An ontology-based approach to role-human assignment in human processes for knowledge intensive services

Knowledge intensive service processes should be managed in a human-oriented way since human workers who naturally undertake complex operations of an intellectual nature in the processes are the most valuable resources for service-providing companies. For the human-oriented management, a role-based approach has been widely applied. The foremost step in the role-based human process management is to assign relevant roles to appropriate humans. The role assignment task is also highly dependent on the ability of humans to consider information about roles and humans. In order to manage the role assignment in a human-oriented way, this paper presents two fundamental principles upon which the assignment task is carried out. First, roles should not be assigned until they need to be activated; second, the authority for the role assignment should be distributed to participants in the processes. In order to support the principles, the information should be explicitly and formally described to enable all the participants to easily understand and utilize it. Consequently, this paper proposes a methodology for managing the role assignment in a human-oriented way by adopting an ontological approach which can precisely describe the information. From the proposed methodology, human workers can be notified which roles are triggered to be activated and wait to be assigned. Moreover, they can be provided appropriate candidate humans when carrying out the assignment task. The contribution of this paper is to suggest a role assignment methodology that not only lightens the assignment workload by providing the capability of identifying a small set of appropriate candidates but also enables the efficient assignment by streamlining the assignment task.

[1]  Nicola Guarino,et al.  Formal Ontology and Information Systems , 1998 .

[2]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[3]  Ian Miles,et al.  Knowledge intensive business services: prospects and policies , 2005 .

[4]  Ninghui Li,et al.  RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[5]  P. Hertog,et al.  Knowledge-intensive business services: users, carriers and sources of innovation , 1995 .

[6]  Anthony C. Bloesch,et al.  Data Modeling in UML and ORM: A Comparison , 1999, J. Database Manag..

[7]  George A. Miller,et al.  WordNet: A Lexical Database for English , 1995, HLT.

[8]  Ravi S. Sandhu,et al.  A model for attribute-based user-role assignment , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[9]  Yuh-Min Chen,et al.  Advanced multi-phase trust evaluation model for collaboration between coworkers in dynamic virtual project teams , 2009, Expert Syst. Appl..

[10]  MengChu Zhou,et al.  Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[11]  MengChu Zhou,et al.  Roles in Information Systems: A Survey , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[12]  Jay Liebowitz,et al.  Knowledge management and its link to artificial intelligence , 2001, Expert Syst. Appl..

[13]  Amy L. Ostrom,et al.  Client Co-Production in Knowledge-Intensive Business Services , 2002 .

[14]  Robert P. Bostrom,et al.  Role conflict and ambiguity: Critical variables in the MIS user-designer relationship , 1980, SIGCPR '80.

[15]  Steve Pepper Topic Maps , 2004 .

[16]  M. Alvesson Management Of Knowledge-Intensive Companies , 1995 .

[17]  W. N. Borst,et al.  Construction of Engineering Ontologies for Knowledge Sharing and Reuse , 1997 .

[18]  Ravi S. Sandhu,et al.  A model for role administration using organization structure , 2002, SACMAT '02.

[19]  Yushi Komachi,et al.  ISO/IEC JTC 1/SC 34 , 2006 .

[20]  Emmanuel Muller,et al.  What we should know about knowledge-intensive business services , 2009 .

[21]  Ruth C. King,et al.  The Impact of Socialization on the Role Adjustment of Information Systems Professionals , 1998, J. Manag. Inf. Syst..

[22]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[23]  Lars Marius Garshol tolog - A Topic Maps Query Language , 2005, TMRA.

[24]  Asunción Gómez-Pérez,et al.  Ontological Engineering: A state of the Art , 1999 .

[25]  Blake E. Ashforth,et al.  Role Transitions in Organizational Life : An Identity-based Perspective , 2001 .

[26]  Human Interactions , 2007, Science.

[27]  Haibin Zhu,et al.  Role mechanisms in collaborative systems , 2006 .

[28]  Ravi S. Sandhu,et al.  The URA97 Model for Role-Based User-Role Assignment , 1997, DBSec.

[29]  David W. Chadwick,et al.  Role-Based Access Control With X.509 Attribute Certificates , 2003, IEEE Internet Comput..

[30]  Natalia Juristo Juzgado,et al.  Assigning people to roles in software projects , 2004, Softw. Pract. Exp..

[31]  Pieter H. Hartel,et al.  Dynamic User Role Assignment in Remote Access Control , 2009 .