a partial use case model, aiming at being explicit on
the enterprise-software alignment that in turn builds
upon the weaving of context-awareness and privacy
at the enterprise modeling level.
For this reason, we are not going to address in the
current paper the elaboration of use cases as well as
the further software specification reflected in
behavior+states modeling and classification.
Interested readers are referred to (Shishkov, 2005)
where this is considered and justified by means of a
case study.
6 CONCLUSIONS
In this paper, we have considered in general the
alignment between enterprise modeling and software
specification, fueled by the SDBC Approach. In
particular, we have addressed the challenge of
weaving context-awareness and privacy in the
enterprise models, such that context-awareness and
privacy are then reflected accordingly in the
specification of software. We have partially
demonstrated our way of modeling by means of a case
example featuring land border security. Hence, the
contribution of the paper is two-fold: (i) We have
contributed to the research concerning enterprise-
software alignment, by studying how particular
desired values (such as context-awareness and
privacy) can be methodologically reflected in the
specification of software. (ii) We have directed the
current research to the border security application
domain where context-awareness and privacy are of
great importance, especially if they could be reflected
in the functionalities of the (technical) systems
facilitating the border control. As future research, we
plan to consider a large-scale border security case
study assuming software development activities.
REFERENCES
AWARENESS, 2008. Freeband AWARENESS Project.
http://www.freeband.nl.
Ayed, D., Delanote, D., Berbers, Y., 2007. MDD Approach
for the Development of Context-Aware Applications.
In International and Interdisciplinary Conference on
Modeling and Using Context.
Bunge, M.A., 1979. Treatise on Basic Philosophy, vol. 4, A
World of Systems, D. Reidel Publishing Company.
Dordrecht.
Burghardt, T., Buchmann, E., Böhm, K., 2008. Why do
Privacy-Enhancement Mechanisms Fail, After All? A
Survey of Both, the User and the Provider Perspective.
In Workshop W2Trust, in conjunction with IFIPTM.
Cockburn, A., 2000. Writing Effective Use Cases, Addison-
Wesley.
Dey, A. K., 2001. Understanding and Using Context.
Personal and Ubiquitous Computing, 5(1), 4-7.
Dietz, J.L.G., 2006. Enterprise Ontology, Theory and
Methodology, Springer. Heidelberg, 1
st
edition.
Dietz, J.L.G., 2003. Generic Recurrent Patterns in Business
Processes. In BPM’03, International Conference on
Business Process Management, LNCS. Springer.
FRONTEX, 2017, the website on the European Agency,
FRONTEX: http://frontex.europa.eu.
Henricksen, K., Indulska, J., 2006. Developing Context-
Aware Pervasive Computing Applications: Models and
Approach. Pervasive and Mobile Computing.
Huberman, B. A., Franklin, M., Hogg, T., 1999. Enhancing
Privacy and Trust in Electronic Communities. In EC
'99, 1
st
Int. ACM Conf. on Electronic Commerce. ACM.
Hustinx, P., 2010. Privacy by Design: Delivering the
Promises. In Identity in the Information Society 3(2).
Springer.
IoTDI, 2017. 2
nd
International Conference on Internet-of-
Things Design and Implementation. ACM/IEEE.
Janssen, M., Van den Hoven, J., 2015. Big and Open Linked
Data (BOLD) in Government: A Challenge to
Transparency and Privacy? Government Information
Quarterly, 32(4).
Johnston, A., Wilson, S., 2012. Privacy Compliance Risks
for Facebook. IEEE Technology and Society Magazine,
31(2).
Könings, B., Schaub, F., Weber, M., 2016. Privacy and
Trust in Ambient Intelligent Environments. In Next
Generation Intelligent Environments: Ambient
Adaptive Systems. Springer.
Kruchten, P., 2003. The Rational Unified Process, An
Introduction, Addison-Wesley.
LBS, 2012. LandBorderSurveillance, the EBF,
LandBorderSurveillance Project: http://ec.europa.eu.
Liu, K., 2000. Semiotics in Information Systems
Engineering, Cambridge University Press. Cambridge.
MDA, 2017. The OMG Model Driven Architecture.
http://www.omg.org/mda.
Pearson, S., 2009. Taking Account of Privacy when
Designing Cloud Computing Services. In ICSE’09,
International Workshop on Software Engineering
Challenges of Cloud Computing.
Seničar, V., Jerman-Blažič, B., Klobučar, T., 2003.
Privacy-Enhancing Technologies - Approaches and
Development. Computer Standards & Interfaces,
25(2).
Shishkov, B., 2017. Enterprise Information Systems, A
Modeling Approach, IICREST. Sofia, 1
st
edition.
Shishkov, B., 2005. Software Specification Based on Re-
usable Business Components (PhD Thesis), TU Delft.
Delft, 1
st
edition.
Shishkov, B., Mitrakos, D., 2016. Towards Context-Aware
Border Security Control. In BMSD’16, 6
th
International
Symposium on Business Modeling and Software
Design. SCITEPRESS.
Towards Context-Aware and Privacy-Sensitive Systems
59