<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Where Enterprise Architecture and Early Ontology Engineering Meet: A Case Study in the Public Security Domain</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Archimedes</forename><forename type="middle">A</forename><surname>Detoni</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Federal Institute of Espírito Santo (IFES)</orgName>
								<address>
									<settlement>Santa Teresa</settlement>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gabriel</forename><forename type="middle">M</forename><surname>Miranda</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Laylla</forename><forename type="middle">D C</forename><surname>Renault</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Paulo</forename><forename type="middle">A</forename><surname>Almeida</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Ricardo</forename><forename type="middle">A</forename><surname>Falbo</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Giancarlo</forename><surname>Guizzardi</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Free University of Bozen-Bolzano</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fernanda</forename><forename type="middle">A</forename><surname>Baião</surname></persName>
							<affiliation key="aff3">
								<orgName type="institution">Federal University State of Rio de Janeiro (UNIRIO)</orgName>
								<address>
									<settlement>Rio de Janeiro</settlement>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Renata</forename><surname>Guizzardi</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Conceptual</forename><surname>Modeling</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="laboratory">Research Group (NEMO</orgName>
								<orgName type="institution">Federal University of Espírito Santo (UFES)</orgName>
								<address>
									<settlement>Vitória</settlement>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Where Enterprise Architecture and Early Ontology Engineering Meet: A Case Study in the Public Security Domain</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">19F49CEF0947DA158576C6178261C88D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:35+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Ontology engineering</term>
					<term>requirements elicitation</term>
					<term>purpose identification</term>
					<term>competency questions</term>
					<term>enterprise architecture</term>
					<term>knowledge acquisition</term>
					<term>nonontological resource</term>
					<term>e-government</term>
					<term>public security</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper explores the use of "process-related models" -such as Enterprise Architecture (EA) models -as non-ontological resources (NORs) in the Ontology Engineering (OE) trajectory. These models are commonly available in enterprise repositories in process-rich social domains (e.g., e-Government, finance, software engineering, manufacturing), and serve as valuable sources of consolidated knowledge. We focus on the role of EA models in supporting what we are naming here Early Ontology Engineering, comprising the phases of purpose and scope identification as well as the identification of functional requirements for creating domain ontologies. This is because these models characterize, among other aspects, the organizational context and the business motivations/goals. Therefore, they may facilitate the identification of intended uses/purpose of an ontology to be integrated to the EA, as a means to address goals of the organization stakeholders. We show how this approach is being applied in a real-world e-Government project in the Public Security Domain.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>When an ontology is being developed, it is essential to firstly identify the domain categories and properties that it should represent <ref type="bibr" target="#b0">[1]</ref>. In most OE methods, this is achieved by means of a set of initial tasks usually concerning: (i) purpose and scope identification, which settles why the ontology will be developed and determines its domain of enquiry; and (ii) requirements elicitation, which identifies (functional and non-functional) requirements that the ontology and its implementations should satisfy. Frequently, these tasks determine, among other things, what is relevant to the ontology in the form of the so-called Competency Questions (CQs), as occurs in methods such as NeOn <ref type="bibr" target="#b0">[1]</ref>, Methontology <ref type="bibr" target="#b1">[2]</ref>, UPON <ref type="bibr" target="#b2">[3]</ref>, and SABiO <ref type="bibr" target="#b3">[4]</ref>.</p><p>Given their level of generality, many OE methods often focus on defining what-todo, but lack more prescriptive guidelines for specific tasks (how-to-do). This is particularly true in the case of the aforementioned tasks, which are challenging and complex in at least two aspects <ref type="bibr" target="#b0">[1]</ref> <ref type="bibr" target="#b3">[4]</ref>: (i) they depend on intense collaboration between ontology engineers, domain experts and potential ontology users, wherein the specialized terminology makes communication difficult; (ii) they encompass selection and reuse of the most suitable non-ontological resources (NORs), from an amount of available knowledge resources used by a particular community, and that must have already achieved some consensus level between experts. The reuse of such NORs may lead to a complex re-engineering process, which is called ontologization in <ref type="bibr" target="#b0">[1]</ref>.</p><p>As observed in <ref type="bibr" target="#b0">[1]</ref>[2] <ref type="bibr" target="#b3">[4]</ref>, NORs used for Knowledge Acquisition (KA) during the OE initial phase include classical books, standards, glossaries, lexicons and thesauri, as far as they are available in the context. In addition, many OE methods deal with information or data models/schemas as NORs to be reused.</p><p>We have noticed, however, that none of the investigated approaches have explicitly explored the use of "process-related models" such as Business Process Management (BPM) and EA models as NORs. These models are commonly available in process-rich social domains (e.g., e-Government, finance, software engineering, manufacturing), and may be employed as valuable sources of consolidated knowledge about the domain(s) in which an enterprise operates. They are often kept in enterprise repositories and reflect the result of significant modeling and validation efforts.</p><p>In this paper, we present an approach that employs such type of models as NORs in the OE trajectory. While these models may play a role in KA in general, we focus on their role in supporting the definition of the purpose, scope and functional requirements for an ontology. This is because these models characterize, among other aspects, the organizational context and the business motivations/goals <ref type="bibr" target="#b4">[5]</ref>. Therefore, they facilitate the identification of intended uses/purpose of an ontology to be integrated to the EA, as a means to address goals of the organization stakeholders. Furthermore, such models are typically presented in a graphical notation (e.g., BPMN for business process models, and ArchiMate for EA models), favoring communication between domain experts and ontology engineers about the subject domain to be modeled. We show how this approach is being applied in a real-world e-Government project, where we need to develop a network of ontologies to deal with interoperability problems regarding data from public security Information Systems (ISs).</p><p>The remainder of this paper is structured as follows: Section 2 introduces the concepts to understand our approach, namely OE initial tasks (purpose and scope identification and requirements elicitation) and EA models and their main elements. Section 3 presents the approach, which is illustrated in Section 4. Section 5 discusses related work, and Section 6 presents some final considerations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">EA Models as Non-Ontological Resources</head><p>In several OE methods (e.g., SABiO, NeOn and Methontology), most of the KA occurs during the OE initial phase, i.e., in the phases comprising what we term here Early Ontology Engineering. As shown in Figure <ref type="figure" target="#fig_0">1</ref> (adapted from SABiO method), in order to perform this activity, ontology engineers need the collaboration of ontology users and domain experts, and they should also select and reuse suitable knowledge resources, including the so-called non-ontological resources (NORs) <ref type="bibr" target="#b0">[1]</ref>. In this paper, we consider EA models developed in the diagrammatic language ArchiMate <ref type="bibr" target="#b5">[6]</ref> as NORs. ArchiMate comprises an EA modeling framework and an homonymous EA modeling language <ref type="bibr" target="#b4">[5]</ref>, whose main objective is to promote the integration of the various viewpoints of the organization, promoting communication between stakeholders and analysis of various aspects of the organization.</p><p>The main graphical elements provided by ArchiMate are disposed in three architectural layers: (i) the business layer -which concerns the products and services produced by business processes executed by actors or roles; (ii) the application layerwhich concerns the application software that supports the business layer; and (iii) the technology layer -which concerns infrastructural elements. In this paper, we focus on the elements of the business layer.</p><p>We employ two viewpoints in this layer: a motivation viewpoint and a business process viewpoint. The motivation viewpoint explores elements concerning motivational aspects that capture and justify why the business wants to do something, what it aims to achieve, how it plans to get there. The business process viewpoint captures actors and roles and their assignments to tasks/activities within one or across several business processes. The description of the EA modeling elements used in this paper and their notation in ArchiMate are described in Table <ref type="table">1</ref> (the elements of EA motivation models) and Table <ref type="table" target="#tab_0">2</ref> (the elements of EA business layer). (The descriptions listed in these tables are originated from the ArchiMate specification <ref type="bibr" target="#b5">[6]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1. EA motivation elements description and ArchiMate notation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Description Notation</head><p>Stakeholder -is the role of an individual, team, or organization (or classes thereof) that represents their interests in the outcome of the architecture.</p><p>Driver -represents an external or internal condition that motivates an organization to define its goals and implement the necessary changes to achieve them.</p><p>Assessment -represents the result of an analysis of the state of affairs of the enterprise with respect to some driver.</p><p>Goal -represents a high-level statement of intent, direction, or desired end state for an organization and its stakeholders. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Description Notation</head><p>Business actor -is a business entity that is capable of performing behavior. A business actor may be assigned to one or more business roles. It can then perform the behavior to which these business roles are assigned.</p><p>Business role -is the responsibility for performing specific behavior, to which an actor can be assigned, or the part an actor plays in a particular action or event.</p><p>Business process -represents a sequence of business behaviors that achieves a specific outcome such as a defined set of products or business services.</p><p>Business object -represents a concept used within a particular business domain. Business objects may be accessed (e.g., in the case of information objects, they may be created, read, written) by a business process.</p><p>Representation -represents a perceptible form of the information carried by a business object. A single business object can have a number of different representations. A single representation can realize one or more business objects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Approach using EA models in Early Ontology Engineering</head><p>In this section, we discuss how EA models can be used for guiding the ontology engineers in the identification of: (i) domain experts and potential users of the ontology, (ii) knowledge resources, (iii) ontology purpose aligned with organizational goals, (iv) ontology scope and requirements. Therefore, the approach consists of the activities that should be performed by ontology engineers helping the specification of the expected ontology from the analysis of EA models. Concerning (i), to guide the identification of the domain experts and potential users of the ontology, the ontology engineer should analyze the motivation element stakeholder, and the business elements actor and role in the EA models. This is because the actors and roles represent the entities responsible for performing organizational processes, and stakeholders represent entities interested in the organizational context, both of which can be considered potential domain experts and/or ontology users.</p><p>Concerning (ii), the ontology engineer may identify additional knowledge resources from the analysis of the business elements representation and business object. This is because representations (e.g., documents, messages, models, database or spreadsheet tables) capture the perceptible carriers of information related to business objects, and may correspond to types of NORs proposed for reuse in the literature.</p><p>Once the knowledge resources have been identified, the ontology engineer initiates the identification of the ontology purpose (iii), which consists of exploring the motivation elements driver, assessment and goal. In general, the stakeholders are motivated by external or internal conditions, called drivers. It is common for organizations to undertake an assessment of these drivers, which may reveal weaknesses and threats that affect such drivers. Thus, the stakeholders are often motivated to define organizational goals and implement the necessary changes to achieve them. In this step, the ontology to be developed is considered a prospective artifact to take part in the EA, and as such, should have an intended purpose fit to contribute to the achievement of organizational goals.</p><p>Furthermore, concerning (iv), and following the recommendations of the cited OE methods to elicit the ontology requirements, the ontology engineer should write them in form of CQs. Considering some business elements in the EA models, the ontology engineer can directly identify "process-related" CQs, as explained below:</p><p>-Given that business roles and business actors may represent active entities in charge of executing business processes, a competency question should be elaborated for each specific actor executing a task. These CQs follow the structure: "Which individual playing the &lt;&lt;business role / actor&gt;&gt; is responsible for the occurrences of a particular &lt;&lt;business process&gt;&gt;?" -Given that business roles and business actors also represent active entities impacted by business processes, the following CQs can be structured: "Which individual playing the &lt;&lt;business role / actor&gt;&gt; is impacted by the occurrences of a particular &lt;&lt;business process&gt;&gt;?" -Given that business objects represent information assets accessed by business processes, the CQs that deal with such relation may follow the structure: "Which &lt;&lt;business object&gt;&gt; is accessed by a particular &lt;&lt;business process&gt;&gt;?" -Unlike previous questions, which can be directly inferred from relations among business elements, there may be relevant questions concerning sequences of interrelated business processes. These may require a more complex analysis about: (i) the relations between business roles and/or business actors and different business processes; or (ii) the business objects accessed by a sequence of interlinked business processes. An example of the structure of such kind of CQ is: "Which &lt;&lt;business role&gt;&gt; is affected by a particular &lt;&lt;business process&gt;&gt; as consequence of a previous &lt;&lt;business process&gt;&gt; that triggers the first one?"</p><p>Finally, it is important to notice that the "process-related" CQs produced by this approach should be taken as complementary to those suggested by existing OE approaches, which consider other kinds of NORs.</p><p>The next section explores each of the steps discussed here in the context of a concrete setting of an e-Government interoperability project.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">A Case Study in the Public Security Domain</head><p>According to the Brazilian Health Ministry, between 1996 and 2010 there were almost 1.9 million violent deaths in Brazil, including 710 thousand homicides; and 174 thousand deaths whose basic cause could not be determined by the State. That is, violent death incidents of undetermined cause represent 9.6% of all violent events. In developed countries, this proportion is a residue with less than 1% of all violent cases <ref type="bibr" target="#b7">[8]</ref>. As Cerqueira noted <ref type="bibr" target="#b7">[8]</ref>, the lack of consistent and qualified information on crimes and violent deaths in Brazil is caused in part by deficiencies concerning the sharing and dissemination of information among public administration (PA) agencies. Although these agencies have a large amount of information in their ISs, the various ISs function in isolated silos, failing to support overall decision making.</p><p>These are characteristic problems of e-Government interoperability <ref type="bibr" target="#b6">[7]</ref>, going beyond the security sector to many other areas of the PA. Integration efforts in this setting are challenging mainly because the involved IS are often: (i) commissioned and maintained by different agencies; (ii) designed to address different tasks; and (iii) positioned to support different business processes in isolation.  In order to understand the current process followed by PA agencies to deal with violent crimes, we used the model presented in Figure <ref type="figure" target="#fig_3">3</ref>. It represents the current aspects (a so called as-is model) of the PA agencies involved in the public security sector, by means of: their roles in the violent crime processes, the subprocesses performed by each PA agency, the IS infrastructure that supports these processes and the information flow, and the information artifacts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Available EA models about the Public Security Domain</head><p>The core of the EA model is the "Violent Crime Process" (VCP). The VCP is a complex business process composed by other business processes. These VCP subprocesses are performed by different public agents of the PA agencies as explained in the sequel. Initially, in the "Police Incident Handling" sub-process, the "Military Police"<ref type="foot" target="#foot_1">2</ref> receives a request and performs the necessary procedures, while the "Public Safety Dispatcher" creates a "Crime Description", recording information about the police incident (e.g., possible location, time, victim) in the "Police Report", which is used as part of the "Police Inquest". Next, in order to determine authorship of the alleged crime, the "Civil Police"<ref type="foot" target="#foot_2">3</ref> establishes a "Criminal Investigation" process, which is composed by: (i) a "Police Investigation" to gather "Evidences" (e.g. crime scene, autopsy and death reports) and "Witness Statements" that are attached to the "Police Inquest"; and (ii) a "Preliminary Police Accusation" based on the "Police Inquest", if the details in the "Crime Description" suffice to name "Formal Suspects" for the crime.</p><p>Then, the "Public Prosecutor" analyzes the "Police Inquest" and defines whether to initiate the "Criminal Accusation" process, which starts with the "Indictment", a formal complaint that causes the "Formal Suspect" to become "Indicted". After that, in the "Acceptance of Prosecution" sub-process, the "Judge" analyzes the "Indictment Document" and may accept it, thus starting a "Criminal Trial" in the judicial sphere.</p><p>During the "Criminal Trial", the "Grand Jury" hears the prosecution (as conducted by the "Public Prosecutor") and the defense ("Defendant" lawyer), in addition to witness(es) and victim(s), and then announces the verdict. In case of a guilty verdict, the "Judge" pronounces the "Conviction" imposing a penalty to the "Convicted". Thereafter, the "Imprisonment" process initiates, the guilty party (i.e. the"Prisoner"), has to comply with the sentence.</p><p>The business objects "Crime Description", "Indictment Data", "Verdict Data" and "Imprisonment Data" represent the information accessed (and changed) by business processes and stored in the related physical objects (representations).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Applying our approach in a concrete e-Government interoperability project</head><p>In this section, we apply the approach proposed in section 3 in the context of a realworld e-Government interoperability project. As this section is based in the models presented in section 4.1, the terms "motivation model" and "business model", when used, refer to Figure <ref type="figure" target="#fig_1">2</ref> and Figure <ref type="figure" target="#fig_3">3</ref> respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.1.">Identifying information artifacts</head><p>The first step consists in the identification of the domain experts and the potential users of the ontology. In the public security domain, these entities are the "State Government" and the "Public Administration Agency", depicted in the motivation model. In the business model, these are the "Public Safety Dispatcher", "Police Chief Office", "Public Prosecutor", "Judge" and "Imprisonment Judge".</p><p>Furthermore, other potential sources of domain knowledge can be inferred from the analysis of the business objects and representations in the business model. Thus, by analyzing these models, the following such potential resources were identified: "Police Report", "Evidences", "Witness Statements", "Police Inquest", "Indictment Document", "Verdict Report" and "Imprisonment Report".</p><p>The second step consists in the identification of the ontology purpose. As seen in motivation model, the driver "Quality of Information about Public Security" motivates the stakeholders "State Government" and "Public Administration Agency" to define organizational goals and implement the necessary changes to achieve such goals. However, there are problems (depicted by assessments) that prevent the stakeholders from having quality information about public security. For example, the problem "Low quality in the criminal information impairs the government strategic decision-making", associated with this driver, reveals itself as a threat to the public security domain. Here, the ontology, to be introduced as a new artifact in this architecture, has the purpose of providing a semantic basis to allow the integration of different criminal ISs. This clarifies the intended role of the ontology in the architecture, and can also serve to communicate this to the stakeholders considering their goals and drivers.</p><p>Further, the approach guides the elicitation of ontology requirements in the form of competency question (CQs). From the analysis of the business model, the following information may be extracted:</p><p>-By analyzing the business roles and business actors, we obtain active entities (e.g., "Public Safety Dispatcher", "Police Chief Officer", "Public Prosecutor") in charge of realizing some business process (e.g., "Police Incident Handling", "Police Investigation", "Indictment"). These elements allow formulating CQs, such as "Which individual playing the role of "Police Chief Officer" is responsible for conducting a particular "Police Investigation"?" or, also, "Which individual playing the role of "Public Prosecutor" is responsible for conducting a particular "Indictment"?" -By analyzing the business roles and business actors, we also obtain active entities (e.g., "Formal Suspect", "Convicted", "Prisoner") affected by some business process (e.g., "Preliminary Police Accusation", "Conviction", "Imprisonment"). These elements allow formulating CQs, such as "Which individual playing the "Formal Suspect" role is impacted by the occurrences of a particular "Preliminary Police Accusation"?" or, also, "Which individual playing the role of "Convicted" is impacted by the occurrences of a particular "Conviction"?" -By analyzing the business objects (e.g., "Crime Description", "Alleged Victim Description", Imprisonment Data") that are accessed by business process (e.g., "Police Investigation", "Indictment", "Imprisonment") we can formulate CQs, such as "Which "Alleged Victim Description" is accessed by a particular "Police Investigation"?" or, also, "Which "Imprisonment Data" are accessed by a particular "Imprisonment"?" In addition, we identify CQs that transcend business processes performed by different public agencies. For instance: "Which police investigations conducted by a police chief officer led to the effective conviction of the formal suspects?" In this case, we need to understand which are the business roles involved in a police investigation and in a conviction, and how they relate to one another. Beyond extracting the business roles involved in business processes, we analyze the relation between business roles and business processes. For example, the information regarding a possible formal suspect is carried by the business object "Alleged Participant Description" (part of the "Crime Description" and created in "Police Investigation"), and the "Conviction" process accesses this information through the "Verdict Data" (which aggregates the "Indictment Data" and consequently the "Crime Description"). Therefore, if the "Conviction" and the "Police Investigation" share the same information about a suspect, this brings about additional evidences that the "Convicted" and the "Formal Suspect" in a specific crime are the same individual, thus providing a more effective semantic support for deciding that this "Police Investigation" led to an effective "Conviction".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.2.">Criminal Investigation Domain Ontology</head><p>In order to exemplify how these identified CQs support the development of domain ontologies, we present a fragment of the VCP domain ontology, represented in the OntoUML language <ref type="bibr" target="#b8">[9]</ref>, concerning "Criminal Investigation" (which encompasses the subprocesses of "Police Investigation" and "Preliminary Police Accusation"). This fragment was built using the following CQs: The two relations, namely the historical dependence relation between "Preliminary Police Accusation" and "Police Investigation" and the generalization relation between "Formal Suspect" and "Preliminary Police Suspect", capture two important notions: the former captures the idea that a "Police Investigation" is required for a "Preliminary Police Accusation" to exist; the latter that the "Formal Suspect" must be a "Preliminary Police Suspect" in the scope of a "Police Investigation". We have observed that similar patterns are manifested throughout the whole VCP process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Related Work</head><p>As previously mentioned, many of the OE methods include the use of CQs to identify requirements. A brief description of some methodologies and their support to CQs definitions is presented in <ref type="bibr" target="#b9">[10]</ref>, pointing out that most of those methods presuppose the existence of this set of questions (not focusing on specifying how to formulate them) and concentrate their efforts in defining the next stages of ontology development. Despite the importance of eliciting ontology requirements within the field of OE, the existing methodologies make little use of elicitation and modeling techniques <ref type="bibr" target="#b9">[10]</ref>. In order to fill this gap between the definition of CQs and the ontology modeling per se, we rely here on the use of EA models.</p><p>The approach presented in <ref type="bibr" target="#b9">[10]</ref> is the closest to the one presented here that we found. The authors in <ref type="bibr" target="#b9">[10]</ref> proposed an OE approach with three main objectives: (i) defining the ontology scope; (ii) deciding the ontology"s applicability; and (iii) specifying what questions the ontology must answer. To achieve these objectives they applied Tropos <ref type="bibr" target="#b10">[11]</ref> as the goal modeling methodology. The first activity of that approach is to develop early requirements, which permits to understand the organizational setting as it is. The output of this activity is an organizational model, which includes relevant actors, their goals and interdependencies. This model provides a context for the definition of the ontology scope, helping to identify ontology"s applicability. In late requirements activity of Tropos, the system is modeled as an actor that is dependent of other actors in the organization. These dependencies define the functional and nonfunctional requirements of the system. Such requirements detail what kind of support a system (in our case, an ontology-based system) should provide. Similar to our proposal, they concentrated their efforts in defining the first stage of ontology development. Differently from them, our work is not only based on analysis of the goals depicted in motivation models, but also on the process models. We argue that, using EA process models, it is possible to analyze other organizational elements that impact the ontology specification. We did not find studies that explicitly propose the use of EA models as knowledge resource to support ontology development.</p><p>Concerning requirements elicitation, a systematic review reported in <ref type="bibr" target="#b11">[12]</ref> has shown that are many proposals using EA models, but all of these concern requirements for software development. The review focused in the requirements extraction from business process models represented in the BPMN notation. In this context, one study that we consider relevant is proposed in <ref type="bibr" target="#b12">[13]</ref>. They propose acquiring requirements for software intensive systems according to the business objectives and base lining business processes. The approach consists of the following activities: (i) concepts exploration and orientation; (ii) analysis and modeling of current business processes; (iii) modeling of target business processes; and (iv) requirements generation for the target system. Although they do not focus on ontology development, there are similarities with our work. First, they use the models to understand the current business processes with their business flows, inputs, outputs, and responsible bodies. They also proposed guidelines to get knowledge about the domain using the BPM model, closer to our proposal. Considering the process of requirements elicitation, we focused on the semantics of the elements of EA models and their relations. In contrast, they explain that functional requirements of the target system were elicited by analyzing the business processes, but they do not show how these requirements can be explicitly identified. An advantage of our proposal is focusing on how to do the requirements identification by detailing guidelines of using EA model elements in this activity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>This paper presents an approach for Early Ontology Engineering, in particular for KA support process. We do that by (re)using EA models as a suitable process-based NOR in process-rich social domains. These EA models provide not only a mechanism to systematically structure knowledge about the subject domain, but also provide resources to analyze and understand the organizational elements from different viewpoints.</p><p>The proposed approach uses the knowledge assets contained in the (pre-existing) EA models (diagrammatic models about institutional processes, structure, information technology architecture and business motivational aspects) as inputs to Early Ontology Engineering activities in way that: (i) helps ontology engineers to comprehend the overall subject domain; (ii) makes their communication with the domain experts easier and clearer; and (iii) provides guidelines to identify the purpose and scope of domain ontologies as well as to elicit their requirements.</p><p>This approach proposes to reuse EA models in enterprise contexts where they are readily available. In cases that these models do not yet exist, the development of new EA models for organizations has become a common practice. In such cases, the EA modeling stage can be a beneficial activity for developing structured knowledge assets in (and about) the organization, enhancing its own EA.</p><p>In addition to these aspects, we have also perceived other benefits exploring the use of EA models as NORs in other stages of the ontology development process, which are not explained in this paper for the sake of space. For example: (i) by analyzing application layer elements (e.g., application services, application components and data objects) and technology layer elements (e.g., technology nodes, artifacts, services and softwares), it is possible to point to other useful NORs that can be used to support the identification of concepts and relations for the ontology, and to provide data for the instantiation and evaluation of the ontologies produced; and (ii) by analyzing how the underlying application layer elements support the various business processes, ontology engineers can identify IS interoperability gaps, e.g., observing that the relations between business processes do not have correspondent relations between the application layer elements that support such processes. From this finding, the ontology engineers design an ontology that addresses this issue.</p><p>In future work, we intend to investigate: (i) how EA models may support identifying non-functional requirements, e.g. desirable computational properties in order to implement an operational ontology; (ii) the role of reference ontology models to improve EA, i.e., how a developed ontology introduced as an new artifact in the organizational architecture can improve such architecture, providing a precise semantics to domain concepts, thus contributing to achieve the organizational goals.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Knowledge acquisition support process using NORs in OE initial phase (adapted from [4])</figDesc><graphic coords="3,197.60,178.95,217.97,127.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2</head><label>2</label><figDesc>Figure 2 presents an EA motivation model that depicts the current scenario of the public security domain addressed in this work. By analyzing this model, one can observe that interoperability is a key element to improve an existing Criminal IS and to allow the cooperation and exchange of information among PA agencies.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. EA Motivation model about the public security domain.</figDesc><graphic coords="6,177.30,225.44,240.69,149.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. EA Processes Model about violent crime process (VCP)</figDesc><graphic coords="7,121.90,194.45,351.49,224.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. Fragment of the Criminal Investigation Domain Ontology</figDesc><graphic coords="10,122.00,155.95,351.33,152.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2 .</head><label>2</label><figDesc>EA business elements description and ArchiMate notation</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Corresponding Author, Archimedes A. Detoni, NEMO -Informatics Department, Federal University of Espírito Santo, Av. Fernando Ferrari, 514, Vitória -ES, Brazil; E-mail: archimedes@ifes.edu.br.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">The Military Police is the state police charged with maintaining order. It patrols the streets and imprisons suspects of criminal activity. It is a "militarized" institution (gendarmerie).</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">The Civil Police is the state police with criminal law enforcement duties. It investigates crimes committed in violation of Brazilian criminal law. It does not patrol the streets.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>This research is partly funded by FAPES (69382549), CNPq (grants number 311313/2014-0, 461777/2014-2 and 407235/2017-5), CAPES (23038.028816/2016-41), as well as the Free University of Bozen-Bolzano (OCEAN Project).</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In Figure <ref type="figure">4</ref>, the "Police Investigation" is a relator (roughly, an objectified relational context) connecting the "Investigator" (the role played by a "Police Chief Officer" when performing an investigation) to the "Preliminary Police Suspects" (the role played by a "Person" being investigated). The "Police Investigation" is characterized by an investigation content, which refers to a "Crime Description". This description grounds the indication of some participant as "Preliminary Police Suspect", justifying the relation "refers to" holding between an "Alleged Participant Description" and a "Preliminary Police Suspect".</p><p>A "Preliminary Police Accusation" is based on a "Police Investigation" (hence the historical dependence relation <ref type="bibr" target="#b8">[9]</ref>). The "Preliminary Police Accusation" mediates the "Accuser" and the "Formal Suspect" (specialization of the "Preliminary Police Suspect"). A "Preliminary Police Accusation", similarly to a "Police Investigation", is characterized by some content, which is captured by the notion of "Crime Description".</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Ontology engineering in a networked world</title>
		<editor>M.C. Suárez-Figueroa, A. Gómez-Pérez, E. Motta, A. Gangemi</editor>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Springer Science &amp; Business Media</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Methontology: from ontological art towards ontological engineering</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fernández-López</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">&amp;</forename><forename type="middle">N</forename><surname>Juristo</surname></persName>
		</author>
		<idno>SS-97-06</idno>
	</analytic>
	<monogr>
		<title level="j">AAAI</title>
		<imprint>
			<biblScope unit="page" from="33" to="40" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A proposal for a unified process for ontology building: UPON</title>
		<author>
			<persName><forename type="first">A</forename><surname>De Nicola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Missikoff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Navigli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int. Conf. on Database and Expert Systems Applications</title>
				<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="655" to="664" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">SABiO: Systematic Approach for Building Ontologies</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Falbo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ONTO. COM/ODISE@ FOIS</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Enterprise architecture at work: Modelling, communication and analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lankhorst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Enterprise Engineering Series</title>
				<meeting><address><addrLine>Germany, Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009. 2009</date>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m">The Open Group, ArchiMate 3.0 specification</title>
				<meeting><address><addrLine>United Kingdom</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">E-government integration and interoperability: framing the research agenda</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Scholl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">&amp;</forename><forename type="middle">R</forename><surname>Klischewski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Public Administration</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">8-9</biblScope>
			<biblScope unit="page" from="889" to="920" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Cerqueira</surname></persName>
		</author>
		<title level="m">Map of hidden homicides in Brazil (</title>
				<meeting><address><addrLine>Rio de Janeiro, Brazil</addrLine></address></meeting>
		<imprint>
			<publisher>IPEA</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>Text for Discussion, 1848</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Ontological foundations for structural conceptual models</title>
		<author>
			<persName><forename type="first">G</forename><surname>Guizzardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fundamental Research Series</title>
				<meeting><address><addrLine>Netherlands</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
		<respStmt>
			<orgName>Centre for Telematics and Information Technology</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Using goal modeling to capture competency questions in ontology-based systems</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">C B</forename><surname>Fernandes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S S</forename><surname>Guizzardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Guizzardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Inf. and Data Management</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="527" to="540" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Tropos: An agent-oriented software development methodology</title>
		<author>
			<persName><forename type="first">P</forename><surname>Bresciani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Autonomous Agents and Multi-Agent Systems</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="203" to="236" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Requirements Elicitation from Business Process Model in BPMN: A Systematic Review</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Bitencourt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Paiva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Cagnin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era-Volume 1</title>
				<meeting>the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era-Volume 1</meeting>
		<imprint>
			<publisher>Brazilian Computer Society</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Utilizing Business Process Models for Requirements Elicitation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Demirörs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ç</forename><surname>Gencel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">&amp;</forename><forename type="middle">A</forename><surname>Tarhan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EUROMICRO</title>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
