business process management (BPM) activities can be divided into categories such as design, modelling, execution, monitoring, and optimization. Some of these activities are usually automated, mainly the first ones, wh...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
business process management (BPM) activities can be divided into categories such as design, modelling, execution, monitoring, and optimization. Some of these activities are usually automated, mainly the first ones, where Automated business Process Discovery (ABPD) solutions, also know as process mining, can automatically find process models (using unstructured, event-level logs). However, BPM usually involves several activities that are executed in different applications, which are not integrated with each other, or are even manually executed. This may involve the waste of resources and time, and eventually not applying BPM with full potential. We propose an integrated solution, that allows to complete the BPM cycle in a single application and with most of the steps automatically. This proposal was applied in practice in the context of a research project and the results are being integrated into a commercial product.
A common situation is that an initial architecture has been sufficient in the initial phases of a project, but when the size and complexity of the product increases the architecture must be changed. In this paper expe...
详细信息
ISBN:
(纸本)9783319270333;9783319270326
A common situation is that an initial architecture has been sufficient in the initial phases of a project, but when the size and complexity of the product increases the architecture must be changed. In this paper experiences are presented from changing an architecture into independent units, providing basic reuse of main functionality although giving higher priority to independence than reuse. An objective was also to introduce metrics in order to monitor the architectural changes. The change was studied in a case-study through weekly meetings with the team, collected metrics, and questionnaires. The new architecture was well received by the development team, who found it to be less fragile. Concerning the metrics for monitoring it was concluded that a high abstraction level was useful for the purpose.
This book contains the refereed proceedings of the 19th International Conference on businessinformation Systems, BIS 2016, held in Leipzig, Germany, in July 2016. The BIS conference series follows trends in academia ...
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394251
This book contains the refereed proceedings of the 19th International Conference on businessinformation Systems, BIS 2016, held in Leipzig, Germany, in July 2016. The BIS conference series follows trends in academia and business research; thus the theme of the BIS 2016 conference was Smart business Ecosystems". This recognizes that no business is an island and competition is increasingly taking place between business networks and no longer between individual companies. A variety of aspects is relevant for designing and understanding smart business ecosystems. They reach from new business models, value chains and processes to all aspects of analytical, social and enterprise applications and platforms as well as cyber-physical infrastructures. The 33 full and 1 short papers were carefully reviewed and selected from 87 submissions. They are grouped into sections on ecosystems; big and smart data; smart infrastructures; process management; business and enterprise modeling; service science; social media; and applications.
business Process compliance is an important issue in control-flow and data-flow perspectives. Control-flow correctness can be analysed at design time, whereas data-flow accuracy should be verified at run-time, since d...
详细信息
ISBN:
(纸本)9783319394299;9783319394282
business Process compliance is an important issue in control-flow and data-flow perspectives. Control-flow correctness can be analysed at design time, whereas data-flow accuracy should be verified at run-time, since data is accessed and modified during execution. Compliance validation should consider the conformance of data to business rules. business compliance rules are policies or statements that govern corporate behaviour. Since business compliance rules and data change during process execution, faults can appear due to the erroneous inclusion of rules and/or data in the process. A hybrid diagnosis therefore needs to be performed regarding the likelihood of faults in data vs. business rules. In order to achieve the correct diagnosis, it is fundamental to attain the best assumption concerning the degree of likelihood. In this paper, we present an automatic process to diagnose possible faults that simultaneously combines business rules and data of multiple process instances. This process is based on Constraint Programming paradigm to efficiently ascertain a minimal diagnosis. Furthermore, a methodology for calculation of the most appropriate degree of likelihood of faults in data vs. business rules is proposed.
The field of mining unstructured data has been growing rapidly in business intelligence. An area of application represent online reviews where customers interact socially to share opinions towards brands. Thereby, exc...
详细信息
ISBN:
(数字)9783319453217
ISBN:
(纸本)9783319453217;9783319453200
The field of mining unstructured data has been growing rapidly in business intelligence. An area of application represent online reviews where customers interact socially to share opinions towards brands. Thereby, exchanged emotions play a dominant role, which poses a challenge for brand managers to understand the emotional attitude in customer's reviews. We develop a text-mining method that extracts information about emotions from customers' product reviews. We cast the underlying analysis of emotions as a binary classification problem, by using features extracted with the help of a psychologically well-grounded emotion lexicon. Based on this, we identify for various brands, which emotion features are important in reviews that are perceived as helpful (and thus more influential) by customers. We have conducted an empirical investigation with a large, publicly available data set from Amazon. Among other insights, our findings can determine the importance of various emotions for different brands throughout several product categories.
In this paper, we measure IT governance using an IT risk-return model. We study impact of market and accounting return of Indian firms' vis-a-vis their IT investments for the period 2003-2014. We have focused on t...
详细信息
ISBN:
(纸本)9783319454085;9783319454078
In this paper, we measure IT governance using an IT risk-return model. We study impact of market and accounting return of Indian firms' vis-a-vis their IT investments for the period 2003-2014. We have focused on three sectors (manufacturing, IT, and banking) only due to paucity of data. We note IT investments make significant contribution to overall firm risk and lead to earning stabilization and reduction of firm risk. The impact of IT investment on IT return, measured, is positive and significant. However, IT return reduces, once we incorporate IT risk term in this model, which reflects the risk premium associated with gross IT return.
Outsourcing of IT-related work to an offshore (or nearshore) location takes almost always place from a developed country to a less developed country. One of the reasons is that wages of IT workers in the less develope...
详细信息
ISBN:
(数字)9783319470092
ISBN:
(纸本)9783319470092;9783319470085
Outsourcing of IT-related work to an offshore (or nearshore) location takes almost always place from a developed country to a less developed country. One of the reasons is that wages of IT workers in the less developed country are usually significantly lower but additional reasons for such a move may exist (e.g., better availability of skilled personnel). While there are meanwhile complex sourcing arrangements and even cases of backsourcing from offshore to a developed country, a relatively new phenomenon can be observed where IT-based services are outsourced from less developed to more developed countries. These are cases of services with a high amount of automation or complexity. In our research on the service of Internet traffic exchange, we find that it is not only the costs that drive the decision to acquire the service from a supplier in a developed country.
In the recent years, there is a significant interest in a link prediction - an important task for graph-based data structures. Although there exist many approaches based on the graph theory and factorizations, there i...
详细信息
ISBN:
(纸本)9783319309965;9783319309958
In the recent years, there is a significant interest in a link prediction - an important task for graph-based data structures. Although there exist many approaches based on the graph theory and factorizations, there is still lack of methods that can work with multiple types of links and temporal information. The creation time of a link is an important aspect: it reflects age and credibility of the information. In this paper, we introduce a method that predicts missing links in RDF datasets. We model multiple relations of RDF as a tensor that incorporates the creation time of links as a key component too. We evaluate the proposed approach on real world datasets: an RDF representation of the ProgrammableWeb directory and a subset of the DBpedia focused on movies. The results show that the proposed method outperforms other link prediction approaches.
In the last period substantial effort was dedicated to solve resource allocation, planning and coordination problems for loosely coupled multi-agent systems through combinatorial techniques, especially Distributed Con...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
In the last period substantial effort was dedicated to solve resource allocation, planning and coordination problems for loosely coupled multi-agent systems through combinatorial techniques, especially Distributed Constraint Satisfaction Problem (DisCSP). Some preoccupations were directed to the extension and adaptation of these results to manufacturing planning/scheduling problems. This work will exploit the DisCSP techniques that could be used to manufacturing execution systems based on holonic organization in order to integrate a DisCSP planning mechanism and then reformulate the agent-holon model and the inter-holon connections from a service perspective.
The activity of linking requirements and software engineering, as described by the Twin Peaks model, has set the standard for the transformation between business requirements and system architectures. Still, much is l...
详细信息
ISBN:
(纸本)9783319394299;9783319394282
The activity of linking requirements and software engineering, as described by the Twin Peaks model, has set the standard for the transformation between business requirements and system architectures. Still, much is left to do regarding model-based activities in this topic where numerous proposals occur. Although counting on a set of common issues vital for their success, analysing or comparing any of these approaches remains a challenging task. Following previous work on their systematic review and comparison, and supported in a set of selected proposals focused in model-based approaches, we present a framework covering their involved key issues which allows classifying and assessing the different approaches. Accordingly, besides proposing the conceptual design of the framework we demonstrate its use by applying it to the selected transformation approaches, in order to validate this solution. Furthermore, the pros and cons of each approach are further discussed, and future steps on this work analysed.
暂无评论