285

principle has been adequately addressed by our design approach as well as the

Semantic Analysis Representations.

9.4 Summary of Results

So far, we have assessed the artifacts produced in this research, namely the O4IS

design methodology and the other related constructs and methods like the USP2 De-

sign, the SARs, etc. We now assess the research methodology that has been adopted

to produce the above-mentioned design for Information Systems.

To quote Peffers and Tuunanen (2006):

“Information systems (IS) is an “applied” research discipline, we acknowl-

edge, in the sense that we apply theory, frequently from other disciplines,

such as economics, computer science, and the social sciences, to solve prob-

lems at the intersection of IT and organizations.”

Peffers and Tuunanen summarize the developments in design science in Informa-

tion Systems and observe that in the lack of a clear mental model for the practice of

research in Information Systems, it is ambiguous to evaluate and ascertain the scien-

tific relevance or contribution that a particular Information Systems research may or

may not have. They propose a six-step conceptual process and a mental model called

the Design Science Research Process (DSRP) to carry out and produce Information

Systems artifacts as discussed earlier in section 1.10.

R Peffers et al. (2006) have based their DSRP model on the guidelines pro-

posed by Hevner et al. (2004). Hence, we choose to assess the research methodology

followed in this research using the design science guidelines proposed by Hevner

et al. (2004) as:

• Design as an Artifact: Must produce a viable artifact, method, model or an instan-tiation. We have produced a number of artifacts in this research. Firstly we have

proposed a design methodology for design and development of ontologies for

information systems, called the Ontology for Information Systems (O4IS) design

methodology (chapter 5). Secondly, we have produced a number of methods for

conceptualization, viz the multi-tier architecture for domain conceptualization,

Dual Conceptual Representation for semi-formal and formal conceptualization.

Thirdly, we have proposed a number of Semantic Analysis Representations as

both models, and constructs for analyzing further domain knowledge. Fourthly,

our case studies themselves have given forth valuable and reusable artifacts,

that is the Multi-Tiered Contract Ontology and the Defence Conceptual Modeling

Framework-Ontology.

Page 308: Ontology for Information Systems (O4IS) Design Methodology

286 9 Discussion of Results

• Problem Relevance: Requires creation of a technology-based solution to a realworld problem. The problems as we have identified are relevant and contempo-

rary. The need for faster, efficient and accurate information retrieval and pro-

cessing in Information Systems is well established. Emerging technologies like

semantic web and ontologies are supposed to resolve some of the current prob-

lems existing in Information Systems. In this research, we have tried to combine

existing methodologies and emerging technologies to propose a viable solution

for the identified problem. We visualize that our O4IS design methodology is sim-

ple and explanatory enough for IS designers to adopt and follow for the design

and development of ontologies.

• Design Evaluation: The artifact must be useful and hence must be evaluated for itsutility, quality and efficacy. The artifacts listed earlier have been theoretically and

practically assessed. By using our proposed methodologies in case studies, we

have been able to demonstrate its utility. At the same time, feedback and issues

faced have led us to refine our proposed design methodology. As stated, this re-

search began with a problem or goal-oriented approach with the first case study.

Experiences gained in that case study led us to the second iteration where we

refined our design methodology before applying it on our second case study, the

DCMF project. The DCMF project had different goals and requirements, hence

we had to further adapt our constructs and methods. The proposed artifacts in

this thesis are the result of this second iteration. We plan to continuously re-

vise and update the proposed solutions if necessary, when we apply the same on

more case studies. By adopting standards and recommendations for the knowl-

edge representation, we ensure the quality of the artifacts produced. Some of

the artifacts (Deontic Analysis Model) have been evaluated by end users through

surveys and empirical tests.

• Research Contributions: The artifact must be novel, using a new improved or in-novative approach to solve the problem domain. The research contributions mustbe clear and verifiable. In our survey of related research we have reviewed the

current state of the art in ontology design methodologies. In the earlier sec-

tion 9.2.3, we have presented a comparison of these surveyed ontology design

methodologies with O4IS design methodology. The scientific originality and re-

search contribution is thus evident. We have supported active reuse of existing

methods, techniques and approaches. Hence, our ten-step guidelines incorporate

parts of the state of the art design methodologies as well. Some of the unique

and original contributions of the research include: the multi-tiered architecture

for domain ontologies; the Dual Conceptual Representation approach; the set

of conceptual analysis models for the semantic analysis of relationships includ-

ing functional, temporal, prescriptive and deontic aspects named SARs that can

also be used as constructs; and the main contribution of this thesis is the Unified

Page 309: Ontology for Information Systems (O4IS) Design Methodology

9.4 Summary of Results 287

Semantic Procedural Pragmatic design for semantic representation of the seman-

tic and pragmatic aspects of the domain. Note that, we have focused mainly on

social domains that are inherently prescriptive or normative in behavior. Our re-

search methods have been documented via this thesis and can be carried out by

interested designers and readers. Our conceptual models have been, for the most

part, verified by domain experts and based on standardized literature.

• Research Rigor: The artifact must be coherent, rigorously defined and internallyconsistent. Application of rigorous methods in the design and development processmust be visible. We have endeavored to be as rigorous and transparent as possi-

ble in our design and development process. Our knowledge representation lan-

guages chosen, UML and OWL can be verified for consistency by themselves.

• Design as a Search Process: The search for an effective artifact requires that avail-able means and methods must have been utilized. As stated earlier, our research

has included reuse and incorporation of existing research and methods. Chapters

2, 3 and 4 summarize our study and review of existing and relevant research of

interest to us. We have motivated the choices that we have made and shown the

reuse of existing methods and research through out our proposed solutions in

chapters 5 and 6.

• Communication of Research: Design science must be effectively communicated

to technology-oriented as well as management-oriented audiences. As listed in

chapter 1 (1.14), we have attempted to communicate our results and ideas

through a number of publications. Several others are in the pipeline and we

hope to continue this knowledge dissemination process. Another form of knowl-

edge dissemination is through teaching other students. This author is actively

involved in the supervision of masters’ students in their research as well as some

courses where ontology design and development is taught. Some of the students

have carried out their research using ideas and solutions proposed in this thesis.

With that we come to the end of our discussion on results achieved. In the final

chapter we recapitulate our problems, goals and our solution.

Page 310: Ontology for Information Systems (O4IS) Design Methodology
Page 311: Ontology for Information Systems (O4IS) Design Methodology

v 10

Conclusions

In this final chapter, we recapitulate on our problems, motivations and solutions

proposed. We highlight some of the salient points of our research and conclude

with a discussion on open issues and work for the future. Peffers and Tuunanen put

forward the DSRP conceptual model as a research process, illustrated in figure 1.6.

They have identified several possible input starting points for Information Systems

research. One of them being the problem-centered approach. Our research began

with the identified problems in the realm of business contracts (Case study I). To

attain those objectives, we designed and developed the first version of the MTCO.

Issues and experience gained in this iteration led us to iterate further and work

towards an improved design methodology. The second case study, then, gave us the

opportunity to test our improved design methodology. Feedback, evaluation from

the end users has led to constant improvements in our design and development. We

present the current state of the O4IS design methodology and USP2 Design in this

thesis. The DCMF case study is still ongoing and we presume that further iterations

and improvements in our proposed artifacts are possible.

As we have been following Peffers et al.’s (2006) design science research process

(DSRP) model, we use the same one to summarize our work in this research.

10.1 Problem Identification and Motivation

To identify the research problem and justify its need for a solution. Problem definitionis to be used to develop an artifact as a solution. Motivation is necessary to convincethe readers to understand and accept the results that are proposed. Resources neededfor this step is a knowledge of the current state of the art, the relevance of the identifiedproblem.

Chapter 1.3 motivates the need for ontologies to be used in Information Systems

like the growing needs of Information Systems, changing facets of business com-

munication and technology and the need for semantic interoperability with global

Page 312: Ontology for Information Systems (O4IS) Design Methodology

290 10 Conclusions

partners etc. Furthermore, we are interested in social domains where prescriptive

norms, pragmatics and social behavior is implicit. Some of the current issues that

stop the widespread use of ontologies in Information Systems have been discussed

in section 1.4 and a recap is given below:

• Abstract research is not in tandem with applied research and industry.

• Ontology design does not cover all of the functional needs of Information Sys-

tems.

• Ontology design methodologies are not explicit enough and easy to adopt by

inexperienced IS Designers.

• Ontology design for Information Systems needs to capture and represent pre-

scriptive behavior in addition to descriptive vocabulary.

These issues raise many research questions, the following have been the focus

for this research as (section 1.5):

1 How can the semantic and pragmatic aspects of social domains be represented

as ontologies that are to be used in Information Systems?

2 How should domain ontologies (of social domains) be designed, considering the

functional requirements of Information Systems, including design choices that

an IS designer should make with regard to architecture, development strategy,

representation language, and selection of tools?

3 For what purposes may an ontology of social domains designed for Information

Systems be used?

10.2 Objectives for a solution

To infer the objectives for the proposed solution to the identified problem. The objectivesare to be based rationally on the identified problems and should lead to the developmentof new or improved artifacts.

For the problems identified we set up some goals (section 1.6) that outline the

objectives for our proposed solution as:

• To propose a methodology for designing ontologies of social domains with a

focus on their semantic and pragmatic aspects.

• To demonstrate the usefulness of this methodology for designing ontologies that

can be used as knowledge resources for designing and using Information Sys-

tems.

A clear and explanatory design methodology that takes care of functional require-

ments of Information Systems resolves the issue of ontology design not considering

functional requirements. By making explicit the semantics, prescriptive norms and

pragmatics of the domain via our USP2 Design takes care of the issue of representing

Page 313: Ontology for Information Systems (O4IS) Design Methodology

10.3 Design and Development 291

the semantic and pragmatic aspects of social domains. The O4IS design methodology

has been described in a simple template based procedure using strategies and meth-

ods prevalent in any Information Systems design and development. Thus, it should

be relatively easy for adoption by information system designers. The O4IS design

methodology reuses and incorporates existing ontology design methodologies.

The second research question is addressed by demonstrating the utility of the

proposed design methodology in two different social domains.

10.3 Design and Development

Create the artifacts. Artifacts may be models, methods, constructs, or instantiations.This step includes determining the functionality of the artifact and developing it usinga theory.

Our contributions made in this thesis are illustrated in figure 1.7:

• The O4IS design methodology for design of domain ontologies for Information

Systems.

• The USP2 Design for domain conceptualization of semantics, procedures and

pragmatics. The USP2 Design uses and follows Sowa’s discourse on lexical knowl-

edge representation (section 3.3.3).

• Set of Semantic Analysis Representations that can be used as constructs for

capturing domain knowledge or as reference models for analysis. The Semantic

Analysis Representations essentially analyze and conceptualize different types

semantic relationships.

• The Multi-Tier Domain Ontology architecture for ontology representations that

promotes flexibility, extendibility and re-usability.

• A Dual Conceptual Representation strategy for a two-step knowledge repre-

sentation of domain supporting both human and machine users of Information

Systems.

Additionally we have a number of ontologies and domain specific artifacts produced

in our case studies, namely the Multi tier contract ontology(MTCO), the deontic

analysis of contract commitments through Obligation State Analysis. The procedu-

ral analysis and alignment to business process models using the Contract Workflow

Methodology to deduce Contract Workflow Models(CWM). We have also proposed

patterns for CWM analysis using BPMN.

In the other case study, we have contributed with a multi-tiered DCMF-O suite.

We have adapted existing data model and standard in to ontology. Our case study

specific extensions and modifications include the use of ECA rule ontology to capture

normative Rule of Engagements.

Page 314: Ontology for Information Systems (O4IS) Design Methodology

292 10 Conclusions

The above artifacts have been developed using the proposed theory, viz, O4IS

design methodology and USP2 Design.

10.4 Demonstration

Demonstrate the utility of the developed artifact. This may be done via experimenta-tion, simulation, case study, proof or other means. The idea is to demonstrate howthe artifact can be used to solve the identified problem. As discussed in the previ-

ous section, our theories have been demonstrated and used in the context of the

two case studies mentioned in this thesis. As we discussed in section 7.13, the pro-

posed MTCO has been used in different contexts like for alignment with business

process models(section 7.13), to monitor contract performance (section 7.13.2),for

exception handling of processes (section 7.13.3), to assess business contract risks

(section 7.13.4) and to model the non-functional aspects of enterprises (Kabilan

et al. 2007).

Similarly the artifacts designed in the context of the second case study, DCMF

Project, have been used in proof of concept demonstrations and tools like analysis

of case scenarios (section 8.8), Military operation plan visualization and activity

diagram visualization. This is an ongoing research and we aim to use the proposed

ontologies and methods in different applications including semantic interoperability.

10.5 Evaluation

Observe and measure how well the artifact solves the problem. It includes a compar-ison of the artifact to the original objectives set up. How far does the artifact fulfillthe objectives? Other quantitative assessments may also be done. The proposed O4IS

design methodology and its included design approaches, constructs and models as

discussed above, meet the objectives set up. A more quantitative or field test of the

same is now warranted. We hope that other designers and researchers will test our

proposed methodologies and provide us with constructive feedback. As stated, we

are following the DSRP model, therefore, this is not the end of a research process but

an evolving one. We ourselves plan to apply the O4IS to other domains and applica-

tions. A certain degree of subjective bias on the part of this author cannot be ruled

out. Hence, it is difficult to estimate exactly how easy an IS designer unfamiliar with

ontology modeling, would find the O4IS design methodology. We have tried to be

illustrative and simple in our descriptions so that it should be comprehensible to any

IS designer. We have also tried to provide the summary of the relevant theoretical

background necessary to follow the O4IS design methodology.

As stated in section 8.9, we have begun with some field tests of our case study

results. We plan to extend our evaluations in the coming years.

Page 315: Ontology for Information Systems (O4IS) Design Methodology

10.7 Open Issues and Future Work 293

10.6 Communication

To disseminate knowledge about the problem, its proposed solution and utility to otherscientific researchers, practicing professionals via publications in scientific channels, andother disseminating media.

We have disseminated our research through publications in scientific conferences

and workshops. We have also shared our results in technical documents and at tech-

nical workshops like the Simulation Interoperability Workshop, which is a confer-

ence for military organizations and defence-related practicing professionals.

10.7 Open Issues and Future Work

To wrap up our discussion, there still remain a few issues that are yet to be resolved

like:

• Analysis and representation of business rules and constraints. So far we have

proposed to conceptualize them as OCL constraints (section 7.13.3). The current

W3C recommendation which will probably become a standard for rule expres-

sion is through SWRL (Semantic Web Rule Language). We need a method to

translate from OCL to SWRL. The OMG recommendation of the Ontology Def-

inition Metamodel(ODM) proposes the use of Common Logic (CL) to capture

business constraints. However, it is still unclear how the translation to OWL is

to take place. Another OMG proposal, SBVR(Semantic Business Vocabulary and

Rule) ontology is something we plan to look at.

• Prescriptive Norms and Pragmatics. Our work on the ECA rule ontology is still

basic and needs to be improved. It has to be extended to handle all other kinds of

conditions and rules. Our Deontic Analysis Model at present only represents the

modalities of an obligation. We should extend it to include the entire Language

Action Perspective model so that we can analyze all kinds of actions from the

intentional aspect.

• Ontology Maintenance and Use. We have not addressed any issues regarding

the physical storage, retrieval or use of the designed ontology. We have not ad-

dressed how or when or by whom an ontology is to be updated and maintained.

Research into migration from existing systems to ontologies is also warranted.

Interoperability of actual Information Systems using ontologies is to be tested.

Methods, approaches and tools for accomplishing the above are also possible

research topics for the future.

Page 316: Ontology for Information Systems (O4IS) Design Methodology

294 10 Conclusions

10.8 Conclusion

Man has been on the quest for truth and knowledge from time immemorial. Some

believe in absolute truth, but this research has followed the existence of a relative

and pragmatic truth as is supported by Information Systems(see our discussion in

section 3.3.4). Just as Barry Smith (2003a, 2004) has pointed out, philosophers can

learn from the experiences of problem-solving ontology engineers and vice versa.

Smith however criticizes the relativist concept of possible worlds. We believe that

the knowledge engineers (both within AI and Information Systems) came up with

the idea of possible worlds because their ‘experiments’ and ‘observations’ showed

them that it is not possible to be completely free of ontological commitment and bias

as recommended by the philosophers. The same conceptualization of the same do-

main could be represented differently, interpreted differently, analyzed differently,

depending on who is doing the same, or in which context or under what circum-

stances. Therefore, the utility of a conceptualization becomes shareable and reusable

only when the context and specifics of the ontological commitment are made obvi-

ous and thus, the delimitation of conceptualization of possible worlds. It implies

that the proposed theorems and truth statements are valid within the boundaries

described. Such an approach is well within the realm of a relativist philosopher who

believes in the existence of relative truth and not the absolute truth. Even the pure

philosophical ontologist would have to agree that in their complete world as is, it

still would not be possible to capture all aspects, and flavors of a concept. And differ-

ent philosophers have different views of the world, thereby indulging in ontological

bias. If establishing consensus regarding the conceptual models would free an on-

tology of its ontological bias, then the same approach can be easily applied to the

knowledge engineering perspective as well.

Our work and results have shown that Haack’s version of possible worlds (sec-

tion 3.3.1 is valid. Our conceptual design approach has been to declaratively capture

one possible vision of a possible world. In that respect, we have tried to combine the

linguistic and AI approach for ontology modeling.

From Linguistics, we have reviewed the works of (Nirenburg & Raskin 2001)

where they have laid the foundation for what should be described in the semantics of

an ontology (section 3.3.2). As we can now see, our proposed conceptual models, the

design rationale behind the USP2 Design has been laid on the theoretical background

laid by Nirenburg and Raskin. Our knowledge representations also conform to the

roles that (Davis et al. 1993) (see section 2.3.2) propose– that of a medium of human

expression and a surrogate model for the real world.

We started off on this research journey with the objectives of promoting the use

of ontologies in Information Systems. To do that, ontology design had to be made

simple and illustrative enough for information system designers to follow. Given

Page 317: Ontology for Information Systems (O4IS) Design Methodology

10.8 Conclusion 295

the complex philosophy that drives ontology, we needed to put forward conceptual

models as stepping stones for designers to understand and use as constructs (build-

ing blocks of Nirenburg and Raskin, as also supported by Sowa). We may not have

reached our final destination, but we feel that we have made sufficient progress to-

wards that goal – an incremental increase in the re-usable knowledge resource of

mankind (limited to Information Systems context).

Page 318: Ontology for Information Systems (O4IS) Design Methodology
Page 319: Ontology for Information Systems (O4IS) Design Methodology

References

Aalst, W. M. P. v. d. (1994), ‘Modelling and analysing workflow using a petri-net based

approach’, Proceedings of the second Workshop on Computer-Supported Cooperative Work,

Petri nets and related formalisms pp. 31–50.

Aalst, W. M. P. v. d. (1998), ‘The application of petrinets to workflow management’, The

Journal of Circuits, Systems and Computers 8(1), 21–66.

Aalst, W. M. P. v. d. (1999), ‘Formalization and verification of event-driven process chains’,

Information and Software Technology 41(10), 639–650.

Ackoff, R. (1989), ‘From Data to Wisdom’, Journal of Applied Systems Analysis 16, 3–9.

Albert, S. (1998), ‘Knowledge management tries to live up to the hype’, MidRange Systems .

Alexander, C., Ishikawa, S. & Silverstein, M. (1977), A Pattern Language: Towns, Buildings,

Construction, Oxford University Press.

Angelov, S. G. (2001), B2b econtract handling - a survey of projects, papers and standards

ctit technical report, Technical report, University of Twente.

Artale, A., Franconi, E., Guarino, N. & Pazzi, L. (1996), ‘Part-whole relations in

object-centered systems: An overview’, Data Knowledge Engineering 20(3), 347–383.

Austin, J. L. (1962), How to do things with words, Oxford: Oxford University Press.

Avison, D. & Fitzgerald, G. (1995), Information Systems Development: Methodologies,

Techniques and Tools, 2 edn, McGraw Hill, Maidenhead.

Baclawski, K., Kokar, M., Kogut, P., Hart, L., Smith, J., Holmes, W., Letkowski, J. & Aronson,

M. (2001), ‘Extending UML to support ontology engineering for the semantic web’, UML

pp. 342–360.

Bergamaschi, S., Castano, S., di Vimercati, S., Montanari, S. & Vincini, M. (1998), ‘An

intelligent approach to information integration’, Proceedings of International Conference

on Formal Ontology in Information Systems (FOIS’98), Trento, Italy .

Berners-Lee, T., Hendler, J. & Lassila, O. (2001), ‘The semantic web’, Scientific American

284(5), 34–43.

Bittner, T., Donnelly, M. & Smith, B. (2004), ‘Endurants and perdurants in directly depicting

ontologies’, AI Communications 13(4), 247–258.

Blazquez, M., Fernandez, M., Garcia-Pinar, J. & Gomez-Perez, A. (1998), ‘Building ontologies

at the knowledge level using the ontology design environment’, Proceedings of the

KAW98 .

Page 320: Ontology for Information Systems (O4IS) Design Methodology

298 References

Boman, M., Johannesson, P., Janis, B. A. & Wangler, B. (1997), Conceptual Modelling,

Prentice Hall.

books, I. (2002), ICC International contract for sale of perishable goods, ICC books.

Borgida, A. (1995), ‘Description logics in data management’, IEEE transactions on knowledge

and data engineering 7(1).

Borgida, A. & Brachman, R. J. (2000), Description Logic Handbook, Cambridge University

Press, chapter Conceptual Modelling with Description Logics, pp. 359–381.

Borst, P., H., A. & Top, J. (1997), ‘Engineering ontologies’, International Journal of

Human-Computer Studies 46 (Special Issue on Using Explicit Ontologies in KBS

Development) pp. 365–406.

Brachman, R. J. (1977), ‘What’s in a concept: Structural foundations for semantic networks’,

International Journal of Man-Machine Studies 9(2), 127–152.

Bradley, F. H. (1914), Essays in truth and reality, Oxford Press.

Bubenko, J. A. (2007), Conceptual Modelling in Information Systems Engineering,

Springer-Verlag Berlin Heidelberg, chapter From Informational Algebra to Enterprise

Modelling and Ontologies– a Historical Perspective on Modelling for Information

Systems, pp. 1–18.

Bucciarelli, M. & Johnson-Laird N, P. (2005), ‘Naive deontics: A theory of meaning,

representation, and reasoning’, Cognitive Psychology 50 (2005) pp. 159–193.

Cabot, J. & Raventos, R. (2004), ‘Roles as entity types: A conceptual modeling pattern’,

International conference on conceptual modeling (ER 2004) pp. 69–82.

Carey, S., Kleiner, M., Hieb, M. & Brown, R. (2001), ‘Standardizing battle management

language a vital move towards the army transformation’.

Chen, P. P. (1976), ‘The entity-relationship model -toward a unified view of data.’, ACM

Translations of Database Systems. 1(1), 9–36.

Chen, P. P. (1983), ‘ER - A historical perspective and future directions’, Proceedings of the 3rd

Int. Conf. on Entity-Relationship Approach (ER’83) pp. 71–77.

Chen, P. P., Thalheim, B. & Wong, L. Y. (1999), ‘Future directions of conceptual modeling’,

Conceptual Modeling: Current Issues and Future Directions 1565, 294–308.

Chen, Y. (2006), Contract execution monitoring and conformance testing of business

contracts, Master’s thesis, Department of Computer and Systems Sciences, Royal

Institute of Technology and Stockholm University.

Chira, O. (2003), Ontologies, Technical report, IDIMS (The Intelligent Agent Based

Collaborative Design Information Management and Support Tools (IDIMS) project)

Report.

Clarke, R. (1995), ‘Information systems: The scope of the domain.’,

http://www.anu.edu.au/people/Roger.Clarke/SOS/ISDefn.html. Last accessed on

2007-07-20.

Colomb, M. R. (2002), Extending ontology to behaviour in communities of interoperating

information systems agents, Technical report, ISIB-CNR.

Community Research and Development Information Service: Glossary (Web Resource),

http://www.cordis.lu/ist/ka1/administrations/publications/glossary.htm.

Last accessed on 2007-07-20.

Page 321: Ontology for Information Systems (O4IS) Design Methodology

References 299

Consortium, W. W. W. (Web Resource), ‘Wordnet in RDFS and OWL’,

http://www.w3.org/2001/sw/BestPractices/WNET/wordnet-sw-20040713.html.

Last accessed 2006-05-30.

Corcho, O., Fernandez, M., Gomez-Perez, A. & Lopez-Cima, A. (2005), ‘Building legal

ontologies with METHONTOLOGY and WebODE’, 3369, 42–157.

Cranefield, S. (2001), ‘UML as an ontology modelling language’.

Cranefield, S. & Purvis, M. (1999), ‘UML as an ontology modelling language’.

Cristani, M. & Cuel, R. (2007), A survey on ontology creation methodologies, in A. Sheth &

M. Lytras, eds, ‘Semantic Web-based Information Systems– state of the art applications.’,

CyberTech Publishing.

Dale, J. (2002), Ontology, Montreal and Kingston: McGill-Queen University Press.

Daskalopulu, A. (2002), ‘Evidence based electronic contract performance monitoring’, The

INFORMS Journal of Group Decision and Negotiation. Special Issue on Formal Modelling in

E-Commerce .

Daskalopulu, A. & Maibaum, T. S. E. (2001), ‘Towards electronic contract performance’,

p. 771.

Daskalopulu, A. & Sergot, M. J. (1997), ‘The representation of legal contracts’, AI and Society

11, 6–17.

Davis, R., Shrobe, H. & Szolovits, P. (1993), ‘What is a knowledge representation?’, AI

Magazine 14(1), 17–33.

De Nicola, A. & Missikoff, M. (2005), ‘A proposal for a unified process for ontology building:

UPON’, Lecture Notes in Computer Science, Volume 3588,Pages 655 – 664 .

Dignum, F., Weigand, H., Kruezen, W., Kemme, T. & van de Riet, R. (1987), ‘Constraint

modelling using conceptual prototyping language’, Data and Knowledge Engineering

pp. 213–254.

Dik, S. (1978), Functional Grammar, North-Holland, Amsterdam.

Ding, L., Finn, T., Joshi, A., Peng, Y., Scott Cost, R., Sachs, J., Reddivari, P. & Doshi, V.

(2004), ‘Swoogle: A semantic search and metadata engine’, ACM Thirteenth Conference

on Information and Knowledge Management (CIKM04) . Last accessed on 2007-07-20.

Doyle, J. & Patil, R. (1989), ‘Two dogmas of knowledge representation’, MIT LCS Technical

Memo 387B . A revised version of this paper appeared as Doyle J., and Patil R, Two

theses of knowledge representation: Language restrictions, taxonomic classification, and

the utility of representation services, Artificial Intelligence, 48(3):261-297, 1991.

EC Directives 1998 (n.d.),

http://europa.eu.int/comm/enterprise/newapproach/standardization/harmstds/reflist.html.

Last accessed 2003-11-12.

Fensel, D., van Harmelen, M., Klein, M. & Akkermans, H. (2000), ‘On-To-Knowledge:

Ontology based tools for knowledge management’, Proceedings of E-Business and E-Work .

Fernandez, E. B. & Yuan, X. (2000), ‘Semantic analysis patterns’, Proceedings of the 19th

International Conference on Conceptual Modeling (ER 00), LNCS 1920 pp. 183–195.

Fernandez, M., Asuncion Gomez-Perez, A. & Juristo, N. (1997), ‘METHONTOLOGY: from

ontological art towards ontological engineering’, Proceedings of the AAAI97 Spring

Symposium Series on Ontological Engineering pp. 33–40.

Page 322: Ontology for Information Systems (O4IS) Design Methodology

300 References

Fernandez, M., Gomez-Perez, A., Sierra, A. & Pazos, J. S. (1999), ‘Building a chemical

ontology using METHONTOLOGY and the ontology design environment.’, IEEE Expert

(Intelligent Systems and Their Applications) 14(1), 37–46.

Fikes, R. & Farquhar, A. (1999), ‘Distributed repositories of highly expressive reusable

ontologies’, IEEE Intelligent Systems pp. 73–79.

Fintel, K. v. (2006), Modality and language, in B. Donald M, ed., ‘Encyclopedia of

Philosophy’, 2 edn, Macmillan Reference USA.

Fonseca, F. (2006), ‘The double role of ontologies in information science research’, Journal of

the American Society for Information Science and Technology 58(6), 786–793.

Fowler, M. (1997), Analysis Patterns: Reusable Object Models, Addison-Wesley.

Fox, M. S. (1992), ‘The TOVE project: A common-sense model of the enterprise’, Industrial

and Engineering Applications of Artificial Intelligence and Expert Systems pp. 25–34.

Galliers, R. (1987), Information analysis: selected readings, Addison Wesley, Wokingham.

Gamma, E., Helm, R., Johnson, R. & Vlissides, J. (1994), Design Patterns: Elements of

Reusable Object Oriented Software, Addison-Wesley.

Gangemi, A., Pisanelli, D. & Steve, G. (2001), ‘A formal ontological framework to represent

norm dynamics’.

Geerts, G. & McCarthy, W. E. (2000), ‘The ontological foundation of REA Enterprise

Ontology’, http://www.msu.edu/user/mccarth4/rea-ontology/.

Geyer-Schulz, A. & Hahsler, M. (2002), ‘Software reuse with analysis patterns’, Proceedings of

AMCIS 2002 .

Glossary of Terms, Management Information Systems (Web Resource),

www.321site.com/greg/courses/mis1/glossary.htm. Last accessed on 2007-07-20.

Gomez-Perez, A. (2001), ‘A proposal of infrastructural needs on the framework of the

semantic web for ontology construction and use’, Proceedings of the FP6 Programme

Consultation Meeting 9 .

Gomez-Perez, A., Fernandez, M. & de Vincente, A. (1996), ‘Towards a method to

conceptualize domain ontologies.’, Working notes of the workshop Ontological

Engineering. ECAI 96 pp. 41–52.

Gomez-Perez, A., Juristo, N. & Pazos, J. (1995), Towards Very Large Knowledge Bases -

Knowledge Building and Knowledge Sharing, Amsterdam, IOS Press, chapter Evaluation

and assessment of knowledge sharing technology, pp. 289–296.

Goodchild, A., Herring, C. & Milosevic, Z. (2000), ‘Business contracts for B2B’.

GOOGLE search engine (Web Resource), http://www.google.com. Last accessed on

2007-07-20.

Griffel, M., Boger, H., Weinreich, W. & Lamersdorf, M. M. (1998), ‘Electronic contracting with

COSMOS - how to establish, negotiate and execute electronic contracts on the internet’.

Grosof, B. N. & Poon, T. (2003), ‘Sweetdeal: Representing agent contracts with exceptions

using xml rules, ontologies and process descriptions’, WWW pp. 340–349.

Grosof, B. N., Yannis, L. & Chan, H. Y. (1999), ‘A declarative approach to business rules in

contracts: Courteous logic programs in xml’.

Group, O. M. (2006), ‘Ontology definition metamodel proposal’. August 2005. Accessed

2006-11-10.

Page 323: Ontology for Information Systems (O4IS) Design Methodology

References 301

Gruber, T. R. (1993a), Toward principles for the design of ontologies used for knowledge

sharing, in ‘Presented at the Padua workshop on Formal Ontology, March 1993’.

Gruber, T. R. (1993b), ‘A translation approach to portable ontology specification’, Knowledge

Aquisition 5(2), 199–220.

Gruninger, M. & Fox, M. (1994), ‘The role of competency questions in enterprise

engineering’.

Gruninger, M. & Fox, M. (1995), ‘Methodology for the design and evaluation of ontologies’,

Proceedings of Int. Joint Conf. AI 1995, Workshop on Basic Ontological Issues in Knowledge

Sharing .

Guarino, N. (1998), ‘Formal ontology and information systems.’, Proceedings of Formal

Ontology and Information Systems(FOIS 1998) pp. 3–15.

Guarino, N., Borgo, S. & Masolo, C. (1997), ‘Logical modelling of product knowledge:

Towards a well-founded semantics for step.sophia antipolis, france.’.

Guarino, N. & Giaretta, P. (1995), ‘Ontologies and knowledge bases: Towards a

terminological clarification’, Towards Very Large Knowledge Bases: Knowledge Building

and Knowledge Sharing pp. 25–32.

Gupta, U. G. (2000), Information Systems. Sucsess in the 21st century, Prentice-Hall, New

Jersey.

Haack, S. (1978), Philosophy of Logic, Cambridge University Press.

HAKIA: The search for meaning (Web Resource), http://www.hakia.com/. Last accessed on

2007-07-20.

Halpin, T. (1998), Handbook of Architectures of Information Systems., Springer-Verlag, Berlin,

chapter Object Role Modelling (ORM/NIAM).

Hayes, P. (1985), Readings in Knowledge Representation, Morgan Kaufmann Pub, chapter The

Logic of Frames, pp. 288–295.

Hendler, J. & Lassila, O. (2001), ‘The semantic web’, Scientific American 284(5).

Heuvel, W. v. d. & Weigand, H. (2000), Cross organizational workflow integration using

contracts, in ‘Proceedings of Business Object Component workshop held in conjunction

with (OOPSLA 2000)’.

Hevner, A. R., March, S. T., Park, J. & Ram, S. (2004), ‘Design science in information systems

research’, MIS Quarterly 28(1), 75–106.

Hintikka, J. (1962), Knowledge and Belief, Cornell University Press.

Hoede, C. & Willems, M. (1989), Knowledge Graphs and Natural Language, Memorandum

no.811, University of Twente, Enschede, The Netherlands.

Husserl, E. (1970), Logical Investigations, London: Routledge and Kegan Paul.

Information Assurance Terminology,IASO certification course,School of Information Technology.

(Web Resource), http://ia.gordon.army.mil/iaso/keyterms.htm. Last accessed on

2007-07-20.

Information Systems. (Web Resource),

http://en.wikipedia.org/wiki/Information_system. Last accessed on 2007-07-20.

Jarrar, M. & Meersman, R. (2002), ‘Formal ontology engineering in the DOGMA approach’,

1st International Conference on Ontologies, Databases and Application of Semantics

(ODBASE’02), Lecture Notes in Computer Science 2519, 1238–1254.

Page 324: Ontology for Information Systems (O4IS) Design Methodology

302 References

Johannesson, P. & Wohed, P. (1998), ‘Deontic specification patterns - generalisation and

classification’, Formal Ontology in Information Systems .Jones, A. & Sergot, M. (1992a), ‘Deontic logic in the representation of law: Towards a

methodology.’, Artificial Interlligence and Law 1(1), 45–64.Jones, A. & Sergot, M. (1992b), ‘On the charecterisation of law and computer systems: The

normative systems perspective.’, In Deontic Logic in Computer Science: Normative System

Specification. .Kabilan, V. (2003), ‘Using multi-tier contract ontology to model contract workflow models’,

Licentiate Thesis- Royal Institute of Technology .Kabilan, V. (2005), Contract workflow model patterns using BPMN, in ‘Proceedings of 10th

International Workshop on Exploring Modelling Methods in System Analysis and Design,

collocated with CAiSE 2005’.Kabilan, V., De Nicola, A., Missikoff, M. & Mojtahed, V. (2006), ‘Practical issues in ontology

modelling: The case of the defence conceptual modelling framework-ontology.’,

Proceedings of Interoperability for Enterprise Software and Applications Conference

I-ESA2006 .Kabilan, V. & Johannesson, P. (2003), ‘Semantic representation of contract knowledge using

multi-tier contract ontology’, Proceedings of Semantic Web and Databases Workshop

(SWDB 2003) .Kabilan, V. & Johannesson, P. (2004), ‘UML for ontology modelling and interoperability’,

Proceedings of 1st INTEROP-EMOI Open Workshop on Enterprise Models and Ontologies for

Interoperability, Co Located with CAiSE 2004 .Kabilan, V., Johannesson, P. & Rugaimukammu, D. (2003), ‘Business contract obligation

monitoring through use of multi-tier contract ontology’, Proceedings of Workshop on

Regulatory Ontologies (Worm CoRe 2003) .Kabilan, V., Johannesson, P., Ruohomaa, S., Moen, P., Herrmann, A., Ahlfeldt, R. & Weigand,

H. (2007), ‘Introducing the common non-functional ontology.’, Proceedings of

Interoperability for Enterprise Software and Applications Conference I-ESA2007 .Kabilan, V. & Mojtahed, V. (2006a), ‘DCMF-O adapting JC3IEDM as ontology an experience

report’, Proceedings of FALL SIW 06, FALL Simulation Workshop, Orlando, Florida .Kabilan, V. & Mojtahed, V. (2006b), ‘Introducing the DCMF-O:ontology suite for defence

conceptual modelling framework’, EUROSIW 2006 .Kabilan, V. & Svan, P. (2007), ‘ECA rule ontology: Modeling prescriptive rules as descriptive

ontology’, Proceedings of 3rd International Conference on Web Information Systems and

Technologies, WEBIST2007 .Kabilan, V. & Weigand, H. (2006), ‘Risk assessment of business contracts.’, 1st International

Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced

Enterprise Systems (IS-TSPQ ) 2006, collocated with INTEROP-ESA 2006. .Kabilan, V., Zdravkovic, J. & Johannesson, P. (2005), ‘Use of multi-tier contract ontology to

deduce contract workflow models for enterprise interoperability’, Proceedings of 2nd

INTEROP-EMOI open workshop on Enterprise Models and Interoperability collocated with

CAISE 2005 .Kangassalo, H. (1983), ‘Concept D - a graphical formalism for representing concept

structures’, Second Scandinavian Research Seminar on Information Modeling and Database

Management 19.

Page 325: Ontology for Information Systems (O4IS) Design Methodology

References 303

Kant, I. (1800), Logic, Dover Publications. ISBN-0-486-25650-2.Karlapalem, K., Dani, A. R. & Radha, K. (2001), A frame work for modelling electronic

contracts, in ‘Proceedings of Entity Relationship and Conceptual Modelling ER 2001,

LNCS 2224’, pp. 193–207.Karteseva, V., Tan, Y.-H. & Gordijn, J. (2004), ‘Developing a modelling tool for designing

control mechanisms in network organisations’, Proceedings of the 17th Bled International

e-Commerce Conference. .Kashyap, V. & Sheth, A. (1998), Semantic heterogeneity in global information systems: The

role of metadata, context and ontologies, in M. P. Papazoglou & G. Schlageter, eds,

‘Cooperative Information Systems’, Academic Press, San Diego, pp. 139–178.Kauppi, R. (1967), Einfhrung in die Theorie der Begriffssysteme, Acta Universitatis

Tamperensis, Ser. A, Vol. 15, Tampereen yliopisto, Tampere.Kecheng, L. (2000), Semiotics in Information Systems Engineering, Cambridge University

Press.Kent, R. E. (2001), ‘The IFF Foundation Ontology’, IJCAI 2001 Ontology Workshop .Key Terminology, Computer and Information Technology (Web Resource), http:

//www.tech.purdue.edu/southbend/academics/degreeprograms/cit/cit_term.cfm.

Last accessed on 2007-07-20.Kripke, S. (1959), ‘A completeness theorem in modal logic’, Journal of Symbolic Logic

24(1), 1–14.Kripke, S. (1976), In Truth and Meaning, Oxford University Press, chapter Is there a problem

with substitutional quantification.Kuhn, T. (1996), The Structure of Scientific Revolutions, 3 edn, University of Chicago Press.Lee, R. M. (1988), ‘A logic model for electronic contracting’, Decision Support Systems

4, 27–44.Lee, R. M. (1998), ‘Towards open electronic contracting’, Electronic Markets 8(3).Lewis, D. K. (1973), Counterfactuals, Blackwell Publishing Limited.Lombardi, V. (2003), ‘Noise between stations: A metadata glossary.’,

http://www.noisebetweenstations.com/personal/essays/metadata_glossary/

metadata_glossary.html. Last accessed on 2007-07-20.Maglitta, J. (1996), ‘Know-How, Inc’, Computerworld 30(1).Malhotra, Y. (2001), ‘Expert systems for knowledge management:crossing the chasm

between information processing and sense making’, Expert Systems with Applications

pp. 7–16.McGuinness, D. L. (2000), Conceptual modelling for distributed ontology environments, in

‘Proceedings of the Eight International Conferences on Conceptual Structures Logical,

Linguistic, and Computational Issues (ICCS 2000)’.Mealy, G. H. (1967), ‘Another look at Data’, Proceedings of the Fall Joint Computer Conference

(AFIPS) 31, 525–534.Milosevic, Z. & Dromey, R. G. (2002), ‘On expressing and monitoring behaviour in contracts’,

Proceedings of 6th International Enterprise Distributed Object Computing Conference

(EDOC) 2002 .Milosevic, Z., Josang, A., Patton, M. A. & Dimitrakos, T. (2002), Discretionary enforcement

of electronic contracts, in ‘Proceedings of 6th International Enterprise Distributed Object

Computing Conference (EDOC) 2002’.

Page 326: Ontology for Information Systems (O4IS) Design Methodology

304 References

Milton, N. (2003), ‘Knowledge management.’,

http://www.epistemics.co.uk/Notes/40-0-0.htm. Last accessed on 2007-07-20.

MITRE (April 2006), Electronic health records overview, Technical report, Center for

Enterprise Modernization. McClean, Virginia.

Mojtahed, V., Garcia, M., Kabilan, V., Andersson, B. & Svan, P. (2005), DCMF - Defence

Conceptual Modelling Framework, Technical report, Swedish Defence Research Agency,

FOI, FOI-R–1754-SE.

Mylopoulos, J. (1985), On Knowledge Base Management Systems: Integrating Artificial

Intelligence and Database Technologies, Springer, Topics in Information Systems, chapter

On Knowledge Base Management Systems, pp. 3–8.

Naeve, A. (2007), The human semantic web: Shifting from knowledge push to knowledge

pull, in A. Sheth & M. Lytras, eds, ‘Semantic Web-based Information Systems– state of

the art applications.’, CyberTech Publishing.

Nations, U. (1980), ‘United nations convention on contracts for the international sale of

goods’, http://www.jus.uio.no/lm/un.contracts.international.sale.of.goods.

convention.1980/doc.html. Last accessed on 2007-07-21.

Niinimaki, M. (2004), Conceptual Modelling Languages, PhD thesis, Department of

Computer Sciences, University of Tampere, Finland.

Nijssen, G. M. & Halpin, T. (1989), Conceptual Schema and Relational Database Design,

Prentice Hall, Upper Saddle River, New Jersey.

Niles & Pease, A. (2001), Towards a standard upper ontology., in C. Welty & B. Smith, eds,

‘Proceedings of the 2nd International Conference on Formal Ontology in Information

Systems (FOIS-2001)’.

Ninan, D. (2005), ‘Two puzzles about deontic necessity’,

http://web.mit.edu/dninan/www/deontic.pdf (last accessed on 31st May 2006).

Nirenburg, S. & Raskin, V. (2001), ‘Ontological semantics, formal ontology and ambiguity’,

Proceedings of FOIS .

Nirenburg, S. & Raskin, V. (2004), Ontological Semantics, MIT Press, Cambridge.

Noy, N. & Hafner, C. D. (Fall 1997), ‘The state of the art in ontology design: A survey and

comparative review’, AI Magazine 18(3), 53–74.

Noy, N. & McGuinness, D. (2001), Ontology development 101: A guide to creating your first

ontology, Technical report, Stanford University.

OASIS (2002), Collaboration protocal profile and agreement specification 2.0, Technical

report, OASIS ebXML Collaboration Protocol Profile Agreement Technical Committee.

O’Brien, J. A. (2002), Management Information Systems- Managing Information Technology in

the E-Business Enterprise, McGraw Hill Irwin.

Olive, A. (2004), ‘Definition of events and thier effects in object-oriented conceptual

modeling languages’, LNCS 3288, 136–149.

OMG & Group, B. R. (2006), Semantics of business vocabulary and business rules, Technical

report, Object Management Group. Available at

http://www.omg.org/docs/dtc/06-08-05.pdf.

Opdahl, A. L. & Henderson-Sellers, B. (2005), ‘A Unified Modeling Language without

referential redundancy’, Data and Knowledge Engineering, Special issue on Quality in

Conceptual Modeling. 55(3), 277–300.

Page 327: Ontology for Information Systems (O4IS) Design Methodology

References 305

Opdahl, A. L., Henderson-Sellers, B. & Barbier, F. (2001), ‘Ontological analysis of whole-part

relationships in OO-models.’, Information and Software Technology 43(6), 387–399.

Palmer, F. R. (1990), Modality and the English Modals, 2nd edition edn, London/New York:

Longman. First Printed in 1979, reprinted in 1990.

Papamarkos, G., Poulovassilis, A. & Wood, P. (2003), ‘Event condition action rule languages

for the semantic web’, In proceedings of International Workshop on Semantic Web and

Databases .

Peffers, K., Tuunanen, T., Gengler, C., Rossi, M., Hui, W., Virtanen, V. & Bragge, J. (2006),

The design science research process: A model for producing and presenting information

systems research., in ‘Proceedings of First International Conference on Design Science

Research in Information Systems and Technology- DESRIST2006’.

Persson, J. (2007), Visualization and reuse of a Generic Process Ontology, Master’s thesis,

Department of Computer and Systems Sciences, Royal Institute of Technology and

Stockholm University.

Petri, C. A. (1962), Kommunikation mit Automaten., Ph. D. Thesis. University of Bonn.

Pierce, C. S. (1933), Collected Papers of Charles Peirce– Vol. IV, The Simplest Mathematics,

Harvard University Press.

Poli, R. (2003), ‘Descriptive, formal and formalized ontologies, university of trento’, Husserl’s

Logical Investigations Reconsidered- Dordrect pp. 183–210.

Power, D. (1995), ‘Decision support systems glossary.’,

http://dssresources.com/glossary/dssglossary1999.html. Last accessed on

2007-07-20.

Quine, W. (1964), ‘Ontological reduction and the world of numbers’, The Ways of Paradox .

Ramberg, J. (1999), ICC Guide to Incoterms 2000, ICC Publications.

Rescher, N. (1973), The Coherence Theory of Truth, Oxford University Press.

Russell, B. (1956), ‘The philosophy of logical atomism’, Logic and Knowledge. ed. Marsh

(Allen and Unwin) .

Schank, R. C. (1975), Conceptual Information Processing, North-Holland,Amsterdam and

American Elsevier, New York.

Schon, D. (1993), The Reflective Practitioner: How Professionals Think in Action, Basic Books,

New York.

Searle, J. (1969), Speech acts: An essay in the philosophy of language., Cambridge: Cambridge

University Press.

Sergot, M. J. (1990), ‘The representation of law in computer programs: A survey and

comparison.’, Knowledge Based Systems and Legal Applications. .

Smith, B. (2003a), Blackwell Guide to the Philosophy of Computing and Information,

Oxford-Blackwell, chapter Ontology and Information Systems -A longer draft version of

Ontology, pp. 155–166. Full Draft available at

www.ontology.buffalo.edu/ontology(PIC).pdf last accessed on 8th April 2006.

Smith, B. (2004), ‘Beyond concepts: Ontology as reality representation’, Proceedings of FOIS

2004, International Conference on Formal Ontology and Information Systems .

Smith, H. (2003b), ‘The role of ontological engineering in B2B net markets, director of

strategy, e business’, www.ontology.org. Accessed on 2003-06-04.

Page 328: Ontology for Information Systems (O4IS) Design Methodology

306 References

Sowa, J. F. (1976), ‘Conceptual graphs for a data base interface’, IBM Systems Research

Institute .

Sowa, J. F. (1984), Conceptual Structures: Information Processing in Mind and Machine,

Addison-Wesley, Reading, MA.

Sowa, J. F. (1999), Knowledge Representation: Logical, Philosophical, and Computational

Foundations, Course Technology.

Sowa, J. F. (2000), Knowledge representation: logical, philosophical and computational

foundations, Brooks/Cole Publishing Co.

Stevens, W., Myers, G. & L., C. (1974), ‘Structured design’, IBM Systems Journal

13(2), 115–139.

Storey, V. C. & Purao, S. (2004), ‘Understanding relationships: Classifying verb phrase

semantics.’, LNCS 3288, 336–347.

Studer, R., Benjamins, R. & Fensel, D. (1998), ‘Knowledge engineering: Principles and

methods’, Data and Knowledge Engineering pp. 161–197.

Sukkarieh, J. (2001), Natural Language for Knowledge Representation, PhD thesis,

University of Cambridge.

Tan, Y. H. (1998), ‘Modeling directed obligations and permission in trade contracts’, 31st

Annual Hawaii International Conference on System Sciences 5.

Tan, Y. H. & Thoen, W. (2000), ‘A logical model of directed obligations and permissions to

support electronic contracting’, The International Journal of Electronic Markets 10(1).

Tan, Y. H. & Thoen, W. (2002), ‘Using event semantics for modeling contracts’, Proceedings of

35th Hawaii International Conference on System Sciences - 2002 .

Tarski, A. (1944), ‘The semantic conception of truth (1944)’, Philosophy and

phenomenological Research 4 .

Tarski, A. (1956), ‘The concept of truth in formalised languages (1931)’, Logic, semantics,

and mathematics p. Oxford University Press. Translated by Woodger, J H.

Tempich, C., Pinto, S., Staab, S. & Sure, Y. (2004), ‘A case study in supporting distributed,

loosely-controlled and evolving engineering of ontologies (diligent)’.

Turban, E. (1993), ‘Knowledge acquisition review’, Expert Systems and Applied Artificial

Intelligence pp. 117–139.

Turnitsa, C., Kovvuri, S., Tolk, A., DeMasi, L., Dobbs, V. & Sudnikovich, B. (2004), ‘Lessons

learned from C2IEDM mappings with XBML’.

UNIDROIT principles of International Commercial Contract, 1994 (1994),

http://www.unidroit.org/english/principles/pr-main.htm. Accessed 2003-06-12.

United Nations Commission on International Trade And Law (n.d.), http://www.uncitral.org/.

Accessed 2003-06-12.

United Nations Standard Products and Service Codes (Web Resource), http://www.unspsc.org.

Uschold, M. (1998), ‘Knowledge level modelling: concepts and terminology’, The Knowledge

Engineering Review pp. 5–29.

Uschold, M. & Gruninger, M. (1996), ‘Ontologies principles, methods and applications’, The

Knowledge Engineering Re-view 11(2): 93–136 .

Uschold, M. & King, M. (1995), ‘Towards a methodology for building ontologies’, Workshop

on Basic Ontological Issues in Knowledge Sharing (IJCAI-95) .

Page 329: Ontology for Information Systems (O4IS) Design Methodology

References 307

Uschold, M., King, M., Moralee, S. & Zorgios, Y. (1995), The Enterprise Ontology, Technical

report, Artificial Intelligence Applications Institute at the University of Edinburgh.

van der Aalst, W. M. P., ter Hofstede, A. H. M., Kiepuszewski, B. & Barros, A. P. (2000a),

‘Advanced workflow patterns’, 7th International Conference on Cooperative Information

Systems (CoopIS 2000) 1901, 18–29.

van der Aalst, W. M. P., ter Hofstede, A. H. M., Kiepuszewski, B. & Barros, A. P. (2000b),

Workflow patterns, Technical report, BETA Working Paper Series, WP 47, Eindhoven

University of Technology, Eindhoven,.

Vanderveken, D. & MacQueen, K. (1990), Semantic Analysis of English Performative Verbs,

Cambridge University Press, chapter Chapter 6 of The Principles of Language Use

(Volume II) of Meanings in Speech Acts.

Wache, H., Vgele, T., Visser, U., Stuckenschmidt, H., Schuster, G., Neumann, H. & Hubner, S.

(2001), ‘Ontology-based integration of information - a survey of existing approaches’,

Proceedings of the IJCAI-01 Workshop: Ontologies and Information Sharing .

Wand, Y., Storey, V. C. & Weber, R. (1999), ‘An ontological analysis of the relationship

construct in conceptual modeling’, ACM Transactions of Database Systems.

24(4), 494–528.

Wand, Y. & Weber, R. (1990), ‘MARIO BUNGEs ontology as a formal foundation for

information systems concepts’, Studies on MARIO BUNGEs Treatise pp. 123–149.

Wand, Y. & Weber, R. (2002), ‘Research commentary:information systems and conceptual

modelling’, Information Systems Research 13, 363–376.

Wand, Y. & Weber, R. (2004), ‘Reflection:ontology in information systems.’, Journal of

Database Management 15(2), iii–vi.

Weiringa, R. & Meyer, J. (1993), Deontic Logic in computer Science: Normative Systems, John

Wiley and Sons Ltd. Chichester, UK., chapter Applications of Deontic Logic in Computer

Science:A concise Overview, pp. 17–40.

White, S. (2004), ‘Business process modeling notation 1.0, (BPMN)’, http://www.bpmi.org.

Wilson, T. D. (2002), ‘The nonsense of ’knowledge management”, Information Research 8(1).

Wittgenstein, L. (1961), Tractatus Logico-Philophicus, Routledge.

Woods, W. A. (1991), Principles of Semantic Networks: Explorations in the Representation of

Knowledge., M. Kaufmann, California, chapter Understanding Subsumption and

Taxonomy: A Framework for Progress., pp. 45–94.

Zachman, J. A. (1987), ‘A framework for information systems architecture’, IBM Systems

Journal 26(3).

Zdravkovic, J. & Kabilan, V. (2005a), ‘Enabling business process interoperability using

contract workflow models.’, Proceedings of 13th International Conference on Co-operative

Information Systems (CooPIS). .

Zdravkovic, J. & Kabilan, V. (2005b), ‘Enabling business process interoperability using

contract workflow models.’, Proceedings of 13th International Conference on Co-operative

Information Systems (CooPIS) .

Page 330: Ontology for Information Systems (O4IS) Design Methodology
Page 331: Ontology for Information Systems (O4IS) Design Methodology

v A

Appendix

In this section, we present the conceptual models for the INCOTERMS delivery pat-

terns that are an extension to the Sale of Goods Contract models.

A.1 INCOTERMS: Delivery Patterns for Sale of Goods

Sale of Goods business contracts form the domain of interest for our knowledge

models. Such legal contracts, pertaining to purchase and sale, cover a wide arena.

We chose a smaller domain of interest as a case study, to assess the usability of

our proposed O4IS design methodology. We chose to analyze and model the con-

tractual knowledge from a recommended standard of contract patterns ICCs IN-

COTERMS (Ramberg 1999). INCOTERMS provide a set of international rules for the

interpretation of commonly used trade terms in foreign trade. Frequently parties are

unaware of the different trading practices in their respective countries. This can give

rise to misunderstandings, disputes, and litigation. In order to remedy this Interna-

tional Chamber of Commerce (ICC) first published the Incoterms in 1936. Amende-

ments and additions have been subsequently made, the latest being Incoterms 2000.

In 1990, Incoterms was revised to adapt the terms to the use of EDI data.

INCOTERMS form only a part of the vast contractual knowledge contained in a

Sale of Goods contract, as recommended by ICC International Sale of Commercial

Goods. These are delivery terms agreed between the two parties involved in a sale

of goods business transaction. They are internationally accepted as standardized

patterns for delivery terms. In this section, we propose the use of INCOTERMS as a

horizontal extension or an individual reusable ontology in the specific domain level

of the MTCO. Either the delivery terms of a Sale of Goods contract may refer to one

of the INCOTERMS standard codes, or the contracting parties may define their own,

as the established business practices.

The terms have been grouped in four basically different categories, namely start-

ing with the only term whereby the seller makes the goods available to the buyer at

Page 332: Ontology for Information Systems (O4IS) Design Methodology

310 A Appendix

the seller’s own premises (the ex works); followed by the second group whereby the

seller is called upon to deliver the goods to a carrier appointed by the buyer(FCA,

FAS, FOB); continuing with the C terms where the seller has to contract for carriage,

but without assuming the risk of loss of exchange or damage to the goods or addi-

tional costs due to events occurring after the shipment or dispatch (CFR, CIF, CPT,

CIP); and finally the D terms whereby the seller has to bear all costs and risks needed

to bring the goods to the country of destination (DAF, DES, DEQ, DDU, DDP). Thus

the Incoterms clearly outline the obligations, roles and responsibilities of various

actions and counter actions of both the Seller and the Buyer.

The Incoterms distribute the obligations between the buyer and the seller. There

are thirteen Incoterms in all, all of them discuss the same group of obligations. The

distribution between the seller and the buyer, the mode of fulfillment, the place and

venue of fulfillment of these obligations is what distinguishes the thirteen Incoterms.

Fig. A.1. INCOTERMS:Obligation to Exchange Goods

The main INCOTERMS concepts are inherited from the sale of goods contract.

(figure 7.13). Figure A.4 gives an overview of the main concepts and we can see that

they are inherited from the sale of goods contract. Figure A.3 gives more specific

details as described in the Incoterms, some of the main concepts are summarized

below:

• Actor. Two or more parties who participate in the purchase and sale of goods.

Page 333: Ontology for Information Systems (O4IS) Design Methodology

A.1 INCOTERMS: Delivery Patterns for Sale of Goods 311

• Obligation. An obligation is a promise or commitment made by one party to the

other, which is backed up by legal intent to fulfill and uphold the promise.

• Role.The part an actor plays in the specific contract (i.e. seller, buyer, etc.).

• Goods. Goods are legally defined as commodities or items of all types, expecting

services, which are involved in trade or commerce. Goods are characterized by

a description, technical specification, type of packaging required, type of cargo

etc.

• Performance. Every obligation is expected to be fulfilled through the execution

of some business, economic or legal action. This expected business behavior is

termed as performance.

• Delivery Terms. Delivery terms are agreed terms and conditions, which govern

the actual process of delivery of goods between the seller and the buyer.

• Packaging. In most cases the parties know beforehand which type of packaging

is required for the safe carriage of the goods to the destination. As the seller’s

obligation to pack the goods may vary depending upon the type and duration of

the transport, it has been stipulated that the seller is obliged to pack the goods

in the way it is required for the transport.

• Inspection of Goods. In many cases the buyer may be advised to arrange for

the inspection of goods before, or at the time the goods are handed over by the

seller.

• Payment Terms. In relation with delivery terms, Sale of Goods includes payment

terms, which are expected in exchange for the goods delivered. Though the IN-

COTERMS does not go into specific details for the payment terms, the obligation

and the performances are outlined.

• Customs Clearance: It is normally desirable that the party domiciled in the

country where such clearance should take place or at least by somebody acting

there on his behalf arranges customs clearance. Thus the Exporter should nor-

mally clear the goods for export, while the importer should clear the goods for

import. However under some trade terms, The buyer may undertake to clear the

goods for export in the seller’s country (Ex Works, F AS) and, in other cases the

Seller may undertake to clear the goods for import into the buyer’s country(DEQ

and DDP). Needless to say that in these cases the buyer and seller respectively

must assume any risk of export and import prohibition. They must also ascertain

that a customs clearance performed by a party not domiciled in the country is

acceptable to the authorities.

• Division of Costs. One of the main aspects to be agreed upon is the cost of

delivery and shipping including all incidental costs like export, import, customs

etc. The various INCOTERMS differ mainly in the division of costs,division of

risks and point of fulfillment of obligations.

Page 334: Ontology for Information Systems (O4IS) Design Methodology

312 A Appendix

• Division of Risks. Another aspect on which the choice of the applicable IN-

COTERMS is decided is how, when or where the transfer of risks (for loss or

damage,ownership etc) should occur.

In order to specify the obligations, roles and responsibilities of different delivery

protocols, the INCOTERMS have been grouped in four different categories. In our

study we will use the term Ex Works, whereby the seller makes the goods available

to the Buyer at the seller’s own premises, to bring the goods to the country of des-

tination. In table A.1, we present a summary Ex Works, in order to elucidate the

nature and type of obligations that are present in any such delivery term.

Table A.1. Extract from distribution of obligations in Ex-Works INCOTERMS delivery patterns

Obligation Seller BuyerProvision of goods andComm. Invoice

Yes No

Delivery Place the goods at the namedplace of delivery on the date orwithin the period stipulated.

Take delivery as soonas they have beenplaced at his disposal.

Payment of price None Pay the price as pro-vided in the contract.

Notice to the buyer Give notice as to when and wherethe goods shall be placed at thebuyers disposal.

Not applicable

Packaging, marking Provide at his own cost packag-ing as it is required by the circum-stances relating to the mode oftransport, destination etc. Pack-aging is to be appropriatelymarked.

Providing the transportmodalities and inform-ing the seller of the re-quired packaging.

Inspection of goods None Pay the shipment in-spection and inspec-tion mandated by thecountry of exportation.

Some of the main obligations that have been identified in the Incoterms may be

seen in figure A.4.

In figure A.4 we see the depiction of the main events as they occur in time-

ordered sequence for the Ex Works delivery pattern. The execution begins by the

buyer placing an order. The figure also shows the time period that is available with

the buyer in which he has to make arrangements for the carrier and also notify the

seller of the same.

Page 335: Ontology for Information Systems (O4IS) Design Methodology

A.1 INCOTERMS: Delivery Patterns for Sale of Goods 313

Fig.

A.2

.Ove

rvie

wof

com

mon

feat

ures

ofth

eIN

CO

TER

MS

deliv

ery

patt

erns

Page 336: Ontology for Information Systems (O4IS) Design Methodology

314 A Appendix

Fig.A.3.IN

CO

TERM

S:Obligation

toExchange

Goods

Page 337: Ontology for Information Systems (O4IS) Design Methodology

A.1 INCOTERMS: Delivery Patterns for Sale of Goods 315

-

Fig.

A.4

.Ex

Wor

ks:A

typi

calc

ase

scen

ario

for

cont

ract

exec

utio

nbe

twee

nse

ller

and

buye

r

Page 338: Ontology for Information Systems (O4IS) Design Methodology

316 A Appendix

A.2 Sample Contract Analysis

Let us analyze a typical contract sample between a Seller and a Buyer (Copy is

attached as given in section A.3) where the two parties agree to exchange goods

for money. We see that the contract type is that of a Sale of Goods. Accordingly, we

compare with the shared domain contract type specific ontology for commercial sale

of goods. Principal concepts like buyer, seller, their identification, addresses etc are

readily identified. Help is available from the Sale of Goods ontology, which gives us

the nature and type of obligations usually associated with this type of contracts.

A.2.1 Phase 1: Contract Type Identification

Input: The given business contract, proposed MTCO.

Step: By parsing through the contract text we should be able to judge the con-

tract type as it would most often be written on it.

Output: Sale of Goods Contract Type, ICC ’s Sale of International Goods Contract

Ontology can be used as the reference ontology.

A.2.2 Phase 2: Contract Instance MetaData

Input: The agreed contract, the MTCO, the O4IS design methdology, USP2 Design,

and the SARs.

Output: We have presented a paragraph by paragraph textual analysis results in

(Kabilan 2003). Here we just summarize the end results of the iterative step by step

analysis to get the data for the semantic concept view of the given contract as :

A.2.3 Phase 3: Obligation Performance Events Identification

Input: Meta-data from Phase 2.

Output: List of obligations, their types and their actors/roles.

Process:

Step 1: The next step is to list all the obligations explicitly or inherently implied

in the contract.

Tips: Most of the obligations would already have been identified in phase 2

themselves. In this step, the user would need to re-use his extracted knowledge.

Some obligations may not be explicitly stated but would have been implied based on

contemporary business practices. For example, the seller is responsible for loading

the goods on to the carrier, whenever the carrier is picking up the goods at the seller’s

premises. In our case scenario, the some of the obligations are:

Step 2: Identify for each obligation, who is the owner and who is the ownee.

Page 339: Ontology for Information Systems (O4IS) Design Methodology

A.2 Sample Contract Analysis 317

Table A.2. Phase2- MetaData from Given Contract Example

Concept Information ExtractedContract Type Sale of Goods Contract typeActor1 ABC Computers Incorporated LtdRole1 SellerAddress for Actor 1 Viderogatan 17, Kista, SwedenActor 2 Stock and Financial Movers ABAddress for Actor 2 Strandvagen 2,Stockholm, SwedenRole2 BuyerConsideration ComputersSpecification DELL PC Dimension 4550 Intel Pentium 4 proces-

sor 333 MhzContract date 12th NOV 2004Primary Obligation ofSeller

Transfer and delivery of goods

Primary Obligation ofBuyer

Receive and pay for goods.

Performance DeliveryPerformed By SellerPlace of delivery SellerDate and time SellerDelivery fulfilled when SellerPerformance PayPerformed By BuyerPlace At the place of deliveryDate and time At the time of deliveryRight to inspect Owner is Buyer.Performance Inspect goods, notify seller.Performed By BuyerTime Period Within 15 days after delivery receipt.Ownee Seller

Table A.3. Phase 3- List of Obligations

ObligationsObligation to deliverObligation to payObligation to insure the goodsObligation to accept the goodsObligation to pay penaltyObligation to package the goodsObligation to arrange for carrier for transporting the goods.

Page 340: Ontology for Information Systems (O4IS) Design Methodology

318 A Appendix

Tips: Find out who has to perform the obligation, and who is the beneficiary or

claimant for the same. Most of the standard obligation owner and ownee could be

found in the multi tier ontology, but the actual specification can only be found from

the contract instance, which could be different from recommended models (which

have been the source for the shared buy sell contract conceptual models). Hence,

the user is recommended to refer to the ontology as a guide to determine the exact

information from his contract. In the case contract, we see that:

Table A.4. Phase 3- Obligation Owner and Ownee

Obligation Owner OwneeObligation to deliver Buyer SellerObligation to pay Seller BuyerObligation to insure the goods Buyer SellerObligation to accept the good Seller BuyerObligation to pay penalty for latedelivery, delivery unsatisfactory,delivery failure

Buyer Seller

Obligation to arrange carrier fortransportation of goods (if buyeris the performer)

Buyer Seller

Obligation to arrange carrier fortransportation of goods (if selleris the performer)

Seller (performance deferred toSeller), Primary Obligation stillrests with Buyer

Buyer

Obligation to package the goods Seller Buyer

Step 3:

• Identify for each obligation, the obligation type from the MTCO.

• Traverse the associations to get the related reciprocal, conditional, reconciliatory

or secondary obligation.

Tips: Look up the obligation in the MTCO. In case of shared ontology for a buy

sell contract type, the user will be able to directly look up ‘obligation to pay’ or

‘obligation to deliver’. From the MTCO, the user will get the information regarding

the nature of obligation (whether it is business obligation, a monetary obligation

or a legal obligation or a combination of these), obligation type (whether it is the

primary obligation, does it have any related reciprocal or conditional or secondary

obligation etc).

The obligation type information is useful for sorting and arranging the obliga-

tions in the order of their execution and their sequence within the business time

frame. Some of the identified obligations, their types and the associated obligations

as well as the identified obligation Owner and Ownee is summed up in table A.5:

Page 341: Ontology for Information Systems (O4IS) Design Methodology

A.2 Sample Contract Analysis 319

Table A.5. Phase 3- Obligations Summarized

Obligation Owner Ownee ObligationType

Nature of Obli-gation

Obligation to deliver Buyer Seller Primary Legal, businessObligation to pay Seller Buyer Primary Monetary, legalObligation to acceptthe goods

Seller Buyer Primary andSecondary

Business

Obligation to pack-age the goods

Seller Buyer Secondary Business

Obligation to paypenalty for latedelivery, delivery un-satisfactory, deliveryfailure

Buyer Seller Reconciliatory Monetary, Legal

Obligation to arrangecarrier for transporta-tion of goods (if selleris the performer)

Seller (perfor-mance deferredto Seller), Pri-mary Obligationstill rests withBuyer

Buyer Conditional(upon requestfrom Buyer)

Moral

Obligation to ar-range carrier fortransportation ofgoods (if buyer is theperformer)

Buyer Seller Secondary Business

A.2.4 Phase 4: Obligation, Performance, Non-Performance Interrelationships

Input: List of obligations from Phase 3 (table A.5 and table A.3)

Output: Unordered list of performance events corresponding to each obligation.

Process:

Step 1: Look up the main performance needed to fulfil each obligation, as iden-

tified in the previous phase, from the MTCO.

Step 2: Deduce the business activities required to execute that performance suc-

cessfully.

Tips: In most cases the obligation statement gives an indication of the required

performance from the ownee. The obligation Ownee is the one who has to be the

performer. Like, the obligation to deliver clearly indicates that the seller has to de-

liver the goods. If we accept ‘deliver goods’ as the performance event required for

fulfilling this obligation, we see from the internal business process model of a seller,

that in order to be able to deliver the goods, he may need to make the goods first.

Maybe to make the goods, he needs to get the raw materials from his supplier. That

could mean that he would need to place an order with his supplier and so on. Such

Page 342: Ontology for Information Systems (O4IS) Design Methodology

320 A Appendix

deductions can be made from the basic required event by the business organiza-

tion (or business process manager etc). A good contract should be able to give all

required information regarding the performance events to be executed. Any ambi-

guity left in the specification could lead to different interpretations and finally to

non-compliance to the contract terms.

The internal business process modeling of the organizations is currently beyond

the scope of this guideline. The guideline assumes and adopts common business

process models as recommended strategies. In the above example, deductions for

required sequence of business activities on the seller’s side are inferred from stan-

dard business models like the supply value chain, other enterprise ontologies like

that of TOVE (Fox 1992), Enterprise Ontology (Uschold et al. 1995) or standards

like ebXML (OASIS 2002), BPSS(Business Process Schema Specifications, Business

Process Work Sheets) etc.

Table A.6. Phase 4- Deduced Performance Activities

Obligation Possible List of Performance Events

Obligation to Deliver

Ship goodsDeliver goods (basic performance)Load goods (extracted from internal workflow)Mark goods (from legal regulation which needsgoods to be marked for particular buyer)Get raw materials (extracted from internal work-flow)Arrange carrier (implied from contract)Quality assurance of goods (legal requirementthat goods should conform to specification)Pack goods

Obligation to package

Get information of mode of transportAssess duration of transportationAssess type of packaging requiredGet packaging materialPack goods (basic performance)

Obligation to pay

Pay for goods (basic performance)Make arrangements with bankReceive goodsInspect GoodsSend AcceptanceNotify seller of any discrepancy

Step 3:

• The user has now to order the obligations. The ordering of the obligations is

recommended on the order of the nature of the obligation. Sort by the obligation

ownee.

Page 343: Ontology for Information Systems (O4IS) Design Methodology

A.2 Sample Contract Analysis 321

• List all the rights of individual parties at the end. However they need not be

ordered sequentially since some of their execution need not be compulsory or no

time ordered choreography might be interpreted.

• List any Prohibitions too, if stated.

Tips: The primary obligations first, then the nested or secondary obligation (obli-

gations which are part of the primary obligation), followed by conditional obliga-

tions (obligations which may be triggered only if certain conditions arise and are

not enforced by default, they are mostly cases like when due to non performance

some particular right of the other party is enforced etc).

Conditional obligations may also be treated on par with nested secondary obli-

gations as they could be fulfilled as a necessary sub- unit of the main primary obli-

gation itself. Help may also be taken from the list of performance activities (table 5),

to judge the nature of obligation.

Table A.7. Phase 4- Seller and Buyer’s Obligations

Seller’s Obligations Buyer’s ObligationsObligation to deliver Obligation to payObligation to package Obligation to arrange carrierObligation To Ship Obligation to inform seller about

carrierObligation to Transfer ownership Obligation to accept goodsObligation to Remedy Right to inspect

Right to cancelRight to remedy

Step4: Separate the list of deduced activities and obligations by the performer.

Tips: Each list would ultimately lead to the business activity workflow as per the

contract requirement for each of the organization involved.

Step 5: Now order the activities sequentially in the order (with respect to time

and/or logic) they should be executed. Some information should be available from

the contract, which would help in the ordering. Like in Paragraph 5, we see that the

buyer would pay after he receives the goods or in Paragraph 9 that the buyer should

inspect the goods and then notify the seller before a set number of days, if he wishes

to claim compensation.

Step 6: Note down any pre conditions or rules or policies, which need to be

checked or enforced for any of the listed activities. Along with a rough idea for the

order of execution, the contract also provides information regarding the conditions

for execution of the same activities. For example, the buyer can cancel his order as

long as the seller has not already dispatched it. That implies that the action ‘can-

cel order’ by the buyer has a qualifying condition that the seller’s action ‘ship goods’

Page 344: Ontology for Information Systems (O4IS) Design Methodology

322 A Appendix

must not have occurred. These conditions need to be in built as the boundary param-

eters within the CWM. The user is advised to note these pre-conditions and sketch

them in roughly in the CWM.

Table A.8. Phase 4- Buyer and Seller’s Performances: In Temporal Order

Seller’s Performance Events Buyer’s Performance EvenstsSend receipt acknowledgementfor PO

Send Purchase Order

Get Raw materials Receive acknowledgmentMake PC Cancel order (has pre condition

can occur only till ship goods hasnot occurred)

Pack PC (has pre condition:Should have received info aboutmode of transport from buyer be-fore this)

Arrange carrier

Ship PC Inform seller of carrier choiceReceive delivery receipt Receive goodsSend Invoice (has time boundedcondition Send invoice on deliv-ery receipt or after 15 days fromDelivery accepted at buyer.)

Inspect goods

Send delivery receiptReceive invoiceMake payment

Step 7: Break up each listed obligation (table A.7, table A.8) into the states

through which each individual obligation will pass.

Tips: From the MTCO, the user should be getting a picture of the different states

an obligation would cycle through, Inactive, active, pending, fulfilled or canceled.

The user will also get additional information as the when the state change of each

obligation will occur. This would be typically on execution of a related performance.

The performance, which triggers the obligation from inactive to active, is connected

to the obligation state. A state-activity diagram can be sketched for each role player.

Step 8: Identify which activity is related to which obligation.

Tips: Either performer may execute the activities. (Either the seller or buyer).

Ex: The obligation to deliver for the seller is activated when the order sent by the

buyer reaches the seller. The obligation could be pending when the seller has sent

the delivery but is waiting for the buyer to accept. But note that the seller’s obligation

to bear the risk for damage is fulfilled once the delivery has been made to the Buyers

premises. After the buyer inspects the goods or the time period lapses, the seller’s

obligation to deliver is fulfilled.

Page 345: Ontology for Information Systems (O4IS) Design Methodology

A.2 Sample Contract Analysis 323

Step 9: Keep the same order as listed in previous phases and now insert the

identified states, and draw a simple flow diagram, listing all the obligations, their

states, related performance activities for each role player, seller and buyer.

Tips: The user may put the two sequences side by side on the same vertical or

horizontal time scale to get a clearer picture of the flow of control and execution of

the contract.

Fig. A.5. Obligation and Performance Events in Time Ordered Sequence

But in the contract workflow pattern, the two business activity threads are not

isolated but intertwined. Activity A in one workflow may be triggered or fulfilled

by some other Activity B in the other workflow or vice versa. Similarly Obligation

Y may be state changed due to activity B executed by the other workflow. A CWM

essentially models a rough outline for the flow of business processes and fulfilment

conditions and patterns for the obligations stipulated in a contract.

At the end of this phase, the user is ready with all the concepts and object blocks

to deduce the CWM. Once the CWM is deduced, the business activity workflow de-

picted for each organization should be the recommended workflow for contract com-

pliance. The derived business workflow would probably not be complete but only an

indicative guide for recommended business process workflow as illustrated in fig-

ure A.5. Internal business process activities may not be captured and only qualitative

analysis and interpretations of required business activities may be proposed.

A.2.5 Phase 5: Optional mapping to existing Business Process flows

This phase is an optional stage and can be used to map to existing internal business

process flows of the business organizations involved in the contract. Alternatively

Page 346: Ontology for Information Systems (O4IS) Design Methodology

324 A Appendix

one can also map to other established process or enterprise ontologies like TOVE or

Enterprise Ontology or standards like the Business Process Worksheets within the

ebXML etc. For simplicity sake, detailed analysis on this phase is excluded from this

thesis document.

A.2.6 Phase 6: Contract Workflow Model for sample contract

Input: figure A.5 and information tabulated in tables A.5 to A.8.

Output: simple contract workflow using EPC notations as shown in figure A.6.

Process:

Step1: The user has now to draw separate CWM diagram for each of the parties

involved. He should translate the rough sketch from figure 30 in to the EPC notation,

by mapping obligations to functions and performance events to events.

Step2: Now the user connects the events and functions blocks by the appropriate

logical connectors, AND, OR or XOR. An AND connector is to be used when the

all the paths of the CWM is to be executed. Like the seller must make the goods

as well as have the carrier information ready before he can ship the goods. An OR

connector is to be used when there are choices or options to be made. In the CWM,

an OR usually denotes one or more choices to be made. A XOR connector is to be

made when one and only one choice from a multiple set of choices is to be made.

Now the user has deduced the CWM from the contract instance. Figure A.6 shows

an illustration of an epc diagram for the ex-works Incoterms delivery pattern.

Page 347: Ontology for Information Systems (O4IS) Design Methodology

A.2 Sample Contract Analysis 325

Fig. A.6. Deduced Contract Workflow Model using EPC Diagram

Page 348: Ontology for Information Systems (O4IS) Design Methodology

326 A Appendix

A.3 Sample Contract

CONTRACT FOR SALE OF GOODS

1. Agreement made and entered into this [12th Nov 2004], by and between [ABC

Computers Incorporated Ltd], of [Osterogatan 17, Kista, Sweden], herein referred

to as ‘Seller’, and [Stock and Financial Movers AB], of [Strandvagen 2,Stockholm,

Sweden], herein referred to as ‘Buyer’.

2. Seller hereby agrees to transfer and deliver to buyer, within 30 days from the

date of order receipt, the following goods:

DELL PC Dimension 4550, Intel Pentium 4 processor, 333 MHz DDR SDRAM desk-

tops conforming to the technical specifications. Product details specified separately.

3. Buyer agrees to accept the goods and pay for them in accordance with the

terms of the contract.

4. Buyer and Seller agree that identification shall not be deemed to have been

made until both parties have agreed that the goods in question are to be appropri-

ated and fulfil the requirements of performance of said contract with the Buyer.

5. Buyer agrees to pay for the goods at the time they are delivered and at the

place where he receives said goods.

6. Goods shall be deemed received by buyer when delivered to address of buyer

as herein described.

7. Until such time as said buyer has received goods, all risk of loss from any

casualty to said goods shall be on seller.

8. Seller warrants that the goods are now free from any security interest, other

lien or encumbrance, that they shall be free from it at the time of Delivery, and that

he neither knows nor has reason to know of any outstanding title or claim of title

hostile to his rights in the goods.

9. Buyer has the right to examine the goods on arrival and has [7] days to notify

seller of any claim for damages on account of the condition, grade or quality of the

goods. That said notice must specifically set forth the basis of his claim, and that

his failure to either notice seller within the stipulated period of time or to set forth

specifically the basis of his claim will constitute irrevocable acceptance of the goods.

10. This agreement has been executed in duplicate, whereby both Buyer and

Seller have retained one copy each, on [12th Nov 2004].

————

————

[Signatures]

Page 349: Ontology for Information Systems (O4IS) Design Methodology

DEPARTMENT OF COMPUTER AND SYSTEMS SCIENCES

Stockholm University/KTH

www.dsv.su.se/eng/publikationer/index.html

Ph.D. Theses:

No 91-004 Olsson, Jan

An Architecture for Diagnostic Reasoning Based on Causal Models

No 93-008 Orci, Terttu

Temporal Reasoning and Data Bases

No 93-009 Eriksson, Lars-Henrik

Finitary Partial Definitions and General Logic

No 93-010 Johannesson, Paul

Schema Integration Schema Translation, and Interoperability in Federated Informa-

tion Systems

No 93-018 Wangler, Benkt

Contributions to Functional Requirements Modelling

No 93-019 Boman, Magnus

A Logical Specification for Federated Information Systems

No 93-024 Rayner, Manny

Abductive Equivalential Translation and its Application to Natural-Language Database

Interfacing

No 93-025 Idestam-Almquist, Peter

Generalization of Clauses

No 93-026 Aronsson, Martin

GCLA: The Design, Use, and Implementation of a Program Development

No 93-029 Bostrom, Henrik

Explanation-Based Transformation of Logic programs

No 94-001 Samuelsson, Christer

Fast Natural Language Parsing Using Explanation-Based Learning

No 94-003 Ekenberg, Love

Decision Support in Numerically Imprecise Domains

No 94-004 Kowalski, Stewart

IT Insecurity: A Multi-disciplinary Inquiry

No 94-007 Asker, Lars

Partial Explanations as a Basis for Learning

No 94-009 Kjellin, Harald

A Method for Acquiring and Refining Knowledge in Weak Theory Domains

No 94-011 Britts, Stefan

Object Database Design

No 94-014 Kilander, Fredrik

Incremental Conceptual Clustering in an On-Line Application

Page 350: Ontology for Information Systems (O4IS) Design Methodology

328 A Appendix

No 95-019 Song, Wei

Schema Integration: - Principles, Methods and Applications

No 95-050 Johansson, Anna-Lena

Logic Program Synthesis Using Schema Instantiation in an Interactive Environment

No 95-054 Stensmo, Magnus

Adaptive Automated Diagnosis

No 96-004 Wærn, Annika

Recognising Human Plans: Issues for Plan Recognition in Human - Computer Inter-

action

No 96-006 Orsvarn, Klas

Knowledge Modelling with Libraries of Task Decomposition Methods

No 96-008 Dalianis, Hercules

Concise Natural Language Generation from Formal Specifications

No 96-009 Holm, Peter

On the Design and Usage of Information Technology and the Structuring of Commu-

nication and Work

No 96-018 Hook, Kristina

A Glass Box Approach to Adaptive Hypermedia

No 96-021 Yngstrom, Louise

A Systemic-Holistic Approach to Academic Programmes in IT Security

No 97-005 Wohed, Rolf

A Language for Enterprise and Information System Modelling No 97-008 Gamback,

Bjorn

Processing Swedish Sentences: A Unification-Based Grammar and Some Applica-

tions

No 97-010 Kapidzic Cicovic, Nada

Extended Certificate Management System: Design and Protocols

No 97-011 Danielson, Mats

Computational Decision Analysis

No 97-012 Wijkman, Pierre

Contributions to Evolutionary Computation

No 97-017 Zhang, Ying

Multi-Temporal Database Management with a Visual Query Interface

No 98-001 Essler, Ulf

Analyzing Groupware Adoption: A Framework and Three Case Studies in Lotus

Notes Deployment

No 98-008 Koistinen, Jari

Contributions in Distributed Object Systems Engineering

No 99-009 Hakkarainen, Sari

Dynamic Aspects and Semantic Enrichment in Schema Comparison

Page 351: Ontology for Information Systems (O4IS) Design Methodology

A.3 Sample Contract 329

No 99-015 Magnusson, Christer

Hedging Shareholder Value in an IT dependent Business society - the Framework

BRITS

No 00-004 Verhagen, Henricus

Norm Autonomous Agents

No 00-006 Wohed, Petia

Schema Quality, Schema Enrichment, and Reuse in Information Systems Analysis

No 01-001 Hokenhammar, Peter

Integrerad Bestallningsprocess vid Datasystemutveckling

No 01-008 von Scheele, Fabian

Controlling Time and Communication in Service Economy

No 01-015 Kajko-Mattsson, Mira

Corrective Maintenance Maturity Model: Problem Management

No 01-019 Stirna, Janis

The Influence of Intentional and Situational Factors on Enterprise Modelling Tool

Acquisition in Organisations

No 01-020 Persson, Anne

Enterprise Modelling in Practice: Situational Factors and their Influence on Adopting

a Participative Approach

No 02-003 Sneiders, Eriks

Automated Question Answering: Template-Based Approach

No 02-005 Eineborg, Martin

Inductive Logic Programming for Part-of-Speech Tagging

No 02-006 Bider, Ilia

State-Oriented Business Process Modelling: Principles, Theory and Practice

No 02-007 Malmberg, Ake

Notations Supporting Knowledge Acquisition from Multiple Sources

No 02-012 Mannikko-Barbutiu, Sirkku

SENIOR CYBORGS- About Appropriation of Personal Computers Among Some Swedish

Elderly People

No 02-028 Brash, Danny

Reuse in Information Systems Development: A Qualitative Inquiry

No 03-001 Svensson, Martin

Designing, Defining and Evaluating Social Navigation

No 03-002 Espinoza, Fredrik

Individual Service Provisioning

No 03-004 Eriksson-Granskog, Agneta

General Metarules for Interactive Modular Construction of Natural Deduction Proofs

No 03-005 De Zoysa, T. Nandika Kasun

A Model of Security Architecture for Multi-Party Transactions

Page 352: Ontology for Information Systems (O4IS) Design Methodology

330 A Appendix

No 03-008 Tholander, Jakob

Constructing to Learn, Learning to Construct - Studies on Computational Tools for

Learning

No 03-009 Karlgren, Klas

Mastering the Use of Gobbledygook - Studies on the Development of Expertise

Through Exposure to Experienced Practitioners’ Deliberation on Authentic Problems

No 03-014 Kjellman, Arne

Constructive Systems Science - The Only Remaining Alternative?

No 03-015 Rydberg Fa hræus, Eva

A Triple Helix of Learning Processes - How to cultivate learning, communication and

collaboration among distance-education learners

No 03-016 Zemke, Stefan

Data Mining for Prediction - Financial Series Case

No 04-002 Hulth, Anette

Combining Machine Learning and Natural Language Processing for Automatic Key-

word Extraction

No 04-011 Jayaweera, Prasad M.

A Unified Framework for e-Commerce Systems Development: Business Process Pat-

terns Perspective

No 04-013 Soderstrom, Eva

B2B Standards Implementation: Issues and Solutions

No 04-014 Backlund, Per

Development Process Knowledge Transfer through Method Adaptation, Implemen-

tation, and Use

No 05-003 Davies, Guy

Mapping and Integration of Schema Representations of Component Specifications

No 05-004 Jansson, Eva

Working Together when Being Apart - An Analysis of Distributed Collaborative Work

through ICT from an Organizational and Psychosocial Perspective

No 05-007 Coster, Rickard

Algorithms and Representations for Personalised Information Access

No 05-009 Ciobanu Morogan, Matei

Security System for Ad-hoc Wireless Networks based on Generic Secure Objects

No 05-010 Bjorck, Fredrik

Discovering Information Security Management

No 05-012 Brouwers, Lisa

Microsimulation Models for Disaster Policy Making

No 05-014 Nackros, Kjell

Visualising Security through Computer Games

Investigating Game-Based Instruction in ICT Security: an Experimental approach

Page 353: Ontology for Information Systems (O4IS) Design Methodology

A.3 Sample Contract 331

No 05-015 Bylund, Markus

A Design Rationale for Pervasive Computing

No 05-016 Strand, Mattias

External Data Incorporation into Data Warehouses

No 05-020 Casmir, Respickius

A Dynamic and Adaptive Information Security Awareness (DAISA) approach

No 05-021 Svensson, Harald

Developing Support for Agile and Plan-Driven Methods

No 05-022 Rudstrom, Asa

Co-Construction of Hybrid Spaces

No 06-005 Lindgren, Tony

Methods of Solving Conflicts among Induced Rules

No 06-009 Wrigstad, Tobias

Owner-Based Alias Management

No 06-011 Skoglund, Mats

Curbing Dependencies in Software Evolution

No 06-012 Zdravkovic, Jelena

Process Integration for the Extended Enterprise

No 06-013 Olsson Neve, Theresia

Capturing and Analysing Emotions to Support Organisational Learning: The Affect

Based Learning Matrix

No 06-016 Chaula, Job Asheri

A Socio-Technical Analysis of Information Systems Security Assurance A Case Study

for Effective Assurance

No 06-017 Tarimo, Charles N.

ICT Security Readiness Checklist for Developing Countries: A Social-Technical Ap-

proach

No 06-020 Kifle Gelan, Mengistu

A Theoretical Model for Telemedicine - Social and Value Outcomes in Sub-Saharan

Africa

No 07-001 Fernaeus, Ylva

Let’s Make a Digital Patchwork Designing for Children’s Creative Play with Program-

ming Materials

No 07-003 Bakari, Jabiri Kuwe

A Holistic Approach for Managing ICT Security in Non-Commercial Organisations A

Case Study in a Developing Country

No 07-004 Sundholm, Hillevi

Spaces within Spaces: The Construction of a Collaborative Reality

No 07-005 Hansson, Karin

A Framework for Evaluation of Flood Management Strategies

Page 354: Ontology for Information Systems (O4IS) Design Methodology

332 A Appendix

No 07-007 Aidemark, Jan

Strategic Planning of Knowledge Management Systems - A Problem Exploration Ap-

proach

No 07-009 Jonsson, Martin

Sensing and Making Sense

Designing Middleware for Context Aware Computing


Recommended