Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial.

Slides:



Advertisements
Similar presentations
The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
Advertisements

Pat Langley Computational Learning Laboratory Center for the Study of Language and Information Stanford University, Stanford, California USA
Copyright © 2006 Data Access Technologies, Inc. Open Source eGovernment Reference Architecture Approach to Semantic Interoperability Cory Casanave, President.
MARKETING RESEARCH: FROM INFORMATION TO ACTION C HAPTER.
CS487 Software Engineering Omar Aldawud
A plan to deploy Ontology mediation information flow architecture for US Customs and Border Protection Presentation by OntologyStream Inc Paul Stephen.
DHS, National Cyber Security Division Overview
Overview of OASIS SOA Reference Architecture Foundation (SOA-RAF)
Supporting Privacy in E-learning with Semantic Streams Lori Kettel, Christopher Brooks, Jim Greer ARIES Laboratory Advanced Research in Intelligent Educational.
OASIS Reference Model for Service Oriented Architecture 1.0
A Bridge to the Future Using a Public (non-ownable) Demand Side Communication Infrastructure.
Who is in control? Technical Committees ? Business Investment and IT Vendor Community ? Interdisciplinary Scholarship ? The public discussion space ?
Instructor: Tasneem Darwish
Chapter 6: Design of Expert Systems
Requirements Specification
Chapter 2 Succeeding as a Systems Analyst
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 1: Introduction to Decision Support Systems Decision Support.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
1 Introduction to System Engineering G. Nacouzi ME 155B.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Systems Engineering Foundations of Software Systems Integration Peter Denno, Allison Barnard Feeney Manufacturing Engineering Laboratory National Institute.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
Business Intelligence
ACSIF Air Cargo Security Industry Forum. ACSIF Member Organisations.
1 Universal Core Executive Briefing Paul Shaw COI Forum October 16, 2007.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
How can ERP improve a company’s business performance?  Prior to ERP systems, companies stored important business records in many different departments.
MDC Open Information Model West Virginia University CS486 Presentation Feb 18, 2000 Lijian Liu (OIM:
Modular Ontology architecture for using human defined sets of concepts Presentation by OntologyStream Inc Paul Stephen Prueitt, PhD Ontology Tutorial 5,
Risk analysis and management using ontology Formal Analysis of Risk in Enterprise System (FARES) Presentation by Drs Peter Stephenson and Paul Stephen.
Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Operational Capability: An underlying simplification of a data encoding standard has been developing over the past decade and is being demonstrated in.
Chapter 2 The process Process, Methods, and Tools
Copyright © 2002 by The McGraw-Hill Companies, Inc. Information Technology & Management 2 nd Edition, Thompson Cats-Baril Chapter 8 I/S and Organizational.
Evaluation of software engineering. Software engineering research : Research in SE aims to achieve two main goals: 1) To increase the knowledge about.
LIS510 lecture 3 Thomas Krichel information storage & retrieval this area is now more know as information retrieval when I dealt with it I.
Strategies for Innovation Sourcing 30 August 2007 Paul McGowan Center for Innovative Technology Herndon, VA / Strategies.
Information Systems & Semantic Web University of Koblenz ▪ Landau, Germany Semantic Web - Multimedia Annotation – Steffen Staab
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Decision Support Systems Chapter 10.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
PUBLIC PURCHASING IN FLORIDA ROLES IN THE PURCHASING PROCESS (rev. 05/27/2008)
INFRASTRUCTURE FOR GIS INTEROPERABLITY APPLICATION FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY (FTMK) THE TECHNICAL UNIVERSITY OF MALAYSIA MELAKA.
Lecture2: Database Environment Prepared by L. Nouf Almujally & Aisha AlArfaj 1 Ref. Chapter2 College of Computer and Information Sciences - Information.
Copyright 2010, The World Bank Group. All Rights Reserved. Managing Mapping Operations Section B 1.
Semantic Web - an introduction By Daniel Wu (danielwujr)
Knowledge Representation of Statistic Domain For CBR Application Supervisor : Dr. Aslina Saad Dr. Mashitoh Hashim PM Dr. Nor Hasbiah Ubaidullah.
How to Organize the Systems Selection Process Using the SCOR Framework Pittiglio Rabin Todd & McGrath April 12, 2000 David Kennedy, Principal.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Improving B2B Customers Satisfaction Jason C.H. Chen, Ph.D. School of Business Administration Gonzaga University, Washington, U.S.A. Senior Consultant,
S&I Integration with NIEM (DRAFT) Standards Development Support June 8, 2011.
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
Using Several Ontologies for Describing Audio-Visual Documents: A Case Study in the Medical Domain Sunday 29 th of May, 2005 Antoine Isaac 1 & Raphaël.
27/3/2008 1/16 A FRAMEWORK FOR REQUIREMENTS ENGINEERING PROCESS DEVELOPMENT (FRERE) Dr. Li Jiang School of Computer Science The.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
Common Core State Standards An overview for Professional Development Leads March 8, 2010 Mary Russell, Region 3 Joyce Gardner, Region 8.
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
Requirements Engineering Process
Deployment of Ontology Mediation Of Information Flow Modified from Presentations made in 2002, 2003 and 2004 This material is not specific to any project.
Why BI….? Most companies collect a large amount of data from their business operations. To keep track of that information, a business and would need to.
ISECON Columbus, Ohio - October 7, 2005 Whither IS? Issues and Problems in Classifying CC2005 Programs Using CIP Codes Paul Leidig, George Nezlek,
Context for Sarbines -Oxley Sarbines-Oxley makes executives and officers of all public corporations listed on any American stock exchange take personal.
Requirements Engineering Processes, York EngD Programme, 2009Slide 1 Requirements engineering processes Prof Ian Sommerville.
Decision Support and Business Intelligence Systems (9 th Ed., Prentice Hall) Chapter 12: Artificial Intelligence and Expert Systems.
Chapter 2 Bring systems into being April Aims of this Lecture To explain what is “System Life-Cycle” To understand the systems engineering process.
Stages of Research and Development
BANKING INFORMATION SYSTEMS
Chapter 6: Design of Expert Systems
Presentation transcript:

Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial 2, copyright, Paul S Prueitt 2005

The BCNGroup Inc, is a not for profit foundation registered in the Commonwealth of Virginia. since Our conjecture is that a new open systems based science is being created. The formalism extends Hilbert type mathematics. Human-centric Information Production (HIP) replaces the current Information Technology paradigm. A proposal is currently directed towards government agencies who need ontology management systems. Proposals have been discussed in the context of a Treasury / IC / DHS / State Department knowledge science and technology program. The second step in this program is to develop an universally accessible CoreSystem CoreOntology expression medium. (20 M over two years) Current and future relevant IP will be compensated according to a Red hat type business model. The third step is to fund the development of a K-12 curriculum in the knowledge sciences. (1.2 B over five years) This funding is offset by reducing funding for computer science and IT programs.

Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics Cyber Security Data National Targeting Center Data Detailed work with tools over available data Practical problem: Limited access to data means that who gets the right to work on the solution is strongly constrained by business criterion. A Core System CoreOntology would change this circumstance. Integrated collection of reified ontologies with specific inferences, information organization and retrieval Possible deployment as Intelligence Community (TIA) capability

Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics Advanced Trade Data Harmonized Tariff Schedule Detailed work with tools over available data Practical problem: Provide the three Cs, clarity, consistency, and completeness in EACH judicial review of a commodity in passage across national boarders. Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval Possible deployment as U. S. Custom’s Total Information Awareness (TIA) capability

Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics DHS Data acquisition centers National intelligence analysis centers Detailed work with tools over available data Practical problem: Each community of practice is observed to use a specific managed vocabulary. These vocabularies can be used to store data in locations that are the context (and thus requiring no search). Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval Possible deployment as department wide Department of Homeland Security (TIA) capability

Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics Medical data acquisition centers National biodefense rapid analysis center Detailed work with tools over available data Practical problem: Medical community is not deeply trustful of the intelligence communities. A Core System Core Ontology would lay cards on the top and make trust relationship negotiable based on shared knowledge of mutual value. Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval Possible deployment as National Bioterrorism Response System

What is and is not a hard problem 1)New ways of thinking are introduced that are supported by actual new product lines appearing in the marketplace. A comprehensive review of the leading edge aspect of the market is suggested. 2)Use cases and data flow can be used to demonstrate these new ways of thinking, and existing commercial product can be shown to be available to architect a demonstration of Semantic Web capabilities. 3)A small community of leading scientists have defined a knowledge sharing core concept, that when equipped with the best Semantic Web capabilities will serve individual Governmental agencies and departments. 4)CoreTalk Inc is a commercial entity with a capability to re-factor the selected technical capabilities and express these as a CoreSystem CoreOntology.

Observation: In regards to evaluating Semantic Web products the standard choice is not always the right choice To elaborate on this observation: Standard IT development processes do not adequately support individual understanding of the long term hard issues, e.g. no educational processes occurs over relevant Semantic Web technology. Easy Difficult Short termLong term In government procurement of IT, a mismatch between what is available and what is evaluated is often created. The development of questions to be given to screen software vendors may not be well focused – either by what SW informed architects might want to do nor by what the product lines are designed to do. The final selection of vendors may not be fully informed by what the market is bringing forward. Expected result = wrong software integrated in the wrong way using a simple-minded architecture.

Semantic Web mismatch issues Because the SW issues are not well known, business decisions focuses on short term simple minded problems, where perceived risk are minimal. Mismatch between low risk decisions and true problems create process that can not be rationalized. The dysfunction can be ignored in an business environment where marketing and public relations often disguises the absence of progress. Short termLong term Easy Difficult

Evaluating Semantic Web products: the identification of by-pass Many problems that are critical are in fact mis-classified as long term and difficult when a simplification is being fielded by the markets. The simplification may involve the use of ontology to organize how information is organized. For Example: The definition of an ontology as a { concepts } expressed within an constraint language. The check box “does the product import and export OWL?” may be improperly asked if the understanding of what is an ontology, and what is a constraint language is not present. Short termLong term Easy Difficult

Many problems that are critical are in fact classified as long term and difficult In many cases, a by-pass around a long term difficult problem can be seen. The by-pass moves the problem to the easy and short term category. However: In security environments open minded search to re-frame problems is problematic for several understandable reasons. 1) Only a limited number of individuals have security clearance and have the training necessary to understand the history of semantic technology development. 2) Business practices themselves often re-enforce what is perceived to be minimization of professional risk, and thus these practices closes off an open discussion (even within secure environments). Short termLong term Easy Difficult

Many problems that are critical are in fact mis-classified as being long term and difficult Example of by-pass Problem: Write 1/3 into a computer. This problem is considered to be unsolvable since in base 10 we have 1/3 = Where the three dots means repeat to infinity. But 1/3 in base ten is also the same as 1/3 in base 6. In base 6, 1/3 = 0.2 So where did the intractable problem go?