A Theory of Information Trilogy: Digital Ecosystem Information Exchange Architecture
Abstract
:1. Introduction
- Research Challenge: How to enable information sharing in complex DE?
- ◦
- RQ1: What do we mean by information in a DE context?
- ◦
- RQ2: How to share such information in DE?
2. Theory of Information Trilogy
2.1. Matter
2.2. Energy
2.3. State
2.4. Theory of Information Trilogy and Digital Ecosystem
2.5. Theory of Information Trilogy and Generic Information Elements
2.6. Theory of Information Trilogy and Generic Information Principles
3. Digital Ecosystem Information Exchange
3.1. Digital Information Exchange
3.1.1. Information Holder
- Connect: It allows connecting with the secure information exchange platform using their account. This could be done via protected devices, connections, applications, and networks.
- Source: It involves selecting and virtualising the required information source including validation and fixing any information quality issues.
- Consolidate: It involves the consolidation of information sourced from different sources before sharing. Consolidation also involves the mapping, merging, and transformation of information for the intended audience. Information, which is subject to sharing, could be reference data, master data, metadata, transactional data, or insights.
- Share: It involves packaging and dispatching consolidated information to their intended audience in different forms via listed or published information APIs and services. Information APIs and services allow the provider to provide “information as code”. Thus, rather than sharing the actual information, only a code or script can be shared, which can be executed by the receiver to retrieve the information package. A secure outbound information package contains information objects (e.g., metadata, schema, tables, views, records, insights), including privileges and conditions. A secure outbound information package is accessible via information APIs and services. Privileges and conditions determine the further shareability of the shared information. It means consumers may not be able to share the shared information. This allows the information owners to have control over their information even after it has been shared with the intended audience or consumers. Furthermore, information could be directly and privately shared with an intended consumer based on information request or could be listed and privately or publicly made available to multiple consumers via the marketplace.
3.1.2. Information Audience
- Connect: It allows connecting with the secure information exchange platform using their account. As indicated earlier, this could be done via protected devices, connections, applications, and networks.
- Search: It allows searching metadata and information sources including information APIs and services (catalogues) available for sharing.
- Request: It allows the intended audience to request information from the information holder using multiple channels (e.g., email, instant message, API, or service calls).
- Receive: It enables the intended audience to receive shared information (inbound) in different forms (e.g., information APIs, services) from the information holder. The audience can access and use the shared information as per allowed privileges and conditions. Information could be received in real time, in batches, etc. The shared information can be combined with other information sources for rich analytics and insights.
3.1.3. Information Exchange Coordinator and Administrator
- Digital identity and access management: This service, including privileged access management, allows (platform system administrator) creating users, verifying digital identity, and controlling access and permissions (e.g., create, read, update, delete, share) to the DE information exchange platform and the underlying information APIs.
- Account and subscription management: This service enables (platform account administrator) managing account onboarding, subscriptions, information sharing contracts, transactions, history, payments, and feedback related to DE information exchange platform and its information APIs. This involves overall account and subscription information management, reporting, and analytics.
- Audit and monitoring: This service enables (platform system administrator) auditing and monitoring information lineage and sharing via the DE information exchange platform. This involves overall audit and monitoring logs management, reporting, and analytics.
- Help and support: This service provides (platform support administrator) operational support, trouble shooting, and requested information to DE information exchange platform users.
- Governance and compliance: This service ensures (information exchange coordinator or steward) the overall governance of the information sharing and DE information exchange platform, and its compliance to different information laws, regulations, standards, and principles. This also ensures that the information is of good quality and is fit for purpose. Information, subject to sharing, could be pre-qualified and certified as per specific context and needs.
- Security and privacy: This service ensures (platform security administrator) the security and privacy of information and a DE information exchange platform for smooth, secure, and resilient operations.
3.1.4. Information Exchange Platform
- Metadata and information sources: The DE information exchange mainly stores the metadata about information and its sources. Metadata could be in the form of information design metadata (e.g., information definitions, models, table structures, schemas), information execution metadata (e.g., information processing logs, scripts) and actual information usage metadata (e.g., information access and usage patterns, experience). Information sources could be local or cloud-based information stores, warehouses, data lakes, IoT, APIs, services, etc. Here, the focus is to virtualise the information and its sources rather storing the information in a central data hub or marketplace.
- Information APIs and services: Information and its sources are exposed via information APIs and services. Thus, actors do not have direct access to information and its sources. These APIs and services can be used by other APIs or services or applications (e.g., Amazon, Azure, Google Cloud, Power BI, Tableau). They can also be used to develop specific applications using scripting or programming languages (e.g., Java, Python, Node.js, .Net, SQL). These APIs and services should be accessible via secure shell or web browsers. These APIs and services need memory and computing resources such as cache and parallel processing for execution.
- Cache and parallel processing: Information and its sources can be cached for optimising performance and resiliency. This enables the ability to provide information from cache memory to users when the physical information source is not available or down. Furthermore, parallel information processing can be achieved to handle a large amount of information. Cached memory and parallel information processing could come in different sizes (e.g., small, medium, large, extra-large) and have the autoscaling features including clustering of resources (e.g., scaling-in, scaling-out, scaling-up, and scaling-down). Cache and parallel processing provide essential fast memory and computing components for information exchange. Cache and parallel processing nodes can be connected via information gateways and pipelines.
- Information gateways and pipelines: The DE information exchange needs to support multiple gateways to allow the user to connect with the DE information exchange pipelines via different interfaces and locations. Information gateways and pipelines provide essential secure connectivity and network components for information exchange. Information pipelines could be open public, protected, or private (sensitivity and criticality) and could also be classified as cold, warm, and hot pipelines depending on the nature of information (e.g., real-time, recent, historical, and archived information). In summary, information pipelines enable the secure transfer of information from its sources to intended destination (Figure 4)—see the mathematical theory of communication by Shannon [18].
3.2. Digital Information Exchange Deployment Models
4. Geospatial Information Sharing Case Study
5. Conclusions, Contribution, and Future Research Directions
- How can we design a distributed digital information exchange organisational structure?
- How can we ensure information governance, privacy, and compliance across different local, national, and international jurisdictions?
- How should we choose between and design appropriate digital information exchange deployment models?
- How can we on-board and off-board users, their metadata, and information sources?
- How should we price digital information exchange APIs and services?
- How can we integrate digital information exchanges with the existing internal information infrastructure and environments (data sources, data hubs, data warehouses, data lakes, staging areas, consumption areas)?
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Krogstie, J. Modeling of Digital Ecosystems: Challenges and Opportunities. In Collaborative Networks in the Internet of Services; PRO-VE 2012; IFIP Advances in Information and Communication Technology; Camarinha-Matos, L.M., Xu, L., Afsarmanesh, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 380. [Google Scholar] [CrossRef] [Green Version]
- Gill, A.Q. Adaptive Information Architecture: Information Element Identification and Organisation Patterns for Digital Ecosystem. In Proceedings of the Information and Knowledge Engineering Conference, CSCE, Las Vegas, NV, USA, 26–29 July 2021. [Google Scholar]
- Alam, L.; Gill, A. A Social Engagement Framework for the Government Ecosystem: Insights from Australian Government Facebook Pages. International Conference on Information Systems. 2020. Available online: https://aisel.aisnet.org/icis2020/digitization_in_cities/digitization_in_cities/8 (accessed on 16 July 2021).
- Floridi, L. Information: A Very Short Introduction; Oxford Press: Oxford, UK, 2010. [Google Scholar]
- Farooq, M.J.; Zhu, Q. Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT). In Proceedings of the 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, France, 15–19 May 2017; pp. 1–8. [Google Scholar] [CrossRef] [Green Version]
- Lin, H.C.; Chang, C.M. What motivates health information exchange in social media? The roles of the social cognitive theory and perceived interactivity. Inf. Manag. 2018, 55, 771–780. [Google Scholar] [CrossRef]
- Liew, A. Data, information, knowledge, and their interrelationships. J. Knowl. Manag. Pract. 2007, 7, 2. [Google Scholar]
- Earl, M.J. Management Strategies for Information Technology; Prentice Hall: New York, NY, USA; London, UK, 1989. [Google Scholar]
- Logan, R.K. What Is Information? Why Is It Relativistic and What Is Its Relationship to Materiality, Meaning and Organization. Information 2012, 3, 68–91. [Google Scholar] [CrossRef] [Green Version]
- Borko, H. Information science: What is it? Am. Doc. 1968, 19, 3. [Google Scholar] [CrossRef]
- Saracevic, T. Information science. In Encyclopedia of Library and Information Sciences, 3rd ed.; Bates, M.J., Ed.; Taylor and Francis: New York, NY, USA, 2009; pp. 570–2585. [Google Scholar]
- Davis, G.B. Information Systems as an Academic Discipline. In The Past and Future of Information Systems: 1976–2006 and Beyond; IFIP WCC TC8 2006; IFIP International Federation for Information Processing; Avison, D., Elliot, S., Krogstie, J., Pries-Heje, J., Eds.; Springer: Boston, MA, USA, 2006; Volume 214, pp. 11–25. [Google Scholar] [CrossRef] [Green Version]
- Detlor, B. Information management. Int. J. Inf. Manag. 2010, 103–108. [Google Scholar] [CrossRef]
- Bashir, M.R.; Gill, A.Q. IoT enabled smart buildings: A systematic review. IEEE Intell. Syst. Conf. 2017, 151–159. [Google Scholar] [CrossRef]
- Chessell, M.; Smith, H.C. Patterns of Information Management; IBM Press: Armonk, NY, USA, 2013. [Google Scholar]
- Sharma, A.; Rana, N.P.; Nunkoo, R. Fifty years of information management research: A conceptual structure analysis using structural topic modeling. Int. J. Inf. Manag. 2021, 58. [Google Scholar] [CrossRef]
- Gill, A.Q. What Is Information? A Theory of Information Trilogy. Available online: https://aqgill.blogspot.com/2021/06/what-is-information-theory-of.html (accessed on 14 June 2021).
- Shannon, C.E. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
- Atkinson, R.C.; Shiffrin, R.M. Human Memory: A Proposed System and Its Control Processes. In Human Memory: Basic Processes; Elsevier: Amsterdam, The Netherlands, 1977; pp. 7–113. [Google Scholar] [CrossRef]
- Braunstein, S.L.; Pati, A.K. Quantum Information Cannot Be Completely Hidden in Correlations: Implications for the Black-Hole Information Paradox. Phys. Rev. Lett. 2007, 98, 8. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information, 10th Anniversary ed.; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
- Musser, G. The Most Famous Paradox in Physics Nears Its End. 2020. Available online: https://www.quantamagazine.org/the-black-hole-information-paradox-comes-to-an-end-20201029/ (accessed on 14 July 2021).
- Einstein, A. Relativity: The Special and General Theory; H. Holt and Company: New York, NY, USA, 1916. [Google Scholar]
- Guggenheim, E.A. Thermodynamics: An Advanced Treatment for Chemists and Physicists, 11th ed.; Zeitschrift für Naturforschung: Amsterdam, The Netherlands, 1985. [Google Scholar]
- Zhang, B.; Cai, Q.; Zhan, M.; You, L. Information conservation is fundamental: Recovering the lost information in Hawking radiation. Int. J. Mod. Phys. D 2013, 22, 12. [Google Scholar] [CrossRef] [Green Version]
- Britanica. Matter. Available online: https://www.britannica.com/science/matter (accessed on 14 June 2021).
- Feynman, R. The Feynman Lectures on Physics Vol I; Addison Wesley: Boston, MA, USA, 1970; ISBN 978-0-201-02115-8. [Google Scholar]
- Bhanumurthy, V.; Shankar, G.J.; Rao, K.R.M.; Nagamani, P.V. Defining a framework for integration of geospatial technologies for emergency management. Geocarto Int. 2015, 30, 963–983. [Google Scholar] [CrossRef]
- Gill, A.Q.; Phennel, N.; Lane, D.; Phung, V.L. IoT-enabled emergency information supply chain architecture for elderly people: The Australian context. Inf. Syst. 2016, 58, 75–86. [Google Scholar] [CrossRef]
- Štefanič, P.; Cigale, M.; Jones, A.C.; Knight, L.; Taylor, I.; Istrate, C.; Suciu, G.; Ulisses, A.; Stankovski, V.; Taherizadeh, S.; et al. SWITCH workbench: A novel approach for the development and deployment of time-critical microservice-based cloud-native applications. Future Gener. Comput. Syst. 2019, 99, 197–212. [Google Scholar] [CrossRef]
- Grimm, D.J. The Dark Data Quandary. Am. Univ. Law Rev. 2019, 68, 761–821. Available online: https://digitalcommons.wcl.american.edu/aulr/vol68/iss3/2 (accessed on 16 July 2021). [PubMed]
- Anwar, M.J.; Gill, A.Q.; Hussain, F.K.; Imran, M. Secure big data ecosystem architecture: Challenges and solutions. EURASIP J. Wire 2021. [Google Scholar] [CrossRef]
- Luhn, G. The Causal-Compositional Concept of Information Part I. Elementary Theory: From Decompositional Physics to Compositional Information. Information 2012, 3, 151–174. [Google Scholar] [CrossRef] [Green Version]
Ref. | Information Element Type | Examples |
---|---|---|
1 | Organism | Individuals, organisations, animals, plants |
2 | Place | Universe, country, state, city, suburb, road, building |
3 | Time | Date and time |
4 | Thing | Product, service, material, land, air, device |
5 | Event | Sale, purchase, return, request |
6 | Mechanism | Sell, buy, share |
7 | State | Initiated, in progress, done |
8 | Intuition | Emotions, feelings, beliefs, desires, intentions |
9 | Consequence | Results, benefits, liability, value, responsibility |
Ref. | Principle |
---|---|
1 | Information presence can be realised when it takes us from an unknown to known state of matter or energy. |
2 | Information is relative. |
3 | Information is contextual. |
4 | Information has a lifecycle. |
5 | Information cannot be created. |
6 | Information can be discovered. |
7 | Information can emerge through interactions. |
8 | Information can be transformed from one form to another form. |
9 | Information is never lost. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gill, A.Q. A Theory of Information Trilogy: Digital Ecosystem Information Exchange Architecture. Information 2021, 12, 283. https://doi.org/10.3390/info12070283
Gill AQ. A Theory of Information Trilogy: Digital Ecosystem Information Exchange Architecture. Information. 2021; 12(7):283. https://doi.org/10.3390/info12070283
Chicago/Turabian StyleGill, Asif Qumer. 2021. "A Theory of Information Trilogy: Digital Ecosystem Information Exchange Architecture" Information 12, no. 7: 283. https://doi.org/10.3390/info12070283
APA StyleGill, A. Q. (2021). A Theory of Information Trilogy: Digital Ecosystem Information Exchange Architecture. Information, 12(7), 283. https://doi.org/10.3390/info12070283