Mobility as a Service

MAAS as a mobility model leans on the idea that a gap between private and public transport systems needs to be bridged as well as on a city, intercity, national and supranational level. The current situation is felt problematic due to the fragmented tools and services often organized in silos to meet a traveler needs to undertake a trip. One of the major concerns designing any platform system like Mobility as a Service is where to start modeling and how to express the notion of the platform system in some language that is understandable for all stakeholders of the platform system. Understandability buttresses the expectation of stakeholders whether some design will probably implement the intended platform services enabling users to actually buy and or use the platform system for what ever purpose. Building on the economic theories of two-sided markets and mechanism design we introduce the concept of value nets extending the Contract Protocol Net. Value net modeling offers a precise abstract representation which provides in the detailed informational requirements in a canonical form and it connects i.e. implements the abstract notion of Service Oriented Architecture characterizing systems without loss of crucial informational elements.

[1]  K. Arrow,et al.  Chapter Thirteen - Kenneth Arrow on Social Choice Theory , 2011 .

[2]  Pablo Noriega,et al.  Characterizing Artificial Socio-Cognitive Technical Systems , 2014, ECSI.

[3]  Guido Boella,et al.  Contracts as legal institutions in organizations of autonomous agents , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[4]  Jon Kolko,et al.  Abductive Thinking and Sensemaking: The Drivers of Design Synthesis , 2010, Design Issues.

[5]  Guido Boella,et al.  Regulative and Constitutive Norms in Normative Multiagent Systems , 2004, KR.

[6]  Ann Heylighen,et al.  Design in Mind , 2009, Design Issues.

[7]  Leonidas G. Anthopoulos,et al.  Smart Transportation Applications' Business Models: A Comparison , 2018, WWW.

[8]  Joris Hulstijn,et al.  Adaptive Normative Modelling: A Case Study in the Public-Transport Domain , 2015, I3E.

[9]  L. Hurwicz Studies in Resource Allocation Processes: Optimality and informational efficiency in resource allocation processes , 1977 .

[10]  Paul Veerkamp,et al.  Modeling Design Process , 1990, AI Mag..

[11]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[12]  A. James 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.

[13]  Tomi Kauppinen,et al.  Increasing Transparency through Web Maps , 2018, WWW.

[14]  Marijn Janssen,et al.  A Unified Smart City Model (USCM) for Smart City Conceptualization and Benchmarking , 2016, Int. J. Electron. Gov. Res..

[15]  R. Amit,et al.  The business model: A theoretically anchored robust construct for strategic analysis , 2013 .

[16]  J. Efrim Boritz,et al.  IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..

[17]  Jean-Charles Rochet,et al.  Two-Sided Markets: An Overview ∗ , 2004 .

[18]  O. Williamson Markets and Hierarchies: Some Elementary Considerations , 1973 .

[19]  Haiping Xu,et al.  An agent-based Petri net model with application to seller/buyer design in electronic commerce , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.

[20]  Vijay K. Vaishnavi,et al.  A Framework for Theory Development in Design Science Research: Multiple Perspectives , 2012, J. Assoc. Inf. Syst..

[21]  R. Amit,et al.  Value creation in E‐business , 2001 .

[22]  Edward J. Coyne,et al.  ABAC and RBAC: Scalable, Flexible, and Auditable Access Management , 2013, IT Professional.

[23]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[24]  Jonathan Billington,et al.  Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets , 2008, FORTE.

[25]  Stan Lipovetsky,et al.  Designing Economic Mechanisms , 2007, Technometrics.

[26]  David M. Nicol,et al.  A framework integrating attribute-based policies into role-based access control , 2012, SACMAT '12.

[27]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[28]  Northrop Grumman,et al.  Reference Architecture Foundation for Service Oriented Architecture Version 1.0 , 2009 .

[29]  Hanan El Bakkali,et al.  A New Task Engineering Approach for Workflow Access Control , 2010, CISIS.

[30]  J. Benthem,et al.  Handbook on the Philosophy of Information , 2006 .

[31]  Jan Damsgaard,et al.  A Typology of Multi-sided Platforms: The Core and the Periphery , 2015, ECIS.

[32]  Joris Hulstijn,et al.  Reliability of electronic evidence: an application for model-based auditing , 2015, ICAIL.

[33]  Joris Hulstijn,et al.  Control Automation to Reduce Costs of Control , 2012, Int. J. Inf. Syst. Model. Des..

[34]  Donald A. Norman,et al.  Things that make us smart , 1979 .