Traditional approaches for process modeling usually comprise the control flow of well-structured activities that an organization performs in order to achieve its objectives. However, many processes involving decision-...
详细信息
ISBN:
(纸本)9783319428871;9783319428864
Traditional approaches for process modeling usually comprise the control flow of well-structured activities that an organization performs in order to achieve its objectives. However, many processes involving decision-making and creativity do not follow a well-structured flow of activities, having rather a more ad-hoc nature at each instance. Knowledge Intensive Processes (KIP) is an example of this kind of process. It is difficult to gather information about a KIP and create a representative model, since it might vary from instance to instance due to decisions made by its participants. The contextual information of each activity - as well as the desires and intentions of the participants - are vital to the complete understanding of the process itself. In this paper, we propose a method to extract intentions and desires from KIP participants using NLP Techniques and social media content, as well as exploring its possibilities on a real case study using Twitter.
The medical profession demands training and lifelong learning to ensure patient safety and quality of treatment. Main barriers are lack of time and resources. information and communication technology (ICT) has proven ...
详细信息
ISBN:
(纸本)9783319435978;9783319435961
The medical profession demands training and lifelong learning to ensure patient safety and quality of treatment. Main barriers are lack of time and resources. information and communication technology (ICT) has proven to be useful to support e-learning, but less focus has been placed on the potential role of ICT as support for continuous learning in everyday practice. The aim of this qualitative interview study was to explore physicians' perspective of learning and how ICT in various ways can support learning at work. The findings indicate that continuous learning to a large extent is case driven, and that ICT may play an important role and support reflection and learning for individual physicians and for the collective as well. We argue that such ICT solutions must be adopted to and integrated in the everyday work, save time and include learning usability.
Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting an...
详细信息
ISBN:
(数字)9783319454085
ISBN:
(纸本)9783319454085;9783319454078
Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting policy violations, crimes, terrorist activities, subversive political movements, etc. Some existing forensics methods and tools are useful for such investigations. Further, forensics researchers are developing new methods and tools specifically for investigating and examining online social networks. While the privacy rights of individuals are widely respected, the privacy rights of social groups are less well developed. In the current development of OLSNs and computer forensics, the compromise of group privacy may lead to the violation of individual privacy. This paper examines the ethics regarding forensics examinations of online social networks. As with individual privacy, ethical tensions exist in social group privacy between the privacy rights that can be afforded to the membership, and the rights of institutions to detect and govern conspiracies to subversion, crimes, discrimination, etc.
In order to handle intense time pressure and survive in dynamic market, software startups have to make crucial decisions constantly on whether to change directions or stay on chosen courses, or in the terms of Lean St...
详细信息
ISBN:
(数字)9783319405155
ISBN:
(纸本)9783319405155;9783319405148
In order to handle intense time pressure and survive in dynamic market, software startups have to make crucial decisions constantly on whether to change directions or stay on chosen courses, or in the terms of Lean Startup, to pivot or to persevere. The existing research and knowledge on software startup pivots are very limited. In this study, we focused on understanding the pivoting processes of software startups, and identified the triggering factors and pivot types. To achieve this, we employed a multiple case study approach, and analyzed the data obtained from four software startups. The initial findings show that different software startups make different types of pivots related to business and technology during their product development life cycle. The pivots are triggered by various factors including negative customer feedback.
Implementing and automating business processes often means to connect and integrate a diverse set of potentially flawed services and applications. This makes them an attractive target for attackers. Here anomaly detec...
详细信息
ISBN:
(纸本)9783319394299;9783319394282
Implementing and automating business processes often means to connect and integrate a diverse set of potentially flawed services and applications. This makes them an attractive target for attackers. Here anomaly detection is one of the last defense lines against unknown vulnerabilities. Whereas anomaly detection for process behavior has been researched, anomalies in process instance data have been neglected so far, even though the data is exchanged with external services and hence might be a major sources for attacks. Deriving the required anomaly detection signatures can be a complex, work intensive, and error-prone task, specifically at the presence of a multitude of process versions and instances. Hence, this paper proposes a novel automatic signature generation approach for textual business process instance data while respecting its contextual attributes. Its efficiency is shown by an comprehensive evaluation that applies the approach on thousands of realistic data entries and 240, 000 anomalous data entries.
The motivation for our work was an idea of integrating formal verification with business processes modeling. In the presented approach ArchiMate was selected as a language used for definition of processes. We describe...
详细信息
ISBN:
(纸本)9783319305288;9783319305271
The motivation for our work was an idea of integrating formal verification with business processes modeling. In the presented approach ArchiMate was selected as a language used for definition of processes. We describe a procedure, which extracts behavioral elements from ArchiMate specification and transforms them into a corresponding representation used by NuSMV model checker. Then, we focus on time efficiency of the verification task. We give results of tests performed on a set of artificial process specifications, as well as on a complex business process, whose development was supported by the implemented solution. We compare three semantics of ArchiMate process definitions and discuss their influence on model complexity and verification time.
To meet the challenge of delivering products to the customers in a minimum time, Time Minimization Transportation Problem (TMTP) provides a powerful framework to determine the better ways to deliver products to the cu...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
To meet the challenge of delivering products to the customers in a minimum time, Time Minimization Transportation Problem (TMTP) provides a powerful framework to determine the better ways to deliver products to the customer. In this paper, we present a new procedure for determining an initial basic feasible solution of TMTP. Comparative study is accomplished between the presented procedure and the other existing procedures in virtue of sample examples which demonstrate that the presented procedure requires less number of iterations to reach the optimal transportation time.
Health care organizations and systems seem to benefit for the adoption and implementation of innovation driven by new technologies for seeking legitimacy and building trust with patients as to proceed towards a sustai...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
Health care organizations and systems seem to benefit for the adoption and implementation of innovation driven by new technologies for seeking legitimacy and building trust with patients as to proceed towards a sustainable development. New technologies lead to develop health care as a process innovation-driven and patient-centered by improving quality and efficiency of health care services. Policies tend to help for diffusion and dissemination of innovation as to support the implementation of new technologies in health care service delivery. Sustainable health care organizations tend to develop or follow innovation by new technologies conforming to policies driving the diffusion of innovation for continuous improvement within health care delivery and systems.
Data visualization is an important area of research aims to empower people to discover information from data through visual artefacts. The huge volume of data can result in abundance of elements in data visualization,...
详细信息
ISBN:
(数字)9783319453217
ISBN:
(纸本)9783319453217;9783319453200
Data visualization is an important area of research aims to empower people to discover information from data through visual artefacts. The huge volume of data can result in abundance of elements in data visualization, which can make the information discovery challenging. Chord diagrams is a sort of visual representation that has been recently introduced to increase the level of abstraction. Although this diagram is widely used and adapted in many disciplines, it is not currently implemented in business Process Management (BPM). Thus, this paper extends the social network visualization approaches in BPM area using chord diagram. This paper defines the formal definitions of elements and elaborates on how the visual representation can be compiled from them. The visualization is supported by implementing a plug-in in ProM. The plug-in is used to demonstrate social networks discovered from real log files in compare with those discovered by current visualization techniques. The result shows that this technique can complement previous ones to discover more social network patterns in BPM area.
This volume presents the revised and peer reviewed contributions of the ERP Future 2015 conference held in Munich, Germany on November 16-17, *** ERP Future 2015 Research conference is a scientific platform for resear...
ISBN:
(数字)9783319327990
ISBN:
(纸本)9783319327983
This volume presents the revised and peer reviewed contributions of the ERP Future 2015 conference held in Munich, Germany on November 16-17, *** ERP Future 2015 Research conference is a scientific platform for research on enterprise information systems in general and specifically on core topics like business process management (BPM), business intelligence (BI) and enterprise resource planning (ERP) systems. Besides the scientific community the event also addresses businesses developing, implementing and using enterprise information systems. The 7 full papers and 5 short papers accepted for ERP were selected from 23 submissions. The papers consider topics in education in enterprise systems; business process management; enterprise systems and solution providers; and IT-trends.
暂无评论