feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (4)
  • HWR Berlin  (4)
  • Konferenzschrift  (4)
Type of Medium
Language
Region
Years
Subjects(RVK)
Access
  • 1
    UID:
    b3kat_BV044334776
    Format: 1 Online-Ressource (XV, 355 Seiten) , 105 Illustrationen
    ISBN: 9783319594668
    Series Statement: Lecture Notes in Business Information Processing 287
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-59465-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Managementinformationssystem ; Informationssystem ; Unternehmensarchitektur ; Software Engineering ; Prozessmanagement ; Requirements engineering ; Konzeptionelle Modellierung ; Modellgetriebene Entwicklung ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Gulden, Jens 1974-
    Author information: Nurcan, Selmin
    Author information: Reinhartz-Berger, Iris
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV045099690
    Format: 1 Online-Ressource (XIV, 305 Seiten) , 79 Illustrationen
    ISBN: 9783319917047
    Series Statement: Lecture Notes in Business Information Processing 318
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-91703-0
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    Keywords: Unternehmensarchitektur ; Prozessmanagement ; Informationssystem ; Konzeptionelle Modellierung ; Modellgetriebene Entwicklung ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Gulden, Jens 1974-
    Author information: Reinhartz-Berger, Iris
    Author information: Schmidt, Rainer
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV047693728
    Format: 1 online resource (358 pages)
    ISBN: 9783319594668
    Series Statement: Lecture Notes in Business Information Processing Ser. v.287
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- BPMDS 2017 -- EMMSAD 2017 -- BPMDS 2017 Organization -- Contents -- Non-functional Considerations in Business Processes -- Towards a Data-Driven Framework for Measuring Process Performance -- 1 Introduction -- 2 Preliminaries -- 3 Approach -- 3.1 Time Dimension -- 3.2 Cost Dimension -- 3.3 Quality Dimension -- 3.4 Flexibility Dimension -- 4 Conclusion -- References -- Supporting Secure Business Process Design via Security Process Patterns -- 1 Introduction -- 2 Security Process Patterns -- 3 Secure Business Process Design Framework -- 4 Evaluation -- 5 Related Work -- 6 Conclusion -- References -- NFC-Based Task Enactment for Automatic Documentation of Treatment Processes -- 1 Introduction -- 2 Solution Design -- 3 Implementation -- 3.1 Contribution - Data Repositories: Hardware and Care Utilities -- 3.2 Contribution: NFC Reader -- 3.3 Contribution: Automatic Care Enhancement (ACE) -- 3.4 Implementation of Scenario: Give Care Utility to Resident -- 3.5 Implementation Choice: NFC -- 4 Evaluation -- 4.1 Morning Routine -- 4.2 Evening and Night Routine -- 5 Transferability to Other Domains -- 6 Related Work -- 7 Conclusion and Outlook -- References -- New Challenges in Business Process Modeling and Support -- Discovering Social Networks Instantly: Moving Process Mining Computations to the Database and Data Entry Time -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Process Mining -- 3.2 Social Network Analysis -- 3.3 Handover of Work -- 4 Enabling Social Network Discovery in Database -- 5 Mining Social Networks Instantly -- 6 Implementation -- 7 Experimental Result -- 8 Conclusion -- References -- Re-evaluation of Decisions Based on Events -- 1 Introduction -- 2 Motivating Example -- 3 Background -- 4 Re-evaluation Scope for Business Processes -- 4.1 Basic Idea -- 4.2 Context-Sensitive Event Queries , 4.3 Point of No Return -- 5 Evaluation -- 5.1 Proof-of-Concept Implementation -- 5.2 Application to Use Case -- 6 Related Work -- 7 Conclusion -- References -- Requirements Framework for Batch Processing in Business Processes -- 1 Introduction -- 2 Literature Review -- 2.1 Batch Processing in Other Domains -- 2.2 Batch Processing in Business Process Management -- 3 Requirement Analysis for Batch Processing in Business Processes -- 3.1 Scenarios Requiring Batch Processing -- 3.2 Requirements Framework -- 3.3 Discussion on Completeness of the Framework -- 4 Application of the Framework -- 5 Conclusion -- References -- Testing Business Processes -- Performance Comparison Between BPMN 2.0 Workflow Management Systems Versions -- 1 Introduction -- 2 Defining a Representative Workload Model -- 2.1 Workload Mix Generation Method -- 2.2 Applying the Workload Mix Generation Method -- 2.3 Load Function -- 3 Case Study Settings -- 4 Evaluation -- 4.1 Performance Metrics -- 4.2 Reliability of Results -- 4.3 Results -- 4.4 Discussion -- 5 Threats to Validity -- 6 Related Work -- 7 Conclusion and Future Work -- References -- BPMN-Based Model-Driven Testing of Service-Based Processes -- 1 Introduction -- 2 Related Work -- 3 Model-Driven Test Approach -- 3.1 Requirements -- 3.2 Meta-Model for Test Models and Test Case Models -- 3.3 Generator Implementation -- 4 Example -- 4.1 Process and Test Case Models -- 4.2 Mapping to Initial Requirements -- 5 Inclusion in the Development Process -- 6 Case Study -- 6.1 Case Description -- 6.2 RQ1: Expressiveness of the Test Model -- 6.3 RQ2: Effort of the Generation Approach -- 6.4 RQ3: Improvement of Communication -- 6.5 RQ4: Effort with Service Version Changes -- 6.6 Improvements to the Original Approach -- 7 Conclusions and Outlook -- References -- Business Process Model Comprehension , Cognitive Insights into Business Process Model Comprehension: Preliminary Results for Experienced and Inexperienced Individuals -- 1 Introduction -- 2 Theoretical Backgrounds -- 2.1 Process Modeling -- 2.2 Cognitive Neuroscience and Psychology -- 2.3 Conceptual Framework -- 3 Experimental Setting -- 3.1 Context Selection and Goal Definition -- 3.2 Hypothesis Formulation -- 3.3 Experimental Setup -- 3.4 Experimental Design -- 4 Experimental Operation -- 4.1 Experimental Preparation -- 4.2 Experimental Execution -- 4.3 Data Validation -- 5 Data Analysis and Interpretation -- 5.1 Empirical Evaluation and Descriptive Statistics -- 5.2 Hypotheses Testing -- 5.3 Threats to Validity -- 5.4 Experimental Results and Conceptual Framework -- 6 Related Work -- 7 Summary and Outlook -- References -- Eye Tracking Experiments on Process Model Comprehension: Lessons Learned -- 1 Introduction -- 2 Experimental Setting -- 3 Lessons Learned -- 4 Related Work -- 5 Summary and Outlook -- References -- An Experience Report on Teaching Business Process Modeling -- Teaching and Learning State-Oriented Business Process Modeling. Experience Report -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Course Description -- 2.2 State-Oriented View on Business Processes -- 2.3 Related Literature -- 3 The Teacher's Reflections -- 3.1 Reflections on the Nature of State-Oriented Modeling -- 3.2 Reflections on the Experience from the First Round of BPCM -- 4 The Learner's Reflections -- 5 Difficulties and Challenges Experienced by Other Learners -- 6 Lessons Learned and Suggested Actions -- Acknowledgements -- References -- Evaluation and Comparison of Modeling Languages and Methods -- On the Requirement from Practice for Meaningful Variability in Visual Notation -- 1 Introduction -- 2 Defining Variability of Concrete Syntax -- 3 Empirical Study -- 3.1 Research Questions , 3.2 Research Design -- 3.3 Data Analysis -- 3.4 Threats to Validity -- 4 Study Results -- 4.1 Demographic Data -- 4.2 Used Visual Notations -- 4.3 Purpose of Modeling Efforts -- 4.4 Additional or Missing Requirements -- 5 Toward Meeting Practitioners' Requirement for Visual Variability -- 5.1 The Need -- 5.2 Why This Need Is Not Accommodated -- 5.3 The Challenges -- 6 Concluding Outlook -- References -- Balanced Scorecard for Method Improvement: Approach and Experiences -- Abstract -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 The Notion of Methods -- 2.2 Business Value of IT and Balanced Scorecard -- 2.3 Method Engineering -- 3 Research Approach -- 4 Development of BSC for Method Improvement -- 4.1 Scorecard Development Process -- 4.2 Method Validation Scorecard -- 5 Method Scorecard in Use -- 5.1 Scorecard Use by IDA-Method Developers -- 5.2 Scorecard Use by Project-External IDA-Method Users -- 5.3 Scorecard Use by 4EM-Method Users -- 6 Summary and Future Work -- References -- Modeling Exchange Agreements with DEMO/PSI and Core Component of Communication -- Abstract -- 1 Introduction -- 2 Research Design -- 3 Describing As-Is Solution -- 4 Problem Statement -- 5 Literature Review -- 5.1 Demo/PSI -- 5.2 Core Component of Communication -- 6 Modeling the Exchange Agreement with DEMO/PSI -- 6.1 The Main Transaction, Agreement on Terms and Fulfillment -- 6.2 Unlock Agreement -- 6.3 Handling Complaints -- 7 Modeling the Exchange Agreement with CCC -- 7.1 Discussion Macro State -- 7.2 Agreement Macro State -- 8 Comparing Solutions -- 9 Conclusions and Future Work -- Acknowledgments -- References -- Modeling Approaches to Support Decision Making -- Towards a Decision-Support System for Selecting the Appropriate Business Process Modeling Formalism: A Context-Aware Roadmap -- Abstract -- 1 Introduction -- 2 Background and Related Work , 3 Systematic Literature Review -- 3.1 Data Extraction -- 3.2 Analysis of the Results -- 4 A Context-Aware Roadmap -- 5 Conclusion and Limitations -- References -- Designing a Decision-Making Process for Partially Observable Environments Using Markov Theory -- 1 Introduction -- 2 Related Work -- 3 Formalization: The Design -- 4 Case Study: Discussion -- 5 Evaluation -- 6 Conclusion -- References -- Know-How Mapping - A Goal-Oriented Approach and Evaluation -- Abstract -- 1 Introduction -- 2 The Goal-Oriented Know-How Mapping Approach -- 3 Other Approaches to Knowledge Mapping -- 4 A Feature Analysis of GOKM -- 5 A Controlled Experiment with GOKM -- 6 Conclusion and Future Work -- Appendix -- References -- Behavioral Specification and Business Process Modeling -- Controlled Experiment in Business Model-Driven Conceptual Database Design -- 1 Introduction -- 2 Related Work -- 3 Overview of the Evaluated Approach -- 4 Experiment Design -- 4.1 Experimental Context -- 4.2 Variables -- 4.3 Subjects, Settings and Assignments -- 5 Results Analysis and Discussion -- 6 Conclusions and Future Work -- References -- Incorporating Data Inaccuracy Considerations in Process Models -- Abstract -- 1 Introduction -- 2 Conceptual Analysis of Data Inaccuracy -- 3 Incorporating Considerations of Data Inaccuracy into Process Models -- 4 Empirical Evaluation -- 4.1 Data Collection -- 4.2 Data Analysis -- 5 Discussion -- 6 Related Work -- 7 Conclusions -- Acknowledgement -- References -- Structured Behavioral Programming Idioms -- Abstract -- 1 Introduction -- 2 Behavioral Programs and Specification Idioms -- 3 Evaluating BP Structured Idioms -- 3.1 The Experiment Settings -- 3.2 Experimental Results -- 3.3 Discussion -- 3.4 Threat to Validity -- 4 Conclusions -- Acknowledgement -- Appendix -- References -- Modelling Languages and Methods in Evolving Context , A Security Requirements Modelling Language to Secure Cloud Computing Environments
    Additional Edition: Erscheint auch als Druck-Ausgabe Reinhartz-Berger, Iris Enterprise, Business-Process and Information Systems Modeling Cham : Springer International Publishing AG,c2017 ISBN 9783319594651
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    RVK:
    Keywords: Managementinformationssystem ; Informationssystem ; Unternehmensarchitektur ; Software Engineering ; Prozessmanagement ; Requirements engineering ; Konzeptionelle Modellierung ; Modellgetriebene Entwicklung ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV049019538
    Format: 1 Online-Ressource (362 Seiten)
    Edition: 1st ed
    ISBN: 9783031074752
    Series Statement: Lecture Notes in Business Information Processing Series v.450
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References , A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining , 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning , 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction , 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules , 3 Implementation and Evaluation
    Additional Edition: Erscheint auch als Druck-Ausgabe Augusto, Adriano Enterprise, Business-Process and Information Systems Modeling Cham : Springer International Publishing AG,c2022 ISBN 9783031074745
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Unternehmen ; Informationsmodellierung ; Prozessmanagement ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages