Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Keynote Lectures

Leveraging Knowledge from Humans and from Data: Why Requirements Engineering (Still) Matters
Eric Yu, University of Toronto, Canada

Integrating Big Data, Data Science and Cyber Security with Applications in Cloud and Internet of Things
Bhavani Thuraisingham, University of Texas at Dallas, United States

Validity Concerns for Evaluating Algorithms
Jan Mendling, Humboldt-Universität zu Berlin, Germany

Keynote Lecture
Deborah L. McGuinness, Rensselaer Polytechnic Institute, United States

 

Leveraging Knowledge from Humans and from Data: Why Requirements Engineering (Still) Matters

Eric Yu
University of Toronto
Canada
 

Brief Bio
Eric Yu is Professor at the Faculty of Information at the University of Toronto. His research interests include conceptual modeling, software requirements engineering, information systems engineering, knowledge management, and enterprise modeling. In his PhD work, he developed the i* framework for social modeling. The work has inspired hundreds of research papers, dozens of PhD theses, and many software tools. A version of i* is part of an international standard. He is co-editor of the MIT Press book series on Information Systems, and is on the editorial boards of the Requirements Engineering journal, IET Software, and the Journal on Data Semantics. He was Program Co- Chair for ER 2008 and 2014, and for CAiSE 2020. He was recipient of the 2019 Peter P. Chen Award.


Abstract
A data-driven computing paradigm has risen to rival the previously dominant knowledge-driven paradigm. As modern society becomes ever more digitalized, all kinds of human activities are increasingly mediated by a mix of data-driven and knowledge-driven software.

The wondrous technical capabilities of software systems are evoking utopian dreams as well as dystopian nightmares. Users, regulators, and the general public are calling for responsible AI and transparency and accountability from software professionals.

In software engineering, requirement analysis techniques have served to mediate between human needs and wants on one hand, and technical system design on the other. This talk will outline the role of social modeling in requirements engineering, as illustrated by the i* framework. In i*, actors depend on each other to achieve what they want. By applying i* modeling, one can explore the potential impacts of various system designs on stakeholders, in search of design options that would better meet the desires and aspirations of all concerned.

The widespread adoption of data-driven computing in today’s highly digitalized world suggests that requirements analysis needs to engage with the full cognitive cycle – the cycle by which actors sense and interpret data, generate knowledge, execute actions, and in turn producing new data. Various software technologies, data-driven and knowledge-driven, enhance and complement specific aspects of the cognitive cycles of humans and groups, often bringing about spectacular gains as well as vulnerabilities. Social modeling encompassing the full cognitive cycle can potentially help system designers and stakeholders jointly explore design options in order to derive the most benefits while avoiding negative consequences when developing today’s advanced software applications.



 

 

Integrating Big Data, Data Science and Cyber Security with Applications in Cloud and Internet of Things

Bhavani Thuraisingham
University of Texas at Dallas
United States
 

Brief Bio
Dr. Bhavani Thuraisingham is the Founders Chair Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute at the University of Texas at Dallas (UTD). She is also a visiting Senior Research Fellow at Kings College, University of London and an elected Fellow of the ACM, IEEE, the AAAS, the NAI and the BCS. Her research interests are on integrating cyber security and artificial intelligence/data science including as they relate to the cloud, social media and the Internet of Things. She has received several technical and leadership awards including the IEEE CS 1997 Technical Achievement Award, ACM SIGSAC 2010 Outstanding Contributions Award, the IEEE Comsoc Communications and Information Security 2019 Technical Recognition Award, the IEEE CS Services Computing 2017 Research Innovation Award, the ACM CODASPY 2017 Lasting Research Award, the IEEE ISI 2010 Research Leadership Award, and the ACM SACMAT 10 Year Test of Time Awards for 2018 and 2019 (for papers published in 2008 and 2009).  Her 40-year career includes industry (Honeywell), federal research laboratory (MITRE), US government (NSF) and US Academia. Her work has resulted in 130+ journal articles, 300+ conference papers, 180+ keynote and featured addresses, seven US patents, fifteen books, and podcasts. She received her PhD from the University of Wales, Swansea, UK, and the prestigious earned higher doctorate (D. Eng) from the University of Bristol, UK. She has a Certificate in Public Policy Analysis from the London School of Economics and Political Science. 


Abstract

Big Data, Data Science and Security are being integrated to solve many of the security and privacy challenges. For example, machine learning techniques are being applied to solve security problems such as malware analysis and insider threat detection. However, there is also a major concern that the machine learning techniques themselves could be attacked. Therefore, the machine learning techniques are being adapted to handle adversarial attacks. This area is known as adversarial machine learning. In addition, privacy of the individuals is also being violated through these machine learning techniques as it is now possible to gather and analyze vast amounts of data and therefore privacy enhanced data science techniques are being developed.

To assess the developments on the integration of Big Data, Data Science and Security over the past decade and apply them to the Internet of Transportation, the presentation will focus on four aspects. First it will examine the developments on applying Data Science techniques for detecting cyber security problems such as insider threat detection as well as the advances in adversarial machine learning. Some developments on privacy aware and policy-based data management frameworks will also be discussed. Next it will discuss how cloud technologies may be used to securely and privately share the information for various Big Data applications such as the Internet of Things. Finally, it will describe ways in which Big Data, Data Science and Security could be incorporated into these applications. 



 

 

Validity Concerns for Evaluating Algorithms

Jan Mendling
Humboldt-Universität zu Berlin
Germany
 

Brief Bio
Jan Mendling is the Einstein-Professor of Process Science with the Department of Computer Science at Humboldt-Universität zu Berlin, Germany. His research interests include various topics in the area of business process management and information systems. He has published more than 450 research papers and articles, among others in Management Information Systems Quarterly, ACM Transactions on Software Engineering and Methodology, IEEE Transactions on Software Engineering, Journal of the Association of Information Systems and Decision Support Systems. He is a department editor for Business and Information Systems Engineering, member of the board of the Austrian Society for Process Management (http://prozesse.at), one of the founders of the Berlin BPM Community of Practice (http://www.bpmb.de), organizer of several academic events on process management, and a member of the IEEE Task Force on Process Mining. He is co-author of the textbooks Fundamentals of Business Process Management, Second Edition, (http://fundamentals-of-bpm.org/) and Wirtschaftsinformatik, 12th Edition, (https://lehrbuch-wirtschaftsinformatik.org/), which are extensively used in information systems education.


Abstract
The evaluation of algorithms has been debated in computer science for decades. Recent years have seen an increasing use of different kinds of evaluations based on empirical research methods and sample data. Various applied areas of computing struggle with different concerns of validity, presumably because an overarching theoretical framework has been missing. In this keynote, we introduce a framework for researching algorithms that highlights several validity concerns. We discuss, in turn, research strategies to address these concerns. Our framework can be useful for any type of applied research in computer science that builds on the evaluation of algorithms.



 

 

Keynote Lecture

Deborah L. McGuinness
Rensselaer Polytechnic Institute
United States
 

Brief Bio
Available soon.


Abstract
Available soon.



footer