Professional Documents
Culture Documents
Business Information Systems: 22nd International Conference, BIS 2019, Seville, Spain, June 26-28, 2019, Proceedings, Part I Witold Abramowicz
Business Information Systems: 22nd International Conference, BIS 2019, Seville, Spain, June 26-28, 2019, Proceedings, Part I Witold Abramowicz
https://textbookfull.com/product/business-information-
systems-22nd-international-conference-bis-2019-seville-spain-
june-26-28-2019-proceedings-part-i-witold-abramowicz/
https://textbookfull.com/product/business-information-
systems-22nd-international-conference-bis-2019-seville-spain-
june-26-28-2019-proceedings-part-ii-witold-abramowicz/
https://textbookfull.com/product/business-information-systems-
workshops-bis-2019-international-workshops-seville-spain-
june-26-28-2019-revised-papers-witold-abramowicz/
https://textbookfull.com/product/business-information-
systems-23rd-international-conference-bis-2020-colorado-springs-
co-usa-june-8-10-2020-proceedings-witold-abramowicz/
Business Information Systems: 20th International
Conference, BIS 2017, Poznan, Poland, June 28–30, 2017,
Proceedings 1st Edition Witold Abramowicz (Eds.)
https://textbookfull.com/product/business-information-
systems-20th-international-conference-bis-2017-poznan-poland-
june-28-30-2017-proceedings-1st-edition-witold-abramowicz-eds/
https://textbookfull.com/product/business-information-
systems-19th-international-conference-bis-2016-leipzig-germany-
july-6-8-2016-proceedings-1st-edition-witold-abramowicz/
https://textbookfull.com/product/business-information-systems-
workshops-bis-2014-international-workshops-larnaca-cyprus-
may-22-23-2014-revised-papers-1st-edition-witold-abramowicz/
Witold Abramowicz
Rafael Corchuelo (Eds.)
Business
LNBIP 353
Information Systems
22nd International Conference, BIS 2019
Seville, Spain, June 26–28, 2019
Proceedings, Part I
123
Lecture Notes
in Business Information Processing 353
Series Editors
Wil van der Aalst
RWTH Aachen University, Aachen, Germany
John Mylopoulos
University of Trento, Trento, Italy
Michael Rosemann
Queensland University of Technology, Brisbane, QLD, Australia
Michael J. Shaw
University of Illinois, Urbana-Champaign, IL, USA
Clemens Szyperski
Microsoft Research, Redmond, WA, USA
More information about this series at http://www.springer.com/series/7911
Witold Abramowicz Rafael Corchuelo (Eds.)
•
Business
Information Systems
22nd International Conference, BIS 2019
Seville, Spain, June 26–28, 2019
Proceedings, Part I
123
Editors
Witold Abramowicz Rafael Corchuelo
Poznań University of Economics ETSI Informática
and Business University of Seville
Poznań, Poland Seville, Spain
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
end with Applications, Evaluations, and Experiences of the newest research trends in
various domains.
The Program Committee of BIS 2018 consisted of 78 members who carefully
evaluated all the submitted papers. Based on their extensive reviews, 67 papers were
selected.
We would like to thank everyone who helped to build an active community around
the BIS conference. First of all, we want to express our appreciation to the reviewers
for taking the time and effort to provide insightful comments. We wish to thank all the
keynote speakers who delivered enlightening and interesting speeches. Last but not
least, we would like to thank all the authors who submitted their papers as well as all
the participants of BIS 2019.
BIS 2019 was organized by the University of Seville and Poznań University
of Economics and Business, Department of Information Systems.
Program Committee
Witold Abramowicz Poznań University of Economics and Business, Poland
(Co-chair)
Rafael Corchuelo (Co-chair) University of Seville, Spain
Rainer Alt Leipzig University, Germany
Dimitris Apostolou University of Piraeus, Greece
Timothy Arndt Cleveland State University, USA
Sören Auer TIB Leibniz Information Center Science
and Technology and University of Hannover,
Germany
Eduard Babkin LITIS Laboratory, INSA Rouen; TAPRADESS
Laboratory, State University – Higher School
of Economics (Nizhny Novgorod), Russia
Morad Benyoucef University of Ottawa, Canada
Matthias Book University of Iceland, Iceland
Dominik Bork University of Vienna, Austria
Alfonso Briones BISITE Research Group, Spain
François Charoy Université de Lorraine – LORIA – Inria, France
Juan Manuel Corchado University of Salamanca, Spain
Rodríguez
Beata Czarnacka-Chrobot Warsaw School of Economics, Poland
Christophe Debruyne Trinity College Dublin, Ireland
Renata De Paris Pontifical Catholic University of Rio Grande do Sul,
Brazil
Yuemin Ding Tianjin University of Technology, China
Suzanne Embury The University of Manchester, UK
Jose Emilio Labra Gayo Universidad de Oviedo, Spain
Werner Esswein Technische Universität Dresden, Germany
Charahzed Labba Université de Lorraine, France
Agata Filipowska Poznań University of Economics and Business, Poland
Ugo Fiore Federico II University, Italy
Adrian Florea ‘Lucian Blaga’ University of Sibiu, Romania
Johann-Christoph Freytag Humboldt Universität Berlin, Germany
Naoki Fukuta Shizuoka University, Japan
Claudio Geyer UFRGS, Brazil
Jaap Gordijn Vrije Universiteit Amsterdam, The Netherlands
viii Organization
Organizing Committee
Milena Stróżyna (Chair) Poznań University of Economics and Business, Poland
Barbara Gołębiewska Poznań University of Economics and Business, Poland
Inmaculada Hernández University of Seville, Spain
Patricia Jiménez University of Seville, Spain
Piotr Kałużny Poznań University of Economics and Business, Poland
Elżbieta Lewańska Poznań University of Economics and Business, Poland
Włodzimierz Lewoniewski Poznań University of Economics and Business, Poland
Additional Reviewers
Profile Inference from Heterogeneous Data: Fundamentals and New Trends . . . 122
Xin Lu, Shengxin Zhu, Qiang Niu, and Zhiyi Chen
Artificial Intelligence
Smart Infrastructure
Otto-von-Guericke-University Magdeburg,
Universitaetsplatz 2, 39106 Magdeburg, Germany
{matthias.volk,sascha.bosse,dennis.bischoff,
klaus.turowski}@ovgu.de
Abstract. In recent years, big data systems are getting increasingly complex
and require a deep domain specific knowledge. Although a multitude of refer-
ence architectures exist, it remains challenging to identify the most suitable
approach for a specific use case scenario. To overcome this problem and to
provide a decision support, the design science research methodology is used. By
an initial literature review process and the application of the software archi-
tecture comparison analysis method, currently established big data reference
architectures are identified and compared to each other. Finally, an Analytic
Hierarchy Process as the main artefact is proposed, demonstrated and evaluated
on a real world use-case.
1 Introduction
In recent years, the topic big data has gained increasing interest and reached a pro-
ductive status in business and research. Today organizations are conducting big data
projects for various reasons, such as fraud detection, predictive maintenance, and
optimizations [1]. With the growing interest among users, also the number of new
technologies being developed and distributed is constantly rising. Big data itself can be
described as a collection “of extensive datasets primarily in the characteristics of
volume, variety, velocity, and/or variability that require a scalable architecture for
efficient storage, manipulation, and analysis” [2]. Due to their particularities and
requirements, organizations are today not only confronted with the question of suit-
ability of big data technologies in their information technology (IT) projects, but also
the adequate composition of specific tools and technologies [3]. This combination
should follow a comprehensive and scalable system architecture, that can be generally
described as “fundamental concepts or properties of a system in its environment
embodied in its elements, relationships, and in the principles of its design and evolu-
tion” [4]. In order to reduce the complexity accompanied by the introduction of these,
best-practices in terms of architectural considerations can be exploited. Reference
architectures are designated for these kind of recommendations, supporting the
Today, many big data reference architectures exist. However, there are many differences
determining their suitability, such as the intended use, the complexity, or the general
system design. Until now, only limited effort was put into the comparison and selection
of reference architectures, for instance, when a new approach is introduced [7, 12]. To
get a better understanding about the currently existing reference architectures and
possible selection process for those, a literature review according to the methodology by
Webster and Watson was conducted [10].
Lambda Architecture
The Lambda architecture was initially postulated by Marz [5]. It consists out of two
different layers. While the first can be further distinguished into the interconnected
batch and serving layer, enabling batch processing, the second, speed layer, is used to
analyze incoming data in real-time [14]. All upcoming data will be sent to both layers,
while within the first layer everything is being stored and processed into the master data
set. By using batch views, one can obtain pre-calculated results from the complete
dataset to allow specific queries. Due to the very time-consuming process, new
incoming data cannot be processed. Thus, the speed layer will analyze the new data in
real-time. The results can be later aggregated with the results of the predefined batch
views [15].
Bolster Architecture
The Bolster architecture represents an extension of the Lambda architecture to allow
the use of semantic data. In the respective work [7], the authors compared features of
different architectures and came to the result that none of them fulfills all of their
desired requirements. Thus, the Bolster architecture, as a new all-encompassing
approach, was developed. In addition to the layers of the Lambda architecture, the
bolster architecture adds another layer. The semantic layer is responsible for storing
and providing metadata. This metadata can be used in the batch layer and also in the
speed layer [7].
Kappa Architecture
The Kappa architecture follows the idea to reduce the overhead maintaining two dif-
ferent systems for one task, as it appears in the case of the Lambda architecture. Hence,
it demands to have only the stream processing system [16]. Although multiple
advantages occur with this approach, the solution may cause huge cost. This is espe-
cially the case if the volume is very high and lots of resource regarding network
capacity and computational power will be required [17]. However, approaches exist for
which compression techniques can be used for the cost of additional computational
power [18].
Solid Architecture
The Solid architecture presents another approach introducing semantic data into a big
data architecture. Within Solid, the Resource Description Framework (RDF) is used to
deal with semantic data [19]. This architecture is comprised of a service tier, a content
tier and a merge tier. The service tier describes the interface that communicates with
components outside of the architecture. Therefore, it gets the required data from the
content tier. This consist out of the online, data and index layer. Each of these serve a
specific purpose: while the latter provides only access to the data layer, it stores all data
except the new one. All new data will be stored by the online layer. The merge tier
afterwards handles the integration of all data packages to the respective data layer [20].
The Big Data Research Reference Architecture (BDRRA)
This architecture was developed by comparing existing architectures of large compa-
nies and extracting their key features. The components of each of the use cases were
mapped to crucial steps of big data projects, finally forming a reference architecture.
With the exception of the data storage that is building the foundation, each of the
Decision-Support for Selecting Big Data Reference Architectures 7
Before the actual construction of the artifact and, therefore, the third step of the con-
ducted DSRM [9] is taking place, a comparison must be made first to determine the
prevailing differences between the found out architectures. Additionally, it is intended to
identify criteria which may influence the decision making process. Although no specific
methods for the comparison of big data architectures exist, today there exist a multitude
of different methods for evaluating and comparing architectures in terms of information
and communication systems. These differ mainly in their structure, the purpose, and the
information that are required. SACAM only requires a set of comparison criteria and the
documentations of the architectures as input parameter [11]. While the first will be
formulized during the procedure, the latter were already determined during literature
8 M. Volk et al.
review. Although the application of the method is primarily oriented towards software
[26] and not big data reference architectures, however, it is also focused on the right
combination of tools and technologies in the sense of patterns application [27].
Predestined for the comparison of multiple architectures, the method was used, for
instance, to compare two architectures to avoid frauds in telephone banking [28].
Consequently, SACAM appears to be a suitable way to contrast the found out approa-
ches. The procedure itself, as depicted in Fig. 2, will be further explained
The first step serves as a preparation. In here, the targeted architectures, their intended
use as well the required documentations are identified. The latter was already realized by
the initially performed literature review. After that, the criteria collection is taking place,
at which typically exemplary scenarios will be formulated “for capturing quality attributes
and refining them into quality attribute scenarios” [11]. Due to the previously provided
definition of big data, especially the targeted data characteristics and the scalability appear
to be suitable requirements and, therefore, quality attributes. According to those, the
required scenarios were formulated, predominantly deduced from the results of the lit-
erature review, either in an explicit (condensed) or implicit (concrete references) form.
The third step declares the determination of extraction directives, which are required to
extract the needed information from the documentations and, thus, assess the applicability
of the architectures. This was realized by the observation of the scenarios and the
deduction of the main tactics, which were predominantly focusing on concepts such as the
processing capabilities. A complete overview of the documented and derived scenarios,
tactics, and quality attributes is depicted in Table 2.
After this step, the view and indicator extraction is performed. All available
information of the targeted architectures are extracted and compared to the derived
tactics from the formulated scenarios, to review the capabilities of its quality attributes
fulfillment. The evidence for each of the comparisons is scored afterwards. Both steps
are performed similar to the workflow. The same applies for the recommended scoring
itself, for which a range from 0 to 10 was chosen, “where 0 means that no support is
provided, and 10 completely” [11]. Whenever a reference architecture is fully capable
to realize such a tactic, a 10 can be assigned. The complete results of the application of
SACAM, as well as the specific component of each big data reference architecture
capable to solve this scenario, are listed in Table 3. In case of limitations, such as the
use of the Kappa architecture within the first scenario that is not suitable for huge
amounts of data, a five is given. The same applies for scenario two and the Solid
architecture, due to the lack of scalability in terms of stream processing. The gradation
between the upper and lower boundary results out of a comparison between the
architectures.
Decision-Support for Selecting Big Data Reference Architectures 9
In scenario four, it has to been noted that information may change over time. Apart
from that, this scenario is similar to the first one. The Lambda, Solid and Kappa
architecture are not intended to perform any of these changes on the master data set.
However, the Lambda and Solid architecture can be easily extended, whereas more
effort needs to be invested when using the Kappa architecture. Thus, a rating of 7 was
given to the latter and the both other approaches received an 8. Comparing all of the
given scores, one can notice that some architectures are more dominant than the others.
Especially the BDRRA and BDAF received the best scores. This results predominantly
out of the generalized structure by which most of the existing requirements and con-
straints can be covered. However, this generalized point of view may lead to ineffi-
ciencies in comparison to specific approaches. Thus, there is a clear distinction between
very general and specific approaches. Furthermore, the BDAF architecture strongly
dominates all other alternatives. The same applies for the BDRRA, but the specificity is
still higher compared to the BDAF and explicit metadata management is not supported
here, thus, the BDAF won’t be further used.
On the basis of those results, it becomes clear that a variety of different criteria play a
major role during the selection of the most suitable architecture. After further exami-
nations about the capability of suitable methods mentioned in Sect. 2.1, the AHP has
proved to be a promising solution. Compared to other approaches, this is especially due
to the reason that the AHP is a widely accepted technique of decision makers and was
already applied in contributions within a similar domain [6]. The application itself is
initiated by pairwise comparisons of different criteria, with regard to individual pref-
erences. Each of the criteria will be compared to all others, resulting in a total of
ðn2 nÞ=2 comparisons, in which n is the total number of criteria of a single proce-
dure. The outcomes of the comparisons range from 1–9. While a value of 1 means that
both criteria are equally important, a value of 9 reflects an “extreme importance” [33]
for the criterion to be compared. Intermediate ratings are intended to highlight slight
preferences, for instance, 5 means that the criterion to be compared has a higher
importance than the other has. The calculatory equivalent, necessary for further com-
putation, is expressed by the reciprocal value. All gradation values of the ratings can be
found in [33]. After the initial comparisons, all results will be stored in an n n
identity matrix for each criterion, called comparison matrix (1). In doing so, the
diagonal is represented by ones, all values above the main diagonal represent the
corresponding ratings of the comparison and in turn all values below the reciprocal
value. After all comparisons have been made, a normalized matrix is generated. The
average of each row of this normalized matrix indicates the absolute priority of the
targeted criteria, forming all together the weighting vector W. The higher an entry, the
higher is the importance of the criteria (2). In order to avoid an undeliberated decision,
the consistency of the made comparisons can be further assessed. First, the initial
comparison matrix needs to be multiplied with W to obtain the weighted sum vector
Ws. Then the reciprocal is formed of each element of W and, afterwards, the scalar
product of both vectors is calculated Ws fWg1 . The number of compared ele-
ments then divides the resulting consistency vector, to obtain kMax as the eigenvalue
(3). This value is required to calculate the consistency index (CI). Finally, with the
calculation of the Consistency Ratio (CR), a comparison of the CI with a randomized
consistency index (RI) takes place, to measure the consistency of the given scores (5).
If CR is less than or equal to 0.10, all of the given ratings are consistent, otherwise
individual pairwise comparisons should be reviewed again. When all values of the
criteria have been determined and W calculated, the alternatives will be inspected in a
similar way. Each of them will be compared and rated on the basis of one specific
criterion. Once again, a W will be calculated for each criterion (6). This continues until
each of them has been checked in terms of the available alternatives. Further, all W
vectors will be brought together into one matrix, highlighting the connection between
the alternatives and criteria. Finally, this newly created matrix will be multiplied with
the initially calculated vector W from the criteria comparison matrix. The resulting
vector describes the suitability of each alternative, based on the made comparison (7).
12 M. Volk et al.
relationships between the levels of the AHP, there are also other conspicuous features.
The application of the artifact itself takes place as demonstrated in Fig. 3 by the
pairwise-comparison of the tactics described in Table 2. First of all, the comparison
matrix and the weighting vector W need to be determined. Then W will be multiplied
with the matrix depicted in Table 4.
The resulting vector then reflects the viability for the undertaking. In contrast to the
standard procedure, W was not calculated for each comparison of the alternatives to one
respective criterion, instead the previously determined results by SACAM were used.
These were obtained by a similar procedure, comparing the architectures in terms of the
developed quality attribute scenarios and the derived tactics. To overcome the different
scaling’s of the rating, the final resulting matrix was normalized and transposed, as in
the case of the standard AHP procedure. Within the table, the first row of each of the
architectures describe a matrix containing the BDRRA, as one possible alternative,
whereas the second row does not take the general approach into consideration. The
final result itself will mostly prioritize the BDRRA, due to its dominancy. However this
does not present always the desired decision support, most of all if general approaches
are not preferred, due to their missing implementation details. If a specific approach is
to be preferred over a general, the BDRRA can be omitted in advance. Nevertheless, at
the beginning extensive research always needs to be carried out to allow for a rational
and reasonable decision when it comes to the comparison of the tactics. In any case, it
is up to the decision maker to interpret the results after the successful application.
Table 4. Normalized and transposed SACAM rating matrix with and without BDRRA
T1 T2 T3 T4 T5 T6 T7
Lambda 0.22 0.22 0.21 0.19 0.23 0 0
0.29 0.29 0.28 0.24 0.29 0 0
Bolster 0.22 0.22 0.21 0.23 0.23 0.71 0.73
0.29 0.29 0.28 0.30 0.29 0.71 0.73
Kappa 0.11 0.22 0.15 0.16 0.23 0 0
0.14 0.29 0.21 0.21 0.29 0 0
Solid 0.22 0.11 0.18 0.19 0.09 0.29 0.27
0.29 0.14 0.24 0.24 0.12 0.29 0.27
BDRRA 0.22 0.22 0.26 0.23 0.23 0 0
Another random document with
no related content on Scribd:
and particularly such as lean towards pessimism, should be avoided.
Although as a general proposition it is unquestionably true that
universal corruption would mean social disintegration, extreme
caution should be employed before venturing such a prediction in a
given case. Prophecies of this character have been made in almost
countless numbers and in almost every age and country. In the
overwhelming majority of cases they have been falsified by
subsequent events. It is easy to underestimate the essential strength
of the more fundamental social institutions and to forget the long
course of evolution during which they have become delicately
adapted to human needs. So far as the more progressive countries
of the modern world are concerned,—England, France, Germany,
Austria, Italy, no less than the United States,—there would seem to
be ground for the conclusion that political and social corruption is
decreasing in extent and virulence. At bottom government rests as
much upon confidence as does a savings bank. Now in spite of the
current and very pointed query:—“Where did he get it?”—the
greatest harm done by corruption is not that it enables some men to
acquire fortune and power rapidly at the expense of others.
Resentment at the constant repetition of this spectacle is natural,
and the influence which it exerts as a bad example is most
deplorable. But far in excess of this is the evil which corruption
inflicts by destroying the confidence of men in their social institutions.
In the field of politics this evil is particularly great because of the wide
extension of governmental functions in recent times and the great
possibilities which might be realised by further extensions. To cite
tangible examples, it is both exasperating and dangerous that much
needed plans for the building of a school, hospital, asylum,
sewerage system, or a State Capitol, or for the establishment of
departments of inspection to supervise industrial plants, theatres, or
tenement houses, should be halted by the fear that corrupt interests
will take an initial toll out of the expenses of installation and
thereafter seek to pervert these services to their private advantage.
Just so far as this retarding condition exists the state is prevented
from realising its present possibilities and from undertaking other
beneficent work which it might perform particularly in the fields of
education, art, sanitation, and philanthropy. Yet in spite of this heavy
drag the more progressive modern states are extending their
functions and, on the whole, giving better satisfaction to the needs of
larger populations than ever before. Petty principalities and the city
states of former times have passed away forever. The dominant
modern national type of state stands for populations that must be
reckoned by tens of millions.
Even more significant than growth in population and territory,
however, is the growth that has taken place in the number and
complexity of political and other social relationships. It is true that far
back in antiquity there were great and powerful despotisms, but they
were held together largely by the strong hand, and, as compared
with modern governments, performed very few services for their
peoples. Within recent times inventions annihilating time and space
have brought men closer together but they would not cohere as they
do in government, in business, and in other social activities, were the
requisite moral factors not present. Civilisation has developed these
factors, but at the same time, unfortunately, a new breed of parasites
has come into existence to destroy in part the fruits of our more
intelligent, more honest, and better equipped labour. Vigorous
fighting is necessary to limit the damage inflicted by the type of
social marauder which Professor Ross so trenchantly describes,
—“the respectable, exemplary, trusted personage who, strategically
placed at the focus of a spider web of fiduciary relations, is able from
his office chair to pick a thousand pockets, poison a thousand sick,
pollute a thousand minds, or imperil a thousand lives.”[115] With full
recognition of the danger threatening our highly specialised society
from resourceful enemies of this character there is still another
aspect of the case which should not be forgotten. One must learn “to
look at the doughnut as well as the hole.” While insisting upon the
enormity of the offences committed by our modern social pirates let
us not ignore the significance of the multiplication of foci strategically
placed within the spider webs of fiduciary relations. If social trusts
were habitually betrayed they could not increase in number and
importance. Such enormous and complex aggregations as are
brought together under modern governments, for example, mean
that men numbered on the scale of millions are convinced of the
substantial fidelity to their deepest interests of the governmental
structures to which they acknowledge allegiance. If this were not the
case, if corruption and other abuses infected governments to such
an extent as to render them unfaithful to their peoples, disloyalty
would take the place of loyalty, disintegration would succeed
integration. No doubt many causes besides those mentioned
conspired to bring about the appearance of the large, potent, and
complex units which now prevail in government. While this process
was being accomplished various hostile conditions had to be
attacked, of which corruption was only one, although one of the most
threatening. As these unfavourable conditions were and are being
overcome it is safe to conclude, in spite of all superficial
appearances to the contrary, that the relative extent and harmfulness
of corruption are decreasing in the more progressive modern
countries. A similar line of argument supports the same conclusion
with regard to business institutions, which also have been increasing
both in size, complexity, and the importance of the functions which
they perform. The household industry of a few generations ago has
given way to corporations employing their tens of thousands of men,
trusting them with property worth millions, and, particularly in
transportation, with the safety of myriads of lives. Such
developments would be impossible either in politics or in business
without greater intelligence, a greater degree of fair dealing, and
greater confidence and loyalty from man to man. Corruption which
exalts the selfish interest above the general interest has doubtless
hindered, but it has not stopped, this process. Never before have
men co-operated on so large a scale and so honest a basis as here
and now. If corruption had really penetrated to the vitals of our
economic and governmental organisations this development could
not have taken place.
FINIS
FOOTNOTES:
[104] Political Science Quarterly, vol. xix (1904), p. 676.
[105] G. Myers, “History of Tammany Hall,” p. 285.
[106] Mr. Ernest Poole under the title of “New Readers of the
News” in the American Magazine for November 1907, (65:41),
presents an extremely interesting study of the broadening power
of the press along this line.
[107] “The France of To-day,” pp. 223 et seq.
[108] As, e.g., fraudulent promotion, adulteration, the building of
unsanitary tenements, failure to provide proper safety devices in
theatres and factories or on railroads and steamships.
[109] Cf. Mr. Frederic C. Howe’s admirable article on “Graft in
England,” American Magazine, vol. lxiii (1907), p. 398.
[110] Nation, lxxxi (November 23, 1905), p. 422.
[111] Note, for example, the very different treatment of the
campaign contribution question in the two countries. It may be
conceded that America has much to learn from England with
regard to the control of election expenditures. On the side of
collections, however, it is notorious that in England both political
parties unblushingly barter titles for financial support. There is
something particularly despicable in this pollution of the “fountain
of honour” to procure campaign funds, yet on the rare occasions
when the matter is brought up in Parliament its discussion is
characterised by hilarity rather than by moral earnestness. In
American politics the corresponding evil is felt to be a scandal
and as such provokes not only the curative legislation discussed
in an earlier study but also much bitter and noisy denunciation.
[112] Any illusion as to the ease of restraining privilege in the
United States is likely to be speedily dispelled by the reading of
President Arthur T. Hadley’s masterly discussion in the
Independent of April 16, 1908, of “The Constitutional Position of
Property in America.”
[113] In “The Old Order Changeth,” American Magazine, lxvii
(1909), p. 219.
[114] No political reform now before the American people
promises more beneficent results than the short ballot movement.
It advocates the principle “that democracy can reach more
efficient working through a drastic reduction in the present
number of officials selected by the individual voter, thus securing
a ballot which is very short and which includes only offices that
are of sufficient public interest to attract from the voters a scrutiny
and comparison of candidates that will be adequate to make their
relative individual merits a matter of common knowledge.” Cf. the
vigorous little pamphlet by Richard S. Childs on “The Short Ballot:
A New Plan of Reform,” reprinted from the Outlook of July 17,
1909, New York, 127 Duane St., 1909.
[115] “Sin and Society,” pp. 29-30.
INDEX
Immigrants, 31.
Inefficiency, 16, 48-51.
Intentional character of corruption, 48.
International corruption, 170.
Machine, political (see also Boss, Party Organisation), 17, 20, 72.
Magee, Chris., 99.
Materialism, 53.
Mencius, 51.
Merriam, Professor C. E., 270.
Michels, Professor Robert, 179.
Mistresses, royal, 90.
Mob rule, 17, 66.
Monarchies, corruption in, as compared with democracies, 54.
Monopolies, contracting rings, 13;
era of consolidation, 163.
Moral uprisings, 188.
More, Paul Elmer, 153.
Muckraking, 281.
Municipal corruption, 83, 84, 98, 101, 184.
Municipal ownership, 13.
Municipal Research, Bureau of, 184.
Myers, Gustavus, 280.