Knowledge Based Concept Analysis Method using Concept Maps and UML: Security Notion Case

One of the most ancient humankind concerns is knowledge formalization i.e. what a concept is. Concept Analysis, a branch of analytical philosophy, relies on the purpose of decompose the elements, relations and meanings of a concept. This paper aims at presenting a method to make a concept analysis obtaining a knowledge representation suitable to be processed by a computer system using either object-oriented or ontology technologies. Security notion is, usually, known as a set of different concepts related to “some kind of protection". Our method concludes that a more general framework for the concept, despite it is dynamic, is possible and any particular definition (instantiation) depends on the elements used by its construction instead of the concept itself.





References:
[1] L. C. Agrela, "La superacion por Leibniz de la logica aristotelica,"
Revista Internacional de Filosofia, vol. Suplemento 3ÔÇ× pp. 67-74, 2010.
[2] P. Jetli, "The Completion of the Emergence of Modern Logic from
Boole-s The Mathematical Analysis of Logic to Frege-s Begriffsschrift,"
in Logic and Its Applications, ser. Lecture Notes in Computer Science,
M. Banerjee and A. Seth, Eds. Springer Berlin Heidelberg, 2011, vol.
6521, pp. 105-123. (Online). Available: http://dx.doi.org/10.1007/978-
3-642-18026-2_10
[3] R. Streveler, T. Litzinger, R. Miller, and P. Steif, "Learning Conceptual
Knowledge in the Engineering Sciences: Overview and Future Research
Directions," Journal of Engineering Education, vol. 97, pp. 279-294,
July 2008.
[4] J. Goguen, "What Is a Concept?" Lecture Notes in Computer Science:
Conceptual Structures: Common Semantics for Sharing Knowledge, pp.
52-77, 2005. (Online). Available: http://dx.doi.org/10.1007/11524564_4
[5] J. Wilson, Thinking with concepts. Cambridge University Press, 1963.
[6] B. L. Rodgers, "Concepts, Analysis, and the Development of Nursing
Knowledge: The Evolutionary Cycle." Journal of Advanced Nursing,
vol. 14, pp. 330-335, 1989.
[7] K. C. Walker, L.O. Avant, Strategies for theory construction in nursing,
3rd ed. Norwalk, CT: Appleton & Lange, 1995.
[8] V. L. Griffin-Heslin and al., "An analysis of the concept dignity,"
Accident and Emergency Nursing, vol. 13, pp. 251-257, 2005.
[9] U. Priss, "Formal Concept Analysis in Information Science," Annual
Review of Information Science and Technology, vol. 40, pp. 521-543,
2006. (Online). Available: (http://www.upriss.org.uk/papers/arist.pdf).
[10] J. D. Novak and A. J. Ca├▒as, "The Theory Underlying Concept Maps
and How to Construct Them," Technical Report IHMC CmapTools,
Tech. Rep. 2006-01, 2006. (Online). Available:
(http://cmap.ihmc.us/Publications/ResearchPapers/TheoryCmaps/Theory
UnderlyingConceptMaps.htm).
[11] B. Ganter and R. Wille, Formal Concept Analysis: Mathematical
Foundations, 1st ed. Secaucus, NJ, USA: Springer-Verlag New York,
Inc., 1997.
[12] R. S. Pressman, Software engineeering: a practioner-s approach, 6th ed.
Boston, EUA: McGraw-Hill, 2005.
[13] M. O-Docherty, Object-oriented analysis and design : understanding
system development with UML 2.0. John Wiley & Sons, 2005.
[14] P. Coad and E. Yourdon, Object-Oriented Analysis. London: Prentice-
Hall, 1991.
[15] R. Studer, R. Benjamins, and D. Fensel, "Knowledge engineering:
principles and methods," Data and knowledge engineering, vol. 25, pp.
161-197, 1998.
[16] S. Kendal and M. Creen, An Introduction to Knowledge Engineering,
1st ed. Springer, Oct. 2006.
[17] J. Hua, "Study on Knowledge Acquisition Techniques," in Proceedings
of the 2008 Second International Symposium on Intelligent Information
Technology Application - Volume 01, ser. IITA -08. Washington, DC,
USA: IEEE Computer Society, 2008, pp. 181-185. (Online). Available:
http://dx.doi.org/10.1109/IITA.2008.152.
[18] S. Potter, "A Survey of Knowledge Acquisition from Natural
Language," AKT project report Task 1.1.2, 2001.
[19] J. Wang, Y. Wu, X. Liu, and X. Gao, "Knowledge acquisition method
from domain text based on theme logic model and artificial neural
network." Expert Syst. Appl., vol. 37, pp. 267-275, 2010. (Online).
Available: http://dx.doi.org/10.1016/j.eswa.2009.05.009.
[20] S. P. Overmyer, B. Lavoie, and O. Rambow, "Conceptual Modeling
through Linguistic Analysis Using LIDA." in Software Engineering,
2001. ICSE 2001. Proceedings of the 23rd International Conference.
IEEE Computer Society, 2001, pp. 401-410.
[21] R. J. Abbott, "Program design by informal English descriptions,"
Commun. ACM, vol. 26, pp. 882-894, November 1983. (Online).
Available: http://doi.acm.org/10.1145/182.358441.
[22] L. Dillard and B. Myers, "Visual Teaching Tools: Concept Maps,"
University of Florida, Tech. Rep., May 2008.
[23] M. J. Eppler, "A comparison between concept maps, mind maps,
conceptual diagrams, and visual metaphors as complementary tools for
knowledge construction and sharing," Information Visualization, vol. 5,
no. 3, pp. 202-210, 2006.
[24] T. Buzan and B. Buzan, The Mind Map Book, 2nd ed. London: BBC
Books, 1995.
[25] G. Booch, Object-oriented analysis and design with applications (2nd
ed.). Redwood City, CA, USA: Benjamin-Cummings Publishing Co.,
Inc., 1994. (Online). Available:
http://portal.acm.org/citation.cfm?id=174890.
[26] J. Rumbaugh, Object-oriented modeling and design. Prentice Hall, 1991.
[27] I. Jacobson, Object Oriented Software Engineering: A Use Case Driven
Approach. Addison-Wesley, 1992.
[28] E. H. Orallo, "El Lenguaje Unificado de Modelado (UML)," Manuales
Formativos ACTA, num 26, October 2002.
[29] S. Cranefield and M. K. Purvis, "UML as an Ontology Modelling
Language." in In Proceedings of the Workshop on Intelligent
Information Integration, 16th International Joint Conference on Artificial
Intelligence (IJCAI-99), 1999, pp. 46-53.
[30] A. Felfernig, G. Friedrich, D. Jannach, and M. Zanker, "Configuration
Knowledge Representation Using UML/OCL," in "UML" 2002 - The
Unified Modeling Language. Springer Berlin / Heidelberg, 2002, pp.
91-108. (Online). Available: http://dx.doi.org/10.1007/3-540-45800-
X_5.
[31] C. W. Chan, "Knowledge and software modeling using UML." Software
and System Modeling, vol. 3, no. 4, pp. 294-302, 2004.
[32] B. Buzan, People, States and Fear. Harvester-Wheatsheaf, Brighton,
1983.
[33] P. Digeser, "The Concept of Security," 1994, presented at the Annual
Meeting of the American Political Science Association 14 September
1994. Obtained from author. Unpublished.
[34] Undp, HDR 1994 - New Dimensions of Human Security. Human
Development Report Office (HDRO), United Nations Development
Programme (UNDP), 1994. (Online). Available:
http://EconPapers.repec.org/RePEc:hdr:report:hdr1994.
[35] E. Rothschild, "What is security? the quest for world order," Daedalus,
vol. 124, no. 3, pp. 53-99, June 1995.