Skip to main content

OntoUML Guide

This page is a living working guide for OntoUML and its relevance to the Knowledge Ontology direction.

It is being built as a synthesis of source material, especially the thesis An Ontological Approach to Security Modeling by Ítalo Oliveira, so that Governance Foundation does not need to keep returning to the source thesis just to recover the main ideas.

This is intended to become a durable working reference, not just a loose summary. The aim is to preserve the strongest ideas, distinctions, patterns, and implications in practical language.

Why this page exists

OntoUML matters here because Governance Foundation is moving toward:

  • an ontologically grounded canonical knowledge layer
  • agents that can understand and persist knowledge into that layer
  • ontology rules for testing consistency, completeness, and quality
  • framework-independent storage with framework-specific views layered on top

That means we need more than a fashionable enterprise modeling notation. We need a grounded conceptual modeling approach.

What OntoUML is

OntoUML is an ontology-driven conceptual modeling language.

In simple terms, it is a way of modeling domains that tries to be careful about what kinds of things really exist, what makes them the kinds of things they are, and how they can validly relate and change.

It is:

  • based on UML profiling/extending, not a completely separate visual world
  • grounded in UFO, the Unified Foundational Ontology
  • designed to express ontological distinctions explicitly
  • useful when semantic precision matters more than diagram convenience alone

What OntoUML is not

OntoUML is not:

  • the foundational ontology itself
  • a finished enterprise architecture framework like TOGAF
  • mainly a presentation notation for business stakeholders
  • a guarantee that a model is good just because the boxes have the right stereotypes

The real stack is:

  • UFO provides the foundational ontology
  • OntoUML provides the ontology-driven conceptual modeling language
  • reference/domain ontologies are built using that grounding
  • framework views and application models sit above that layer

This matters because OntoUML is not itself the foundational ontology. It is the modeling language that carries foundational distinctions into conceptual models.

Why Governance Foundation cares

Governance Foundation is not trying to create diagrams for their own sake. It is trying to create:

  • a canonical organisational ontology
  • agent-usable semantics
  • durable structured memory
  • ontology-based validation and testing
  • framework-independent continuity

That makes OntoUML relevant because it helps separate things that enterprise models often blur together, such as:

  • kind vs role
  • type vs state
  • object vs relationship
  • capability vs event
  • quality vs disposition
  • stable identity vs temporary condition

The stack, in simple terms

The thesis reinforces a layered stack:

  • UFO provides the foundational ontology
  • OntoUML provides the ontology-driven conceptual modeling language
  • reference/domain ontologies are built using that grounding
  • framework views and application models sit above that layer

A good working interpretation for Governance Foundation is:

  • UFO-style foundational distinctions provide the grounding layer
  • OntoUML provides the modeling discipline
  • Knowledge Ontology becomes the canonical organisational ontology
  • agent memory and persistence should be structured using those distinctions
  • Knowledge Ontology Runtime Model should express those distinctions in machine-usable runtime form
  • frameworks such as TOGAF, BMC, or other governance models should be treated as derived views or translations

Thesis chapter map

  1. Introduction
  2. A systematic mapping study of security ontologies
  3. Ontological foundations
  4. Understanding and modeling prevention
  5. An ontology of security from a risk treatment perspective
  6. Toward a phishing attack ontology
  7. An ontological analysis of D3FEND cybersecurity model
  8. Ontology-based security modeling in ArchiMate
  9. Final considerations
  • Appendix A, Project Repositories
  • Appendix B, Ontology Vocabulary

Reading batches

To keep synthesis manageable, this guide is being built in batches:

Batch 1

  • Chapter 1, Introduction
  • Chapter 2, Systematic mapping study of security ontologies
  • Chapter 3, Ontological foundations

Batch 2

  • Chapter 4, Understanding and modeling prevention
  • Chapter 5, An ontology of security from a risk treatment perspective

Batch 3

  • Chapter 6, Toward a phishing attack ontology
  • Chapter 7, An ontological analysis of D3FEND cybersecurity model
  • Chapter 8, Ontology-based security modeling in ArchiMate

Batch 4

  • Chapter 9, Final considerations
  • Appendix material

Core OntoUML and UFO concepts in plain English

This section is the working semantic core of the guide. For the machine-usable follow-through, see Knowledge Ontology Runtime Model.

Individual vs type

An individual is a particular thing. A type is the kind of thing something can be.

Examples:

  • individual: Max Barrass
  • type: Person

Endurant vs perdurant

This is one of the most important distinctions.

  • an endurant is something that is wholly present whenever it exists, such as a person, organisation, system, contract, or device
  • a perdurant is something that unfolds in time, such as an event, process occurrence, deployment, hiring, or decision meeting

Very roughly:

  • objects endure
  • events happen

Substantial vs moment

A substantial is an entity that exists in its own right. A moment depends on something else.

Examples:

  • substantial: person, organisation, system
  • moment: colour, commitment, capability, vulnerability, obligation, trust level

This matters because many enterprise models incorrectly treat dependent properties as if they were standalone things.

Kind

A kind is a fundamental sort of thing that supplies identity and persistence.

Examples:

  • Person
  • Organisation
  • System
  • Contract, if modeled as a substantial social object

A kind is rigid, meaning if something is that thing, it is that thing in every situation in which it exists.

Subkind

A subkind is a more specific rigid type under a kind.

Examples:

  • Human Person under Person
  • Nonprofit Organisation under Organisation

Role

A role is a context-dependent type something can take on without changing what it fundamentally is.

Examples:

  • Customer
  • Employee
  • Supplier
  • Regulator
  • Product Owner

A person can cease to be a Customer and still remain a Person. This is exactly why role distinctions matter.

Phase

A phase is a temporary condition of the same underlying thing.

Examples:

  • Draft / Published
  • Active / Suspended
  • Child / Adult

A phase is not a new fundamental type. It is a temporary state-like classification.

Relator

A relator is one of the most useful OntoUML ideas. It is a thing that grounds or makes a relation real.

Examples:

  • Employment
  • Membership
  • Contract
  • Subscription
  • Agreement

Instead of modeling Person works for Organisation as just a loose edge, OntoUML often wants you to model the underlying relation-making entity, such as Employment.

This is extremely relevant for Governance Foundation because many important organisational relationships are not just simple links. They are structured arrangements with conditions, obligations, rights, and time.

Quality

A quality is a dependent property that can vary and often has measurable values.

Examples:

  • temperature
  • latency
  • reliability score
  • risk score
  • confidence level

Disposition

A disposition is a dependent property involving potentiality, tendency, power, capability, vulnerability, liability, or readiness to manifest in certain conditions.

Examples:

  • capability
  • vulnerability
  • ability
  • tendency
  • fragility
  • deterrent capability

This is one of the most important concepts in the thesis. The thesis treats dispositions as central to understanding how events happen and how prevention works.

Situation

A situation is a configuration of reality that can satisfy conditions, activate dispositions, or be brought about by events.

In the prevention theory, situations are critical because events can be prevented by bringing about situations incompatible with their activation conditions.

Event

An event is a perdurant, something that unfolds in time.

Examples:

  • approval
  • attack
  • deployment
  • breach
  • policy enactment
  • meeting
  • incident

In the thesis, events are manifestations of dispositions under certain situations.

Intentional and social entities

UFO-C brings in intentional and social entities, which matters for organisations. This covers things like:

  • goals
  • intentions
  • commitments
  • obligations
  • agents
  • social roles
  • normative structures

This is one reason UFO/OntoUML are interesting for Governance Foundation, because governance and organisations are full of social and normative reality, not just technical assets.

Why these distinctions matter so much

These distinctions stop the model from collapsing into a muddle.

They help prevent common mistakes such as:

  • treating a role as if it were a kind
  • treating a state as if it were a permanent type
  • treating a relationship as a bare line when it is actually a structured relator
  • treating a capability as if it were the same thing as an event
  • treating a score as if it were the same thing as the risk itself

For agents, these distinctions are not academic. They determine whether the stored knowledge can be reasoned over coherently.

Batch 1 synthesis

What the thesis is trying to do

The thesis is trying to define an adequate conceptualization of the security domain. Its position is that modeling languages are only good if they reflect the actual ontology of the domain they are trying to represent.

So the aim is not just better diagrams. It is stronger conceptual grounding.

Why a reference ontology is needed

The thesis argues that risk and security modeling require:

  • shared concepts
  • shared vocabulary
  • explicit ontological commitments
  • application-independent semantics

This is why a reference ontology matters. Without it, models become inconsistent, tool-biased, or framework-biased.

Main gap identified in the literature

The literature review finds that many security ontologies exist, but they are often:

  • fragmented
  • narrow
  • weakly reusable
  • weakly interoperable
  • not grounded in a foundational ontology

The field lacks a strong FAIR, well-grounded core ontology.

UFO and OntoUML in the stack

The thesis positions:

  • UFO as the foundational ontology
  • OntoUML as the conceptual modeling language that embeds many UFO distinctions
  • COVER as a domain ontology for value and risk that can be extended

This is highly relevant to Governance Foundation because it reinforces a layered architecture rather than a framework-first one.

Key distinctions from the foundations chapter

The foundations material highlights distinctions such as:

  • endurant vs perdurant
  • substantial vs moment
  • disposition vs quality
  • kind vs sortal
  • rigid vs non-rigid types

One especially important theme is the ontological seriousness of dispositions, including:

  • capability
  • ability
  • function
  • liability
  • vulnerability
  • capacity

These are not treated as casual labels. They are central to understanding how events happen.

Practical relevance of Batch 1

The main consequence of Batch 1 is this:

  • a canonical ontology should be grounded below the framework layer
  • OntoUML is a strong candidate language for expressing that ontology
  • capability, vulnerability, role, event, and state should be treated as distinct ontological categories

Batch 2 synthesis

Prevention is the core operational concept

The thesis argues that prevention is not a vague practical term. It can be modeled ontologically.

Its core idea is:

prevention is about bringing about a situation that is incompatible with the conditions required for some event to occur.

This is one of the most useful ideas in the thesis.

Prevention works through dispositions, situations, and events

In the UFO grounding used by the thesis:

  • events are manifestations of dispositions
  • dispositions are activated in certain situations
  • causal chains connect dispositions, manifestations, and downstream effects

So preventing an event means interfering with the dispositional setup that would have allowed that event to happen.

Type-level modeling matters

The thesis explicitly lifts the discussion to the level of types.

That means prevention should be modeled not only for a single concrete event but for:

  • event types
  • disposition types
  • situation types

This is important because risk, likelihood, controls, and governance all operate at the type level.

Mutual Activation Partner (MAP)

A major concept introduced in the prevention analysis is the idea that a disposition often depends on the presence of other compatible dispositions in order to manifest.

This is captured as Mutual Activation Partner.

Examples include:

  • flammability needing oxygen and ignition conditions
  • a key's opening capability needing a lock's being-openable disposition
  • vulnerabilities needing matching threat capabilities

This is highly relevant for a Knowledge Ontology because it suggests many important things should be modeled as activation dependencies rather than as isolated properties.

Main prevention patterns

The thesis shows that prevention can work by:

  1. removing the relevant disposition
  2. removing the bearer from the relevant situation
  3. removing a required mutual activation partner
  4. introducing an incompatible condition

This gives a reusable ontology pattern for interventions, safeguards, countermeasures, controls, and governance actions.

Direct and indirect prevention

The thesis distinguishes:

  • direct prevention, where an event brings about a situation incompatible with the target event's activation conditions
  • indirect prevention, where an intervention breaks a causal chain earlier upstream

This distinction is very important for modeling controls and interventions in organisational systems.

ROSE

The thesis then builds ROSE, the Reference Ontology for Security Engineering.

ROSE combines:

  • COVER
  • the prevention ontology
  • UFO grounding
  • OntoUML representation

The core framing is that security is understood as value created by systematically preventing risk events.

Security mechanisms are ontologically unpacked

ROSE treats a security mechanism as more than a loose control label. It is an object designed to bear control capabilities whose manifestations produce protection events that bring about controlled situations incompatible with risk event activation.

This matters because it keeps clearly separate:

  • the object
  • the capability
  • the event
  • the resulting situation
  • the protected value context

That kind of separation is exactly what enterprise frameworks often blur.

Practical relevance of Batch 2

For Governance Foundation, Batch 2 strongly suggests that a good ontology should support:

  • causal-intervention modeling
  • control mechanisms as first-class structured entities
  • activation conditions
  • incompatible situations
  • event-chain reasoning
  • prevention patterns that agents can reason over

Batch 3 synthesis

What Batch 3 is doing overall

Batch 3 is where the thesis becomes very practical. The first two batches build the foundations. Batch 3 shows what those foundations are for.

The three chapters do different but closely related things:

  • Chapter 6 shows how a domain ontology can be built by specializing the reference ontology into a concrete problem domain
  • Chapter 7 shows how an existing operational ontology can be critiqued and improved through ontological analysis
  • Chapter 8 shows how a major enterprise modeling language can be redesigned as a better view over the ontology

That combination is extremely relevant for Governance Foundation because it mirrors the actual architecture we want:

  • canonical ontology underneath
  • domain specializations above it
  • framework overlays on top of that
  • practical critique/redesign of existing artifacts rather than blind adoption

Chapter 6, PHATO and ontology specialization

The phishing chapter is not mainly interesting because phishing itself is the central Governance Foundation domain. It is interesting because it demonstrates the method.

The method is:

  1. start from a foundational ontology
  2. use a reference ontology for the broader domain
  3. specialize that into a more concrete domain ontology
  4. use the resulting ontology to reason about interventions and countermeasures

That is exactly the kind of pattern Governance Foundation needs for turning a canonical ontology into domain-specific working ontologies.

PHATO as a specialization of ROSE

The thesis proposes PHATO, a Phishing Attack Ontology, by specializing ROSE.

This is important because the phishing domain is shown not as a disconnected taxonomy but as a specialization of a richer ontology of value, risk, and security.

The model introduces entities such as:

  • Scammer as a specialization of attacker/threat object
  • Impersonated Reputable Agent
  • Target as a risk subject
  • Lure
  • Hook
  • Asset Catch as a loss event
  • Phishing Enabler such as the target's email address, phone number, or reachable surface
  • Target Fragilities such as ignorance, fear, greed, urgency, distraction, curiosity, and similar mental attitudes

The key point is not just the list. It is that these are ontologically differentiated. They are not all thrown into one flat class hierarchy.

Phishing is modeled as a causal-dispositional structure

The thesis models phishing in terms of:

  • intentions
  • capabilities
  • vulnerabilities/fragilities
  • triggering situations
  • complex events
  • resulting loss events

A phishing attack is not treated as a single blunt object. It is modeled as a chain involving:

  • the scammer's intention to phish
  • the scammer's impersonation capability
  • exposure/enabling conditions
  • the target's fragilities
  • the phishing attack event itself
  • subsequent asset-catch/loss events

This is a really strong pattern. It shows how social and technical factors can be represented together without collapsing them into one vague bucket.

Fragilities are first-class and matter operationally

One of the most useful ideas in this chapter is that many human factors are treated as fragilities that can participate in the causal setup of loss.

Examples include:

  • ignorance
  • fear
  • complacency
  • curiosity
  • urgency
  • distraction
  • greed
  • loneliness

This matters because it shows that human vulnerabilities can be modeled without hand-wavy psychology. They become part of the ontological structure of the domain.

For Governance Foundation, this is very interesting because organisational failure also often depends on human and social fragilities, not just technical gaps.

Countermeasures are modeled by what they change

PHATO is especially valuable because it does not stop at describing phishing. It shows how anti-phishing countermeasures can be modeled ontologically.

A phishing awareness program is treated as a social entity whose capabilities are manifested by training events that alter the target's fragilities or build relevant capabilities.

So the intervention is understood in terms of what it changes in the world:

  • removing or attenuating fragilities
  • building new competencies/capabilities
  • preventing the situations that would otherwise trigger asset-catch events

That is exactly the kind of causal clarity Governance Foundation needs in governance and capability modeling.

Main lesson from Chapter 6

The big lesson is that a good ontology should support specialization into concrete domains without losing foundational discipline.

In other words:

  • start from a strong core
  • derive domain ontologies from it
  • use them to reason about actual interventions

Chapter 7, D3FEND critique as ontology quality work

The D3FEND chapter is valuable because it shows what ontological analysis looks like when applied to a real industry artifact.

D3FEND is important in practice, but the thesis argues that practical popularity does not mean conceptual adequacy.

The key move here is not to dismiss D3FEND. It is to analyze it as a computational ontology and identify where lack of foundations created semantic problems.

This is exactly the attitude Governance Foundation should keep toward widely used frameworks, taxonomies, and knowledge graphs.

The three main classes of problems found in D3FEND

The thesis identifies recurring issues such as:

  • ontological incompleteness
  • construct overload
  • under-specification

That is a very reusable evaluation lens.

In plain English:

  • something important is missing
  • one construct is trying to mean too many different things
  • there are too few constraints, so unintended interpretations slip through

D3FEND mixes fundamentally different things

A major criticism is that D3FEND tends to blur:

  • objects
  • events
  • intentions/tactics
  • techniques
  • capabilities
  • digital artifacts

This is exactly the kind of collapse OntoUML/UFO are supposed to help prevent.

The thesis shows examples where the ontology does not cleanly enforce distinctions between digital artifacts, events, physical objects, locations, and other disjoint categories. That allows nonsensical inferences and unintended instances.

Missing constraints are not a minor detail

One of the strongest practical lessons from Chapter 7 is that lack of constraints is itself a semantic failure.

If an ontology permits something to be, at once, an event, an object, a tactic, a reference, a location, and so on, then the ontology is not doing enough semantic work.

This matters a lot for Governance Foundation because a canonical ontology for agents cannot just store terms. It has to exclude bad models, not just allow good-looking ones.

D3FEND lacks important security-domain concepts

Using ROSE as the reference, the thesis argues that D3FEND also misses important domain concepts, including:

  • subjects
  • attackers/threat objects
  • vulnerabilities
  • intentions
  • triggering situations
  • the richer structure of control mechanisms

In other words, even if the taxonomy is large, the semantic skeleton is still incomplete.

That is a good warning for Governance Foundation work. A large vocabulary is not the same as a good ontology.

Main lesson from Chapter 7

The big lesson is that ontological analysis is not abstract academic criticism. It is a practical method for improving real knowledge artifacts.

For Governance Foundation, this means the Knowledge Ontology should eventually be able to evaluate imported frameworks, taxonomies, and external models for:

  • missing concepts
  • overloaded concepts
  • missing constraints
  • invalid category mixing
  • weak interoperability semantics

Chapter 8, ArchiMate as a framework view to redesign

This chapter is maybe the most directly relevant one for the broader Governance Foundation direction.

Why? Because it studies a major enterprise architecture language and shows that its security/risk overlay should be redesigned based on ontology.

This is very close to the Governance Foundation idea that frameworks are views over ontology, not the canonical ontology itself.

The thesis identifies six limitations in the ArchiMate risk/security overlay

The thesis identifies six limitations in the RSO, including:

  1. redundant or unclear intention-like constructs
  2. under-specified implemented control measures
  3. weak treatment of baseline versus target architecture and change over time
  4. missing subjects in the security domain
  5. missing triggering conditions of protection events
  6. weak representation of interdependence among risk capabilities

This is important because it shows in a very concrete way what a framework misses when it does not fully align with the ontology underneath.

Security elements in frameworks often blur means, ends, and realizations

One of the thesis's strongest points here is that constructs like:

  • control objective
  • security requirement
  • control measure
  • security principle

are not always cleanly distinguished in the framework.

Some are really different levels of intention, abstraction, or means-end relations. Some are partly redundant. Some are underspecified.

That is exactly the kind of thing Governance Foundation should expect when mapping external frameworks into a canonical ontology. The framework terms are often useful, but they are not automatically ontologically clean.

Prevention has to be represented in framework terms without losing the theory

A subtle but important point in Chapter 8 is that ArchiMate does not clearly distinguish the type level from the instance level. So representing the prevention theory inside it requires adaptation.

That is very relevant. It means a framework view may not be able to express the ontology perfectly. That is okay, but it strengthens the case for keeping the canonical ontology underneath and generating framework-aligned views from it.

Chapter 8 reinforces that security mechanisms need internal structure

The chapter keeps pushing the same very important pattern:

  • security mechanism object
  • control capability
  • protection/control event
  • protection trigger
  • resulting controlled situation
  • affected subject and intention

This is better than just saying "control X mitigates risk Y".

For Governance Foundation, this pattern generalizes well beyond cybersecurity. You can reuse it for:

  • governance controls
  • policy interventions
  • change programs
  • compliance mechanisms
  • organisational capability design

Modeling change over time matters

A particularly useful lesson from the ArchiMate chapter is that it is not enough to model the steady-state relationship between a control and a vulnerability. The framework also needs to express change from baseline architecture to target architecture.

This is excellent for Governance Foundation because organisational ontology cannot stay purely static. It has to support:

  • current state
  • desired state
  • intervention path
  • migration/change plateaus
  • before/after comparisons

Main lesson from Chapter 8

The big lesson is that enterprise architecture frameworks become much more useful when treated as semantically constrained views over a better ontology.

Not the other way around.

Practical relevance of Batch 3

Batch 3 strongly reinforces several Governance Foundation positions.

1. Domain ontologies should specialize a canonical core

PHATO shows how to derive a domain ontology from a better-founded reference ontology. This is a strong precedent for Knowledge Ontology -> domain specialization.

2. Imported external models should be audited ontologically

The D3FEND analysis shows that adopted industry artifacts should not be trusted just because they are popular. They should be tested for incompleteness, overload, and under-specification.

3. Frameworks should be treated as overlays/views

The ArchiMate chapter strongly supports the idea that enterprise frameworks are not the semantic foundation. They are better understood as views that may need redesign to align with ontology.

4. Canonical ontology must support intervention semantics

Batch 3 reinforces that the model should support:

  • subjects
  • intentions
  • dispositions
  • triggers
  • events
  • controlled situations
  • change over time
  • domain specialization

5. Human and social factors belong in the ontology

The phishing chapter especially reinforces that social, behavioural, and cognitive factors are not outside the model. They are part of the real causal structure.

Batch 4 synthesis

What the final batch adds

Batch 4 does not introduce another big domain case. Instead, it consolidates the whole thesis.

That matters because it makes explicit what the author thinks the real contribution is:

  • not just a phishing ontology
  • not just a security extension for ArchiMate
  • not just criticism of D3FEND
  • but a repeatable ontology engineering approach grounded in UFO and carried through OntoUML into domain and framework artifacts

Chapter 9 organizes the thesis around six research contributions

The final chapter is very useful because it restates the thesis as a progression of six contributions:

  1. a systematic mapping of the security ontology landscape
  2. a general ontology of prevention grounded in UFO
  3. ROSE as a reference ontology for security from a risk-treatment perspective
  4. PHATO as a specialization of ROSE for phishing
  5. ontological analysis of D3FEND as evaluation of a practical knowledge artifact
  6. ontological analysis and redesign of ArchiMate security modeling

This makes the structure of the work very clear. The thesis is cumulative. Each layer supports the next one.

The deepest contribution is probably the method, not only the artifacts

Reading the final chapter, the strongest overall takeaway is that the thesis is really arguing for a method:

  • map the domain and expose the gaps
  • ground the core semantics in a foundational ontology
  • model central mechanisms carefully
  • build a reference ontology
  • specialize it into more concrete domains
  • use it to critique and redesign existing languages and knowledge artifacts

That is a very strong fit for Governance Foundation. It is close to the method we need for Knowledge Ontology work.

Prevention remains the conceptual hinge of the whole thesis

Chapter 9 makes clear that prevention is the central bridge between abstract ontology and practical security modeling.

This is important because the thesis does not define security mainly as a bag of controls. It defines security around how designed interventions prevent or reduce the realization of risk events.

That point is very reusable outside cybersecurity. For Governance Foundation, many governance mechanisms can also be understood as structured prevention or structured intervention.

The thesis argues strongly for well-founded models as practical tools

The final chapter is also very explicit that the work is meant to help:

  • enterprise modeling researchers
  • ontology engineers
  • enterprise architects
  • practitioners designing real systems

This is worth noting because it pushes back against the idea that foundational ontology is only philosophical overhead. The thesis argues the opposite: without those foundations, large practical artifacts become semantically brittle.

A major practical warning: large taxonomies are not enough

By the end of the thesis, one clear lesson is that practical value does not come from having lots of terms. It comes from having:

  • good ontological distinctions
  • meaningful constraints
  • clean specialization
  • reusable patterns
  • explicit semantics

This is exactly the kind of lesson Governance Foundation should keep front and center. A large organizational vocabulary without these properties will still produce muddle.

Relevance for researchers and practitioners

The final chapter says the work matters because it can help:

  • improve modeling languages and enterprise tools
  • improve knowledge-graph quality
  • improve enterprise architecture representations of security and risk
  • support the design of systems for defense, health, and national security

Translated into Governance Foundation terms, the lesson is simple:

  • the ontology is not just for documentation
  • it is infrastructure for reasoning, tooling, and design improvement

Limitations are also important and honest

The thesis is pretty clear about its own limitations. Two especially important ones are:

  1. the theory of prevention does not yet handle interference well
  2. the work does not cover the whole of risk management

That first point matters a lot. Prevention is modeled strongly, but mitigation/interference is still only partially handled. So if Governance Foundation reuses this line of thought, it should avoid pretending the prevention theory already covers every kind of partial dampening, weakening, or delay.

The second point matters because a full governance ontology will need more than just:

  • assessment
  • treatment

It will also need things like:

  • monitoring
  • reporting
  • consultation
  • review
  • communication
  • compliance and institutional process

Future perspectives are unusually relevant

The future work section is not filler. It points toward directions that are highly relevant for Governance Foundation.

1. Formal ontology of prevention

The thesis explicitly wants a stronger formalization of prevention and interference, including first-order logic formalization and modularization with UFO.

For Governance Foundation, that suggests a path from:

  • narrative conceptual guidance
  • to formal ontology modules
  • to machine-checkable rules and tests

2. Object-event simulation

This is one of the most exciting parts. The thesis proposes object-event simulation for risk and security modeling.

That fits extremely well with the idea that ontology should not only classify reality but support:

  • scenario analysis
  • simulation
  • reasoning about interventions
  • before/after architectural comparisons

This feels very aligned with where a mature Knowledge Ontology Runtime Model could eventually go.

3. Continued PHATO validation

The author plans to keep validating PHATO through:

  • more literature review
  • expert validation sessions
  • alignment with datasets

That is a strong practical reminder that ontology work is not done when the model is drawn. It needs iterative validation against evidence and operational usage.

4. Unified ontology of value, risk, and security

This is probably the most relevant future direction for Governance Foundation. The thesis explicitly points toward integrating COVER and ROSE into a unified ontology of value, risk, and security.

That strongly resonates with the Governance Foundation direction because organisational ontology also needs to connect:

  • value
  • risk
  • intervention
  • governance
  • capability
  • incident
  • resilience

The thesis even notes a very interesting framing:

  • incidents as actual prevention of value
  • risks as possible prevention of value
  • security as a form of double prevention

That is a really strong idea and worth preserving.

5. Better-founded threat intelligence models

The thesis proposes a future well-founded model combining D3FEND and ATT&CK.

The broad lesson for Governance Foundation is that imported operational taxonomies should eventually be reworked into a cleaner semantic substrate before being trusted as canonical machine knowledge.

6. Ontological analysis of FMEA

This is another useful signpost. It shows the method is portable beyond cybersecurity and into reliability/safety engineering.

That portability matters, because Governance Foundation should not treat OntoUML only as a cybersecurity lens. It is a way of engineering clearer conceptual models across domains.

Appendix A matters because the work is deliberately kept alive

Appendix A lists public project repositories and PURLs for the ontology artifacts:

  • prevention ontology
  • ROSE
  • D3FEND analysis
  • phishing ontology
  • ArchiMate security modeling artifacts

That matters because the thesis treats ontology work as a living artifact, not a frozen PDF.

This is very aligned with what Max asked for in this chat. The OntoUML synthesis should stay living and updateable in the repo.

Appendix B is more important than it first looks

The vocabulary appendix is extremely useful. It provides compact definitions for the novel terms introduced across the thesis.

Some especially valuable terms to preserve are:

  • Control Capability
  • Control Event
  • Control Chain Event
  • Controlled Situation
  • Countermeasure to
  • Security Mechanism
  • Security Designer
  • Protected Subject
  • Protection Trigger
  • Mutual Activation Partnership
  • Prevention
  • Generic Intention
  • Specific Intention
  • phishing-specific terms like Scammer, Hook, Lure, Target, Target's Fragility, Phishing Enabler, Asset Catch, and Vulnerability Condition

This appendix is almost a seed dictionary for a reusable ontology engineering glossary.

Best lessons from the appendices

The appendices reinforce three things:

  1. ontology work should have stable public artifacts and identifiers
  2. vocabulary should be made explicit and maintained as a reference asset
  3. conceptual work is more reusable when its terms are kept crisp and versionable

Practical relevance of Batch 4

Batch 4 sharpens the Governance Foundation implications a lot.

1. The real reusable asset is the ontology engineering method

The thesis is not only a set of outputs. It is a method for building better conceptual infrastructure.

2. A runtime ontology should eventually support simulation and reasoning

The future-work emphasis on formalization and object-event simulation strongly supports a runtime-oriented direction, not just static docs.

3. Governance Foundation needs more than prevention alone

If we borrow heavily from this thesis, we should also consciously extend it into:

  • interference/mitigation
  • monitoring
  • reporting
  • review
  • institutional communication
  • governance process loops

4. Stable identifiers and living docs matter

Appendix A reinforces the value of persistent artifacts and public references. That is a good pattern for long-lived ontology assets in Governance Foundation.

5. Explicit glossary work is not optional

Appendix B makes it obvious that good ontology work eventually needs a maintained vocabulary layer, not just prose pages.

Strongest final interpretation for Governance Foundation

After all four batches, the most convincing reading of the thesis is:

  • UFO provides the deep foundational distinctions
  • OntoUML provides the discipline for building clear conceptual models
  • reference ontologies such as COVER and ROSE provide reusable semantic cores
  • domain ontologies specialize those cores into concrete problem areas
  • frameworks and modeling languages should be treated as overlays or translations, not as semantic source-of-truth
  • good ontology work must include constraints, vocabulary, specialization discipline, and living artifacts
  • the next mature step is runtime semantics, including reasoning, validation, and possibly simulation

Best OntoUML ideas to carry forward

These are the strongest reusable ideas so far.

1. Model the world, not just the reporting framework

This is the deepest lesson. The model should aim to capture what is there, not just how one framework wants to talk about it.

2. Identity matters

The model has to distinguish what gives something its identity from the temporary contexts it enters. This is why kind, role, and phase distinctions matter.

3. Relationships often deserve ontological substance

Many important organisational relationships are not just lines. They are structured social or normative arrangements. This is why relators matter.

4. Capabilities, vulnerabilities, and liabilities are not the same as events

They are dispositions that may manifest under certain conditions. This gives a much better basis for reasoning about risk, opportunity, governance, and change.

5. Interventions should be modeled causally

Controls, policies, security mechanisms, and governance mechanisms should be modeled in terms of what they change in the causal and dispositional setup of the world.

6. Frameworks should be views over the ontology

This aligns strongly with the Governance Foundation position that TOGAF, BMC, and similar models should be layered as presentations/translations rather than treated as the canonical storage structure.

What this likely means for Knowledge Ontology

At this stage, the strongest working interpretation is:

Canonical ontology layer

The canonical layer should likely model things such as:

  • organisations
  • people
  • teams
  • roles
  • capabilities
  • services
  • products
  • applications
  • data objects
  • infrastructure elements
  • decisions
  • policies
  • risks
  • vulnerabilities
  • dependencies
  • controls
  • workflows
  • events
  • evidence
  • obligations
  • agreements

Not all of these are the same ontological kind of thing

Some are likely:

  • kinds
  • roles
  • phases
  • relators
  • qualities
  • dispositions
  • events
  • situations

That is exactly why OntoUML is useful.

Agents should not just store notes

Agents should be able to persist knowledge into this ontology as:

  • typed entities
  • typed relationships
  • structured relators
  • dispositions and qualities
  • event records
  • state/phase changes
  • evidence and provenance
  • confidence and contradiction markers

Rules should follow ontological distinctions

Examples:

  • a role should depend on an appropriate context
  • a phase should not be modeled as a permanent kind
  • a control should connect to what it is capable of preventing
  • a risk score should not be confused with the risk event type itself
  • a contract-like relation may need a relator rather than a bare link

Governance Foundation working heuristics

Until a fuller formal model exists, these are good working heuristics.

Treat these as likely different

Do not casually collapse:

  • organisation vs organisational role
  • capability vs process
  • process vs event occurrence
  • vulnerability vs incident
  • control mechanism vs control event
  • goal vs policy
  • contract vs relationship line
  • confidence score vs evidence

Prefer structure over convenience when it matters

If the ontology will be used by agents and rules, convenience modeling shortcuts become future problems.

Separate canonical semantics from presentation semantics

A framework may present:

  • capability map
  • value stream
  • application inventory
  • governance structure

But those presentations should be derived from the canonical ontology where possible.

Common modeling mistakes to watch for

These are exactly the kinds of problems OntoUML helps catch.

Role as kind mistake

Bad pattern:

  • model Customer as if it were a permanent kind of person

Better:

  • Person as kind
  • Customer as role

State as kind mistake

Bad pattern:

  • model Draft Document and Published Document as unrelated kinds

Better:

  • underlying thing persists
  • draft/published are phase-like distinctions

Relationship flattening mistake

Bad pattern:

  • Person linked to Organisation with a simple line when the real thing is employment, appointment, membership, or contract

Better:

  • model the underlying relator where the semantics matter

Event-disposition confusion

Bad pattern:

  • capability treated as if it were the same thing as the behavior/event itself

Better:

  • capability is a disposition
  • event is its manifestation under certain conditions

Score-reality confusion

Bad pattern:

  • risk score treated as if it were the same thing as the risk structure itself

Better:

  • score is a quality/assessment artifact
  • risk setup is a broader ontological configuration

What still needs to be synthesized

The thesis batch synthesis is now complete through Batch 4.

The next work should shift from thesis extraction to synthesis application:

  • map current Knowledge Ontology concepts into OntoUML-style categories
  • define a sharper Knowledge Ontology Runtime Model
  • identify where Governance Foundation needs concepts beyond the thesis, especially around monitoring, reporting, review, and interference/mitigation
  • start a maintained glossary or vocabulary page derived from the strongest terms in the guide

Current Governance Foundation implications

So far, the thesis reinforces these architectural positions:

  1. The canonical knowledge layer should sit below framework views
  2. OntoUML is useful because it carries foundational distinctions into conceptual models
  3. Frameworks should be views over the ontology, not the ontology itself
  4. Agents need access to ontological distinctions such as role, disposition, event, state, capability, and relationship
  5. Controls, interventions, and policies should be modeled as structured causal mechanisms, not just labels

Current synthesis status

This guide currently includes:

  • thesis structure
  • the grounding stack
  • plain-English concept notes
  • Batch 1 synthesis
  • Batch 2 synthesis
  • Batch 3 synthesis
  • Batch 4 synthesis
  • practical Governance Foundation interpretation

Still to be added:

  • a more explicit mapping from current Knowledge Ontology concepts to OntoUML-style categories
  • a first-cut OntoUML-informed runtime object model for agents
  • a compact glossary/vocabulary artifact derived from the thesis and adapted for Governance Foundation use