2006
DOI: 10.1007/11787181_18
|View full text |Cite
|
Sign up to set email alerts
|

Transaction Agent Modelling: From Experts to Concepts to Multi-Agent Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…One avenue of research has explored how they might be deployed in enterprise systems through the Resources-Events-Agents (REA) modelling pattern that is closer to business reality (Vymětal & Scheller, 2012). Other work has taken on the REA approach and, using CGs, provided an early requirements capture specification, known as Transaction Agent Modelling (TrAM) (Hill, Polovina, & Shadija, 2006). A variant of this work has been the Transaction Graph, using CGs to apply TrAM in Enterprise Architecture projects (Launders, 2012).…”
Section: Conceptual and Architectural Frameworkmentioning
confidence: 99%
“…One avenue of research has explored how they might be deployed in enterprise systems through the Resources-Events-Agents (REA) modelling pattern that is closer to business reality (Vymětal & Scheller, 2012). Other work has taken on the REA approach and, using CGs, provided an early requirements capture specification, known as Transaction Agent Modelling (TrAM) (Hill, Polovina, & Shadija, 2006). A variant of this work has been the Transaction Graph, using CGs to apply TrAM in Enterprise Architecture projects (Launders, 2012).…”
Section: Conceptual and Architectural Frameworkmentioning
confidence: 99%
“…Drawing from our previous work, we now explore how transactions might provide structure to the unstructured (Hill, Polovina, & Shadija, 2006;Hill, 2007;Polovina, 1993a;Polovina, 1993b). In support of our view we can note that enterprise information systems (EIS) echo this underpinning concept (Groenewegen, 1993).…”
Section: Structure Through Transactionsmentioning
confidence: 99%
“…All in all, CG are particularly attractive as they are built upon such a strong theoretical and wideranging base. A strong case therefore exists for capturing the REA model in CG (Gerbé, Keller, & Mineau, 1998;Hill et al, 2006;Hill, 2007;Polovina, 1993a;Polovina, 1993b).…”
Section: Rea As Conceptual Graphsmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT privacy protection seems to be more vulnerable than conventional Information and Communication Technology (ICT) systems because of several vector threats against IIoT technologies [14,15]. Modelling these vulnerabilities is challenging, particularly since the multiplicity of IIoT devices each represent agents within a complex system of interactions that need to be secure [16][17][18].…”
Section: Introductionmentioning
confidence: 99%