feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    b3kat_BV048250924
    Umfang: 1 Online-Ressource (XXI, 356 p. 118 illus., 66 illus. in color)
    Ausgabe: 1st ed. 2022
    ISBN: 9783031074752
    Serie: Lecture Notes in Business Information Processing 450
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-07474-5
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-07476-9
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    Schlagwort(e): Unternehmen ; Informationsmodellierung ; Prozessmanagement ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    b3kat_BV047389792
    Umfang: 1 Online-Ressource (XIX, 396 p. 151 illus., 84 illus. in color)
    Ausgabe: 1st ed. 2021
    ISBN: 9783030791865
    Serie: Lecture Notes in Business Information Processing 421
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-79185-8
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-79187-2
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Software Engineering ; Anwendungssoftware ; Prozessmanagement ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    b3kat_BV049019538
    Umfang: 1 Online-Ressource (362 Seiten)
    Ausgabe: 1st ed
    ISBN: 9783031074752
    Serie: Lecture Notes in Business Information Processing Series v.450
    Anmerkung: Description based on publisher supplied metadata and other sources , Intro -- Preface -- BPMDS 2022 -- EMMSAD 2022 -- BPMDS 2022 Organization -- EMMSAD 2022 Organization -- Trustworthy Information Systems: Modelling Security, Privacy and Forensics in Business Processes (Keynote Abstract) -- Contents -- Actual and Perceived Challenges (BPMDS 2022) -- Process Mining Challenges Perceived by Analysts: An Interview Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Findings -- 4.1 Defining Research Question -- 4.2 Data Collection -- 4.3 Data Pre-Processing -- 4.4 Mining and Analysis -- 4.5 Stakeholder Evaluation -- 4.6 Challenges Ranging Across All Phases -- 5 Discussion -- 6 Conclusion -- References -- Towards Process-Oriented IIoT Security Management: Perspectives and Challenges -- 1 Introduction -- 2 IIoT Security Management Process -- 3 Perspectives for Process-Driven IIoT Security -- 3.1 Process-Oriented Asset Identification and Threat Analysis -- 3.2 Process-Oriented Risk and Measure Assessment -- 3.3 Process-Oriented Measure Implementation -- 3.4 Process-Oriented Monitoring and Security Process Audit -- 4 Challenges and Intersections -- 4.1 Modelling Notations for IIoT- and Security-Aware Processes -- 4.2 Process Modelling Guidelines and Procedures -- 4.3 Executable Process Models -- 4.4 Process Analytics for IIoT and Security -- 5 Conclusion and Outlook -- References -- Business Process Modeling (BPMDS 2022) -- RBPMN - The Power of Roles for Business Process Modeling with BPMN -- 1 Introduction -- 1.1 Challenges of BP Modeling -- 1.2 Research Approach -- 2 Role Modeling -- 2.1 Roles -- 2.2 Roles in Business Process Modeling -- 3 The RBPMN Modeling Language -- 3.1 Developing the RBPMN Modeling Language -- 3.2 Extending the BPMN -- 3.3 The Syntax of RBPMN Elements -- 4 Modeling Case Study -- 5 Evaluation -- 5.1 Workflow Patterns -- 5.2 Role Feature Coverage -- 6 Conclusion -- References , A Complementary Analysis of the Behavior of BPMN Tools Regarding Process Modeling Problems -- 1 Introduction -- 2 Background -- 2.1 Business Process Model and Notation -- 2.2 Process Modeling Problems and Anti-patterns -- 3 Related Works -- 3.1 Anti-patterns on Business Process Models -- 3.2 Visual Feedback About Problems in Business Process Models -- 4 Analysis of Business Process Modeling Tools Behavior Regarding Business Process Modeling Problems -- 4.1 Process Modeling Tools Selection -- 4.2 Experiment Parameters -- 4.3 Overall Results -- 4.4 Comparison with Related Work -- 5 Visual Feedback Implemented by Modeling Tools in Comparison with the Literature -- 5.1 Applying Recommendations for Small Process Models -- 5.2 Applying Recommendations for Large Process Models -- 5.3 Comparison of the Literature and the Visual Feedback Provided by Tools -- 6 Conclusion -- References -- Understanding Collaboration: One Issue, Many Perspectives (BPMDS 2022) -- A Technique for Collaboration Discovery -- 1 Introduction -- 2 The colliery Technique -- 3 The colliery Tool -- 4 Experimental Evaluation -- 5 Related Works -- 6 Concluding Remarks -- References -- Understanding Process Management in Non-profit Organisations Without Formal Business Process Management -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Findings and Discussion -- 4.1 There is a Lack of BPM Awareness, BPM Evaluation and BPM Resources -- 4.2 NPOs Instinctively Manage Processes -- 4.3 NPOs Employ Strategic Approaches to Manage Processes -- 4.4 NPO Governance and External Bodies Drive Process Change -- 5 Conclusion -- References -- Event Logs - Why it Deviates? (BPMDS 2022) -- Deviance Analysis by Means of Redescription Mining -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Deviance Mining -- 2.3 Declare -- 3 Related Work -- 4 Redescription Mining , 5 Deviance Mining Approach -- 5.1 Overall Structure of the Pipeline -- 5.2 Generate Missing Input -- 5.3 Declare Constraint Based Feature Extraction -- 5.4 Redescription Mining -- 5.5 Comparisons and Analysis of Discovered Redescription Rules -- 5.6 Natural Language Generation -- 6 Implementation and Evaluation -- 6.1 Datasets -- 6.2 Evaluation Setup -- 6.3 Discussion of the Order-to-Cash Process -- 6.4 Overall Results and Conclusion -- 7 Future Work -- References -- Detecting Context Activities in Event Logs -- 1 Introduction -- 2 Motivation Example -- 3 Background -- 4 Preliminaries -- 5 The Proposed Method -- 5.1 Build Context Traces -- 5.2 Build a Point Cloud -- 5.3 Construct Convex Hulls for the Event Log -- 5.4 Construct Convex Hulls for Each Activity and Calculate Behavioural Coverages -- 5.5 Identify Context Activities -- 6 Evaluation on Synthetic Data -- 7 Evaluation on Real-Life Data -- 8 Conclusion -- References -- Event Log Generation: An Industry Perspective -- 1 Introduction -- 2 Process Mining Overview -- 3 Motivation, Research Questions, and Survey Structure -- 4 Survey Results -- 4.1 Demographics -- 4.2 Process Execution -- 4.3 Process Scoping and Data Sources -- 4.4 Event Logs -- 4.5 Process Discovery -- 4.6 Process Analysis -- 5 Discussion -- 5.1 Questioning Academic Assumptions -- 5.2 Relevance of Academic Research -- 5.3 Emerging Research Directions -- 6 Conclusion -- References -- Foundations of Modeling and Method Engineering (EMMSAD 2022) -- Towards a Systematic Method for Developing Meta Attack Language Instances -- 1 Introduction -- 2 Background -- 2.1 Design Science Research -- 2.2 Meta Attack Language -- 3 Method -- 4 The Approach: Applying ADR to Create MAL DSLs -- 4.1 Stage 1 - Problem Formulation -- 4.2 Stage 2 - Building, Intervention, and Evaluation -- 4.3 Stage 3 - Reflection and Learning , 4.4 Stage 4 - Formalization of Learning -- 5 Demonstration -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Enterprise, Business Process, and Capability Modeling (EMMSAD 2022) -- Enterprise Modeling in Support Of Transparency in the Design and Use of Software Systems -- 1 Introduction -- 2 Towards an Interactive Understanding of Transparency -- 3 Goals, Requirements and Existing Approaches -- 4 Extensions to MEMO in Support of Transparency -- 5 Exemplary Application -- 6 Conclusions -- References -- Uncertain Case Identifiers in Process Mining: A User Study of the Event-Case Correlation Problem on Click Data -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Training Log Generation -- 3.2 Model Training -- 3.3 Segmentation -- 4 User Study -- 5 Conclusion -- References -- The Integration of Process Simulation Within the Business Architecture -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 PGA Modeling Technique -- 2.3 PGA Simulation Technique -- 3 Business Architecture Simulation Technique -- 3.1 Building a Business Architecture Hierarchy -- 3.2 Simulate the Performance Level of Process Elements -- 3.3 Propagation of Performance Measures -- 3.4 Improvement Analysis -- 4 Conclusion -- References -- Information Systems and Requirements Modeling (EMMSAD 2022) -- Blockchain Application Development Using Model-Driven Engineering and Low-Code Platforms: A Survey -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 4 Academic MDE Approaches -- 4.1 Review Process -- 4.2 Results -- 5 Industrial Low-Code and No-Code Approaches -- 5.1 Review Process -- 5.2 Results -- 6 Use Case for Low-Code Blockchain Development -- 7 Discussion and Requirements for Future Developments -- 8 Conclusion -- References -- Eliciting Ethicality Requirements Using the Ontology-Based Requirements Engineering Method -- 1 Introduction , 2 Research Baseline -- 2.1 Ontological Analysis -- 2.2 An Ontology for Requirements (NFRO) -- 3 ObRE Method -- 4 Applying ObRE to Ethical Requirements for Intelligent Systems -- 4.1 The Common Ontology of Value and Risk (COVER) -- 4.2 Domain Ontology Development and Instantiation: Ethical Requirements -- 4.3 Requirements Analysis Method Execution -- 5 Related Works -- 6 Final Remarks -- References -- Agent Responsibility Framework for Digital Agents: Roles and Responsibilities Related to Facets of Work -- 1 Toward a New Approach for Describing Digital Agents -- 2 Digital Agents as Algorithmic Agents -- 3 Work Systems as the Context for Using Digital Agents -- 3.1 A Hypothetical Work System that Uses AI-Based Digital Agents -- 4 Facets of Work -- 5 The Agent Responsibility Framework -- 6 Application of the AR Framework to Examples -- 6.1 Example: An Ecommerce Platform as a Digital Agent -- 6.2 Example: A Real Time Advertising Auction as a Digital Agent -- 6.3 Example: A Self-driving Car's Information System as a Digital Agent -- 7 Discussion and Conclusions -- References -- A Method for Ontology-Driven Minimum Viable Platform Development -- 1 Introduction -- 2 Previous Research -- 3 A Method for Ontology-Driven MVP Development -- 4 Method Demonstration: SafaRide -- 4.1 Analysis -- 4.2 MVP Development -- 4.3 Testing -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Tool for Debugging Unsatisfiable Integrity Constraints in UML/OCL Class Diagrams -- 1 Introduction -- 2 Related Work -- 3 Presentation of MVM -- 3.1 Context -- 3.2 Feedback -- 3.3 Running Example -- 3.4 User Interface -- 4 Conclusions and Future Work -- References -- Domain-Specific and Knowledge Modeling (EMMSAD 2022) -- Towards Simplification of ME-Maps -- 1 Introduction -- 2 Simplification of ME-Maps -- 2.1 Valid Simplification -- 2.2 Simplification Rules , 3 Implementation and Evaluation
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Augusto, Adriano Enterprise, Business-Process and Information Systems Modeling Cham : Springer International Publishing AG,c2022 ISBN 9783031074745
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    Schlagwort(e): Unternehmen ; Informationsmodellierung ; Prozessmanagement ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz