Software Engineering: The Relationship between a Formal System and its Environment

1986 ◽  
Vol 1 (1) ◽  
pp. 14-21 ◽  
Author(s):  
Frank Land ◽  
Elizabeth Somogyi
AJS Review ◽  
2001 ◽  
Vol 25 (1) ◽  
pp. 1-24 ◽  
Author(s):  
Zachary Braiterman

In the following pages, I will address the relationship between Jewish thought and aesthetics by bringing Joseph Soloveitchik into conversation with Immanuel Kant, whose Critique of Judgment remains an imposing monument in the history of philosophical aesthetics. While Buber and Rosenzweig may have been more accomplished aesthetes, Soloveitchik's aesthetic proves closer to Kant's own. In particular, I draw upon the latter's distinction between the beautiful and the sublime and the notion of a form of indeterminate purposiveness without determinate purpose. I will relate these three figures to Soloveitcchik's understanding of halakhah and to the ideal of performing commandments for their own sake (li-shemah). The model of mitzvah advanced by this comparison is quintessentially modern: an autonomous, self-contained, formal system that does not (immediately) point to extraneous goods, such as spiritual enlightenment, personal morality, or social ethics. The good presupposed by this system proves first and foremost “aesthetic.” That is, immanent to the system. Supererogatory goods enter into the picture only afterward as second-order effects.


2021 ◽  
Vol 27 (10) ◽  
pp. 786-795
Author(s):  
O. V. Voronova ◽  
I. V. Il’in ◽  
V. A. Sheleyko

Aim. The presented study aims to develop and describe a contract management system for FMCG chain retailing companies in the context of the digital transformation of the economy.Tasks. The authors examine the specific aspects of developing a contract management system for chain retailing companies; develop a classification of contracts by sector of activity and outline the landscape of the contract management process; create and describe a system for managing contracts.Methods. The methodological basis of this study includes conceptual representations of the contract management system, which make it possible to apply a systems approach, generalization, grouping, methods of formal system representation, and socio-economic experimentation.Results. The study examines the specific aspects of developing a contract management system for chain retailing companies in the context of the digital transformation of the economy, describing the major types of contracts used by these companies. The contracts are classified by sector of activity, and the landscape of the contract management process is outlined. Its individual units correspond to the Deming cycle and represent a cyclically repeating decision-making process.Conclusions. As a result, a contract management system for chain retailing companies is proposed, and the relationship between the management subsystem and the system of requirements for the architecture of business services in the field of contract management is determined. It is shown that successful implementation of an efficient contract management system requires preliminary work to identify requirements for the architecture of business services. Taking into account these requirements in the modeling of architectural solutions and integrating them into the business architecture will ensure high-quality contract management through the optimization of the company’s resources and highly efficient regulation of the relationship between the stakeholders and counterparties of chain retailing companies.


2012 ◽  
Vol 3 (1) ◽  
pp. 1-13 ◽  
Author(s):  
Diana-Marcela Vásquez-Bravo ◽  
Maria-Isabel Sánchez-Segura ◽  
Fuensanta Medina-Domínguez ◽  
Antonio Amescua

Knowledge elicitation process allows acquiring and transferring the knowledge. This process presents difficulties to select the appropriate elicitation technique. This paper presents a classification of the elicitation techniques used in software engineering and the relationship between the elicitation techniques and some elements of knowledge management as assets knowledge, epistemological dimension of knowledge and the knowledge creation phases. This classification provides a guideline to select a technique or a set of techniques for knowledge elicitation based on phases of Nonaka’s model.


2009 ◽  
pp. 98-113 ◽  
Author(s):  
Nancy R. Mead ◽  
Dan Shoemaker

This chapter describes methods of incorporating security requirements engineering into software engineering courses and curricula. The chapter discusses the importance of security requirements engineering and the relationship of security knowledge to general computing knowledge by comparing a security body of knowledge to standard computing curricula. Then security requirements is related to standard computing curricula and educational initiatives in security requirements engineering are described, with their results. An expanded discussion of the SQUARE method in security requirements engineering case studies is included, as well as future plans in the area. Future plans include the development and teaching of academic course materials in security requirements engineering, which will then be made available to educators. The authors hope that more educators will be motivated to teach security requirements engineering in their software engineering courses and to incorporate it in their curricula.


2020 ◽  
pp. 681-694
Author(s):  
Bernadette Rainey ◽  
Pamela McCormick ◽  
Clare Ovey

This chapter sums up the key findings of this study on the Convention on Human Rights (ECHR). It suggests that the principal achievement of the Convention has been the establishment of a formal system of legal protection available to individuals covering a range of civil and political rights which has become the European standard. The chapter highlights the measures taken by the Court to decrease its caseload and increase its efficiency in dealing with applications. It also highlights the contemporary challenges facing the Court, including the relationship between States and the Court, the challenge of the rise of authoritarian governments, and the threats to rights protection from the climate crisis.


2020 ◽  
Author(s):  
Gabrielle Minohara ◽  
Carla Rocha ◽  
Joenio Costa ◽  
Paulo Meirelles

BACKGROUND Health Informatics Systems (HIS) draw more attention as their benefits are further explored and becoming more evident. The improvement of patient care and the quality of health services are examples of such advantages. Nevertheless, proprietary systems are not always viable due to their high costs. OBJECTIVE We investigated the benefits and challenges of Open-Source Health informatics Systems (OHIS) adoption discussed in the literature, and we also mapped the real-world OHIS projects, with their technical and community characteristics. Both results guide us to address the aspects that still need to be overcome and also to identify the criteria to help managers and IT professionals in choosing the most suitable OHIS for their context. METHODS We conducted a Systematic Mapping Study to review the literature and also mined source code repositories of OHIS projects. We employ well-consolidated methods from the software engineering community, and we differentiate from similar related works by the use of a more systematic method and also to evaluate OHIS projects using objective software engineering metrics and artifacts. RESULTS We found 500 papers and 151 projects, selecting 26 works to analyze thoroughly and mining 38 active OHIS repositories. We mapped the benefits and challenges to adopt OHIS projects and identified the legal and technical characteristics of them. We propose a conceptual map to illustrate the relationship among all the OHIS adoption benefits. We then correlate how technical and documental artifacts from an OHIS project affect their expected benefits and challenges. Thus, we recommend a set of artifacts and metrics well established in the OSS community as the criteria necessary to evaluate an OHIS solution from a software engineering perspective. CONCLUSIONS OSS projects increase the quality of the HIS and solve several problems that are mostly linked with proprietary solutions. The OHIS ecosystem provides several possible solutions for adoption. However, one barrier to its adoption is misconceptions and misinformation on OSS in the HIS context. We address this challenge with a set of recommended aspects to OHIS project adoption to assist managers and IT professionals in evaluating OHIS solutions. Finally, we highlight the necessity of more research to cover specific technical challenges on OHIS adoption.


Sign in / Sign up

Export Citation Format

Share Document