In this catchword article we describe the current technological opportunities that are available through blockchain technologies and outline how the field of enterprise modeling can contribute to these developments as well as benefit itself from them. For this purpose, we discuss the technical foundations of blockchains and derive a framework for relating both sides. Finally, it is reported about recent approaches that already engage in these opportunities.
{"title":"Catchword: Blockchains and Enterprise Modeling","authors":"Hans-Georg Fill, P. Fettke, S. Rinderle-Ma","doi":"10.18417/EMISA.15.16","DOIUrl":"https://doi.org/10.18417/EMISA.15.16","url":null,"abstract":"In this catchword article we describe the current technological opportunities that are available through blockchain technologies and outline how the field of enterprise modeling can contribute to these developments as well as benefit itself from them. For this purpose, we discuss the technical foundations of blockchains and derive a framework for relating both sides. Finally, it is reported about recent approaches that already engage in these opportunities.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126905470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Effort and quality of care documentation are among the most pressing challenges in the nursing domain due to demographic development and compliance demands. Hence approaches for decreasing the effort of documentation while increasing its quality are required. This work introduces the idea of automatic task completion and documentation which is achieved through a process-aware solution where physical objects utilized during care tasks are equipped with NFC tags. Nine use cases from the care domain are identified with domain experts and implemented through a proof-of-concept prototype. The time reduction of employing this technology is assessed by domain experts within the typical routines in a nursing home. The interviews indicate an average decrease in documentation time per shift of more than 60%. Inherently also documentation quality is increased as automatic documentation prevents forgetting to document certain steps or other errors. On top, this work fosters two ways for comprehensive documentation, i.e., log-based documentation for analysis and monitoring tasks and paper-based documentation as typically expected by nurses. The logs are automatically created and stored by the underlying process engine. It is shown how paper-based documentation can be automatically created based on process logs. Overall, this work provides the basis for automatic, comprehensive, and continuous documentation of care tasks based on NFC technology.
{"title":"Balancing Patient Care and Paperwork Automatic Task Enactment and Comprehensive Documentation in Treatment Processes","authors":"Florian Stertz, Juergen Mangler, S. Rinderle-Ma","doi":"10.18417/EMISA.15.11","DOIUrl":"https://doi.org/10.18417/EMISA.15.11","url":null,"abstract":"Effort and quality of care documentation are among the most pressing challenges in the nursing domain due to demographic development and compliance demands. Hence approaches for decreasing the effort of documentation while increasing its quality are required. This work introduces the idea of automatic task completion and documentation which is achieved through a process-aware solution where physical objects utilized during care tasks are equipped with NFC tags. Nine use cases from the care domain are identified with domain experts and implemented through a proof-of-concept prototype. The time reduction of employing this technology is assessed by domain experts within the typical routines in a nursing home. The interviews indicate an average decrease in documentation time per shift of more than 60%. Inherently also documentation quality is increased as automatic documentation prevents forgetting to document certain steps or other errors. On top, this work fosters two ways for comprehensive documentation, i.e., log-based documentation for analysis and monitoring tasks and paper-based documentation as typically expected by nurses. The logs are automatically created and stored by the underlying process engine. It is shown how paper-based documentation can be automatically created based on process logs. Overall, this work provides the basis for automatic, comprehensive, and continuous documentation of care tasks based on NFC technology.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130711113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Guerreiro, Diogo Silva, Tiago Rosado, André Vasconcelos, M. Correia, P. Sousa
Many applications supported by blockchain technology are emerging in the industry. Blockchain can be used to enforce the correctness of business process execution and, consequently, increasing the trust among the stakeholders involved in complex business processes. Since few experiences in the area have been reported, more are needed to better understand the benefits and pitfalls of blockchain-based solutions for decentralized business process control. This paper is an experience report of two projects that enforce decentralized business process control using blockchain - a food supply chain and a car registration - using a Design Science Research Methodology approach. Each application follows a different business process design - DEMO and BPMN - leading to different implementations based on Hyperledger Fabric. The major lessons learned are related to the appropriateness of DEMO and BPMN as business process modelling languages in the context of blockchain applications.
{"title":"Decentralized Business Process Control using Blockchain An experience report from two applications: Food Supply Chain and Car Registration","authors":"S. Guerreiro, Diogo Silva, Tiago Rosado, André Vasconcelos, M. Correia, P. Sousa","doi":"10.18417/EMISA.15.15","DOIUrl":"https://doi.org/10.18417/EMISA.15.15","url":null,"abstract":"Many applications supported by blockchain technology are emerging in the industry. Blockchain can be used to enforce the correctness of business process execution and, consequently, increasing the trust among the stakeholders involved in complex business processes. Since few experiences in the area have been reported, more are needed to better understand the benefits and pitfalls of blockchain-based solutions for decentralized business process control. This paper is an experience report of two projects that enforce decentralized business process control using blockchain - a food supply chain and a car registration - using a Design Science Research Methodology approach. Each application follows a different business process design - DEMO and BPMN - leading to different implementations based on Hyperledger Fabric. The major lessons learned are related to the appropriateness of DEMO and BPMN as business process modelling languages in the context of blockchain applications.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper serves as an editorial to the corresponding special issue on Blockchain Technologies in Enterprise Modeling and Enterprise Information Systems.
本文是《区块链技术在企业建模和企业信息系统中的应用》专刊的社论。
{"title":"Blockchain Technologies in Enterprise Modeling and Enterprise Information Systems","authors":"Hans-Georg Fill, P. Fettke, S. Rinderle-Ma","doi":"10.18417/EMISA.15.12","DOIUrl":"https://doi.org/10.18417/EMISA.15.12","url":null,"abstract":"This paper serves as an editorial to the corresponding special issue on Blockchain Technologies in Enterprise Modeling and Enterprise Information Systems.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132932158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain technologies allow for multiple organizations, individuals, and software to become part of a decentralized network where they can reach consensus on the state of the system including all data stored. Due to the ability of reaching consensus even among untrusted actors, the idea of decentralized organizations has been proposed, where both the system components as well as their coordination are distributed. Given such a system of distributed actors, the problem of decentralized coordination for following common goals and planning becomes apparent. This paper addresses the decentralized coordination problem by means of a blockchain-based approach that uses conceptual modeling to reach consensus in decentralized organizations. With a unified view on the processes and instances of distributed actors, the aim is a decentralized planning and execution through models. For this purpose, an existing approach for decentralized process modeling and instance tracking is applied and extended with the possibility for actors to form consensus on an organizational level through blockchain transactions.
{"title":"Process Modeling in Decentralized Organizations Utilizing Blockchain Consensus","authors":"Felix Härer","doi":"10.18417/EMISA.15.13","DOIUrl":"https://doi.org/10.18417/EMISA.15.13","url":null,"abstract":"Blockchain technologies allow for multiple organizations, individuals, and software to become part of a decentralized network where they can reach consensus on the state of the system including all data stored. Due to the ability of reaching consensus even among untrusted actors, the idea of decentralized organizations has been proposed, where both the system components as well as their coordination are distributed. Given such a system of distributed actors, the problem of decentralized coordination for following common goals and planning becomes apparent. This paper addresses the decentralized coordination problem by means of a blockchain-based approach that uses conceptual modeling to reach consensus in decentralized organizations. With a unified view on the processes and instances of distributed actors, the aim is a decentralized planning and execution through models. For this purpose, an existing approach for decentralized process modeling and instance tracking is applied and extended with the possibility for actors to form consensus on an organizational level through blockchain transactions.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper serves as an editorial to the corresponding special issue setting out solutions and future directions of privacy preservation and data protection in information system design.
本文作为相应专题的社论,阐述了信息系统设计中隐私保护和数据保护的解决方案和未来发展方向。
{"title":"Towards Privacy Preservation and Data Protection in Information System Design. An introduction to the special issue","authors":"A. Koschmider, Judith Michael, N. Baracaldo","doi":"10.18417/EMISA.15.7","DOIUrl":"https://doi.org/10.18417/EMISA.15.7","url":null,"abstract":"This paper serves as an editorial to the corresponding special issue setting out solutions and future directions of privacy preservation and data protection in information system design.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115474451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Mannhardt, A. Koschmider, Lars Biermann, Jana Lange, Florian Tschorsch, M. Wynn
This paper summarizes the panel discussion at the 1st Workshop on Trust and Privacy in Process Analytics (TPPA) co-located with the 2nd International Conference on Process Mining. The panel discussed to what extend trust and privacy is embedded in applications of process mining and took place on 5th October 2020. The virtual session was chaired by Felix Mannhardt and Agnes Koschmider and the invited panelists were Moe Wynn, Jana Lange, Lars Biermann and Florian Tschorsch. The major challenges that this panel identified related to privacy-preserving process mining are to include (user-centric) privacy filters, understanding the privacy-utility trade-off and to link privacy-preserving techniques with dataset quality.
{"title":"Trust and Privacy in Process Analytics","authors":"F. Mannhardt, A. Koschmider, Lars Biermann, Jana Lange, Florian Tschorsch, M. Wynn","doi":"10.18417/EMISA.15.8","DOIUrl":"https://doi.org/10.18417/EMISA.15.8","url":null,"abstract":"This paper summarizes the panel discussion at the 1st Workshop on Trust and Privacy in Process Analytics (TPPA) co-located with the 2nd International Conference on Process Mining. The panel discussed to what extend trust and privacy is embedded in applications of process mining and took place on 5th October 2020. The virtual session was chaired by Felix Mannhardt and Agnes Koschmider and the invited panelists were Moe Wynn, Jana Lange, Lars Biermann and Florian Tschorsch. The major challenges that this panel identified related to privacy-preserving process mining are to include (user-centric) privacy filters, understanding the privacy-utility trade-off and to link privacy-preserving techniques with dataset quality.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"84 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116257492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Personal data is increasingly positioned as a valuable asset. While individuals generate and expose ever-expanding volumes of personal information online, certain tech companies have built their business models on the personal data they gather. In this context, lawmakers are revising data protection regulations in order to provide individuals with enhanced rights and set new rules regarding the way corporations collect, manage, and share personal information. We argue that recent data protection regulatory frameworks such as the European Union’s General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA) are fundamentally about data management. Yet, there have been no attempts to analyze the regulations in terms of their implications on the data life cycle. In this paper, we systematically analyze the GDPR and the CCPA, and identify their implications on the data life cycle. To synthesize our findings, we propose a semi-formal notation of the resulting changes on the personal data life cycle, in the form of a process and data model governed by business rules, consolidated in a reference personal data life cycle model for data protection. To the best of our knowledge, this study represents one of the first attempts to provide a data-centric view on data protection regulatory requirements.
{"title":"Personal Data Protection Inside and Out. Integrating Data Protection Requirements in the Data Lifecycle","authors":"Clément Labadie, Christine Legner","doi":"10.18417/EMISA.15.9","DOIUrl":"https://doi.org/10.18417/EMISA.15.9","url":null,"abstract":"Personal data is increasingly positioned as a valuable asset. While individuals generate and expose ever-expanding volumes of personal information online, certain tech companies have built their business models on the personal data they gather. In this context, lawmakers are revising data protection regulations in order to provide individuals with enhanced rights and set new rules regarding the way corporations collect, manage, and share personal information. We argue that recent data protection regulatory frameworks such as the European Union’s General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA) are fundamentally about data management. Yet, there have been no attempts to analyze the regulations in terms of their implications on the data life cycle. In this paper, we systematically analyze the GDPR and the CCPA, and identify their implications on the data life cycle. To synthesize our findings, we propose a semi-formal notation of the resulting changes on the personal data life cycle, in the form of a process and data model governed by business rules, consolidated in a reference personal data life cycle model for data protection. To the best of our knowledge, this study represents one of the first attempts to provide a data-centric view on data protection regulatory requirements.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laurens Sion, Pierre Dewitte, D. Landuyt, Kim Wuyts, P. Valcke, W. Joosen
Building software-intensive systems that respect the fundamental rights to privacy and data protection requires explicitly addressing data protection issues at the early development stages. Data Protection by Design (DPbD)—as coined by Article 25(1) of the General Data Protection Regulation (GDPR)—therefore calls for an iterative approach based on (i) the notion of risk to data subjects, (ii) a close collaboration between the involved stakeholders and (iii) accountable decision-making. In practice, however, the legal reasoning behind DPbD is often conducted on the basis of informal system descriptions that lack systematicity and reproducibility. This affects the quality of Data Protection Impact Assessments (DPIA)—i.e. the concrete manifestation of DPbD at the organizational level. This is a major stumbling block when it comes to conducting a comprehensive and durable assessment of the risks that takes both the legal and technical complexities into account. In this article, we present DPMF, a data protection modeling framework that allows for a comprehensive and accurate description of the data processing operations in terms of the key concepts used in the GDPR. The proposed modeling approach supports the automation of a number of legal reasonings and compliance assessments (e.g., purpose compatibility) that are commonly addressed in a DPIA exercise and this support is strongly rooted upon the system description models. The DPMF is supported in a prototype modeling tool and its practical applicability is validated in the context of a realistic e-health system for a number of complementary development scenarios.
{"title":"DPMF: A Modeling Framework for Data Protection by Design","authors":"Laurens Sion, Pierre Dewitte, D. Landuyt, Kim Wuyts, P. Valcke, W. Joosen","doi":"10.18417/EMISA.15.10","DOIUrl":"https://doi.org/10.18417/EMISA.15.10","url":null,"abstract":"Building software-intensive systems that respect the fundamental rights to privacy and data protection requires explicitly addressing data protection issues at the early development stages. Data Protection by Design (DPbD)—as coined by Article 25(1) of the General Data Protection Regulation (GDPR)—therefore calls for an iterative approach based on (i) the notion of risk to data subjects, (ii) a close collaboration between the involved stakeholders and (iii) accountable decision-making. \u0000In practice, however, the legal reasoning behind DPbD is often conducted on the basis of informal system descriptions that lack systematicity and reproducibility. This affects the quality of Data Protection Impact Assessments (DPIA)—i.e. the concrete manifestation of DPbD at the organizational level. This is a major stumbling block when it comes to conducting a comprehensive and durable assessment of the risks that takes both the legal and technical complexities into account. In this article, we present DPMF, a data protection modeling framework that allows for a comprehensive and accurate description of the data processing operations in terms of the key concepts used in the GDPR. \u0000The proposed modeling approach supports the automation of a number of legal reasonings and compliance assessments (e.g., purpose compatibility) that are commonly addressed in a DPIA exercise and this support is strongly rooted upon the system description models. The DPMF is supported in a prototype modeling tool and its practical applicability is validated in the context of a realistic e-health system for a number of complementary development scenarios.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130231144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This contribution addresses the quest for a framework for a comprehensive science of informatics as a formal theory of discrete dynamic systems, in analogy to the model of natural sciences. A variety of examples show that this endeavor is promising indeed, and that (detached) parts of it exist already. In the long run, informatics may evolve as a self-contained science, more comprehensive than nowadays Computer Science, by complementing its strong technological aspects with a consistent theoretical, mathematical basis, on an equal footing with natural sciences.
{"title":"Informatics as a Science","authors":"W. Reisig","doi":"10.18417/EMISA.15.6","DOIUrl":"https://doi.org/10.18417/EMISA.15.6","url":null,"abstract":"This contribution addresses the quest for a framework for a comprehensive science of informatics as a formal theory of discrete dynamic systems, in analogy to the model of natural sciences. A variety of examples show that this endeavor is promising indeed, and that (detached) parts of it exist already. In the long run, informatics may evolve as a self-contained science, more comprehensive than nowadays Computer Science, by complementing its strong technological aspects with a consistent theoretical, mathematical basis, on an equal footing with natural sciences.","PeriodicalId":186216,"journal":{"name":"Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121786434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}