<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Configuring Value Networks based on Subjective Business Values</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Jefferson</forename><surname>Da</surname></persName>
							<email>sreis.jefferson@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Silva</forename><surname>Reis</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universidade Federal Rural do Semi-Árido</orgName>
								<address>
									<settlement>Rio Grande do Norte</settlement>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Programa de Pós-Graduação em Ciência da Computação</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Patrício</forename><surname>De Alencar</surname></persName>
							<email>patricio.alencar@ufersa.edu.br</email>
							<affiliation key="aff0">
								<orgName type="institution">Universidade Federal Rural do Semi-Árido</orgName>
								<address>
									<settlement>Rio Grande do Norte</settlement>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Programa de Pós-Graduação em Ciência da Computação</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Faiza</forename><forename type="middle">Allah</forename><surname>Bukhsh</surname></persName>
							<email>f.a.bukhsh@utwente.nl</email>
							<affiliation key="aff2">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Twente</orgName>
								<address>
									<postCode>7500 AE</postCode>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Angélica</forename><surname>Félix De Castro</surname></persName>
							<email>angelica@ufersa.edu.br</email>
							<affiliation key="aff0">
								<orgName type="institution">Universidade Federal Rural do Semi-Árido</orgName>
								<address>
									<settlement>Rio Grande do Norte</settlement>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Programa de Pós-Graduação em Ciência da Computação</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Configuring Value Networks based on Subjective Business Values</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">1B54C05DF3C9569FFF758D3C353523C4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Ontology</term>
					<term>Subjective Values</term>
					<term>Value Networks</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Monetary profitability is an objective value essential to the sustainability of a value network. The analysis of this requirement continues to receive substantial attention by the e 3 value research community thus far. However, subjective values such as privacy, security and trust might also play a key role on the configuration of a value network, especially when it is necessary to differentiate equivalent monetary value propositions. This paper describes an ontological proposition for configuring value networks based on subjective values. The ontology is aimed to be used as complement of the e 3 value framework, blending concepts of Multiple Agency Theory, Enterprise Ontology, Value Modeling and Speech Acts Theory. We demonstrate our approach on a case scenario based on the Directive 2009/72/EC, which defines common rules for the liberalization of the European market of energy.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>A value network has been initially referred to as a group of enterprises exchanging objects of economic value to satisfy the needs of a market of consumers <ref type="bibr" target="#b12">[13]</ref>. Aiming to define formally how business actors could collaborate within a value network, Gordijn and Akkermans proposed the e 3 value framework to support the modeling and profitability analysis of value networks. The fundamental principle grounding the e 3 value ontology seems to be the one of "economic reciprocity", which governs how business actors sacrifice objects of economic value to obtain other ones (of equivalent value) in return. There, the difference between sacrifice and benefit is measured, as objectively as possible, as monetary profit. It is reasonable that reaching goals stated for this objective value is necessary to the economic sustainability of a value network, but not sufficient for a consumer to declare that his business need(s) will be fully satisfied with such a measure of value <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b17">18]</ref>. For this case, subjective values such as assurance, privacy and trust might come into play for a consumer not only to differentiate between equivalent monetary value propositions, but also acquire products and services the valuation of which would depend on previous experience, such as products bought online or innovative services (e.g. smart metering and medical nanotechnology).</p><p>Adopting a Design Science perspective on research <ref type="bibr" target="#b18">[19]</ref>, the research question addressed in this paper is how a value network could be configured based on subjective values. From an organizational perspective <ref type="bibr" target="#b5">[6]</ref>, this question is initially threefold: What subjective values could be considered as important or even essential for consumers in a value network? How to measure these subjective values? How these values might be related to the satisfaction of a certain consumers' business need?</p><p>To start addressing these questions from an Information Systems perspective, we propose an ontology for configuration of value networks based on subjective values. The ontology was formalized in Web Ontology Language (OWL-DL), supplemented by a set of rules defined in Semantic Web Rule Language (SWRL) <ref type="bibr" target="#b10">[11]</ref>, and blends concepts of the e 3 value ontology <ref type="bibr" target="#b9">[10]</ref>, Enterprise Ontology <ref type="bibr" target="#b6">[7]</ref>, Speech Acts <ref type="bibr" target="#b14">[15]</ref> and Value Monitoring Ontology <ref type="bibr" target="#b2">[3]</ref>.</p><p>The rest of this paper is organized as follows. In Section 2, we describe a case scenario that motivated our conceptual analysis of the role of subjective values on the configuration of value networks. In Section 3, we describe an ontology for modeling and analysis of what can be named thus far as qualitative value networks. In Section 4, we return to the motivating scenario to demonstrate the modeling utility of the ontology on a case scenario depicted as a value network of Smart Metering services. In Section 5, we provide theoretical conclusions, threats to validity and future steps of this research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Observational Case Study</head><p>The case scenario presented in this section is a projection on future markets of liberalized Energy services in Europe, normalized by the Directive 2009/72/EC of the European Union <ref type="bibr" target="#b16">[17]</ref>, and described in earlier research by Silva et al. <ref type="bibr" target="#b1">[2]</ref>. In this scenario, householders will have the option to choose not only among energy providers, but also smart metering companies that suit their needs the best. As depicted in Fig. <ref type="figure" target="#fig_0">1</ref>, the case scenario was shaped as an e 3 value model. The final consumer playing the Agency role of a principal is a householder represented by a market segment of Balance Responsible Parties (BRP). EU reports have revealed that one of the main issues on the adoption of smart metering solutions by the European population concerns privacy, that is, energy consumption information might be explored opportunistically <ref type="bibr" target="#b0">[1]</ref>. Hence, householders might consider peer assessment and evaluation of the privacy provided by such an innovative service before entering into an agreement with a metering operator. This is therefore a special business case where it is not only the monetary price of the technology that matters, but also the intangible value to be experienced by the final consumer.</p><p>A BRP is motivated by the opportunity of balancing energy consumption, or even selling unused energy through demand-response of the smart meters. Thus, a BRP has the option to create value from smart metering assets provided as core business objects by a market segment of Metering Operators. A householder might obtain metering accounting or auditing reports from three value paths. In the first option, the householder could possess a metering asset provided by a Metering Operator, once granted with a Metering Responsible Party (MRP) accreditation by the Transmission System Operator (TSO). In exchange, the householder allows the TSO to have access to private verifiable information of energy consumption through an Open (virtual) Monitoring Channel. This is necessary for monitoring and control of the overall state of imbalance reduction of the network by the TSO. In the second option, the householder could delegate the energy metering activity to the peers from which the energy is bought, e.g. aggregators or Distributed Energy Resources (e.g. wind turbine owners), both allowed by law to operate with MRP accreditations. The analysis of qualitative values relevant for the assessment of these options is demonstrated in Section 4. 3 Semantic Value Network Ontology</p><p>The ontology was formalized in OWL and complemented with SWRL rules to allow semi-automatic configuration of qualitative value networks. However, the scope of this paper is limited to the demonstration of the relevance of subjective values on the configuration of a value network.</p><p>A business need is owned by a principal consumer (actor or market segment) and is the starting point of configuration of a qualitative value network. A policy may assume five organizational arrangements (or patterns) that represent different configurations whereby a business need could be satisfied. The conceptual foundation of these patterns is described in detail by Silva et al. <ref type="bibr" target="#b1">[2]</ref> and formalized in OWL in the ontology depicted parsimoniously in Fig. <ref type="figure" target="#fig_1">2</ref>. Following the organization of the value network model, the value indicators allow for analysis of the subjective values assigned to products and services offered as value propositions to the final consumer. The value indicators not only qualify the economic effectiveness of a value proposition meeting a business need, but also the economic efficiency of a policy arrangement. Yet, value indicators do not replace the profitability analysis supported by the e 3 value framework, but adds an extra layer of information to refine the selection of value propositions by the consumer. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Business need</head><p>In e 3 value, the notion of a business need is reified as a value object desired by the consumer. Here, this notion is extended by separating the identity of a core business object (i.e. a product or service category) from its value, which can be objective (e.g. quantity, quality, time and location) or subjective (e.g. privacy, reliability or trust). In e 3 value, a core business object meets a consumer's need when its investment is lower than its sacrifice, which is measured by quantifying the monetary resources paid in exchange for the core product or service provided by the network.</p><p>From our best knowledge, objective values such as quality, time and location are not taken into consideration in an e 3 value profitability analysis. Despite the importance of these values, we take the e 3 value quantitative approach as sufficient for objective valuation of core business objects and move our discussion into the role of subjective values on classifying value propositions of equivalent objective values. Accordingly, a business need is demanded by a consumer acting as an Agency principal of the network, and is satisfied not only by a core business value object, but also by the value indicator assigned to this object. There are two subclasses of value indicator: objective value and subjective value. Different from objective values, subjective values are perceptual, and the assessment of which involves at least two Agency parties and depends on individual experience. The difference between the perception of two Agency parties on the same value assigned to a value object is a measured value, which has three value partitions: value surplus, value balance and value shortage <ref type="bibr" target="#b15">[16]</ref>. The logic underpinning subjective value measurement is detailed further in this section. Moreover, the principal has also a business rationale, e.g. a business weakness, threat or opportunity (the only rationale treated in this paper). A business need is represented as a defined class in the ontology, as depicted in Fig. <ref type="figure" target="#fig_2">3</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Policy</head><p>A policy is defined here as an organizational pattern of actors, activities and objects connected by speech acts and inspired by the NIST metamodel of Role-Based Access Control (RBAC) <ref type="bibr" target="#b7">[8]</ref>. Preventive monitoring is intrinsic to Multiple Agency, and the ontology formalizes five Agency monitoring patterns for value networks, described in detail in Silva et al. <ref type="bibr" target="#b1">[2]</ref>. The patterns are named as single, double-check, chokepoint, committee and gossip, and comprise different strategies whereby the principal might evaluate products and services offered by the network. The pattern described in detail here is the committee pattern, due to its completeness on covering the case scenario. The ontology defines four actor roles (i.e. principal, third-party, regulator and agent), four value activity roles (i.e. front-end, back-end, resource and regulatory) and four value object roles (i.e. core business, proof-of-performance, certification or accreditation and counterobject). Actor roles are connected to activity roles by relationships of authority, competence and responsibility, inspired by the Enterprise Ontology <ref type="bibr" target="#b6">[7]</ref>. Activities roles are connected to object roles by speech acts, (some of them adapted by Enterprise Ontology as production acts) such as produce, consume, grant, transfer, bundle and distribute. The formalization of the committee pattern is depicted in Fig. <ref type="figure" target="#fig_3">4</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Value indicators</head><p>Subjective values are normally used by consumers when evaluating a product or service before acquisition. Without experience on the use of the product or service, it is also common that consumers consider other peers' evaluation on subjective values of the desired commodity. Such a practice is not recent, and therefore should not be exclusively associated with the current trend of e-Commerce solutions. However, subjective values are shaped not only by individual and private productive acts of experience, but also by social communication, which is closely related to the reputation of a commodity and its respective provider. From a Speech Acts perspective, it is possible to argue that subjective values might assume different roles, depending on who is making a (subjective) value proposition to whom.</p><p>Taking this perspective into a value network organized with Multiple Agency roles, the final consumer acting as a principal receives value propositions of core business objects produced by back-end activities of competence of third-parties, and transformed (i.e. bundled, distributed, granted or transferred) into valueadded commodities by agents and regulatory parties. Considering that suppliers acting as third-parties are prone to communicate biased evaluations on their own products or services, it is assumed here that their evaluation on corresponding products or services shall not be fully taken into consideration by a rational consumer. Thence, the social construction of a business value in this case will involve the consumer acting as a principal, agents and regulators.</p><p>For the principal, what is relevant is the expectation of value to be created using the product or service produced by third-parties. In this sense, the principal initially predicts his expected value for the commodity to be acquired. Nonetheless, for the agent and regulators, whose evaluation will be considered by the principal on acquiring the commodity, and who somehow experienced or sensed the value of the commodity, the subjective value will have the role of perceived value. While a regulator testifies his perceived value of the commodity by verification or witnessing, an agent reports own perception on the same commodity through business transformation. The description logics definition for subjective value and corresponding value scales (or partitions) are depicted in Fig. <ref type="figure" target="#fig_4">5</ref>-a and Fig. <ref type="figure" target="#fig_4">5</ref>-b, respectively. The SWRL rules for assignment of expected and perceived values are summarized in Table <ref type="table" target="#tab_0">1</ref>.  Subjective value is a class defined as an enumerated set of partitions adapted from the SERVQUAL model to express measures for expected value or perceived value, as depicted in Fig. <ref type="figure" target="#fig_4">5-b</ref>. Accordingly, the value partitions comprise: ideal value, forecasted value, equitable value, deserved value and minimum tolerable value <ref type="bibr" target="#b13">[14]</ref>. The difference between expected value (predicted by the principal) and perceived value (testified by at least one regulator and reported by at least one agent) is assessed qualitatively as measured value. The logic underpinning the qualitative assessment is formalized in SWRL rules summarized in Table <ref type="table" target="#tab_1">2</ref>. As smart metering assets are becoming more intelligent and innovative, the acceptance of this technology by European householders shall depend, among many other factors not covered in this paper, on progressive peer evaluation of subjective values such as privacy to be created using this technology. This evaluation can be supported by e-Government channels providing transparent accounting of infrastructure services to the population <ref type="bibr" target="#b3">[4]</ref>.</p><p>Hence, to decide which metering operator to choose, a householder might take into consideration some evaluation provided by agents that used the technology. After declaring a business need of a smart metering service and predicting a subjective value to be created by its use, a householder has the option to select one among many policies whereby the desired commodity could be acquired. The Agency monitoring patterns proposed by Silva et al. <ref type="bibr" target="#b1">[2]</ref> can be used for this purpose. For brevity, our demonstration will be resumed to the committee pattern.</p><p>Once the policy pattern is selected, the next step is to evaluate its internal subjective value propositions for the smart metering asset as a core business object. In this case scenario, the BRP's business need could be satisfied by the metering asset prospected to offer the best level of privacy, as a subjective value of relevance. This prospection has been referred in this paper as measured value, which is defined by the difference between the principal's expected value of the core business object and the agents perceived value of the same object, based on previous experience or use. Let it be supposed that:</p><p>(1) the market segment of Metering Operators acting as third-parties has three individuals for analysis; (2) the BRP predicts an expected value for the metering asset as equitable;</p><p>(3) the MRP-Aggregator reports a perceived value as forecasted ; and (4) some MRP-DER reports a perceived value as equitable;</p><p>Then, the rules for definition of the measured value taking the BRP's perspective as dominant apply as summarized in Table <ref type="table" target="#tab_2">3</ref>. Accordingly, it is possible to notice that the metering asset provided by the Metering Operator 1 is prospected to generate value surplus as a measured value on the BRP's side. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions and Future Research</head><p>In this paper, we have addressed the research question of how a value network could be configured based on subjective values. We recognize that meeting a consumers' need with value objects exchanged by a reciprocate monetary price is necessary, but insufficient to state that the need will be fulfilled. The ontology proposed here defines a business need as a composition of a desired value object (i.e. a product or service category) and its value components (i.e. objective or subjective values). For objective value assessment, we recommend the use of the e 3 value mechanism of profitability analysis to verify the objective values of quantity and quality (e.g. monetary price) assigned to value propositions. For subjective value assessment, we assume that values such as privacy, security and trust are perceptual and dependent on social communication. Accordingly, the ontology includes five Agency monitoring patterns of Silva et al. <ref type="bibr" target="#b1">[2]</ref> to indicate the provenance of the value propositions that will possibly satisfy a consumer's business need. For simplicity, only one pattern is demonstrated in this paper. Moreover, the ontology is complemented by a set of SWRL rules to support semi-automated classification and selection of value propositions based on the need of value surplus on the consumer's side. Gómez-Pérez <ref type="bibr" target="#b8">[9]</ref> proposes a framework for ontology evaluation, which comprises three phases: (1) verification of correctness, consistency and completeness;</p><p>(2) validation via theoretical demonstration, prototyping or case study applica-tion; and (3) evaluation of community acceptance, modeling utility and usability. The correctness and consistency of the ontology has been checked by using OWL2 and a SRWL plugin for Protégé <ref type="bibr" target="#b11">[12]</ref>. Completeness has been verified according to an Ontology Requirements Specification Document (ORSD) not described in this paper. For validation, we have been using observational case studies in digital music clearance <ref type="bibr" target="#b9">[10]</ref>, energy imbalance reduction <ref type="bibr" target="#b2">[3]</ref>, and customs control <ref type="bibr" target="#b4">[5]</ref> for research problem exploration and technology evaluation. Thus far, the ontology has not yet been applied in interventional case studies or submitted to users' evaluation and surveying, which comprise the current threats to validity of this research.</p><p>For future work, this research will follow three directions. First, a more precise characterization of subjective business values demands philosophical grounding. Business values should not be misinterpreted as soft goals (as defined in Requirements Engineering) or Non-Functional Requirements (NFR) analysis. It is necessary to investigate the role of subjective value analysis for the overall sustainability of value networks. Second, it is necessary to design a mechanism for integrity check of transactions that compose a value network, also taking subjective values into consideration. For a while, our analysis is driven by a Service Dominant Logic, focused on a single consumer's business need. However, it is relevant to resolve two or more business needs covered by a same value network. Third, the logic of qualitative assessment proposed here will be revisited based on related research in gossip algorithms and evaluation of products and services provided by e-Commerce platforms.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Case scenario of a smart metering value network extracted from Silva et al. [2]</figDesc><graphic coords="3,147.41,290.37,320.54,223.78" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. SVNO full viewpoint</figDesc><graphic coords="4,134.77,454.44,349.39,61.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Description logic representation of the class business need</figDesc><graphic coords="5,210.18,353.23,195.00,104.81" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Description logic definition of the committee monitoring pattern</figDesc><graphic coords="6,136.00,197.57,343.36,118.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. a) Description logic definition of subjective value; b) subjective value partition</figDesc><graphic coords="7,144.87,232.13,325.62,100.98" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>SWRL rules for assignment of expected value and perceived value</figDesc><table><row><cell>Agency-role value viewpoint</cell><cell>SWRL rule for value assignment</cell></row><row><cell></cell><cell>svn:Principal(?p)ˆsvn:hasSubjectiveValue(?p,?s)ŝ</cell></row><row><cell>Value expected by</cell><cell>vn:SubjectiveValue(?s)ˆsvn:predicts(?p,?svp)ŝ</cell></row><row><cell>the principal</cell><cell>vn:SubjectiveValuePartition(?svp)</cell></row><row><cell></cell><cell>→ svn:hasExpectedValue(?s,?svp)</cell></row><row><cell></cell><cell>svn:Agent(?p)ˆsvn:hasSubjectiveValue(?p,?s)ŝ</cell></row><row><cell>Value perceived by the agent</cell><cell>vn:SubjectiveValue(?s)ŝ vn:testifies/reports(?p,?svp)ŝ vn:SubjectiveValuePartition(?svp)</cell></row><row><cell></cell><cell>→ svn:hasPerceivedValue(?s, ?svp)</cell></row><row><cell></cell><cell>svn:Regulator(?p)ˆsvn:hasSubjectiveValue(?p,?s)</cell><cell>ŝvn:SubjectiveValue(?s)ŝ</cell></row><row><cell>Value perceived by the Regulator</cell><cell cols="2">vn:testifies/reports(?p, ?svp)ŝ vn:SubjectiveValuePartition(?svp)</cell></row><row><cell></cell><cell>→ svn:hasPerceivedValue(?s, ?svp)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>SWRL rules for assignment of measured valueWe now return to the case scenario introduced in Section 2. The problem of this case is how a householder could analyze value propositions of smart metering services based on qualitative values that this technology might return. Earlier research conducted by the European Commission has uncovered privacy as a key value expected by the European population to be offered by smart metering operators.</figDesc><table><row><cell>Partition of measured value</cell><cell>SWRL rule for measured value assignment</cell></row><row><cell></cell><cell>svn:Principal(?p)ˆsvn:demands(?p, ?bn)ŝ</cell></row><row><cell></cell><cell>vn:BusinessNeed(?bn)ŝ</cell></row><row><cell>Value surplus</cell><cell>vn:hasSubjectiveValue(?p, ?sv)ŝ vn:hasExpectedValue(?sv, svn:EquitableValue)ŝ</cell></row><row><cell></cell><cell>vn:hasPerceivedValue(?sv, svn:IdealValue)</cell></row><row><cell></cell><cell>svn:Principal(?p)ˆsvn:demands(?p, ?bn)ŝ</cell></row><row><cell></cell><cell>vn:BusinessNeed(?bn)ŝ</cell></row><row><cell>Value shortage</cell><cell>vn:hasSubjectiveValue(?p, ?sv)ŝ vn:hasExpectedValue(?sv, svn:EquitableValue)ŝ</cell></row><row><cell></cell><cell>vn:hasPerceivedValue(?sv, svn:DeservedValue)</cell></row><row><cell></cell><cell>→ svn:hasMeasuredValue(?bn, svn:shortage)</cell></row><row><cell cols="2">4 Demonstration: A Case Scenario in Smart Metering</cell></row></table><note>→ svn:hasMeasuredValue(?bn, svn:Surplus) Value balance svn:Principal(?p)ˆsvn:demands(?p, ?bn)ŝ vn:BusinessNeed(?bn)ŝ vn:hasSubjectiveValue(?p, ?sv)ŝ vn:hasExpectedValue(?sv, svn:EquitableValue)ŝ vn:hasPerceivedValue(?sv, svn:EquitableValue) → svn:hasMeasuredValue(?bn, svn:balance)</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3 .</head><label>3</label><figDesc>Qualitative value prediction of Metering Operator's service based on evaluation provided by delegated agents</figDesc><table><row><cell>Third-</cell><cell></cell><cell></cell></row><row><cell>Party</cell><cell>Agent</cell><cell>Agent</cell></row><row><cell>(Metering</cell><cell>(MRP-DER)</cell><cell>(MRP-Aggregator)</cell></row><row><cell>Operator)</cell><cell></cell><cell></cell></row><row><cell></cell><cell>svn:hasSubjectiveValue</cell><cell>svn:hasSubjectiveValue</cell></row><row><cell></cell><cell>(svn:BRP, svn:Privacy)ŝ</cell><cell>(svn:BRP, svn:Privacy)ŝ</cell></row><row><cell></cell><cell>vn:hasExpectedValue</cell><cell>vn:hasExpectedValue</cell></row><row><cell></cell><cell>(svn:Privacy,</cell><cell>(svn:Privacy,</cell></row><row><cell>Metering</cell><cell>svn:EquitableValue)ŝ</cell><cell>svn:EquitableValue)ŝ</cell></row><row><cell>Operator</cell><cell>vn:hasPerceivedValue</cell><cell>vn:hasPerceivedValue</cell></row><row><cell>1</cell><cell>(svn:Privacy,</cell><cell>(svn:Privacy,</cell></row><row><cell></cell><cell>svn:ForecastedValue)</cell><cell>svn:IdealValue)</cell></row><row><cell></cell><cell>→ svn:hasMeasuredValue</cell><cell>→ svn:hasMeasuredValue</cell></row><row><cell></cell><cell>(svn:SmartMetering,</cell><cell>(svn:SmartMetering,</cell></row><row><cell></cell><cell>svn:Surplus)</cell><cell>svn:Surplus)</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m">European commission: Country fiches for electricity smart metering (</title>
				<meeting><address><addrLine>brussels</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014-06-17">2014. 17 june (2014</date>
			<biblScope unit="volume">188</biblScope>
		</imprint>
	</monogr>
	<note>the eu-27 with a focus on elec-tricity. swd</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Agency monitoring patterns for value networks</title>
		<author>
			<persName><forename type="first">P</forename><surname>De Alencar Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Bukhsh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Da Silva Reis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>De Castro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on the Economics of Grids, Clouds, Systems, and Services</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="81" to="93" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Enterprise monitoring ontology. Conceptual Modeling-ER</title>
		<author>
			<persName><forename type="first">P</forename><surname>De Alencar Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Weigand</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="page" from="132" to="146" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Bertot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Estevez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Janowski</surname></persName>
		</author>
		<title level="m">Universal and contextualized public services: Digital public service innovation framework</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Smart auditing-innovating compliance checking in customs control</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Bukhsh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Weigand</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Informatics (CBI)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="page" from="131" to="138" />
		</imprint>
	</monogr>
	<note>IEEE 15th Conference on</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Critical questions in assessing organizational effectiveness</title>
		<author>
			<persName><forename type="first">K</forename><surname>Cameron</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Organizational dynamics</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="66" to="80" />
			<date type="published" when="1980">1980</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Enterprise ontology: theory and methodology</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Dietz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Springer Science &amp; Business Media</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Proposed nist standard for role-based access control</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Ferraiolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sandhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gavrila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Kuhn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Chandramouli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Information and System Security (TISSEC)</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="224" to="274" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Ontology evaluation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook on ontologies</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="251" to="273" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Value-based requirements engineering: exploring innovative e-commerce ideas</title>
		<author>
			<persName><forename type="first">J</forename><surname>Gordijn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Akkermans</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Requirements engineering</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="114" to="134" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Swrl: A semantic web rule language combining owl and ruleml</title>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">F</forename><surname>Patel-Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Boley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tabet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Grosof</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dean</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">W3C Member submission</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page">79</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The protégé project: a look back and a look forward</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Musen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI matters</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="4" to="12" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">From value chain to value constellation: Designing interactive strategy</title>
		<author>
			<persName><forename type="first">R</forename><surname>Normann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ramirez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Harvard business review</title>
		<imprint>
			<biblScope unit="volume">71</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="65" to="77" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Servqual: A multiple-item scale for measuring consumer perc</title>
		<author>
			<persName><forename type="first">A</forename><surname>Parasuraman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Zeithaml</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">L</forename><surname>Berry</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of retailing</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">12</biblScope>
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Foundations of illocutionary logic</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Searle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Vanderveken</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1985">1985</date>
			<publisher>CUP Archive</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Positive profits with negative surplus value</title>
		<author>
			<persName><forename type="first">I</forename><surname>Steedman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Economic Journal</title>
		<imprint>
			<biblScope unit="volume">85</biblScope>
			<biblScope unit="issue">337</biblScope>
			<biblScope unit="page" from="114" to="123" />
			<date type="published" when="1975">1975</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Directive 2009/72/ec of the european parliament and of the council of 13 july 2009 concerning common rules for the internal market in electricity and repealing directive 2003/54/ec</title>
		<author>
			<persName><forename type="first">E</forename><surname>Union</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Eur. Union L</title>
		<imprint>
			<biblScope unit="volume">211</biblScope>
			<biblScope unit="page" from="55" to="93" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Strategic analysis using value modeling-the c3-value approach</title>
		<author>
			<persName><forename type="first">H</forename><surname>Weigand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Johannesson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Andersson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bergholtz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Edirisuriya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ilayperuma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">HICSS 2007. 40th Annual Hawaii International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="175" to="175" />
		</imprint>
	</monogr>
	<note>System Sciences</note>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Design Science Methodology for Information Systems and Software Engineering</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Wieringa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Springer</publisher>
			<pubPlace>Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
