The goal of the paper is to present the opportunity of exploiting data analysis methods and semantic models to discover customer profiles from financial databases. The solution to the problem is illustrated by the exa...
详细信息
ISBN:
(纸本)9783319499444;9783319499437
The goal of the paper is to present the opportunity of exploiting data analysis methods and semantic models to discover customer profiles from financial databases. The solution to the problem is illustrated by the example of credit cards promotion strategy on the basis of historical data coming from the bank's databases. The database contains information, personal data, and transactions. The idea is founded on data exploration methods and sematic models. With this purpose in mind, multiple algorithms of clustering and classification were applied, the results of which were exploited to elaborate the ontology and to define the customer profile to be used in decision-making.
Nowadays, information security is a main organizational concern that aims to control and protect business assets from existing threats. However, the lack of mechanisms to direct and control the increasing incorporatio...
详细信息
ISBN:
(数字)9783319453217
ISBN:
(纸本)9783319453217;9783319453200
Nowadays, information security is a main organizational concern that aims to control and protect business assets from existing threats. However, the lack of mechanisms to direct and control the increasing incorporation of information Technology (IT) assets to support new security solution architectures creates additional security threats. We created a method to identify the hidden implications that exist after implementing IT assets of different solution architectures. This method comprises two artifacts. The first artifact is a metamodel that characterizes three domains: IT governance, enterprise architecture, and dependencies between IT assets of solution architectures. The second artifact is a model to specify value dependencies, which identify the business impact related to interoperability relations between the aforementioned assets. The application of this method in a Latin American central bank led to rationalize IT assets and to obtain a suitable security solution architecture from two existing architectures.
Fashion has a deep impact on the apparel industry and is used as a lever to gain a competitive advance position. The original idea of the fast fashion firm consists in offering fashionable products at cheap or very ch...
详细信息
ISBN:
(纸本)9783319395647;9783319395630
Fashion has a deep impact on the apparel industry and is used as a lever to gain a competitive advance position. The original idea of the fast fashion firm consists in offering fashionable products at cheap or very cheap prices. The fast fashion players try to capture the trends as opposed to imposing the trends, and simultaneously to reduce the risks of betting the future staying close to the "proof of the market" and be flexible to jump in as soon as signals become stronger and more reliable, therefore they are not incurring in the market risk of unmatched demand or, at least, strongly erase them.
Setting-up hybrid shared services is not a straightforward and requires methodology support. To learn more about current practices and experiences with shared services delivery models and methodologies to setup shared...
详细信息
ISBN:
(数字)9783319470092
ISBN:
(纸本)9783319470092;9783319470085
Setting-up hybrid shared services is not a straightforward and requires methodology support. To learn more about current practices and experiences with shared services delivery models and methodologies to setup shared services we conduct survey research among companies that deploy shared service centres. In this research paper we report on the findings of our research. Based on the results we outline initial requirements and present building blocks for an integrated methodology to effectively support implementing shared services.
Implementing management support information systems with the use of outsourcing is the prevalent method of completing this type of project. Agency theory is one of the significant categories of theories used in the an...
详细信息
ISBN:
(纸本)9783319305288;9783319305271
Implementing management support information systems with the use of outsourcing is the prevalent method of completing this type of project. Agency theory is one of the significant categories of theories used in the analysis of IT outsourcing. Literature studies indicate a research gap concerning the phenomenon of moral hazard in IT projects consisting in the implementation of management support information systems. The scope of this article is to present research results on the phenomenon of moral hazard amongst Polish and German clients and suppliers of MIS. The author used the case study method. The research results may be interesting for theoreticians of business informatics and for practitioners completing IT projects both in enterprises and government agencies.
Optimal decision making during the business process execution is crucial for achieving the business goals of an enterprise. Process execution often involves the usage of the decision logic specified in terms of busine...
详细信息
ISBN:
(纸本)9783319428871;9783319428864
Optimal decision making during the business process execution is crucial for achieving the business goals of an enterprise. Process execution often involves the usage of the decision logic specified in terms of business rules represented as atomic elements of conditions leading to conclusions. However, the question of using and integrating the process-and decision-centric approaches, i.e. harmonization of the widely accepted business Process Model and Notation (BPMN) and the recent Decision Model and Notation (DMN) proposed by the OMG group, is important. In this paper, we propose a four-step approach to derive decision models from process models on the examples of DMN and BPMN: (1) Identification of decision points in a process model;(2) Extraction of decision logic encapsulating the data dependencies affecting the decisions in the process model;(3) Construction of a decision model;(4) Adaptation of the process model with respect to the derived decision logic. Our contribution also consists in proposing an enrichment of the extracted decision logic by taking into account the predictions of process performance measures corresponding to different decision outcomes. We demonstrate the applicability of the approach on an exemplary business process from the banking domain.
In today's ever changing world, business processes need to be dynamic. Data accumulated as the processes operate capture the meaning of transactions in the past, which opens a door for the dynamics of the business...
详细信息
ISBN:
(纸本)9783319394299;9783319394282
In today's ever changing world, business processes need to be dynamic. Data accumulated as the processes operate capture the meaning of transactions in the past, which opens a door for the dynamics of the business processes in question. Mining the operational data to explicitly represent this meaning could lead to process re-design to make the business processes more efficient. In this paper, we propose a formal framework for redesigning business processes taking data mining rules and business rules as the driver. We formally represent business processes using the artifact-centric approach put forward by the IBM Research. We devise redesigning algorithms that take classification rules extracted from data mining together with business rules and transform the business process in question by eliminating redundant tasks and/or re-ordering inefficiently placed tasks. We illustrate our algorithms and report experiments that were conducted using a proof-of-concept case-study.
A better evaluation and understanding of the client's perception of the service provided by hotels is critical for hotel managers, especially in the "Travel 2.0" era, where tourists not only access but a...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
A better evaluation and understanding of the client's perception of the service provided by hotels is critical for hotel managers, especially in the "Travel 2.0" era, where tourists not only access but also actively review the service provided. This paper analyses data automatically collected from TripAdvisor reviews regarding 2 star and 5 star hotels in Porto. TripAdvisor user generated content is explored through text mining techniques with the purpose of creating word clouds, synthesizing and prioritizing the aspects of the service raised by customers. Furthermore, this content is analyzed using the SERVQUAL model to identify the service quality dimensions most valued by guests of the two types of hotels. The results of the preliminary study demonstrate that the methodology proposed allows us to identify service perceptions with reasonable effectiveness, highlighting the potential of the procedure to become a complementary tool for hotel management.
The social approach in recommender systems relies on the hypothesis that preferences are coherent between users. To recommend a user u some resources, this approach exploits the preferences of other users who have pre...
详细信息
ISBN:
(纸本)9783319309965;9783319309958
The social approach in recommender systems relies on the hypothesis that preferences are coherent between users. To recommend a user u some resources, this approach exploits the preferences of other users who have preferences similar to those of u. Although this approach has shown to produce on average high quality recommendations, which makes it the most commonly used approach, some users are not satisfied: they get low quality recommendations. Being able to anticipate if a recommender will provide a given user with inaccurate recommendations, would be a major advantage. Nevertheless, little attention has been paid in the literature to studying this particular point. In this work, we assume that some of the users who are not satisfied do not respect the assumption made by the social approach of recommendation: their preferences are not coherent with those of others;we consider they have atypical preferences. We propose measures to identify these users, upstream of the recommendation process. These measures only exploit the users profile. The experiments conducted on a state of the art corpus and three social recommendation techniques show that the proposed measures allow to identify reliably a subset of users with atypical preferences, who will actually get inaccurate recommendations with a social approach. One of these measures is the most accurate, whatever is the recommendation technique.
Enabling flexibility in unpredictable situations with ad hoc actions decided at runtime by knowledge workers is the main focus of Adaptive Case Management (ACM) systems. However, ad hoc actions added during case execu...
详细信息
ISBN:
(纸本)9783319428871;9783319428864
Enabling flexibility in unpredictable situations with ad hoc actions decided at runtime by knowledge workers is the main focus of Adaptive Case Management (ACM) systems. However, ad hoc actions added during case execution and ACM templates prepared at design time need to be within the boundaries defined by business constraints, company regulations and legal systems. In this paper we report our experience in addressing this challenge by using model checking and runtime monitoring techniques for behavioral consistency checking that can handle both ACM aspects: support by means of predefined process templates and high flexibility by allowing ad hoc actions at runtime. Our study is conducted using a practical ACM system for repair service management handling different customer requirements under diverse compliance and law regulations.
暂无评论