feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • HWR Berlin  (5)
  • TH Wildau  (3)
  • SB Werder
  • Landesgeschichtliche Vereinigung
  • Unternehmen  (8)
Type of Medium
Language
Region
Subjects(RVK)
Access
  • 1
    UID:
    b3kat_BV022888576
    Format: 1 Online-Ressource (XVI, 244 S.) , Ill., graph. Darst.
    Edition: 2., verb. und erw. Aufl.
    ISBN: 3834801143 , 9783834801142 , 9783834891129
    Series Statement: Edition CIO
    Language: German
    Subjects: Economics
    RVK:
    RVK:
    RVK:
    Keywords: Unternehmen ; Outsourcing
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Berger, Alexander
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV040371626
    Format: LVI, 695 Seiten
    Edition: 15. Auflage
    ISBN: 9783814504353 , 3814504356
    Series Statement: RWS-Skript 135
    Language: German
    Subjects: Economics , Law
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Deutschland ; Unternehmenskauf ; Recht ; Deutschland ; Unternehmenskauf ; Rechtsprechung ; Vertragsrecht ; Kauf ; Unternehmen ; Arbeitsrecht
    Author information: Pöllath, Reinhard 1948-
    Author information: Holzapfel, Hans-Joachim
    Author information: Bergjan, Ralf
    Author information: Berger, Konrad
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV043685157
    Format: 1 Online-Ressource (378 Seiten)
    ISBN: 3446441913 , 9783446441637
    Content: Sichere Maschinen, wasserdichte CE-Konformität, valide Dokumentationen, Rechtssicherheit bei allen Produkthaftungsfragen, das sind wichtige Erfolgsfaktoren für Sie als Hersteller, Importeur oder Händler von Maschinen. Das Buch erklärt anhand der EG-Maschinenrichtlinie (Richtlinie 2006/42/EG), wie sich das öffentliche Produkt-sicherheitsrecht im Unternehmen praktisch umsetzen lässt. Die Autoren verfügen über langjährige Erfahrung mit der EG-Maschinenrichtlinie und gehen auf eine Viel-zahl von praktisch relevanten Problemen im Zusammenhang mit der Rechtsanwendung und der Umsetzung der Richtlinie 2006/42/EG im Unternehmen ein. Sie bekommen ? konkrete Handlungsempfehlungen, wie das Produktsicherheitsrecht im Unter-nehmen zu implementieren ist. So wird die Rolle des CE Koordinators diskutiert und es wird gezeigt, wie er innerhalb des Unternehmens positioniert sein sollte. ? Know-how zur Abgrenzung zwischen vollständiger und unvollständiger Maschine ? Bewertungskriterien für das Vorliegen einer wesentlichen Veränderung von Maschinen ? Hinweise zur Organisation und Durchführung von speziellen Audits zur Produktsicherheit ? Anleitungen zur Durchführung von internen Mitarbeiterschulungen Alle Fragen, die im Zusammenhang mit der Maschinenrichtlinie häufig auftauchen, werden im Buch anhand konkreter Beispiele beantwortet. Wichtige Fälle aus der Rechtsprechung geben Ihnen ein besseres Verständnis für juristische Hintergründe. Damit sind Sie für die Absicherung der Konformität Ihrer Produkte bestens gerüstet.
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-446-44191-0
    Language: German
    Subjects: Engineering
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Europäische Union Maschinenrichtlinie ; CE-Zeichen ; Produktsicherheit ; Unternehmen ; Europäische Union Maschinenrichtlinie ; CE-Zeichen ; Produktsicherheit ; Unternehmen
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Berger, Norbert
    Author information: Schucht, Carsten
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV021511112
    Format: XVI, 244 S. , Ill., graph. Darst.
    Edition: 2., verb. und erw. Aufl.
    ISBN: 3834801143
    Series Statement: Edition CIO
    Language: German
    Subjects: Economics
    RVK:
    RVK:
    RVK:
    Keywords: Unternehmen ; Outsourcing
    Author information: Berger, Alexander
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV017750837
    Format: XII, 226 S. , Ill., graph. Darst.
    Edition: 1. Aufl.
    ISBN: 352805882X
    Series Statement: Edition CIO
    Language: German
    Subjects: Economics
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Unternehmen ; Outsourcing
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV048677572
    Format: 306 Seiten , Diagramme
    Edition: 2., vollständig aktualisierte Auflage
    ISBN: 9783802127724 , 3802127722
    Note: Literaturverzeichnis: Seite 300-303
    Language: German
    Subjects: Economics , General works
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Unternehmen ; Nachhaltigkeit ; Wirtschaftsprüfung ; Nachhaltigkeitsbericht
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV042482051
    Format: 1 Online-Ressource (XIX, 297 p.) , Ill.
    ISBN: 9783658090005
    Note: Zugl.: Bremen, Univ., Diss., 2014
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-3-658-08999-3
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Wirtschaftswissenschaften ; Betriebsführung ; Unternehmer ; Management ; Entrepreneurship ; Unternehmen ; Unternehmensgründung ; Betriebsführung ; Furcht ; Versagen ; Hochschulschrift
    Author information: Berger, Philipp K.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV049019538
    Format: 1 Online-Ressource (362 Seiten)
    Edition: 1st ed
    ISBN: 9783031074752
    Series Statement: Lecture Notes in Business Information Processing Series v.450
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References , A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining , 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning , 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction , 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules , 3 Implementation and Evaluation
    Additional Edition: Erscheint auch als Druck-Ausgabe Augusto, Adriano Enterprise, Business-Process and Information Systems Modeling Cham : Springer International Publishing AG,c2022 ISBN 9783031074745
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Unternehmen ; Informationsmodellierung ; Prozessmanagement ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages