INFORMATION INVASION IN ENTERPRISE SYSTEMS - Modelling, simulating and analysing system-level information propagation

Peter Henderson, Stephen Crouch, Robert J Walters

Abstract

With the proliferation of internet-based technologies within and between organisations, large-scale enterprise systems are becoming more interconnected than ever before. A significant problem facing these organisations is how their information systems will cope with inconsistency being introduced from external data sources. Major problems arise when low quality information enters an authoritative enterprise system from these external sources, and in so doing gains credibility. This problem is compounded by the propagation of this information to other systems and other enterprises, potentially 'invading' an inter-enterprise network. In this paper we will introduce and examine this behaviour, which we term 'information invasion'. Characterisation of systems that are most vulnerable from such an occurrence is provided, and details of an experiment are given which simulates information invasion on an example network topology.

References

  1. Anderson, T. et al., 1998. Replication, Consistency, and Practicality: Are These Mutually Exclusive? In Proceedings of the ACM-SIGMOD 1998 International Conference on Management of Data, Seattle, WA, pp.484--495.
  2. Bichler, M. Segev, A. & Zhao, J.L., 1998. Componentbased E-Commerce: Assessment of Current Practices and Future Directions. SIGMOD Record, 27 (4), pp.7- 14.
  3. Gerth, J., 2000. Man declared dead by U.S. 'not quite ready to go'. The Courier Journal, Louisville, Kentucky, Jan. 3rd.
  4. Gerth, J., 2000. Medicare officials agree with man that he is, in fact, alive. The Courier Journal, Louisville, Kentucky, Jan. 6th.
  5. Grandison, T. Sloman, M., 2000. A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials, 3 (4), October-December.
  6. Grandison, T. Sloman, M., 2002. Specifying and Analysing Trust for Internet Applications. In Proceedings of the 2nd IFIP Conference on ECommerce, e-Business, and e-Government (I3e 2002), Lisbon, Portugal, October 7th - 9th.
  7. Gray, J. et al., 1996. The Dangers of Replication and a Solution. In Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, pp.173-182.
  8. Haga, C., 2002. Twin Cities Journal: There's life after death in New Hope, Golden Valley. The Star Tribune, Minneapolis, Minnesota, August 5th.
  9. Henderson, P., 2002. Reasoning about Asynchronous Behaviour in Distributed Systems. In Proceedings of the 8th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'02).
  10. Henderson, P., 2003. Modelling Architectures for Dynamic Systems. In McIver, A., Morgan, C. eds. Programming Methodology. Springer-Verlag New York Inc.
  11. Henderson, P. et al., 2003. A Comparison of some Negotiation Algorithms. In Kowalczyk, R. et al. eds. Agent Technologies, Infrastructure, Tools, and Applications for E-Services, Lecture Notes for Computer Science, 2592, Springer-Verlag Berlin Heidelberg, pp.137-150.
  12. Henderson, P. Walters, R.J. & Crouch, S., 2001. Inconsistency Tolerance across Enterprise Solutions. In Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS'01).
  13. IBM Corporation, 2004. WebSphere MQ. Available from: http://www-306.ibm.com/software/integration/ wmq/ [Accessed January 29th, 2004].
  14. Jennings, N.R. et al., 1998. On Argumentation-Based Negotiation. In Proceedings of the International Workshop on Multi-Agent Systems, Boston, USA.
  15. Jennings, N.R. et al., 2000. Automated Negotiation. In Proceedings of the 5th International Conference on the Practical Application of Intelligent Agents and MultiAgent Systems (PAAM 2000), Manchester, UK, pp.23- 30.
  16. McLaughlin, S. Krishnamurthy, V., 2003. Managing Data Incest in a Distributed Sensor Network. In Proceedings of the 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP).
  17. Microsoft Corporation, 2004. Microsoft Message Queue Homepage. Available from: http://www.microsoft. com/windows2000/technologies/communications/ms mq/default.asp [Accessed January 29th, 2004].
  18. Nissenbaum, H., 1996. Accountability in a Computerized Society, Science and Engineering Ethics, 2, pp.25-42.
  19. Nissenbaum, H., 2001. How Computer Systems Embody Values, IEEE Computer, March 2001.
  20. Sun Microsystems Incorporated, 2004. Java Messaging Service. Available from: http://java.sun.com/products/ jms/ [Accessed January 29th, 2004].
  21. Thompson, C., 1997. Database Replication. Intelligent Enterprise (formerly DBMS) Magazine, May. Available from: http://www.dbmsmag.com/9705d15 .html [Accessed January 29th, 2004].
Download


Paper Citation


in Harvard Style

Henderson P., Crouch S. and J Walters R. (2004). INFORMATION INVASION IN ENTERPRISE SYSTEMS - Modelling, simulating and analysing system-level information propagation . In Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 1: ICEIS, ISBN 972-8865-00-7, pages 473-481. DOI: 10.5220/0002621204730481


in Bibtex Style

@conference{iceis04,
author={Peter Henderson and Stephen Crouch and Robert J Walters},
title={INFORMATION INVASION IN ENTERPRISE SYSTEMS - Modelling, simulating and analysing system-level information propagation},
booktitle={Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 1: ICEIS,},
year={2004},
pages={473-481},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002621204730481},
isbn={972-8865-00-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 1: ICEIS,
TI - INFORMATION INVASION IN ENTERPRISE SYSTEMS - Modelling, simulating and analysing system-level information propagation
SN - 972-8865-00-7
AU - Henderson P.
AU - Crouch S.
AU - J Walters R.
PY - 2004
SP - 473
EP - 481
DO - 10.5220/0002621204730481