Involving stakeholders in enterprise modeling, besides rendering valid models, also helps stakeholders articulate and align their views on their organization. This requires that stakeholders are able to understand and...
详细信息
ISBN:
(纸本)9783319483931;9783319483924
Involving stakeholders in enterprise modeling, besides rendering valid models, also helps stakeholders articulate and align their views on their organization. This requires that stakeholders are able to understand and actively perform conceptual modeling for representing their views on enterprise structure and behavior. The specific skills required for this should not be taken for granted and need to be developed explicitly. Scaffolding is an educational concept that allows to embed learning support mechanisms in operative modeling processes. The present article introduces a framework that makes it possible to view scaffolding as an integral part of stakeholder-centric modeling activities. The framework is validated with respect to its descriptive and discriminatory power by an ex-post analysis of the design and application of an existing modeling method.
This conceptual paper considers the cooperative enterprise model in the light of how it can be affected by the digital world and - at the same time - of how it can positively affect both the Internet and its users. Th...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
This conceptual paper considers the cooperative enterprise model in the light of how it can be affected by the digital world and - at the same time - of how it can positively affect both the Internet and its users. The aim of the paper is therefore twofold: (i) to consider the extent and the way in which cooperative principles are going to be affected by the transition of these firms towards 'digital materiality' [1];(ii) to outline the potential implications of a diffusion of cooperative forms to Internet organizations and users. Based on the traits of this enterprise model, an emerging perspective is described whereby the 'cooperative' (especially if considered as a 'service system') has an interesting potential both as a competent actor in the domain of virtual enterprises and as a possible driver for safeguarding Internet users.
Key performance indicators are widely used to manage any type of processes including manufacturing, logistics, and business processes. We present an approach to map informal specifications of key performance indicator...
详细信息
ISBN:
(数字)9783319392431
ISBN:
(纸本)9783319392431;9783319392424
Key performance indicators are widely used to manage any type of processes including manufacturing, logistics, and business processes. We present an approach to map informal specifications of key performance indicators to prototypical data warehouse designs that support the calculation of the KPIs via aggregate queries. We argue that the derivation of the key performance indicators shall start from a process definition that includes scheduling and resource information.
Traditionally in large enterprises, budget cuts are a treat for IT departments. One way to guard IT budget is visualizing the impacts in IT services of such cuts. Data visualization tools are capable of bridging the g...
详细信息
ISBN:
(纸本)9783319499444;9783319499437
Traditionally in large enterprises, budget cuts are a treat for IT departments. One way to guard IT budget is visualizing the impacts in IT services of such cuts. Data visualization tools are capable of bridging the gap between increased data availability and human cognitive capabilities. In this paper, we present a budget visualization tool that allows enterprise wide data-driven decision-making. Our proposal was developed in the context of a large multi-industry state-owned company, with rigid control structures and external pressures for cost reduction and investment optimization. Our tool promotes visualization as the main mechanism to justify IT budget requests and to defend from budget amendments and cuts. We propose a generic tool that might manage different perceptions from many parts of an organization. However, to evaluate our tool's effectiveness we incorporated four stakeholder's perspectives: financial, technical, business' clients and supply chain. In our efforts, we developed a data model that encapsulates these four perspectives and improves communication capabilities between stakeholders.
The spectrum of business processes can be divided into two types: well-structured routine processes and agile processes with control flow that evolves at run time. In a similar way, two different representational para...
详细信息
ISBN:
(纸本)9783319428871;9783319428864
The spectrum of business processes can be divided into two types: well-structured routine processes and agile processes with control flow that evolves at run time. In a similar way, two different representational paradigms can be distinguished: procedural models and declarative models which define rules that a process has to satisfy. Agile processes can often be captured more easily using a declarative approach. While in procedural languages the organisational perspective can be modelled adequatly, in declarative languages, however, an adequate representation of organisational patterns is often still not possible. Agile processes, however, need to explicitly integrate organisational coherencies due to the importance of human decision-making. This paper presents a review of declarative modeling languages, outlines missing aspects and suggests research roadmaps for the future.
Empirical research on the maturity of retained IT organizations has remained scarce. IS literature shows that studies do not investigate the effect of organizational culture determinants on the relationship with the g...
详细信息
ISBN:
(数字)9783319470092
ISBN:
(纸本)9783319470092;9783319470085
Empirical research on the maturity of retained IT organizations has remained scarce. IS literature shows that studies do not investigate the effect of organizational culture determinants on the relationship with the growth stage of an retained organization. The aim of this paper is to examine the relationship between organizational culture determinants and retained organizations stages of growth. Data from three case studies was collected and the Social Exchange Theory is used to understand the degree of interaction between the staff of retained organizations. Our analysis identified that culture determinants form a predictable pattern with the growth stage of a retained organization. Specifically, the culture determinants Management and Focus fit with their assumed growth stage in all three case studies. This might indicate that both determinants are interrelated as executive management of a firm has to develop a clear focus to achieve their IT mission and goals. Moreover, from an individual level, the results show that the degree of social interaction between staff is influenced by the perception of IT in the organization.
Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and...
详细信息
ISBN:
(纸本)9783319483931;9783319483924
Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs. We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we reflect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benefits and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned.
Many e-government applications need certificates, which are stored in the client's browser certificate store to gain access into a service. The problems of such an authentication methodology at first are, a client...
详细信息
ISBN:
(纸本)9783319270333;9783319270326
Many e-government applications need certificates, which are stored in the client's browser certificate store to gain access into a service. The problems of such an authentication methodology at first are, a client has to store all certificates on every device, with whom access will be gained into e-government services and secondly, if the client lost such a device (e.g. notebook etc.) than all involved certificates have to be exchanged, otherwise it exist the danger to be compromised. To phase such a problem and to provide a secure single sign on solution, we implemented a secure proxy solution with integrated encrypted certificate storage, where citizens can store all their certificates to use e-government services. Our solution - we call "proxy authenticator" - enabled us to omit any alteration of existing protocol structure or amending of software architecture for all Austrian e-government applications. This saved time, effort, and costs, by connecting the existing e-delivery services in Austria into the myHelp portal through the proxy authenticator.
The implementation of business processes through the use of information systems (ERP, CRM, PLM and MES) has become a key success factor for companies. For further development and optimization of processes, many compan...
详细信息
ISBN:
(数字)9783319405124
ISBN:
(纸本)9783319405124;9783319405117
The implementation of business processes through the use of information systems (ERP, CRM, PLM and MES) has become a key success factor for companies. For further development and optimization of processes, many companies havent trusted processes for the analysis. Surveying as-is processes is complex and only possible by manual recording. To perform this task automatically the theory shows us different approaches (process mining, Application Usage Mining and Web Usage Mining). The target of the concepts and tools is to complement the process of continuous improvement in the company with meaningful process models, which can be reconstructed from protocols and user actions in the information systems. This article focuses on the limitations of these concepts and the challenges they present and gives an outlook on how future solutions must work to speed up the process of continuous improvement and to meet the challenges of heterogeneity in IS-architectures.
Compared to business processes in other business domains, dynamic workflows in disaster management need a rather rigid allocation of work to actors. The work schedule must conform to available resources and their skil...
详细信息
ISBN:
(纸本)9783319327990;9783319327983
Compared to business processes in other business domains, dynamic workflows in disaster management need a rather rigid allocation of work to actors. The work schedule must conform to available resources and their skills. Moreover, to ensure that each actor is able to quickly start working and to complete pieces of work rapidly, work must be distributed evenly. This also reduces the overall waiting time, which is an important issue in disaster management. Additionally, each actor should only have few tasks assigned at any point in time in order to be able to reliably perform critical tasks, without being overburdened. As conventional business Process Management (BPM) tools do not fully meet these requirements, we provide an additional layer to BPM tools, the so-called Dynamic Resource Allocation (DRA) component.
暂无评论