Abstract—This study is a sequel to a previous study entitled It should be clear that this work is an exploratory
“Thinging for Software Engineers”, which showed that the notion explanation of existential ontology and that there is no claim of
of thing, in contrast to objectification, has some beneficial authority in the subject matter; however, the author must risk
orientations in modeling. The incorporation of thinging in incurring disapproval, as there is no other available understood
conceptual modeling is required to explain the roots of explanation of existential ontology for software engineers and,
Heidegger’s conception of things. This requires an understanding possibly, for most non-philosophers. Hence, if the
of Heidegger’s existential ontology to identify any relationship to interpretation of Heidegger’s ideas is wrong, the presented
thinging. This paper is an exploration of existential ontology in materials can be considered the author’s thoughts inspired by
search of further clarification of the concept of thinging. We start
his reading of Heidegger.
by reviewing the thinging machine (TM) introduced in “Thinging
for Software Engineers” and provide a full example of its
This paper falls within the intersection of two research
utilization in modeling an “ordering system”. We follow this with disciplines:
a discussion of the being (existence) of things in the word and Software engineering/modeling/conceptual
Heidegger’s interpretation of time as a possible horizon for any Philosophy/ontology/existential
understanding whatsoever of being. We emphasize that the TM is Although interdisciplinarity is fashionable in academia, it is
not related directly to the Heideggerian notion of existence and typically viewed as cooperation among experts in the different
its elaborate analysis of Dasein. However, there may be some disciplines. The work in this paper is characteristically not
benefit to studying non-Dasein things to provide a philosophical appreciated by specialists in both disciplines, as philosophy
foundation to thinging, as utilized in TM modeling. Interestingly, specialists consider it an intrusion on their turf and software
the TM can be utilized to model existential ontology, thus engineering specialists think that it is not a practical effort and
increasing the level of understanding about them. will lead to nothing. So, this paper needs (e.g., reading,
refereeing) experts and generalists who are not strictly
Keywords-conceptual modeling; thing vs. object; thinging; specialists. A specialist is a person who possesses special
diagrammatic representation knowledge relating to a particular area of study. Generalists
have an understanding of several subjects—in our case,
I. INTRODUCTION conceptual modeling in software engineering and ontology in
This study is a sequel to a previous study under the title philosophy.
“Thinging for Software Engineers”, which was published in Conceptual modeling in software engineering is employed
this journal [1]. Our motivation for that paper was the repeated to facilitate, systemize, and aid the process of information
rejection of submitted papers in conceptual modeling in engineering. Conceptual models describe entities of some
software engineering based on, in the referees’ words, “the use domains in semantic terms [3]. The model serves as a tool for
of vague terms such as things.” “Thinging for Software communicating between developers and users, thus helping
Engineers” [1] shows that the notion of thing has a analysts to understand a domain, providing input to the design
philosophical foundation in Heidegger’s works, specifically in process, and documenting purposes [3].
in his work entitled “The Thing” [2]. This paper adopts a conceptual model, called a thinging
Our incentive for this paper was raised by students who are (abstract) machine (TM) that views all components of the
modeling using the thinging machine (TM) and the impression domain in terms of a single notion: flow machine [4–12]. As
that that the notions thing and thinging have an origin in our objective is to discuss the TM in terms of existential
Heidegger’s other works; thus, according to students, “to ontology, the TM is reviewed, and a full sample of the TM
incorporate thinging in conceptual modeling in software model is applied to a real system of ordering items.
engineering, we need to understand Heidegger’s existential Given the size of the research produced over the years on
ontology which is very difficult if not impossible to Heidegger’s thoughts, another review of the literature is not
comprehend by us.” This paper is an attempt to find the roots necessary. Instead, simplified Heideggerian statements (e.g., no
of thinging in Heidegger’s existential ontology. This would non-English terms) will be interwoven into the appropriate text
clarify further direction by providing a philosophical in the paper. We assume that the reader is familiar with basic
foundation to the TM approach.
70 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
71 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
(what gets used – Heidegger) occurs when a machine changes In UML semantics, activity diagrams are reducible to state
a thing in a certain way. For example, a doctor machine could machines, with some additional notations to indicate that the
process a patient to decide on the appropriate treatment. Note vertices represent an activity being carried out; the edges
that release, transfer, and receive are not Heidegger’s notions. represent the transition from the completion of one collection
Each type of flow is distinguished from other flows. No two of activities to the commencement of a new collection.
flow streams are mixed, just as telephone and water lines are Activity diagrams capture the aspects of high-level activities
separate in buildings’ blueprints. However, two types of things [16].
can enter a machine for a shared supertype (e.g., integers and As this ordering system is already modeled using UML,
real numbers flowing to a number machine). A TM does not this provides an opportunity to contrast it with the alternative
necessarily include all stages (e.g., an archiving system might TM modeling.
only use the transfer, receive, release, and process stages,
A. Static Thinging Machine Model
leaving out the create stage).
Machines can interact through flows or by triggering new The initial TM diagrammatic description is static in
stages. Triggering is a transformation (denoted by a dashed Heidegger’s sense of a present-at-hand multiplicity of “nows”,
arrow) from one flow to another (e.g., when a flow of as will be explained later. Fig. 4 shows the ordering system, as
electricity triggers a flow of air). understood from the state and activity diagrams. In Fig. 4, an
ordered list is created (1) in the lower left corner of the figure.
III. EXAMPLE OF THINGING MACHINE MODELING The order list flows to the ordering system (2), where it is
This paper is about thinging and explores strengthening its stored (3) and processed (4) to create an invoice (5).
foundation. Hence, to have a self-contained paper, we provide The invoice then flows to the customer (6). Sending the
a full example of the TM in this section. invoice to the customer triggers the setting of the deadline (7)
According to Visual Paradigm [16], a state diagram is a for receiving the payment; if the payment is not received on
type of UML behavior diagram. It describes all of the possible time (8), lateness triggers the deletion of the order (9). If the
states of an object (or even an entire system) and provides the customer creates a payment (10) that the ordering system
means to control decisions. The object behaves differently receives (11), the following activities are the result:
depending on its state. A simple ordering system is described A trigger stops the timer for payment (12).
in terms of state, and activity diagrams are given, as shown in A trigger extracts (13) items (14) from the list. Note that
Figs. 2 and 3, for an ordering system. the ordered items include two components: the items’
names and the number of ordered items (15).
Get order
…
Checking
Do/check item
[some items not in stock]
Waiting Dispatching
Do/check item
Item received [all items not in stock]
Item received [some items not in stock] Event … Action
Figure 2. State diagram for ordering items (Redrawn, partial from [16]).
Receive order
Assign to order
72 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
Release
27 Request to supply 25
Supplier Transfer
24If .No. in stock =>
Ordered No.
Transfer 32 30 Release 23 Process: compare
Receive Create If No. in stock
< Ordered No. 19
Receive Receive
No. of items in Release
35 stock 20 Transfer Transfer
19 21 22
26 Process
Stock
34 31
33 Order on hold
Process On hold Receive Transfer Transfer Release
18
Ordered item
16 Process
28
Process: Packaging Transfer
Item 17
Number
14
Release of Release
Create Item name Create Ordered
Transfer items
15 Create
29
3 Process: delete
9
12
Receive 4 Time
Process 8 De-create
If beyond deadline 11
Transfer 5 Invoice
Process
Create Release Transfer Create Transfer
7
2
6
Transfer Payment
Transfer
Transfer Release Create
Customer Transfer
Receive Release
10
Receive 1 Order list
Process Create
Processing the ordered items (16) results in the following: If the number of items in stock equals or is greater than
The number of ordered items is extracted (17). the number of ordered items (24, upper right corner), the
Simultaneously, a trigger (18) releases (19, middle of the ordered items are released (25) from stock (26, yellow
figure) the current number of items in stock (20). circle) and flow (27) to the packaging process (28). They
The above two values are sent (21 and 22) for comparison are then sent to the customer who made the order (29,
(23): lower right corner).
73 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
If the number of items in stock is less than the number of The number of items in stock is updated (35, blue circle).
ordered items, two things can happen:
(a) A request is issued for the supplier to provide new B. Events and time
items (30). To specify the behaviors in such a system, we identify the
(b) The order is put on hold (31, red circle). sequence events in the diagram. Every change in the model
When a requested item is received (32, orange circle), it is can be considered an event. However, at the practical level,
put in stock (26, yellow circle) and then followed by the these events are combined to form different combinations of
subsequent steps: events. To illustrate, we outline one of these combinations as
The on-hold item is processed to trigger (33) the release follows (see Fig. 5):
(34), the packaging (28), and the sending (18) of the item
to the customer who ordered it.
E14 Release
Request to supply
Supplier Transfer
E9 If .No. in stock =>
E10
Ordered No.
Transfer
Receive
Release
Create
Process: compare
If No. in stock E8
E13
< Ordered No.
E7
stock Transfer Transfer
Process
Stock
Ordered item
Process
E6
Process: Packaging Transfer
Number
Release of Release
Create Item name Create Ordered
Transfer items
E5 Create
E3
Process: delete
Receive
Process Time De-create
Transfer Invoice If beyond deadline
Process
Create Release Transfer Transfer
Create
E1 E2 E4
Transfer Payment
Transfer
Transfer Release Create Receive
Customer Transfer
Release
Receive Order list
Process Create
Figure 5. Events.
74 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
Invoice
Receive Payment E4 E2
No payment, cancel
E3
Extract item E5
75 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
76 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
77 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
Figure 13. Illustration of the notions of events and region (Adapted from (Heidegger (being and time)).
“forthwith be no-longer-now” and nows that have “just been Create “Now”
not-yet-now.” Time is understood as a succession or as a Transfer Transfer Transfer Transfer Transfer
“flowing stream” of nows. The nows are present-at-hand in the Receive Release Receive Release Receive
same way as things. The nows pass away, and those which Process Process
Process
have passed away make up the past. The nows come along, and
those which are coming along define the “future”. The time
character has a location of the same kind as Dasein’s. Existence
(Now Time)
This understanding of time is represented in Fig. 16. The
lower stream of flow denotes the flow of Dasein. Figure 16. The nows come along, and those that are coming along define
the “future”.
78 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
REFERENCES
[1] S. Al-Fedaghi, “Thinging for software engineers,” International Journal
of Computer Science and Information Security (IJCSIS), vol. 16, no. 7,
The left most rectangle is the event of the Dasein appearance pp. 21–29, July 2018.
(create). Then he/she flows in being from one event to another. [2] M. Heidegger, “The thing,” in Poetry, Language, Thought, A.
As mentioned above, the nows come along, and those which Hofstadter, Trans. New York: Harper & Row, 1975, pp. 161–184.
are coming along define the future. Because now is time, [3] J. C. Recker, “Conceptual model evaluation. Towards more
existence is defined in terms of time. paradigmatic rigor,” in CAiSE’05 Workshops, J. Castro and E. Teniente,
According to Wheeler [23] in the Stanford Encyclopedia of Eds. Porto, Portugal: Publisher, 13–14 June 2005, pp. xx–xx.
Philosophy, Dasein’s three temporal dimensions are past [4] S. Al-Fedaghi and A. A. Alkhaldi, “Thinging for computational
(thrownness), future (projection), and present (fallenness). thinking, international,” Journal of Advanced Computer Science and
Dasein’s existence is understood by way of an interconnected Applications (IJACSA), vol. 10, no. 2, pp. xx–xx, 2019.
pair: thrownness-projection-fallenness and disposedness- [5] S. Al-Fedaghi, “Thinging vs objectfying in software engineering,”
International Journal of Computer Science and Information Security
understanding-fascination. These dimensions can be added, as (IJCSIS), vol. 16, no. 10, pp. xx–xx, July 2018.
shown in Fig. 17. [6] S. Al-Fedaghi, “A method for modeling and facilitating understanding of
user requirements in software development,” Journal of Next Generation
VII. CONCLUSION Information Technology SCOPUS, vol. 4, no. 3, pp. 30–38, 2013.
This paper started by reviewing thinging machines (TMs) so as [7] S. Al-Fedaghi, “Crossing privacy, information, and ethics,” 17th
to enhance the TM approach and strengthen its potential International Conference Information Resources Management
Association (IRMA 2006), Washington, DC, USA, May 21-24, 2006.
viability as a tool in conceptual modeling. It is a venture to republished in Emerging Trends And Challenges in Information
explore the roots in Heidegger’s conception of things. Technology Management, Mehdi Khosrow-Pour (ed.), IGI Publishing
Accordingly, existential ontology is explained through Hershey, PA, USA, 2006.
examples and analogies. [8] S. Al-Fedaghi, “Article title,” International Journal of Advancements in
The results do not seem to be satisfactory, as too much Computing Technology, vol. 3, no. 9, pp. 302–313, Year.
effort is spent in understanding the Dasein. Our goal is centered [9] S. Al-Fedaghi, “Privacy as a base for confidentiality,” Presented in the
on thinging and not the Dasein. In existential ontology, Fourth Workshop on the Economics of Information Security, Harvard
Heidegger’s whole focus is the Dasein, and his discussion of University, Cambridge, MA, 2005.
non-Dasein things is directed to serve this purpose. It is not [10] S. Al-Fedaghi and A. A. Alkhaldi, “Thinging for computational
thinking,” International Journal of Advanced Computer Science and
clear how to concentrate mainly on non-Dasein things, as Applications (IJACSA), vol. 10, no. 2, pp. xx–xx, 2019.
Dasein is the only one who understands being and its own [11] S. Al-Fedaghi, “Schematizing Heidegger,” 13th International
being. Perhaps this is what Heidegger was trying to do in the Conference on Information Technology: New Generations, ITNG 2016,
“The thing” [2]. Further works should proceed further in April 11-13, 2016, Las Vegas, Nevada, USA. Springer, Information
potentially reaching non-Dasein things as the stars of the show. Technolog: New Generations, v 448 of the series Advances in Intelligent
On the positive side, we demonstrated that the TM is Systems and Computing, pp. 1195–1207, 29 March 2016.
applicable in illustrating and explaining existential ontology, [12] S. Al-Fedaghi, “An engineering reading of Deleuze and Guattari’s Anti-
Oedipus,” 2016 International Symposium on Economics and Social
thus strengthening the relationship between conceptual Science (ISESS 2016), Bangkok, Thailand, 19–21 January, 2016.
modeling and philosophy.
Pass away
Come along
“Nows”
“Nows”
Transfer Transfer Transfer Transfer
Transfer Transfer
Receive Release Receive Release
Receive Release
Process Process
… Process
Process Create
Create “Now”
Transfer Transfer Transfer Transfer Transfer Receive Process Create Process
Receive Release Receive Release
Thrownness Fallen-ness Projection
Process Process Create Process
79 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 3, March 2019
[13] T. Nail, “What is an assemblage?” SubStance, vol. 46, no. 1 (Issue 142), [19] J. A. Escudero, “Heidegger on selfhood,” American International
pp. 21–37, 2017. Journal of Contemporary Research, vol. 4 no. 2, pp. 6–17, February
[14] M. Heidegger, Being and Time, Trans. by John Macquarrie and Edward 2014.
Robinson. London: SCM Press, 1962. [20] I. Graham, Object Oriented Methods. Location: Addison-Wesley, 1995.
[15] J. Carreira, “Philosophy is not a luxury,” [blog], March 2, 2011, [21] J.-M. Favre, “Foundations of model (driven) (reverse) engineering:
https://philosophyisnotaluxury.com/2011/03/02/to-thing-a-new-verb/ Models - Episode i: Stories of the fidus papyrus and of the solarus.
[16] Visual Paradigm, “State Machine Diagram vs Activity Language Engineering for Model-Driven Software Development 2004,
Diagram”, (No date), https://www.visual 2004.
-paradigm.com/guide/uml-unified-modeling-language/state- [22] A. Schwill, “Fundamental ideas of computer science,” Bull. Eur. Assoc.
machine-diagram-vs-activity-diagram/ Theor. Comput. Sci., vol. 53, pp. xx–xx, 1994.
[17] R. Nath, “Introduction to Object-Oriented Methodology,” March 15, [23] M. Wheeler, “Martin Heidegger,” in Stanford Encyclopedia of
/2019). www.ddegjust.ac.in/studymaterial/mca-5/mca-503.pdf Philosophy, A. Editor, Ed. Location: Publisher, October 2011, pp. xx–
[18] H. Dreyfus and P. Rabilnow, “Can there be a science of existential xx.
structure and social meaning?” in Bourdieu A Critical Reader, R.
Shustennan, Ed. Location: Blackwell Publishers Ltd., 1999, pp. xx–xx.
80 https://sites.google.com/site/ijcsis/
ISSN 1947-5500